WRVS4400N Wireless-N Gigabit Security Router
with VPN
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found
at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (1005R)
Chapter 3: Planning Your Virtual Private Network (VPN)13
Why do I need a VPN?13
What is a VPN?15
Chapter 4: Getting Started with the WRVS4400N Router18
Front Panel19
Back Panel20
WRVS4400N Antennas20
Placement Options21
Installing the Router24
Configuring the Router26
Chapter 5: Setting Up and Configuring the WRVS4400N Wireless-N Router28
Accessing the Web-Based Utility29
Navigating the Utility30
Setting Up Your Wireless-N Router36
Configuring Wireless Settings68
Configuring Firewall Settings88
Configuring the ProtectLink Web Service104
Configuring the VPN Settings105
Configuring the QoS Settings118
Configuring the Administration Settings123
Configuring IPS Settings135
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide3
Configuring the L2 Switch Settings141
Viewing Status152
Contents
Chapter 6: Using the VPN Setup Wizard160
VPN Setup Wizard160
Before You Begin160
Running the VPN Router Software Wizard161
Appendix A: Troubleshooting178
Frequently Asked Questions191
Appendix B: Using Cisco QuickVPN for Windows 2000, XP, or Vista195
Overview195
Before You Begin196
Installing the Cisco QuickVPN Software197
Using the Cisco QuickVPN Software199
Distributing Certificates to QuickVPN Users202
Appendix C: Configuring a Gateway-to-Gateway IPSec Tunnel203
Introduction203
Environment204
Configuring the VPN Settings for the VPN Routers204
Configuring the Key Management Settings206
Configuring PC 1 and PC 2207
Appendix D: Finding Out MAC and IP Addresses208
Windows 98 or Me Instructions208
Windows 2000 or XP Instructions209
For the Router’s Web-based Utility209
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide4
Contents
Appendix E: Cisco ProtectLink Web Service210
Overview210
How to Access the Web-Based Utility210
How to Purchase, Register, or Activate the Service211
How to Use the Service214
Appendix F: Specifications219
General219
Performance220
Management220
Security221
QoS221
Layer 2222
Environmental222
Appendix G: Where to Go From Here223
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide5
Introduction
Thank you for choosing the Cisco WRVS4400N Wireless-N Gigabit Security
Router with VPN. The Wireless-N Gigabit Security Router with VPN is an advanced
Internet-sharing network solution for your small business needs. WRVS4400N lets
multiple computers in your office share an Internet connection through both wired
and wireless connections.
The WRVS4400N wireless router features a built-in 4-Port full-duplex 10/100/
1000 Ethernet switch, which allows you to connect four personal computers
directly, or you can connect more hubs and switches to create as big a network as
you need.
1
You can use the WRVS4400N wireless router as an intranet router to aggregate
traffic to a company backbone network.
The WRVS4400N wireless router has a built-in access point that supports the
latest 802.11n draft specification by IEEE. The WRVS4400N wireless router also
supports 802.11g and 802.11b clients in a mixed environment.
The built-in access point can support an 11n data rate of up to 300 Mbps. In
addition to having a higher data rate, 802.11n technology also promises longer
coverage by using multiple antennas to transmit and receive data streams in
different directions.
The Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN is equipped
with advanced security technologies like Intrusion Prevention System (IPS),
Stateful Packet Inspection (SPI) Firewall, IP based Access List (IP ACL), and
Network Address Port Translation (NAPT, also called NAT as a more generic term).
These technologies work together by providing self-defensive strategy. They
identify, classify, and stop malicious attack traffic in real time while passing
through the WRVS4400N wireless router.
The SPI Firewall provides deep packet inspection to analyze packets in network
layer (IP) and transport layer (TCP, UDP) to block illegal packet transactions. You
can also use IP based ACL to limit traffic to a specific source, destination and
protocol.
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide6
Introduction
1
NAPT allows you to open specific TCP/UDP port numbers to the Internet to
provide limited service while minimizing harmful traffic at the same time.
The Virtual Private Network (VPN) capability is another security feature that
creates encrypted “tunnels” through the Internet, allowing up to five remote offices
and five traveling users to securely connect into your office network from off-site.
Users connecting through a VPN tunnel are attached to your company’s network
with secure access to files, e-mail, and your intranet as if they were in the building.
You can also use the VPN capability to allow users on your small office network to
securely connect out to a corporate network.
The QoS features of the Cisco WRVS4400N Wireless-N Gigabit Security Router
with VPN provide consistent voice and video quality throughout your business.
This administration guide gives you all the information you need to connect, set up,
and configure your router.
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide7
Networking and Security Basics
This chapter describes networking and security basics. It includes the following
sections:
•An Introduction to LANs, page 8
•The Use of IP Addresses, page 9
•The Intrusion Prevention System (IPS), page11
2
An Introduction to LANs
A router is a network device that connects two networks together.
The router connects your local area network (LAN), or the group of personal
computers in your home or office, to the Internet. The router processes and
regulates the data that travels between these two networks.
The router’s Network Address Translation (NAT) technology protects your network
of personal computers so users on the Internet cannot “see” your personal
computers. This is how your LAN remains private. The router protects your
network by inspecting the first packet coming in through the Internet port before
delivery to the final destination on one of the Ethernet ports. The router inspects
Internet port services like the web server, FTP server, or other Internet
applications, and, if allowed, it will forward the packet to the appropriate personal
computer on the LAN side.
You can use multiple Cisco WRVS4400N Wireless-N Gigabit Security Routers to
connect multiple LANs together. This usually applies to a medium-sized or larger
company where you want to divide your network into multiple IP subnets to
increase the intranet throughput and reduce the size of the IP broadcast domain
and its interference. In this case, you need one WRVS4400N wireless router for
each subnetwork and you can connect all the WAN ports to a second level router
or switch to the Internet.
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide8
Networking and Security Basics
The Use of IP Addresses
The second level router only forwards data packets through a wired network so
you don’t have to use the Cisco WRVS4400N Wireless-N Gigabit Security Router.
You can use any wired router in the Cisco family such as RVS4000 that has 4 LAN
ports and 1 WAN port.
2
The Use of IP Addresses
IP stands for Internet Protocol. Every device in an IP-based network, including
personal computers, print servers, and routers, requires an IP address to identify
its location, or address, on the network. This applies to both the Internet and LAN
connections.
There are two ways of assigning IP addresses to your network devices.
A static IP address is a fixed IP address that you assign manually to a personal
computer or other device on the network. Since a static IP address remains valid
until you disable it, static IP addressing ensures that the device assigned it will
always have that same IP address until you change it. Static IP addresses are
commonly used with network devices such as server personal computers or print
servers.
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide9
Networking and Security Basics
The Use of IP Addresses
If you use the router to share your cable or DSL Internet connection, contact your
ISP to find out if they have assigned a static IP address to your account. If so, you
will need that static IP address when configuring the router. You can get the
information from your ISP.
A dynamic IP address is automatically assigned to a device on the network. These
IP addresses are called dynamic because they are only temporarily assigned to
the personal computer or other device. After a certain time period, they expire and
may change. If a personal computer logs onto the network (or the Internet) and its
dynamic IP address has expired, the DHCP server will assign it a new dynamic IP
address.
A DHCP server can either be a designated personal computer on the network or
another network device, such as the router. By default, the router’s Internet
Connection Type is Obtain an IP automatically (DHCP).
The personal computer or network device obtaining an IP address is called the
DHCP client. DHCP frees you from having to assign IP addresses manually every
time a new user is added to your network.
2
For DSL users, many ISPs may require you to log on with a user name and
password to gain access to the Internet. This is a dedicated, high-speed
connection type called Point to Point Protocol over Ethernet (PPPoE). PPPoE is
similar to a dial-up connection, but PPPoE does not dial a phone number when
establishing a connection. It also will provide the router with a dynamic IP address
to establish a connection to the Internet.
By default, a DHCP server (on the LAN side) is enabled on the router. If you already
have a DHCP server running on your network, you MUST disable one of the two
DHCP servers. If you run more than one DHCP server on your network, you will
experience network errors, such as conflicting IP addresses. To disable DHCP on
the router, see Configuring Local Area Network (LAN) Settings, page 52
NOTE Since the router is a device that connects two networks, it needs two IP
addresses—one for the LAN, and one for the Internet. In this Administration
Guide, you’ll see references to the “Internet IP address” and the “LAN IP
address”.
Since the router uses NAT technology, the only IP address that can be seen
from the Internet for your network is the router’s Internet IP address.
However, even this Internet IP address can be blocked so the router and
network seem invisible to the Internet.
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide10
Networking and Security Basics
The Intrusion Prevention System (IPS)
The Intrusion Prevention System (IPS)
IPS is an advanced technology to protect your network from malicious attacks. IPS
works together with your SPI Firewall, IP Based Access Control List (ACL),
Network Address Port Translation (NAPT), and Virtual Private Network (VPN) to
achieve the highest level of security. IPS works by providing real-time detection
and prevention as an in-line module in a router.
The WRVS4400N wireless router has hardware-based acceleration for real-time
pattern matching for detecting malicious attacks. It actively filters and drops
malicious TCP/UDP/ICMP/IGMP packets and can reset TCP connections. This
protects your client personal computers and servers running various operating
systems including Windows, Linux, and Solaris from network worm attacks.
However, this system does not prevent viruses contained in e-mail attachments.
The P2P (peer to peer) and IM (instant messaging) control allows you to prevent
network users from using those protocols to communicate with people over the
Internet. This helps the administrators to set up company policies on how to use
their Internet bandwidth wisely.
2
The signature file is the heart of the IPS system. It is similar to the virus definition
files on your personal computer’s Anti-Virus programs. IPS uses this file to match
against packets coming in to the Router and performs actions accordingly. As of
today, the Wireless-N Router is shipped with signature file version 1.3.8 and with a
total of 1101 rules. The rules cover the following categories: DDoS, Buffer
Overflow, Access Control, Scan, Trojan Horse, Misc., P2P, IM, Virus, Worm, and
Web Attacks.
It is recommended that you update your IPS signature file regularly to thwart new
attack types.
The following diagram illustrates a number of IPS scenarios.
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide11
Networking and Security Basics
The Intrusion Prevention System (IPS)
2
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide12
3
Planning Your Virtual Private Network (VPN)
This chapter provides information for planning your VPN and includes the
following sections:
•Why do I need a VPN?, page13
•What is a VPN?, page15
Why do I need a VPN?
Computer networking provides a flexibility not available when using an archaic,
paper-based system. With this flexibility, however, comes an increased risk in
security. This is why firewalls were first introduced. Firewalls help to protect data
inside of a local network. But what do you do once information is sent outside of
your local network, when e-mails are sent to their destination, or when you have to
connect to your company’s network when you are out on the road? How is your
data protected?
That is when a VPN can help. VPNs are called Virtual Private Networks because
they secure data moving outside of your network as if it were still within that
network.
When data is sent out across the Internet from your computer, it is always open to
attacks. You may already have a firewall, which will help protect data moving
around or held within your network from being corrupted or intercepted by entities
outside of your network, but once data moves outside of your network—when you
send data to someone via e-mail or communicate with an individual over the
Internet—the firewall will no longer protect that data.
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide13
Planning Your Virtual Private Network (VPN)
Why do I need a VPN?
At this point, your data becomes open to hackers using a variety of methods to
steal not only the data you are transmitting but also your network login and
security data. Some of the most common methods are as follows:
•MAC Address Spoo fing, page14
•Data Sniffing, page14
•Man in the Middle Attacks, page14
MAC Address Spoofing
Packets transmitted over a network, either your local network or the Internet, are
preceded by a packet header. These packet headers contain both the source and
destination information for that packet to transmit efficiently. A hacker can use this
information to spoof (or fake) a MAC address allowed on the network. With this
spoofed MAC address, the hacker can also intercept information meant for
another user.
3
Data Sniffing
Data “sniffing” is a method used by hackers to obtain network data as it travels
through unsecured networks, such as the Internet. Tools for just this kind of activity,
such as protocol analyzers and network diagnostic tools, are often built into
operating systems and allow the data to be viewed in clear text.
Man in the Middle Attacks
Once the hacker has either sniffed or spoofed enough information, he can now
perform a “man in the middle” attack. This attack is performed, when data is being
transmitted from one network to another, by rerouting the data to a new
destination. Even though the data is not received by its intended recipient, it
appears that way to the person sending the data.
These are only a few of the methods hackers use and they are always developing
more. Without the security of your VPN, your data is constantly open to such
attacks as it travels over the Internet. Data travelling over the Internet will often
pass through many different servers around the world before reaching its final
destination. That’s a long way to go for unsecured data and this is when a VPN
serves its purpose.
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide14
Planning Your Virtual Private Network (VPN)
What is a VPN?
What is a VPN?
A VPN, or Virtual Private Network, is a connection between two endpoints—a VPN
router, for instance—in different networks that allows private data to be sent
securely over a shared or public network, such as the Internet. This establishes a
private network that can send data securely between these two locations or
networks.
This is done by creating a “tunnel”. A VPN tunnel connects the two PCs or
networks and allows data to be transmitted over the Internet as if it were still
within those networks. Not a literal tunnel, it is a connection secured by encrypting
the data sent between the two networks.
VPN was created as a cost-effective alternative to using a private, dedicated,
leased line for a private network. Using industry standard encryption and
authentication techniques—IPSec, short for IP Security—VPN creates a secure
connection that, in effect, operates as if you were directly connected to your local
network. VPN can be used to create secure networks linking a central office with
branch offices, telecommuters, and/or professionals on the road (travelers can
connect to a VPN router using any computer with the Cisco QuickVPN Client
software.)
3
There are two basic ways to create a VPN connection:
•VPN router to VPN router
•Computer (using the Cisco QuickVPN Client software) to VPN router
The VPN router creates a “tunnel” or channel between two endpoints, so that data
transmissions between them are secure. A computer with the Cisco QuickVPN
Client software can be one of the two endpoints (refer to AppendixB, “Using
Cisco QuickVPN for Windows 2000, XP, or Vista”). If you choose not to run the
VPN client software, any computer with the built-in IPSec Security Manager
(Microsoft 2000 and XP) allows the VPN router to create a VPN tunnel using IPSec
(refer to Appendix C, “Configuring a Gateway-to-Gateway IPSec Tunnel.”).
Other versions of Microsoft operating systems require additional, third-party VPN
client software applications that support IPSec to be installed.
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide15
Planning Your Virtual Private Network (VPN)
What is a VPN?
VPN Router to VPN Router
An example of a VPN router-to-VPN router VPN would be as follows. At home, a
telecommuter uses his VPN router for his always-on Internet connection. His router
is configured with his office’s VPN settings. When he connects to his office’s router,
the two routers create a VPN tunnel, encrypting and decrypting data. As VPNs
utilize the Internet, distance is not a factor. Using the VPN, the telecommuter now
has a secure connection to the central office’s network, as if he were physically
connected. For more information, refer to AppendixC, “Configuring a Gateway-
to-Gateway IPSec Tunnel.”
3
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide16
Planning Your Virtual Private Network (VPN)
What is a VPN?
Computer to VPN Router
The following is an example of a computer-to-VPN router VPN. In her hotel room, a
traveling businesswoman connects to her ISP. Her notebook computer has the
Cisco QuickVPN Client software, which is configured with her office’s IP address.
She accesses the Cisco QuickVPN Client software and connects to the VPN
router at the central office. As VPNs utilize the Internet, distance is not a factor.
Using the VPN, she now has a secure connection to the central office’s network, as
if she were physically connected.
3
For additional information and instructions about creating your own VPN, please
visit www.cisco.com. You can also refer to Appendix B, “Using Cisco QuickVPN
for Windows 2000, XP, or Vista”, and Appendix C, “Configuring a Gateway-toGateway IPSec Tunnel.”
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide17
4
Getting Started with the WRVS4400N Router
This chapter describes the physical features of the WRVS4400N router and
provides information for installing the router. The following sections are included:
•Front Panel, page19
•Back Panel, page 20
•WRVS4400N Antennas, page 20
•Placement Options, page 21
•Installing the Router, page 24
•Configuring the Router, page 26
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide18
Getting Started with the WRVS4400N Router
Front Panel
Front Panel
The LEDs are located on the front panel of the router.
Front of Router
4
POWER LED—Lights up green to indicate the router is powered on. The LED
flashes when the router is running a diagnostic test.
DIAG LED—If this light is off, the system is ready. The Diag LED blinks red
during firmware upgrades.
IPS LED—The IPS LED lights up when the Intrusion Prevention System (IPS)
function is enabled. If the LED is off, then IPS functions are disabled. The IPS
LED flashes green when an external attack is detected. It flashes red when an
internal attack is detected.
Wireless LED—The WIRELESS LED lights up when the wireless module is
enabled. The LED is off when the wireless module is disabled. The WIRELESS
LED flashes green when the data is transmitting or receiving on the wireless
module.
Ethernet Port LEDs 1-4—For each LAN port, there are three LEDs. If a port
LED is continuously lit green, the router is connected to a device at the speed
indicated through the corresponding port (1, 2, 3, or 4). The LED flashes green
when a router is actively sending or receiving data on that port.
INTERNET LED—The Internet LED lights up green to indicate the line speed of
the device attached to the Internet port. If the router is connected to a cable or
DSL modem, typically the 100 LED will be the only LED lit up, indicating
100 Mbps. Flashing indicates activity.
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide19
Getting Started with the WRVS4400N Router
Back Panel
Back Panel
The Ethernet ports, Internet port, Reset button, and Power port are on the back panel of
the router.
4
WRVS4400N Antennas
RESET Button—The Reset button can be used in two ways:
•If the router is having problems connecting to the Internet, press
the Reset button for just a second with a paper clip or a pencil tip.
This is similar to pressing the reset button on your personal
computer to reboot it.
•If you are experiencing extreme problems with the router and
have tried all other troubleshooting measures, press and hold in
the Reset button for 10 seconds. This restores the factory
defaults and clears all of the router settings, such as port
forwarding or a new password.
INTERNET Port—Provides a WAN connection to a cable modem or DSL
modem.
ETHERNET Ports 1-4—Provide a LAN connection to network devices,
such as PCs, print servers, or additional switches.
POWER Port—Connects the router to power via the supplied AC power
adapter.
The router has three non-detachable 1.8dBi omni-directional antennas. The three
antennas have a base that can rotate 90 degrees when in the standing position.
The three antennas support 2X3 MIMO diversity in wireless-N mode.
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide20
Getting Started with the WRVS4400N Router
Placement Options
Placement Options
You can place the router horizontally on the rubber feet, mount it in the stand, or
mount it on the wall.
Desktop Option
For desktop placement, place the Cisco WRVS4400N router horizontally on a
surface so it sits on its four rubber feet.
4
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide21
Getting Started with the WRVS4400N Router
Placement Options
Stand Option
To install the router vertically in the supplied stands, follow the steps below.
4
INTERNET
WRVS4400N
1 2 3 4
1000
100
10
POWER DIAG IPS WIRELESSETHERNET
274945
To place the router vertically, follow these steps.
STEP1Locate the left side panel of the router.
STEP 2With the two large prongs of one of the stands facing outward, insert the short
prongs into the little slots in the router and push the stand upward until the stand
snaps into place.
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide22
Getting Started with the WRVS4400N Router
193817
Wall
mount
slots
2-9/16
Placement Options
STEP 3Repeat step 2 with the other stand.
4
Wall Option
To mount the Cisco WRVS4400N router on the wall, follow these steps.
STEP1Determine where you want to mount the router and install two screws (not
supplied) that are 2-9/16 in. apart (approximately 64.5 mm).
STEP 2With the back panel pointing up (if installing vertically), line up the router so that the
wall-mount crisscross slots on the bottom of the access point line up with the two
screws.
STEP 3Place the wall-mount slots over the screws and slide the router down until the
screws fit snugly into the wall-mount slots.
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide23
Getting Started with the WRVS4400N Router
Installing the Router
Installing the Router
To prepare the router for installation do the following:
•Obtain the setup information for your specific type of Internet connection
from your Internet Service Provider (ISP).
•Power off all of your network hardware, including the router, PCs, and cable
modem or DSL modem.
Perform the steps in this section to install the hardware.
STEP1Connect one end of an Ethernet network cable to one of the LAN ports (labeled 1-
4) on the back of the router. Connect the other end to an Ethernet port on a PC.
4
STEP 2Repeat step 1 to connect up to four PCs, switches, or other network devices to the
router.
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide24
Getting Started with the WRVS4400N Router
Installing the Router
STEP 3Connect an Ethernet network cable from your cable or DSL modem to the Internet
port on the router’s back panel.
4
STEP4Power on the cable or DSL modem.
STEP 5Connect the power adapter to the Power port on the router and plug the other end
into an electrical outlet.
STEP 6The Power and Internet LEDs on the front panel will light up green as soon as the
power adapter is connected properly.
STEP 7Power on the PCs.
The router hardware installation is now complete.
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide25
Getting Started with the WRVS4400N Router
Configuring the Router
Configuring the Router
To configure the WRVS4400N router, plug a PC into the router and launch the webbased configuration utility as follows.
NOTE Before setting up the router, make sure your PCs are configured to obtain an IP (or
TCP/IP) address automatically from the router.
STEP1Launch a web browser, such as Internet Explorer or Mozilla Firefox.
STEP 2In the Address field enter http://192.168.1.1 and press Enter.
STEP 3In the User Name and Password fields, enter admin.
4
The default user name and password is admin.
STEP4Click OK.
For added security, you should later set a new password using the Administration
> Management window of the web-based utility.
STEP 5The web-based utility will appear with the Setup menu and Summary selected.
Click WAN under the Setup menu.
STEP 6If requested by your ISP (usually cable ISPs), complete the Host Name and Domain
Name fields, and the MTU and MTU Size fields. Otherwise, leave the defaults.
STEP 7In the WAN window, choose an Internet Connection Type from the
drop-down menu. Depending on which internet connection type you select,
additional setup may be required.
The Internet Connection Types are:
•Automatic Configuration - DHCP: If you are connecting through DHCP or a
dynamic IP address from your ISP, keep this default setting.
•Static IP: If your ISP assigns you a static IP address, select Static IP from the
drop-down menu. Complete the Internet IP Address, Subnet Mask, Default
Gateway, and DNS fields. Enter at least one DNS address.
•PPPoE: If you are connecting through PPPoE, select PPPoE from the drop-
down menu. Complete the User Name and Password fields.
•PPTP: PPTP is a service used in Europe only. If you are using a PPTP
connection, check with your ISP for the necessary setup information.
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide26
Getting Started with the WRVS4400N Router
Configuring the Router
•Heartbeat Signal: Heartbeat Signal is used primarily in Australia. Check with
your ISP for the necessary setup information.
•L2TP: L2TP is used mostly in Europe. Check with your ISP for the necessary
setup information.
STEP 8When you are finished entering your Internet connection settings, click Save.
STEP 9Restart or power on your PC to obtain the new router setting.
STEP10 Test the setup by opening your web browser from any computer and entering
http://www.cisco.com/smb.
Congratulations! The installation of the router is complete.
4
NOTE For more information about advanced settings and security options, refer to the
Cisco
WRVS4400N Wireless-N Gigabit Security Router with VPN Administration
Guide on your CD-ROM. You can also access this guide and other related
documentation on Cisco.com, as indicated in the next section.
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide27
5
Setting Up and Configuring the WRVS4400N
Wireless-N Router
The Wireless-N router works right out of the box with the default settings.
However, to change these settings, you can use the router’s web-based
configuration utility.
You can access the web-based configuration utility via a web browser (such as
Microsoft Internet Explorer or Mozilla Firefox) from a computer connected to the
same network the router is connected to.
This chapter includes the following sections:
•Accessing the Web-Based Utilit y, page 29
•Navigating the Utility, page 30
•Setting Up Your Wireless-N Router, page 36
•Configuring Wireless Settings, page 68
•Configuring Firewall Settings, page 88
•Configuring the ProtectLink Web Service, page104
•Configuring the VPN Settings, page105
•Configuring the QoS Settings, page118
•Configuring the Administration Settings, page123
•Configuring IPS Settings, page135
•Configuring the L2 Switch Settings, page141
•Viewing Status, page152
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide28
Setting Up and Co nfiguring the WRVS4400N Wirele ss-N Router
Accessing the Web-Based Utility
Accessing the Web-Based Utility
There are two ways to connect to your wireless router for the first time:
•Physically connect your personal computer to one of the four LAN ports on
the router. Then, configure your personal computer to obtain its IP address
automatically from a DHCP server.
•Wirelessly connect your personal computer to the router (not
recommended), by configuring the wireless interface of your personal
computer to obtain its IP address automatically from a DHCP server.
NOTE Wirelessly connecting your personal computer to the router for initial
configuration is not recommended because you might lose the
connection while making wireless configuration changes.
5
To access the router’s web-based utility, follow these steps:
STEP1Launch a web browser, such as Internet Explorer or Mozilla Firefox, and enter the
router’s default IP address, 192.168.1.1, in the Address field. Then, press Enter.
The Authentication Required dialog box appears.
STEP 2Enter admin in the User Name field, and enter your password (default password is
admin) in the Password field. Then, click OK.
The Summary window appears.
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide29
Setting Up and Co nfiguring the WRVS4400N Wirele ss-N Router
Navigating the Utility
5
Navigating the Utility
The web-based utility consists of the following main windows:
•Setup
•Wireless
•Firewall
•ProtectLink
•VPN
•QoS
•Administration
•IPS
•L2 Switch
•Status
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide30
Loading...
+ 194 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.