background image

71

Software License  Agreement

4-Port Gigabit Security Router with VPN

Appendix I

Preamble

The licenses for most software are designed to take away 
your  freedom  to  share  and  change  it.  By  contrast,  the 
GNU General Public License is intended to guarantee your 
freedom to share and change free software--to make sure 
the  software  is  free  for  all  its  users.  This  General  Public 
License applies to most of the Free Software Foundation’s 
software  and  to  any  other  program  whose  authors 
commit to using it. (Some other Free Software Foundation 
software  is  covered  by  the  GNU  Lesser  General  Public 
License instead.) You can apply it to your programs, too. 

When  we  speak  of  free  software,  we  are  referring  to 
freedom,  not  price.  Our  General  Public  Licenses  are 
designed  to  make  sure  that  you  have  the  freedom  to 
distribute  copies  of  free  software  (and  charge  for  this 
service if you wish), that you receive source code or can 
get it if you want it, that you can change the software or 
use pieces of it in new free programs; and that you know 
you can do these things. 

To protect your rights, we need to make restrictions that 
forbid anyone to deny you these rights or to ask you to 
surrender the rights. These restrictions translate to certain 
responsibilities  for  you  if  you  distribute  copies  of  the 
software, or if you modify it. 

For example, if you distribute copies of such a program, 
whether gratis or for a fee, you must give the recipients 
all the rights that you have. You must make sure that they, 
too,  receive  or  can  get  the  source  code.  And  you  must 
show them these terms so they know their rights. 

We protect your rights with two steps: (1) copyright the 
software,  and  (2)  offer  you  this  license  which  gives  you 
legal  permission  to  copy,  distribute  and/or  modify  the 
software. 

Also,  for  each  author’s  protection  and  ours,  we  want  to 
make certain that everyone understands that there is no 
warranty for this free software. If the software is modified 
by  someone  else  and  passed  on,  we  want  its  recipients 
to know that what they have is not the original, so that 
any problems introduced by others will not reflect on the 
original authors’ reputations. 

Finally,  any  free  program  is  threatened  constantly  by 
software  patents.  We  wish  to  avoid  the  danger  that 
redistributors  of  a  free  program  will  individually  obtain 
patent licenses, in effect making the program proprietary. 
To prevent this, we have made it clear that any patent must 
be licensed for everyone’s free use or not licensed at all. 

The precise terms and conditions for copying, distribution 
and modification follow. 

TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION 
AND MODIFICATION

0.

 This License applies to any program or other work which 

contains a notice placed by the copyright holder saying it 
may be distributed under the terms of this General Public 
License. The “Program”, below, refers to any such program 
or work, and a “work based on the Program” means either 
the  Program  or  any  derivative  work  under  copyright 
law:  that  is  to  say,  a  work  containing  the  Program  or  a 
portion of it, either verbatim or with modifications and/or 
translated into another language. (Hereinafter, translation 
is included without limitation in the term “modification”.) 
Each licensee is addressed as “you”. 

Activities other than copying, distribution and modification 
are not covered by this License; they are outside its scope. 
The act of running the Program is not restricted, and the 
output  from  the  Program  is  covered  only  if  its  contents 
constitute a work based on the Program (independent of 
having been made by running the Program). Whether that 
is true depends on what the Program does. 

1.

  You  may  copy  and  distribute  verbatim  copies  of  the 

Program’s source code as you receive it, in any medium, 
provided  that  you  conspicuously  and  appropriately 
publish  on  each  copy  an  appropriate  copyright  notice 
and disclaimer of warranty; keep intact all the notices that 
refer to this License and to the absence of any warranty; 
and give any other recipients of the Program a copy of this 
License along with the Program. 

You may charge a fee for the physical act of transferring a 
copy, and you may at your option offer warranty protection 
in exchange for a fee. 

2.

 You  may  modify  your  copy  or  copies  of  the  Program 

or  any  portion  of  it,  thus  forming  a  work  based  on  the 
Program,  and  copy  and  distribute  such  modifications  or 
work under the terms of Section 1 above, provided that 
you also meet all of these conditions: 

a) You must cause the modified files to carry prominent 
notices stating that you changed the files and the date 
of any change. 

b)  You  must  cause  any  work  that  you  distribute  or 
publish, that in whole or in part contains or is derived 
from the Program or any part thereof, to be licensed 
as a whole at no charge to all third parties under the 
terms of this License. 

Summary of Contents for Linksys RVS4000

Page 1: ...BUSINESS SERIES Model RVS4000 4 Port Gigabit Security Router with VPN User Guide ...

Page 2: ...ademark of Cisco Systems Inc and or its affiliates in the U S and certain other countries Copyright 2008 Cisco Systems Inc All rights reserved Other brands and product names are trademarks or registered trademarks of their respective holders ...

Page 3: ...do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com international Glossary www linksys com glossary Network Security www linksys com security Copyright andTrademarks Linksys is a registered trademark or trademark of Cisco Systems Inc and or its affiliates in the U S and...

Page 4: ...the Linksys VPN client software to VPN Router 5 Chapter 4 Product Overview 6 Front Panel 6 Back Panel 6 Chapter 5 Setting Up and Configuring the Router 7 Setup 7 Setup Summary 7 Setup WAN 8 Setup LAN 11 Setup DMZ 12 Setup MAC Address Clone 13 Setup Advanced Routing 13 Setup Time 14 Setup IP Mode 14 Firewall 15 Firewall Basic Settings 15 Firewall IP Based ACL 15 Firewall Internet Access Policy 17 F...

Page 5: ...2 VLAN Membership 29 L2 RADIUS 29 L2 Port Setting 30 L2 Statistics 30 L2 Port Mirroring 30 L2 RSTP 30 Status 31 Status Gateway 31 Status Local Network 31 Appendix A Troubleshooting 33 Frequently Asked Questions 38 Appendix B Using Linksys QuickVPN forWindows 2000 XP orVista 41 Overview 41 Before You Begin 41 Installing the Linksys QuickVPN Software 41 Installing from the CD ROM 41 Downloading and ...

Page 6: ...Address 52 Configuration of the RVS4000 52 Configuration of the RV082 52 Configuration of PC 1 and PC 2 53 Configuration when Both Gateways Use Dynamic IP Addresses 53 Configuration of the RVS4000 53 Configuration of the RV082 54 Configuration of PC 1 and PC 2 54 Appendix E Trend Micro ProtectLink Gateway Service 55 Overview 55 How to Access the Web Based Utility 55 How to Purchase Register or Act...

Page 7: ... Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 65 Appendix I Software License Agreement 69 Software in Linksys Products 69 Software Licenses 69 Schedule 1 Linksys Software License Agreement 69 Schedule 2 70 Schedule 3 73 Appendix J Contact Information 76 ...

Page 8: ...nto your office network from off site Users connecting through a VPN tunnel are attached to your company s network with secure access to files e mail and your intranet just as if they were in the building You can also use the VPN capability to allow users on your small office network to securely connect out to a corporate network The QoS features provide consistent voice and video quality througho...

Page 9: ...Internet and its dynamic IP address has expired the DHCP server will assign it a new dynamic IP address A DHCP server can either be a designated PC on the network or another network device such as the Router By default the Router s Internet Connection Type is Obtain an IP automatically DHCP The PC or network device obtaining an IP address is called the DHCP client DHCP frees you from having to ass...

Page 10: ...net This helps the administrators to set up company policies on how to use the Internet bandwidth wisely The signature file is the heart of the IPS system It is similar to the Virus definition file on your PC s Anti Virus software IPS uses this file to match against packets coming into the Router and performs actions accordingly The RVS4000 is shippedwithasignaturefilecontaining1000 rules which co...

Page 11: ... the hacker has either sniffed or spoofed enough information he can now perform a man in the middle attack This attack is performed when data is being transmitted from one network to another by rerouting the data to a new destination Even though the data is not received by its intended recipient it appears that way to the person sending the data These are only a few of the methods hackers use and ...

Page 12: ...figuring a Gateway to Gateway IPSec Tunnel VPN Router to VPN Router Computer using the LinksysVPN client software toVPN Router The following is an example of a computer to VPN Router VPN In her hotel room a traveling businesswoman dials up her ISP Her notebook computer has the Linksys VPN client software which is configured with her office s IP address She accesses the Linksys VPN client software ...

Page 13: ...ding or receiving data over that port INTERNET Green The Internet LED lights up the appropriate LED depending upon the speed of the device attached to the Internet port If the Router is connected to a cable or DSL modem typically the 10 LED will be the only LED lit up Flashing indicates activity Back Panel The Router s ports and Reset button are located on the back panel of the Router Back Panel R...

Page 14: ...ab then select the appropriate screen By default the Setup tab s Summary screen is the first screen displayed following login The utility s tabs and screens are described below For brevity screen names are listed using the notation TabName ScreenName Setup The Setup tab is used to access all of the Router s basic setup functions The device can be used in most network settings without changing any ...

Page 15: ...f VPN tunnels that are available Log Setting Status E mail If this displays Email cannot be sent because you have not specified an outbound SMTP server address then you have not set up the mail server Click the E mail hyperlink to display the Administration Log screen where you can configure the SMTP mail server Setup WAN Internet ConnectionType The Router supports six types of connections Each Se...

Page 16: ...gs to save the changes or click Cancel Changes to undo your changes PPTP Point to Point Tunneling Protocol PPTP is a service that applies to connections in Europe and Israel only PPTP IP Address This is the Router s IP address when seen from the WAN or the Internet Your ISP will provide you with the IP Address you need to specify here Subnet Mask This is the Router s Subnet Mask as seen by externa...

Page 17: ... Point Protocol PPP across the Internet It is used mostly in European countries Check with your ISP for the necessary setup information L2TP IP Address This is the Router s IP address when seen from the WAN or the Internet Your ISP will provide you with the IP Address you need to specify here Subnet Mask This is the Router s Subnet Mask as seen by external users on the Internet including your ISP ...

Page 18: ...Service DDNS Service is disabled by default To enable DDNS Service follow these instructions Sign up for DDNS Service 1 DynDNS Sign up for DDNS service at www dyndns org and write down your User Name Password and Host Name information TZO Sign up for DDNS service at www tzo com and write down your E mail Address Password and Domain Name information Select the DDNS service provider whose service yo...

Page 19: ...blank Static IP Mapping Static IP Mapping is used to bind a specific IP address to a specific MAC address This helps external WAN users to access LAN servers that are advertised through NAPT port forwarding You can define up to 50 entries Static IP Address Enter the IP address to be mapped MAC Address Enter the MAC address to be mapped Host Name Enter the host name to be mapped Click Add to create...

Page 20: ...Routing The Router s dynamic routing feature can be used to automatically adjust to physical changes in the network s layout The Router can use the dynamic RIP protocol to calculate the most efficient route for the network s data packets to travel between the source and the destination based upon the shortest paths The RIP protocol regularly broadcasts routing information to other routers on the n...

Page 21: ...ields and enter the hour minutes and seconds in the Time fields using 24 hour format For example for 10 00 pm enter 22 in the hours field 0 in the minutes field and 0 in the seconds field Set the local time using Network Time Protocol NTP Automatically If you wish to use a NetworkTime Protocol server to set the time and date select this option then complete the following fields Time Zone Select th...

Page 22: ...he field provided Subnet Allows access from the Subnet that you enter in the field provided Remote Upgrade This option allows you to upgrade the Router remotely To allow remote upgrade select Enable The Remote Management feature must be set to Enable as well The default is Disable Multicast Passthrough If an IGMP Proxy running on the Router set this to Enable to cause the Router to allow IP Multic...

Page 23: ...vice Select the service types to which the rule will apply You can either select one of the predefined services in the drop down menu select ALL to allow or deny all typesofIPtraffic ordefineanewservicebyclickingService Management to bring up the ServiceManagementscreen then the new service s Name select the Type TCP UDP or TCP UDP enter the Start Port and Finish Port then click Save The new servi...

Page 24: ...licy Name Days Time and a checkbox to delete clear thepolicy Todeleteapolicy checkthecheckbox in the Delete column and click Delete VieworchangethePCscoveredbythecurrentpolicy click Edit List of PCs to display the List of PCs popup Internet Policy Summary List of PCs On the List of PCs popup you can define PCs by MAC Address or IP Address You can also enter a range of IP Addresses if you want this...

Page 25: ... used by Internet users is different from the port number used by the server or Internet application For example you could configure your Web Server to accept connections on both port 80 standard and port 8080 Then enable Port Forwarding and set the External Port to 80 and the Internal Port to 8080 Now any traffic from the Internet to your Web server will be using port 8080 even though the Interne...

Page 26: ... port range triggering for the relevant application Click Save Settings to save the settings you have entered Click Cancel Changes to cancel any changes you have entered VPN VPN Summary VPN Summary Tunnels Used Displays the number of tunnels used Tunnel s Available Displays the number of available tunnels Detail button Click Detail to display more tunnel information Tunnel Status No Displays the n...

Page 27: ...Name FQDN Authentication IP Only If this is selected the RVS4000 s WAN IP address automatically appears in the IP Address field IP Domain Name FQDN Authentication This is the same as IP Only but includes a domain name for greater security Enter an arbitrary domain name in the Domain Name field The Router s WAN IP address automatically appears in the IP Address field Local Security Group Type Selec...

Page 28: ...on method Authentication Authenticationdeterminesamethod to authenticate the ESP packets Either MD5 or SHA1 may be selected Note that both sides VPN endpoints must use the same Authentication method MD5 A one way hashing algorithm that produces a 128 bit digest SHA1 A one way hashing algorithm that produces a 160 bit digest Perfect Forward Secrecy If PFS is enabled IKE Phase 2 negotiation will gen...

Page 29: ...ortthecertificate for administrator A dialog will ask you to specify where you want to store your certificate The default file name is RVS4000_Admin pem but you can use another name The certificate for administrator contains the private key and needs to be stored in a safe place as a backup If the router s configuration is reset to the factory default this certificate can be imported and restored ...

Page 30: ...P EntertheIPaddressorIPrangeyouneedtocontrol The default is zero which includes all internal IP addresses Direction Select Upstream for outbound traffic or Downstream for inbound traffic Mini Rate Enter the minimum rate for the guaranteed bandwidth Max Rate Enter the maximum rate for the guaranteed bandwidth Enable Check this box to enable this Rate Control Rule Add to list After a rule is set up ...

Page 31: ... Settings to save your settings Click Cancel Changes to cancel any changes you have entered Administration The Administration tab provides access to system administration settings and tools It includes the following screens Administration Management Administration Management Local Gateway Access Gateway Userlist Select the desired Gateway User List Gateway Username Enter the user name here Gateway...

Page 32: ...number Email Alerts Email Alerts Select Enable to cause an e mail to be sent immediately if a DoS Denial of Service attack is detected If enabled fill in the e mail address information in the remaining fields in this section Denial of Service Thresholds Enter the number of DoS Denial of Service attacks which need to be blocked by the built in Firewall before an e mail alert is sent The minimum val...

Page 33: ...umber from the drop down menu Pair Identifies a specific pair A B C or D in the cable Each cable consists of 8 pins 4 pairs Cable Length Displays the length of the cable in meters Status Displays the status of the pair Administration Backup Restore Administration Backup Restore To download a copy of the current configuration and store the file on your PC click Backup to start the download Restore ...

Page 34: ...T Normalization of Telnet negotiation strings RPC RPC record fragging detection Signature Update Before upgrading the firmware download and extract the Router firmware upgrade file from the Linksys website www linksys com Enter the firmware upgrade file name in the Signature Update field or click Browse to find the file Then click Update and follow the on screen instructions IPS P2P IM IPS P2P IM ...

Page 35: ... of ports and can be created per unit per device per stack or any other logical connection combination as VLANs are software based and not defined by physical attributes VLANs function at layer 2 SinceVLANs isolate traffic within the VLAN a Layer 3 router is needed to allow traffic flow between VLANs Layer 3 routers identify segments and coordinate with VLANs VLANs are broadcast and multicast doma...

Page 36: ...half of the table is used to assign port membership for the selectedVLAN The default for each port is Exclude the port is not a member of the VLAN To make a port a member of the VLAN select the applicable mode s For example if the port mode is Untagged select Untagged if the mode is Tagged select Tagged if the mode is Trunk select either Tagged or Untagged L2 RADIUS L2 Switch RADIUS Mode Select En...

Page 37: ... from the selected port Rx Bytes Displays the number of Bytes received on the selected port Rx Frames Displays the number of Frames received on the selected port Tx Errors Displays the number of error packets transmitted from the selected port Rx Errors Displays the number of error packets received from the selected port L2 Port Mirroring L2 Switch Port Mirroring Mirror Source Use this to enable o...

Page 38: ...he type of the connection Interface Displays the Gateway Internet Interface IP Address Displays the Gateway Internet IP Address Subnet Mask Displays the Subnet Mask that is associated with the IP address above Default Gateway Displays your ISP s Gateway DNS 1 2 Displays the DNS Domain Name System IP addresses currently used by this Gateway IP Conntrack Click this button to display the IP Conntrack...

Page 39: ...n a screen showing you which PCs are utilizing the Router as a DHCP server On the DHCP Client Table screen you will see a list of DHCP clients PCs and other network devices with the following information Client Names Interfaces IP Addresses MAC Addresses and the length of time before their assigned IP addresses expire ARP RARP Table Clicking this button will open a screen showing you which PCs are...

Page 40: ...P to get that information or go to its website for the information Click 6 OK in the TCP IP properties window and click Close or OK for the Network window Restart the computer when asked 7 Windows 2000 Click 1 Start Settings and Control Panel Double click Network and Dial Up Connections Right click the 2 Local Area Connection that is associated with the Ethernet adapter you are using and click Pro...

Page 41: ...lly is selected in the TCP IP settings for your Ethernet adapter At the command prompt type 4 ping followed by your Internet IP address and press Enter The Internet IP Address can be found in the web interface of the Router For example if your Internet IP address is 1 2 3 4 you would enter ping 1 2 3 4 and press Enter If you get a reply the computer is connected to the Router If you do NOT get a r...

Page 42: ...onnecting to the IPSec server Refer to I need to set up online game hosting or use other Internet applications below for details Check the Linksys website at www linksys com for more information I need to set up a server behind my Router To use a server like a web ftp or mail server you need to know the respective port numbers they are using For example port 80 HTTP is used for web port 21 FTP is ...

Page 43: ...computer Select 5 Enable to enable DMZ Hosting When you have completed the configuration click Save Settings I forgot my password or the password prompt always appears when saving settings to the Router Reset the Router to factory defaults by pressing the Reset button for ten seconds and then releasing it If you are still getting prompted for a password when saving settings then perform the follow...

Page 44: ...y need to re establish connection periodically To connect to the Router go to the web browser and 1 enter http 192 168 1 1 or the IP address of the Router Enter the password if asked default password is 2 admin On the 3 Setup WAN tab select the option Keep Alive and set the Redial Period option at 20 seconds Click 4 Save Settings If the connection is lost again follow steps 1 and 2 to re establish...

Page 45: ...unnel connected to my RVS4000 but I cannot see the computers in the remote network from Windows Explorer QuickVPN tunneling does not support NetBIOS Broadcast To access the computers or shared drives on the remote network users are advised to use the IP address to identify the resource I have a Gateway to Gateway IPSec VPN tunnel connected between two RVS4000 routers but the users in one network c...

Page 46: ...ownload a file with your FTP client try using another FTP program The web page hangs downloads are corrupt or nothing but junk characters are being displayed on the screen What do I need to do Force your Ethernet adapter to 10Mbps or half duplex mode and turn off the Auto negotiate feature of your Ethernet adapter as a temporary measure Please look at the Network Control Panel in your Ethernet ada...

Page 47: ...ny platform that supports Ethernet and TCP IP is compatible with the Router How many ports can be simultaneously forwarded Theoretically the Router can establish 2 048 sessions at the same time but you can only forward 30 ranges of ports Does the Router replace a modem Is there a cable or DSL modem in the Router No this version of the Router must work in conjunction with a cable or DSL modem Which...

Page 48: ...he username in the 3 Username field Enter the password in the 4 Password field and enter it again in the Re enter to confirm field Click 5 Add Save Click the 6 Active checkbox for VPN Client No 1 Click 7 Save Settings VPN Client Accounts Screen Installing the Linksys QuickVPN Software Installing from the CD ROM Insert the RVS4000 CD ROM into your CD ROM drive 1 Go to the Start menu and then click ...

Page 49: ...ck Help To begin your QuickVPN connection click 3 Connect The connection s progress is displayed Connecting Provisioning Activating Policy and Verifying Network When your QuickVPN connection is established the 4 QuickVPN tray icon turns green and the QuickVPN Status screen appears The screen displays the IP address of the remote end of the VPN tunnel the time and date theVPN tunnel began and the t...

Page 50: ... VPN Client Accounts Click c Generate to generate a new certificate Click d Export for Client and save the certificate as a PEM file Distribute the certificate to all QuickVPN users 2 Each QuickVPN user must then install the certificate as 3 follows Save the certificate into the directory where a the QuickVPN Client is installed For example C Program Files Linksys QuickVPN Client Launch the QuickV...

Page 51: ... mentioned in this appendix are for illustration purposes only Windows 2000 or Windows XP IPAddress 140 111 1 2 UserISPprovidesIPAddress this is only an example Subnet Mask 255 255 255 0 RVS4000 WAN IP Address 140 111 1 1 User ISP provides IP Address this is only an example Subnet Mask 255 255 255 0 LAN IP Address 192 168 1 1 Subnet Mask 255 255 255 0 How to Establish a Secure IPSecTunnel Step 1 C...

Page 52: ...hanged these settings enter your new values If you want to enter a description for your filter click 5 the Description tab and enter the description there Click 6 OK Then click OK or Close in the IP Filter List window Filter List 2 router win The 7 New Rule Properties screen will appear Select the IP Filter List tab and make sure that win Router is highlighted Then click Add New Rules Properties T...

Page 53: ...nnel Rules Tunnel 1 win Router On the 1 IP Filter List tab select filter list win Router IP Filter List Tab Click the 2 Filter Action tab and click the filter action Require Security radio button Then click Edit Filter Action Tab On the 3 Security Methods tab verify that the Negotiate security option is enabled and deselect the Accept unsecured communication but always respond using IPSec check bo...

Page 54: ...onnections Then click the OK or Close button to finish this rule Connection Type Tab Tunnel 2 Router win In the new policy s Properties screen make sure 9 that win Router is selected and deselect the Use Add Wizard check box Then click Add to create the second IP filter Properties Screen Go to the 10 IP Filter List tab and click the filter list Router win IP Filter List Tab Click the 11 Filter Act...

Page 55: ...Yours should be a key that is unique but easy to remember Then click OK Preshared Key This new Preshared key will be displayed Click the 14 Apply button to continue if it appears on your screen otherwise proceed to the next step New Preshared Key Clickthe 15 TunnelSettingtab ClicktheradiobuttonThe tunnel endpoint is specified by this IP Address and enter the Windows 2000 XP computer s IP Address T...

Page 56: ...nter 0 for the last set of IP Addresses e g 192 168 1 0 Enter the IP Address and Subnet Mask of the VPN 6 device at the other end of the tunnel the remote VPN Router or device with which you wish to communicate in the Remote Group Setup fields Select from two types of authentication 7 MD5 and SHA1 SHA1 is recommended because it is more secure As with encryption either of these may be selected prov...

Page 57: ...Remote Gateway Uses a Dynamic IP RVS4000 WAN A A A A LAN 192 168 5 1 RV082 WAN B B B B LAN 192 168 1 1 Gateway to Gateway IPSec VPN Tunnel Remote Gateway Using Static IP NOTE Each computer must have a network adapter installed Configuration of the RVS4000 Follow these instructions for the first VPN Router designated RVS4000 The other VPN Router is designated the RV082 Launch the web browser for a ...

Page 58: ...WAN IP address B B B B of the RV082 will be 7 automatically detected For the Local Security GroupType select Subnet Enter the RV082 s local network settings in the IPAddressand Subnet Mask fields RV082 VPN Settings For the Remote Security Gateway Type select 8 IP address Enter the RVS4000 s WAN IP address in the IP Address field For the Remote Security Group Type select 9 Subnet Enter the RVS4000 ...

Page 59: ... select 6 Enable The WAN IP address A A A A of the RVS4000 will be 7 automatically detected For the Local Security GroupType select Subnet Enter the RVS4000 s local network settings in the IP Address and Subnet Mask fields RVS4000 IPSec VPN Settings For the Remote Security Gateway Type select 8 IP by DNS Resolved Enter the RV082 s domain name in the field provided For the Remote Security Group Typ...

Page 60: ...ormation If the computers can ping each other then you know the VPN tunnel is configured correctly Configuration when Both Gateways Use Dynamic IP Addresses This example assumes both Gateways are using dynamic IP addresses If only the Remote Gateway uses a dynamic IP address refer to Configuration when the Remote Gateway Uses a Dynamic IP RVS4000 Dynamic IP A A A A with Domain Name www xyz com LAN...

Page 61: ... IPSec VPN tab Click the 4 Gateway to Gateway tab Enter a name in the 5 Tunnel Name field For the VPN Tunnel setting select 6 Enable The WAN IP address B B B B of the RV082 will be 7 automatically detected For the Local Security GroupType select Subnet Enter the RV082 s local network settings in the IPAddressand Subnet Mask fields RV082 VPN Settings For the Remote Security Gateway Type select 8 IP...

Page 62: ...the Password on the Setup Password screen Then click OK Login Screen How to Purchase Register or Activate the Service You can purchase register or activate the service using the ProtectLink screen ProtectLink Click the ProtectLink tab to display this screen NOTE If the ProtectLink tab is not displayed upgrade the Router s firmware Refer to Appendix F Firmware Upgrade for instructions ProtectLink F...

Page 63: ...t the appropriate Filtering option Business Hours To filter this URL category during the business hours you have specified select this option Leisure Hours To filter this URL category during non business hours select this option Instances Blocked The number of attempted visits is displayed Business Hour Setting Business Days Select the appropriate days The default days are Mon through Fri Business...

Page 64: ...hanges to undo them ProtectLink Email Protection The Email Protection features are provided by an online service called IMHS which stands for InterScan MessagingHostedSecurity Itchecksyoure mailmessages so spam viruses and inappropriate content are filtered out After you have configured the IMHS settings your e mail messages will be checked online before appropriate messages are forwarded to your ...

Page 65: ...nse information online click this link Status The status of your license Activated or Expired is displayed Platform The platform type Gateway Service is automatically displayed License expires on The date and time your license expires are displayed Renew To renew your license click Renew Then follow the on screen instructions Add Seats Each seat allows an e mail account to use Email Protection To ...

Page 66: ...59 Trend Micro ProtectLink Gateway Service 4 Port Gigabit Security Router with VPN Appendix E ...

Page 67: ...tem Application Anomaly Detection HTTP FTP Telnet RCP P2P Control Instant Messenger Control L3 L4 Protocol IP TCP UDP ICMP Normalization L7 Signature Matching Signature Update Manual download from the Web Secure Management HTTPS Username Password 802 1X Port based RADIUS Authentication EAP MD5 EAP PEAP QoS Service based Service based Bandwidth Management supports Rate Control and Priority Prioriti...

Page 68: ...9 W x H x D 170 x 41 x 170 mm Unit Weight 0 84 lb 0 38 kg Power 12V 1A Certification FCC Class B CE ICES 003 Operating Temp 32 to 104ºF 0 to 40ºC Storage Temp 4 to 158ºF 20 to 70ºC Operating Humidity 10 to 85 Noncondensing Storage Humidity 5 to 90 Noncondensing Specifications are subject to change without notice ...

Page 69: ... Return Materials Authorization RMA number You are responsible for properly packaging and shipping your product to Linksys at your cost and risk You must include the RMA number and a copy of your dated proof of Appendix G Warranty Information Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period which begins on the date...

Page 70: ...and Canada are responsible for all shipping and handling charges custom duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies...

Page 71: ...et other than the receiver s Consult a dealer or an experienced radio TV technician for assistance Safety Notices Caution To reduce the risk of fire use only No 26 AWG or larger telecommunication line cord Do not use this product near water for example in a wet basement or near a swimming pool Avoid using this product during an electrical storm There may be a remote risk of electric shock from lig...

Page 72: ...ká směrnice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místními ...

Page 73: ... το οποίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets des ...

Page 74: ...ult berendezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking nietm...

Page 75: ...a pomôže zabrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenčina Slovene Okoljske informacije za stranke v Evropski uniji Evropska direktiva 2002 96 EC prepoveduje odla...

Page 76: ... ONE OF ITS AFFILIATES CISCO SYSTEMS LINKSYS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IFYOU DO NOT AGREETO ALL OFTHESE TERMS THENYOU MAY NOT DOWNLOAD INSTALL OR USE THE SOFTWARE YOU MAY RETURN UNUSED SOFTWARE OR...

Page 77: ...iately without notice from Linksys if You fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer of Liabilities IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA REVENUE OR PROFIT OR FOR SPECIAL INDIRECT CONSEQUENTIAL INCIDENTAL OR PUNIT...

Page 78: ...ually obtain patent licenses in effect making the program proprietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMSANDCONDITIONSFORCOPYING DISTRIBUTION AND MODIFICATION 0 This License applies to any program or other work which contains a no...

Page 79: ...rnative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work means the preferred form of the work for making modifications to it For an executable work complete source code means all the source code for all modules it contains plus any associated interfac...

Page 80: ... published by the Free Software Foundation If the Program does not specify a version number of this License you may choose any version ever published by the Free Software Foundation 10 If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different write to the author to ask for permission For software which is copyrighted by the Free Software F...

Page 81: ...s product includes cryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright C 1995 1998 Eric Young eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written so as to conform with Netscape s SSL This l...

Page 82: ...OFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenceanddistributiontermsforanypubliclyavailable version or derivative of this code cannot be changed i e this code cannot simply be copied a...

Page 83: ...rmation Website http www linksys com Support Site http www linksys com support FTP Site ftp linksys com Advice Line 800 546 5797 LINKSYS Support 800 326 7114 RMA Return Merchandise Authorization http www linksys com warranty NOTE Details on warranty and RMA issues can be found in the Warranty section of this Guide 7112610B JL ...

Reviews: