Cisco Linksys EtherFast BEFVP41 User Manual
Cisco Linksys EtherFast BEFVP41 User Manual

Cisco Linksys EtherFast BEFVP41 User Manual

Etherfast cable/dsl vpn router with 4-port switch

Advertisement

Quick Links

USER GUIDE
EtherFast
Cable/DSL VPN Router
®
with 4-Port Switch
BEFVP41 (EU/LA)
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Cisco Linksys EtherFast BEFVP41

  • Page 1 USER GUIDE EtherFast Cable/DSL VPN Router ® with 4-Port Switch BEFVP41 (EU/LA) Model:...
  • Page 2: About This Guide

    Network Security www.linksys.com/security Copyright and Trademarks Linksys, EtherFast, Cisco, and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Introduction Introduction to VPNs ......... . . 1 VPN Examples.
  • Page 4 Table of Contents Appendix E: Regulatory Information FCC Statement ..........25 Safety Notices.
  • Page 5: Chapter 1: Introduction

    The following are examples of a VPN tunnel between two VPN routers and a VPN tunnel between a computer using VPN client software and a VPN router. Thank you for choosing the Linksys by Cisco EtherFast VPN Router to VPN Router Cable/DSL VPN Router with 4-Port Switch. The Router...
  • Page 6: Vpn Security

    Introduction Chapter 1 There are additional ways to enhance data security beyond Off-Site the VPN Router. Here are some suggestions: Internet Enhance security on your other networks. Install • firewall routers for your Internet connections, and use the most up-to-date security measures for wireless networking.
  • Page 7: Chapter 2: Product Overview

    Product Overview Chapter 2 Chapter 2: Back Panel Product Overview Front Panel Reset There are two ways to reset the Router to its factory default settings. Use a straightened paper clip or similar object to press and hold the Reset button for approximately five seconds. You can also restore the defaults from the Power (Green) The Power LED lights up and...
  • Page 8: Chapter 3: Advanced Configuration

    Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you’d like to change its advanced settings, use the Router’s web-based utility. This chapter describes each web page of the utility and each page’s key functions.
  • Page 9 Advanced Configuration Chapter 3 Static IP before your Internet connection terminates. The default Max Idle Time is 5 minutes. If you are required to use a permanent IP address to Keep Alive: Redial Period If you select this option, connect to the Internet, select Static IP. the Router will periodically check your Internet connection.
  • Page 10 Advanced Configuration Chapter 3 PPTP Point-to-Point Tunneling Protocol (PPTP) is a service that applies to connections in Europe only. Connection Type > Heart Beat Signal User Name and Password Enter the User Name and Password provided by your ISP. Heart Beat Server Enter the IP address of your ISP’s Heart Beat server.
  • Page 11: Setup > Ddns

    Advanced Configuration Chapter 3 Router select the best MTU for your Internet connection, amount of time, in minutes, that the user will be “leased” keep the default setting, Automatic. this dynamic IP address. After the time is up, the user will be automatically assigned a new dynamic IP address.
  • Page 12: Setup > Mac Address Clone

    Advanced Configuration Chapter 3 Setup > MAC Address Clone Advanced Routing A MAC address is a 12-digit code assigned to a unique Dynamic Routing piece of hardware for identification. Some ISPs will require If this Router is hosting your network’s connection to you to register a MAC address in order to access the the Internet, keep the default, Enabled.
  • Page 13: Security > Firewall

    Advanced Configuration Chapter 3 Block WAN Requests Routing Table Block Anonymous Internet Requests For each route, the Destination LAN IP address, Subnet This feature Mask, Gateway, Hop Count, and Interface are displayed. makes it more difficult for outside users to work their Click Refresh to update the information.
  • Page 14 Advanced Configuration Chapter 3 VPN Tunnel IP Address Only the computer with a specific IP address will be able The Router creates a tunnel between two endpoints, to access the tunnel. so that the data traveling between these endpoints is secure.
  • Page 15 Advanced Configuration Chapter 3 for a specific computer on the Internet (for example: encryption keys will not be able to obtain future IPSec keys. vpn.myvpnserver.com). Select Enabled to ensure that the initial key exchange and IKE proposals are secure. Pre-shared Key This specifies the pre-shared key used The remote VPN Router will accept a request from any to authenticate the remote IKE peer.
  • Page 16: Access Restrictions

    Advanced Configuration Chapter 3 Key Lifetime Enter the number of seconds you want the key to last before a re-key negotiation between each endpoint is completed. The default is 3600 seconds. Phase 2 The Encryption, Authentication, and PFS settings are automatically displayed.
  • Page 17: Applications And Gaming > Port Range Forwarding

    Advanced Configuration Chapter 3 Select any Blocked Services and enter a range of ports in the fields provided. If the service you want to block is not listed or you want to edit a service’s settings, then click Add/Edit Service. If you want to block websites with specific URL addresses, enter each URL in a separate field next to Website Blocking by URL Address.
  • Page 18: Applications & Gaming > Port Triggering

    Advanced Configuration Chapter 3 Start and End Enter the number or range of port(s) Click Save Settings to apply your changes, or click Cancel used by the server or Internet applications. Check Changes to cancel your changes. with the Internet application documentation for more information.
  • Page 19: Applications And Gaming > Dmz

    Advanced Configuration Chapter 3 Applications and Gaming > DMZ TFTP (Trivial File Transfer Protocol) - A version of the TCP/IP FTP protocol that has no directory or password capability. The DMZ feature allows one network computer to be Finger - A UNIX command widely used on the Internet exposed to the Internet for use of a special-purpose to find out information about a particular user, such as a service such as Internet gaming or videoconferencing.
  • Page 20: Administration > Log

    Advanced Configuration Chapter 3 Data is passed from an SNMP agent, such as the Router, to the workstation console used to oversee the network. The Router then returns information contained in a Management Information Base (MIB), a data structure that defines what is obtainable from the device and what can be controlled.
  • Page 21: Administration > Diagnostics

    Advanced Configuration Chapter 3 Ping Test Denial of Service Thresholds Enter the number of Denial of Service (DoS) attacks the Router detects before it sends an e-mail alert. The default is 20. Ping Test Parameters SMTP Mail Server If you want any log or alert information Ping Target IP Enter the address of the PC or other device e-mailed to you, then enter the name or numerical IP...
  • Page 22: Administration > Firmware Upgrade

    Advanced Configuration Chapter 3 have saved will be lost when the default settings are restored. Administration > Firmware Upgrade The Firmware Upgrade screen allows you to upgrade the Router’s firmware. Do not upgrade the firmware unless you are experiencing problems with the Router or the new firmware has a feature you want to use.
  • Page 23 Advanced Configuration Chapter 3 Local Network Local MAC Address The MAC address of the Router’s local interface is displayed. IP Address The local IP address of the Router is displayed. Subnet Mask The Subnet Mask of the Router is displayed. DHCP Server The status of the Router’s DHCP server function is displayed.
  • Page 24: Appendix A: Troubleshooting

    Troubleshooting Appendix A Appendix A: When you double-click the web browser, you are prompted for a username and password. If you want to Troubleshooting get rid of the prompt, follow these instructions. Launch the web browser and perform the following steps (these steps are specific to Internet Explorer but are similar Your computer cannot connect to the Internet.
  • Page 25: Appendix B: Vpn Tunnel

    VPN Tunnel Appendix B Appendix B: VPN Tunnel Overview This appendix describes an example of how to set up a VPN tunnel between two VPN Routers. Refer to “Chapter 3: Advanced Configuration” for more information. Instructions 192.168.1.1 in the Open your web browser, and enter Address field.
  • Page 26: Appendix C: Specifications

    Specifications Appendix C Appendix C: Specifications Model BEFVP41 Standards IEEE 802.3 (10BaseT), IEEE 802.3u (100BaseTX) VPN Encryption DES (56-bit), 3DES (168-bit) VPN Authentication MD5, SHA Ports Internet: One 10/100 RJ-45 Port Local Network: Four 10/100 RJ-45 Ports Cabling Type UTP Category 5 or Better...
  • Page 27: Appendix D: Warranty Information

    Warranty Information Appendix D Appendix D: network on which the product or software is used will be free of vulnerability to intrusion or attack. The product Warranty Information may include or be bundled with third party software or service offerings. This limited warranty shall not apply to such third party software or service offerings.
  • Page 28 Warranty Information Appendix D and a copy of your dated proof of original purchase when returning your product. Products received without a RMA number and dated proof of original purchase will be rejected. Do not include any other items with the product you are returning to Linksys.
  • Page 29: Appendix E: Regulatory Information

    Regulatory Information Appendix E Appendix E: Avis d’Industrie Canada Regulatory Information Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Le fonctionnement est soumis aux conditions suivantes : FCC Statement Ce périphérique ne doit pas causer d’interférences; This product has been tested and complies with the Ce périphérique doit accepter toutes les interférences specifications for a Class B digital device, pursuant to Part...
  • Page 30: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    Regulatory Information Appendix E User Information for Consumer Products Čeština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno Waste Electric and Electronic Equipment s netříděným komunálním odpadem.
  • Page 31 Regulatory Information Appendix E Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 32 Regulatory Information Appendix E Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 33 Regulatory Information Appendix E Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
  • Page 34: Appendix F: Software License Agreement

    CISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR USING THE PRODUCT CONTAINING This product from Cisco-Linksys LLC or from one of its THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco- THIS AGREEMENT.
  • Page 35 Software License Agreement Appendix F your Linksys product and/or the Software is being used in OR RELATED TO THE USE OF OR INABILITY TO USE THE accordance with the terms of this Agreement; (iii) to provide SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF improvements to the way Linksys delivers technology to THE POSSIBILITY OF SUCH DAMAGES.
  • Page 36 Software License Agreement Appendix F GNU General Public License is intended to guarantee your TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND freedom to share and change free software–to make sure MODIFICATION the software is free for all its users. This General Public This License applies to any program or other work License applies to most of the Free Software Foundation’s which contains a notice placed by the copyright...
  • Page 37 Software License Agreement Appendix F If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
  • Page 38 Software License Agreement Appendix F If, as a consequence of a court judgment or allegation not specify a version number of this License, you of patent infringement or for any other reason (not may choose any version ever published by the Free limited to patent issues), conditions are imposed on Software Foundation.
  • Page 39 Software License Agreement Appendix F GNU LESSER GENERAL PUBLIC LICENSE To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the Version 2.1, February 1999 library is modified by someone else and passed on, the recipients should know that what they have is not the Copyright (C) 1991, 1999 Free Software Foundation, Inc.
  • Page 40 Software License Agreement Appendix F freedom and the wherewithal to run that program using a You may copy and distribute verbatim copies of the modified version of the Library. Library’s complete source code as you receive it, in any medium, provided that you conspicuously and The precise terms and conditions for copying, distribution appropriately publish on each copy an appropriate and modification follow.
  • Page 41 Software License Agreement Appendix F Thus, it is not the intent of this section to claim When a “work that uses the Library” uses material from rights or contest your rights to work written entirely a header file that is part of the Library, the object code by you;...
  • Page 42 Software License Agreement Appendix F Use a suitable shared library mechanism for linking You may not copy, modify, sublicense, link with, or with the Library. A suitable mechanism is one that distribute the Library except as expressly provided (1) uses at run time a copy of the library already under this License.
  • Page 43 Software License Agreement Appendix F software distributed through that system in reliance BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, on consistent application of that system; it is up to THERE IS NO WARRANTY FOR THE LIBRARY, TO THE the author/donor to decide if he or she is willing to EXTENT PERMITTED BY APPLICABLE LAW.
  • Page 44 Software License Agreement Appendix F OpenSSL License Original SSLeay License Copyright © 1998-2007 The OpenSSL Project. All rights Copyright © 1995-1998 Eric Young (eay@cryptsoft.com) reserved. All rights reserved. Redistribution and use in source and binary forms, with This package is an SSL implementation written by Eric or without modification, are permitted provided that the Young (eay@cryptsoft.com).
  • Page 45 Software License Agreement Appendix F DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Table of Contents