Page 1
RV260x Administration Guide First Published: 2018-10-23 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883...
Page 2
Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com trademarks.
C O N T E N T S C H A P T E R 1 Getting Started RV260X Product Features Getting Started Launch Setup Wizard User Interface C H A P T E R 2 Status and Statistics System Summary TCP/IP Services Port Traffic WAN QoS Statistics...
Page 4
Contents Diagnostic Certificate Import Certificate Generate CSR/Certificate Show Built-in 3rd Party CA Certificates Configuration Management Copy/Save Configuration C H A P T E R 4 System Configuration Initial Router Setup System Time Email Server Remote Syslog Servers Email User Accounts Remote Authentication Service User Groups IP Address Groups...
Page 5
Contents Mobile Network Mobile Network Setup Bandwidth Cap Setting Dynamic DNS Hardware DMZ IPv6 Transition IPv6 in IPv4 Tunnel (6in4) IPv6 Rapid Deployment (6rd) C H A P T E R 6 Port Settings PoE Settings (RV260P) VLAN Settings Option82 Settings Static DHCP 802.1X Configuration Router Advertisement...
Page 6
C H A P T E R 1 1 Security Content Filtering Web Filtering Cisco Small Business Web Filtering Service Supplemental End User License Agreement C H A P T E R 1 2 Traffic Classes WAN Queuing WAN Policing...
Page 7
Contents Switch Classification Switch Queuing C H A P T E R 1 3 Where To Go Where To Go From Here RV260x Administration Guide...
User Interface, on page 7 RV260X Product Features Thank you for purchasing the Cisco RV260 VPN Series routers. The Cisco RV260 VPN routers are high-performance models that combine business-class features with performance, security, reliability and overall value at a great price point. These models are perfect for the small business, small enterprise, branch, or small home office network.
Page 10
Getting Started RV260X Product Features • FindIT Network Management Support Product Specifications Description Specification Ethernet WAN 1 RJ45 SFP Gigabit Combination Port Ethernet LAN 8 RJ45 Gigabit Ethernet RV260P has 4 PoE ports with a 60w power budget Console Port 1 RJ45 Switch Power On/Off...
Page 11
Getting Started RV260X Product Features Description Specification Network Protocols • Dynamic Host Configuration Protocol (DHCP) server • Point-to-Point Protocol over Ethernet (PPPoE) • Point-to-Point Tunneling Protocol (PPTP) • Layer 2 Tunneling Protocol (L2TP) • DNS proxy • DHCP relay agent •...
Page 12
FindIT Support for Monitoring and Management Event Logging Local, Syslog, email alerts Network Diagnostics Ping, Traceroute, DNS Lookup Upgradeability Firmware upgradeable via browser UI, imported/exported file, USB, Cisco FindIT System Time NTP, Daylight Savings, Manual Entry Environmental RV260x Administration Guide...
Getting Started Getting Started Description Specification Power RV260: 12VDC/2A RV260P: 54VDC/1.67A RV260W: 12VDC/2.5A Operating Temperature 0° to 40°C (32° to 104°F) Storage Temperature -20° to 70°C (-4° to 158°F) Operating Humidity 10% to 85% noncondensing Storage Humidity 5% to 90% noncondensing Certifications Safety: •...
Continue to the website. Step 4 When the sign-in page appears, enter the default username cisco and the default password cisco (lowercase). Step 5 Click Login. The Getting Started page appears. You can use the various links available on this page and follow the on-screen instructions to quickly configure your network device.
Getting Started User Interface To open this page, select Launch Setup Wizard in the navigation pane and follow the on-screen instructions to proceed. Refer to your ISP for the information required to setup your Internet connection. Launch Setup Wizard Initial Router Setup Link to the Initial Router Setup.
Page 16
Getting Started User Interface Table 1: Header Toolbar Options Icon Description Toggle button – Located on the top left of the header – This toggle button helps to expand or collapse the navigation pane. Language Selection – This drop-down list allows you to select the language for the user interface.
Page 17
Getting Started User Interface Export – Click to export the configurations. Import – Click to import the configurations. Popup Windows Some links and buttons launch popup windows that display more information or related configuration pages. If the web browser displays a warning message about the popup window, allow the blocked content. RV260x Administration Guide...
Page 18
Getting Started User Interface RV260x Administration Guide...
C H A P T E R Status and Statistics This section describes the device's status and statistics and contains the following topics: • System Summary, on page 11 • TCP/IP Services, on page 13 • Port Traffic, on page 14 •...
Page 20
Status and Statistics System Summary Firmware Information • Firmware Version – The firmware version number installed on the router. • Firmware MD5 Checksum – A value used for file validation. • Locale – Defined localization support. • Language Version – Language version. •...
Status and Statistics TCP/IP Services Wireless Status This section displays the status of the Wireless. • Radio 1 (2.4G), Radio 2 (5G), and Enabled – Bands displaying the MAC address, mode, channel, and operation bandwidth and their details. VPN Status This section displays the status of the VPN tunnels.
Status and Statistics Port Traffic Port Listen Status This section displays the status of which ports are open to receiving data (listening). • Protocol – Type of protocol used for communication. • Listen IP Address – The listening IP address displays the interface it is listening on. •...
Status and Statistics WAN QoS Statistics • Number of Associated Clients – The number of associated clients on wireless. • RX Packets – Number of RX packets. • RX Bytes – Number of RX bytes. • TX Packets – Number of TX packets. •...
Status and Statistics Switch QoS Statistics • Packets Dropped – Number of outbound packets dropped. Inbound QoS Statistics • Queue – Number of inbound queues. • Traffic Class – Name of traffic class assigned to queue. • Packets Passed – Number of traffic class inbound packets that have passed. •...
Status and Statistics Routing Table • SSID – The primary name assigned to a wireless network. IPv6 • Hostname – Name of the connected device. • IPv6 Address – The IPv6 address of the connected device. • MAC Address – MAC address of the connected device. •...
Status and Statistics Mobile Network • Type – Connection status (Static or Dynamic). • Action – Action status of the DHCP bindings. Mobile Network Mobile networks enable routers and its subnets to maintain transparent IP connectivity, via the mobile router. To view the router's mobile network, click Status and Statistics >...
Page 27
Status and Statistics VPN Status In the Connection Table, you can add, edit, delete, or refresh a tunnel. You can also click on Column Display Selection to select the column headers displayed in the Connection Table. GRE Tunnel Status The Connection Table displays the following: •...
Status and Statistics View Logs • Connect Time – Amount of time connected. • Action –Action status. PPTP Tunnel Status Point-to-Point Tunneling Protocol has the capability to encrypt data with 128-bit. It is used to ensure that messages sent from one VPN node to another are secure. •...
Status and Statistics Captive Portal Status • Clear Logs – Click to clear logs. • Export Logs to PC – Click to export logs to PC. • Export Logs to USB – Click to export logs on to a USB storage device. Captive Portal Status The captive portal feature requires wireless users to accept the terms and conditions prior to joining a public internet access network.
Page 30
Status and Statistics Captive Portal Status RV260x Administration Guide...
• Current Dongle Driver Version – Current version of the USB dongle driver. • Last Update – Date of the last update. • Latest Version Available on Cisco.com – Latest version available on Cisco.com. • Last Checked – Last date checked.
Step 3 In the Upgrade From section, select an option (Cisco.com, PC, or USB). a) If you select Cisco.com, click Upgrade to upgrade the firmware or Download to USB to save the firmware image file. b) If you select PC or USB, click Browse to locate the firmware file on your PC and click Upgrade.
Administration Firmware Auto Fallback Mechanism • The behavior only happens when the router is in factory default and attached with a USB flash drive before it is powered on. • The router will search the USB flash drive for a config file whose name has one or more of the following: PID, MAC address, and Serial Number.
Administration Diagnostic Step 2 In the Active Image after reboot section, select an option (Active Image x.x.xx.xx ) from the drop-down list. Step 3 Select from the following reboot options. • Reboot the device. • Return to factory default settings after reboot. •...
Administration Import Certificate Import Certificate To import a certificate, follow these steps: Step 1 Click Import Certificate. Step 2 Select the type of certificate to import from the drop-down list: • CA Certificate • Local Device Certificate • PKCS#12 Encoded File. Step 3 Enter a certificate name.
Administration Show Built-in 3rd Party CA Certificates Common Name Enter a common name. Email Address Enter the email address. Key Encryption Length Select the Key Encryption Length from the drop-down menu. It should be 512, 1024 or 2048. Valid Duration Enter the number of days (Range 1-10950, Default: 360).
Page 37
Administration Copy/Save Configuration To copy the Running Configuration file, follow these steps: Step 1 In the Copy/Save Configuration section, select the Source from the drop-down list. Step 2 In Destination section, select the destination that the configuration file will be copied to from the drop-down list. Step 3 Click Apply.
C H A P T E R System Configuration This section describes the device's system configuration and contains the following topics: • Initial Router Setup, on page 31 • System, on page 33 • Time, on page 33 • Log, on page 34 •...
Page 40
System Configuration Initial Router Setup Static IP Address A static IP address is a number (in the form of a dotted quad) that is assigned to a computer by an Internet service provider (ISP) to be its permanent address on the Internet.
System Configuration System Step 15 In the Enable Security – Set Router Password section, enter, and confirm the router password. You can check the Disable Password Strength Enforcement to disable the strength enforcement. Step 16 Click Next, and in the Network Name field, enter a name for the network. Step 17 Click Next, and in the Enable Security –...
System Configuration Step 2 Set Time Zone – Select your time zone relative to Coordinated Universal Time (UTC). Step 3 Set Date and Time – Select Auto or Manual. a) For Manual – Enter the date and time. Step 4 In the NTP Server section –...
System Configuration Email Server System Logs involving the system. Firewall Logs involving the firewall rules, attacks, and content filtering. Network Logs involving the network. Logs involving the VPN. OpenVPN OpenVPN-related logs including instances like VPN tunnel establishment failure, VPN gateway failure, and so on. Logs involving web filtering.
System Configuration Email Step 1 In the Syslog Servers section, check Enable to enable the syslog server. Step 2 In the Syslog Server 1 field, enter the IP address of a syslog server to which the log messages are sent. Step 3 In the Syslog Server 2 field, enter the IP address of a syslog server to which the log messages are sent.
Page 45
System Configuration User Accounts To configure the Web Login Session Timeout, select System Configuration > User Accounts and set the following in the Web Login Session Timeout section: Administrator Inactivity Timeout Set the minutes for the inactivity timeout. (Range: 0-1440, 0 means never times out.) Guest Inactivity Timeout Set the minutes for guest inactivity timeout.
Remote Authentication Service is a distributed client/server system that secures networks against unauthorized access. In the Cisco implementation, RADIUS clients run on Cisco routers and send authentication requests to a central RADIUS server that contains all user authentication and network service access information. The RADIUS security server is identified on the basis of their host name or IP address, host name and specific UDP port numbers, or IP address and specific UDP port numbers.
Page 47
System Configuration User Groups To create user groups, follow these steps: Step 1 Select System Configuration > User Groups. Step 2 Under the User Groups, click Add to create a new user group. Step 3 In the Group Name field, enter a name for the group. Step 4 Under the Local User Membership List, click Add and check the box and select desired user group to add the new user Step 5...
System Configuration IP Address Groups IP Address Groups In order to configure and manage the application control policies and web filtering, you must set up the IP address groups. To configure the IP address groups, follow these steps: Step 1 Click System Configuration>...
Note For discovery of Cisco Small Business products, Cisco provides a utility that works through a simple toolbar on the web browser called FindIt. The FindIT Discovery Utility discovers Cisco devices in the network and display basic information, such as serial numbers and IP addresses. For more information and to download the FindIT Discovery Utility, visit www.cisco.com/go/findit.
System Configuration Automatic Updates Step 1 Select System Configuration > LLDP. Step 2 In the LLDP section, check Enable. (It is enabled by default). Step 3 In the LLDP Port Setting Table, check Enable LLDP to enable LLDP on an interface. Step 4 Click Apply.
System Configuration Schedules Schedules The network devices should be protected against intentional attacks and viruses that could compromise confidentiality or result in data corruption or denial of service. Schedules can be created to apply firewall or port forwarding rules on specific days or time of day. To configure the schedule, follow these steps.
Step 1 In your web browser, navigate to https://software.cisco.com. Step 2 Click the Log In button at the top right of the screen. Log in with a cisco.com ID associated with your Cisco Smart Account. Step 3 Select the Plug and Play Connect link under the Network Plug and Play heading. The main page for the Plug and Play Connect service is displayed.
Certain products purchased directly from Cisco may be associated with your Cisco Smart Account at the time of purchase, and these will automatically be added to Plug and Play Connect. However, the majority of Cisco's 100 to 500 series Plug and Play-enabled products will need to be registered manually. To register the devices...
Page 54
System Configuration Registering Devices RV260x Administration Guide...
C H A P T E R A wide area network (WAN) is a collection of geographically distributed telecommunications or computer network. The term distinguishes a broader telecommunication structure from a local area network (LAN). A wide area network may be privately owned or rented and allows a business to effectively carry out its daily functions regardless of location.
Page 56
WAN Settings Default Gateway Enter the IP address of the default gateway. Default Gateway is needed on this interface to participate in the load balance and failover (Multi-WAN). Enter the IP address of the primary and or secondary Static DNS in the fields. Static DNS 1 &...
Page 57
WAN Settings MPPE Encryption Check to enable MPPE encryption. If the IPv4 uses L2TP to connect, configure the following: IP Assignment For DCHP, select this option to enable DHCP to provide an IP address. For Static IP, select this option and provide an IP address, netmask, and the IP address of the default gateway.
Multi-WAN Step 7 Click Apply. Multi-WAN WAN failover provides efficient utilization of multiple WAN interfaces. Based on the configuration, this feature can be used to distribute traffic among the interfaces. The Multi-WAN feature provides the outbound WAN traffic over multiple WAN interfaces (WAN & USB) based on a numeric weight assignment. It also monitors each WAN connection using repeated ping tests and automatically routes outbound traffic to another WAN interface if connectivity is lost.
Mobile Network Setup Step 6 Click Apply. Mobile Network Setup To configure the Mobile Network Setup, follow these steps: Step 1 In the Configuration Mode, select Auto to connect to the network automatically. Step 2 Enter the SIM PIN – the pin code associated with your SIM card. Step 3 Or, select Manual and to connect to the network manually and configure the following: •...
Dynamic DNS • Check Send an email to administrator if 3G/4G usage has reached percentage of monthly bandwidth cap. Select the percentage of data for monthly bandwidth cap from the drop-down list. When the cap is reached, an email alert is sent to the administrator. Step 2 Click Apply.
IPv6 Transition Step 3 Select Subnet to identify a subnetwork for DMZ services and enter the DMZ IP Address and Subnet Mask. Step 4 Select Range to reserve a group of IP addresses on the same subnetwork for DMZ services and enter the IP address range. Step 5 Click Apply.
Page 62
IPv6 Rapid Deployment (6rd) Step 3 Or, select Manual and set the following 6rd parameters. a) Enter the IPv4 Address of Relay. b) Enter the IPv4 Common Prefix Length. c) Enter the IPv6 Prefix/Length. The IPv6 network (subnetwork) is identified by the prefix. All hosts in the network have the identical initial bits for their IPv6 address.
C H A P T E R A local area network (LAN) is a computer network that spans within a relatively small area close to each other, such as in an office building, a school, or a home. LANs are characterized by their topology, protocols, and media.
PoE Settings (RV260P) Flow Control Check to enable to symmetric flow control. Flow control is used to send pause frames and respecting pause frames to and from the LAN PC connected to the device. Select the port setting mode from the drop-down list. Mode Jumbo frames are Ethernet frames with more than 1500 bytes of payload, which is the Jumbo Frames...
VLAN Settings Step 4 Simple Network Management Protocol (SNMP) Traps enable an agent to notify the management station of significant events by way of an unsolicited SNMP message. To enable SNMP Traps, check Enable. Step 5 In the Power Trap Threshold, enter the threshold in %. (Range 1 to 99, Default 95). To configure the PoE Table, follow these steps: The PoE Properties table displays the operational status and power levels used in the PoE.
Page 66
VLAN Settings To create new VLANs, follow these steps: Step 1 Select LAN > VLAN Settings. Step 2 Click Add to create a new VLAN. Step 3 Enter the VLAN ID (Range is 1-4093) and a name. Step 4 Check Enabled to enable both the Inter-VLAN routing and Device Management. Step 5 Enter the following information for IPv4 or IPv6.
Option82 Settings Preview Preview the IPv6 address. Interface Select the appropriate interface identifier. Identifier DHCP Type • Disabled – Disables the DHCP IPv6 server on VLAN. • Server • Lease Time – Enter a time value of 5 to 43,200 minutes. Default is 1440 minutes (equal to 24 hours).
Static DHCP Step 1 Select LAN > Option82 Settings. Step 2 Click Add and configure the following: Step 3 Enter the following information to configure the Option 82 Circuit: Enter description for option 82 client. Description Enhances the validation security to determine about the information which is provided Circuit ID in the Option 82 Circuit ID.
802.1X Configuration Step 5 Check Enabled. Step 6 Click Apply to add the devices to the Static IP list. Step 7 Click Import or Export to use these details. 802.1X Configuration The IEEE 802.1X port-based authentication prevents unauthorized devices (clients) from gaining access to the network.
Page 70
Router Advertisement Advertisement Mode Select the advertisement mode from the drop-down list. • Unsolicited Multicast – Sends Router Advertisement messages to all interfaces in the multicast group. Enter the Advertisement Interval. This option is the default setting. • Unicast – Send Router Advertisement messages only to well-known IPv6 addresses. Advertisement Interval Enter the time interval between 10 and 1800 (Default is 30 seconds) at which the router advertisement messages are sent.
C H A P T E R Wireless A Wireless Local Area Network (WLAN) is a wireless distribution method that implements a flexible data communication system using high-frequency radio waves and often includes an access point to the Internet. This is achieved by augmenting, rather than replacing a wired LAN within a building or campus. Since the WLANs use radio frequency to transmit and receive data, they don't require a wired connections.
Page 72
Wireless Basic Settings Actively applied to Radio Select 2.4G or 5G band to connect only to a network matching both network settings and band selection. The SSID is created on the radio selected. Select Both to configure the SSID on both the radios and connect this profile to an available network with matching network settings.
Wireless Concurrent Dual Band Selection Wireless Isolation with SSID Check Enable to enable wireless isolation within the SSID. When wireless isolation is configured, wireless clients will not be able to see or communicate with each other when connected to the same SSID. To prioritize and queue the traffic according to the Access Category (AC), check Enable to enable the Wireless Multimedia Extensions (WME).
Wireless Configuring 5 GHz Radio Option Description B Only Select this option if you have only Wireless-B devices in your network. G Only Select this option if you have only Wireless-G devices in your network. N Only Select this option if you have only Wireless-N devices in your network.
Wireless Advanced Settings Step 3 Select the network band mode from the Wireless Network Mode drop-down list. Option Description A Only Select this option if you have only Wireless-A devices in your network. N/AC-Mixed Select this option if you have Wireless-N and Wireless-AC devices in your network.
Wireless WMM No Acknowledgment Check Enable to achieve efficient throughput. This may result in higher error rates in a noisy Radio Frequency (RF) environment. Data Rate For Data Rate, click Set to Default , to reset the default basic and transmission rates. Basic Rate Select the basic rate settings–...
Wireless Captive Portal supported by WPS: WPS push button, WPS PIN number through your client’s device, and Device PIN number generated on the WPS configuration page. To configure WPS: Step 1 Click Wireless > WPS. The Wi-Fi Protected Setup page appears. Step 2 Select the SSID (for which the WPS is to be configured) from the WPS drop-down list.
Wireless Lobby Ambassador Step 4 On the Portal Page Customization section, configure the following: Select a font color, from the drop-down list, for the text you want to display on the page. Font Color Background Picture Click Browse and select an image to be displayed as the background of the portal page. Company Name Specify the company name to be displayed.
Page 79
Wireless Lobby Ambassador Step 5 In the Password field, enter a password or click Auto Generate to automatically generate a password. Step 6 In the Expires In section, select the Days, Hours, and Minutes, from the drop-down list. Step 7 Check one of the following radio buttons, Delete guest account when it expires or Suspend guest account when it expires, to delete or suspend the lobby ambassador account.
C H A P T E R Routing Routing is the process of selecting the best paths in a network. Dynamic routing is a networking technique that provides optimal data routing. Dynamic routing enables routers to select paths according to real-time logical network layout changes.
Routing Prefix Enter the IPv6 prefix. Length Enter the number of prefix bits of the IP address. Next Hop Enter the IP address of the router of the last resort. Hop Count Enter the hop count number (Max 255). Interface Choose the interface to use for this static route from the drop-down list.
Routing IGMP Proxy RIPng (IPv6) Routing Information Protocol next generation (RIPng) uses User Datagram Packets (UDP) to send routing information. This is based on RIP version 2 but used for IPv6 routing. • Check Enable to enable RIP IPv6 routing. •...
C H A P T E R Firewall A firewall is a function designed to prevent unauthorized access by analyzing the incoming and outgoing network traffic. The firewall examines traffic and filters the transmissions that do not meet the specified security criteria, The firewall decides the type of packets that should be allowed or denied into or out of a network.
Page 86
Firewall Basic Settings RESTCONF Port Enter the RESTCONF port number. Default is 443. NETCONF The NETCONF protocol defines a simple mechanism through which a network device can be managed, configuration data information can be retrieved, and new configuration data can be uploaded and manipulated. Check Enable and LAN and/ or WAN to enable NETCONF.
Firewall Access Rules Access Rules Rules can be configured for filtering the packets based on particular parameters like IP address or ports. To configure the access rules, follow these steps: Step 1 Select Firewall > Access Rules. Step 2 In the IPv4 or IPv6 Access Rules Table, click Add or select the row and click Edit and enter the following: Rule Status Check Enable to enable the specific access rule.
Firewall Network Address Translation Step 6 To add a service, click Add under the Service table. To edit a service, select the row and click Edit. The fields open for modification. Step 7 You can have many services in the list: •...
Firewall Port Forwarding Range Length Enter the number of IP addresses in the range. The range length must not exceed the number of valid IP addresses. To map Note a single address, enter 1. Select the name of the service, from the drop-down list, to apply for the Static NAT. Services Interfaces Select the name of the interface from the drop-down list.
Firewall Port Triggering • Application Name – Name of the service or application. • Protocol – Required protocol. Refer to the documentation for the service that you are hosting. • Port Start/ICMP Type/IP Protocol – Range of port numbers reserved for this service. •...
Firewall Policy NAT Policy NAT Policy NAT allows you to identify the real address for the address translation by specifying the source and destination address in an extended access list. You can specify the source and destination ports. The Policy NAT allows you to create flexible NAT rules for advanced users.
Page 92
Firewall Policy NAT Use Cases Case 1: The source address for the HTTP traffic is translated by another public address, for traffic that is initiated from the same LAN host. Topology: PC1 –– LAN[RV260W]WAN –– (Internet) –– PC2 • PC1: 192.168.1.111 •...
Page 93
Firewall Policy NAT Use Cases Note Disable the global NAT on WAN1. Address Object: Configure the VLAN2_subnet to 192.168.2.0/24. Result: The VLAN traffic from VLAN2 subnet is translated to WAN IP. The other traffic from VLAN2 goes to routing mode out of WAN (source address will not be translated). Case 4 You configure the VLAN1 with subnet A and VLAN2 with subnet B.
Firewall Session Timeout Result The PC2 address is 172.16.1.110, and can access PC1 by http://172.16.1.1. Change the PC address to another address out of the range 172.16.1.100-110, if it cannot access the internal server. Case 7 Only allows particular Internet hosts to access the LAN server by 1:1 like rule. Topology PC1/PC10 ––...
Firewall DMZ Host DMZ Host DMZ is a subnetwork that is open to the public but behind the firewall. With DMZ, the packets, which are coming into the WAN port, can be redirected to a specific IP address in the LAN. DMZ Host allows one host on the LAN to be exposed to the Internet to use services such as Internet gaming, video conferencing, web, or email servers.
C H A P T E R A Virtual Private Network (VPN) is used to establish an encrypted connection over a less secure network. VPN ensures the appropriate level of security to the connected systems when the underlying network infrastructure alone cannot provide it. A tunnel is established as a private network that can send data securely by using industry-standard encryption and authentication techniques to secure the data sent.
Page 98
VPN is useful when connecting from Laptop/PC from home to a corporate network through VPN server. The VPN allows a remote host to act as if they were located on the same local network. The RV260 series router supports 20 tunnels by default. The VPN Setup Wizard guides the user when configuring a secure connection for a site-to-site IPSec tunnel.
IPSec VPN Authentication The authentication method determines how the Encapsulating Security Payload Protocol (ESP) header packets are validated. The MD5 is a one-way hashing algorithm that produces a 128-bit digest. The SHA1 is a one-way hashing algorithm that produces a 160-bit digest.
IPSec Profiles communications mechanism for data and IP information that is transmitted between networks. A VPN can also be used over an existing network, such as the Internet, to facilitate the secure transfer of sensitive data across public networks. VPNs can also provide flexible solutions, such as securing communications between remote telecommuters and the organizations, regardless of where the telecommuters are located.
Page 101
IPSec Profiles Encryption Select an encryption option (3DES, AES-128, AES-192, or AES-256) from the drop-down list. This method determines the algorithm used to encrypt or decrypt ESP/ISAKMP packets. Authentication Select an authentication (MD5, SHA1, or SHA2-256). SA Lifetime (Sec) Amount of time a VPN tunnel (IPSec SA) is active in this phase. The default value for Phase 2 is 3600 seconds.
Site-to-Site Site-to-Site In a site-to-site VPN, the local router at one location connects to a remote router through a VPN tunnel. Client devices can access network resources as if they were all at the same site. This model can be used for multiple users at a remote location.
Page 103
Site-to-Site VPN Connection Step 1 On the Basic Settings tab, provide the following information: Click Enable to enable the configuration. Enable Enter a connection name for the VPN tunnel. This description is for reference purposes; Connection Name it does not have to match the name used at the other end of the tunnel. IPSec Profile Default –...
Page 104
Site-to-Site VPN Connection IP Address Enter the IP address of the device that can use this tunnel. Subnet Mask Enter the subnet mask. Aggressive Mode Check the box to enable aggressive mode. Step 2 On the Advanced Settings tab, provide the following: Compress (Support IP A protocol that reduces the size of IP datagrams.
Client to Site Split DNS Check Split DNS to enable. Splits the DNS server and other DNS requests to another DNS server, based on specified domain names. When the router receives an address resolution request, it inspects the domain name. If the domain name matches a domain name in the Split DNS settings, it passes the request to the specified DNS server.
Page 106
Client to Site IKE Authentication Method Authentication method to be used in IKE negotiations in IKE-based tunnels. • Pre-shared Key: IKE peers authenticate each other by computing and sending a keyed hash of data that includes the Pre-shared Key. If the receiving peer is able to create the same hash independently using its Pre-shared key, it knows that both peers must share the same secret, thus authenticating the other peer.
OpenVPN Aggressive Mode Check Aggressive Mode to enable. Aggressive Mode feature allows you to specify RADIUS tunnel attributes for an IP security (IPsec) peer and to initiate an Internet Key Exchange (IKE) aggressive mode negotiation with the tunnel. Compress (Support IP If the responder rejects this proposal, then the router does not implement compression.
(Point-to-Point Tunneling Protocol) VPN tunnels can be enabled for users who are running PPTP client software on the RV260 series routers. In the Wizard, the user selects the option to create a connection to the workplace by using a VPN connection. The user must know the WAN IP address of the device. For more information, refer to the documentation or help files for your operating system.
GRE Tunnel Microsoft Point-to-Point The MPPE encrypts data in PPP-based dial-up connections or PPTP VPN connections. 128-bit key MPPE encryption schemes are supported. Select the MPPE encryption (None (MPPE) Encryption or 128 bits) from the drop-down list. Step 2 Click Apply. GRE Tunnel Generic Routing Encapsulation (GRE) is one of the available tunneling mechanisms which uses an IP as the transport protocol and carries many different passenger protocols.
Resource Allocation • PPTP Passthrough – Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be tunneled through an IP network. • L2TP Passthrough - Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions by using the Internet at Layer 2.
C H A P T E R Security This section describes the device's security features and contains the following topics: • Content Filtering, on page 103 • Web Filtering, on page 104 Content Filtering The Content Filtering enables you to restrict access to certain unwanted websites. It can block access to websites based on the domain names and keywords.
Security Web Filtering Web Filtering Web filtering is a feature that allows you to manage access to inappropriate websites. It can screen a client’s web access requests to determine whether to allow or deny that website. To enable and configure the web filtering, follow these steps: Step 1 Click Security >...
This Supplemental End User License Agreement (“SEULA”) contains additional terms and conditions that grant the right to use the Cisco Small Business Web Filtering Service and its associated software (collectively, the “Service”) under the End User License Agreement (“EULA”) between you and Cisco (collectively, the “Terms”).
Page 114
(b) End User access to the Service shall terminate. 3.2 Cisco may at any time terminate these Terms for convenience, for any reason, or for no reason at all, by providing End User with thirty (30) days prior notice of termination via posting an end of sale notice at: http://www.cisco.com/c/en/us/products/routers/small-business-rv-series-routers/eos-eol-notice-listing.html.
Page 115
Cisco’s obligations, subject to these Terms, to provide the Service. All financial obligations associated with End User’s business are the sole responsibility of End User. 7.2 Third Party Services. Cisco reserves the right to subcontract the provision of all or part of the Service to a third party.
Page 116
Cisco Small Business Web Filtering Service Supplemental End User License Agreement 7.3 Force Majeure. Cisco shall not be liable for any delay or failure in performance whatsoever resulting from acts beyond its reasonable control. Such acts shall include, but not be limited to delays attributed to delays of common carriers, acts of God, earthquakes, labor disputes, shortages of supplies, actions of governmental entities, riots, war, acts or threatened acts of terrorism, fire, epidemics and similar occurrences.
C H A P T E R Quality of service (QoS) is used to optimize network traffic management in order to improve the user's experience. QoS is a defined measure of performance in a communication network. It prioritizes one type of transmission over another.
WAN Queuing Service Name Name of the service to apply the traffic classification. Enter the name of the service. Receive Interface The interface that receives traffic to apply the classification records. Select one of the interfaces from the drop-down list. •...
WAN Policing Rate Control Packets are served with their maximum allowed bandwidth from each queue. However, when congestion occurs with the help of minimum rate for each queue configured are applied on the network traffic. The sum of minimum rates of all queues should not exceed 100% and maximum rate for each queue should not exceed 100%.
WAN Bandwidth Management Step 7 Click Apply. WAN Bandwidth Management The WAN interfaces can be configured with the maximum bandwidth provided by the ISP. When the value (transfer rate in KBP/S) is configured, the traffic entering the interface is shaped in defined rate. To configure the WAN Bandwidth Management, follow these steps: Step 1 Click QoS >...
Switch Queuing DSCP-based For IPv6 traffic, the DSCP matches the traffic class value in the IPv6 header and places it in different queues. The traffic class value is 4 times the DSCP value. For example, if the user configures the DSCP as 10 mapping to Queue 1, then the IPv6 flows with traffic class value 40 are put into Queue 1.
Cisco Firmware https://www.cisco.com/c/en/us/support/index.html Downloads Select a link to download the firmware for your Cisco product. No login is required. Cisco Open Source If you wish to receive a copy of the source code to which you are entitled under...
Page 124
Where To Go Where To Go From Here RV260x Administration Guide...
Need help?
Do you have a question about the RV260 series and is the answer not in the manual?
Questions and answers