Linksys RV016 User Manual

10/100 16-port vpn router
Hide thumbs Also See for RV016:
Table of Contents

Advertisement

Quick Links

®
A Division of Cisco Systems, Inc.
10/100
16-Port VPN Router

User Guide

WIRED
RV016
Model No.

Advertisement

Table of Contents
loading

Summary of Contents for Linksys RV016

  • Page 1: User Guide

    ® A Division of Cisco Systems, Inc. 10/100 16-Port VPN Router User Guide WIRED RV016 Model No.
  • Page 2 10/100 16-Port VPN Router Copyright and Trademarks Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2004 Cisco Systems, Inc. All rights reserved. How to Use this Guide This User Guide has been designed to make understanding networking with the Router easier than ever.
  • Page 3: Table Of Contents

    Chapter 5: Configuring the PCs Overview Configuring Windows 98 and Millennium PCs Configuring Windows 2000 PCs Configuring Windows XP PCs Chapter 6: Setting up and Configuring the Router Overview How to Access the Web-based Utility System Summary Tab Setup Tab - Network...
  • Page 4 Appendix B: Upgrading Firmware Appendix C: Finding the MAC Address and IP Address for Your Ethernet Adapter Windows 98 or Me Instructions Windows 2000 or XP Instructions For the Router’s Web-based Utility Appendix D: Physical Setup of the Router Setting up the Router...
  • Page 5 10/100 16-Port VPN Router Appendix E: Battery Replacement Replacing a Lithium Battery Appendix F: Windows Help Appendix G: Glossary Appendix H: Specifications Appendix I: Warranty Information Appendix J: Regulatory Information Appendix K: Contact Information...
  • Page 6 10/100 16-Port VPN Router List of Figures Figure 2-1: VPN Router-to-VPN Router VPN Figure 2-2: Computer-to-VPN Router VPN Figure 3-1: Front Panel Figure 3-2: Back Panel Figure 4-1: Example of a Typical Network Figure 4-2: Connect a PC Figure 4-3: Connect the Internet...
  • Page 7 10/100 16-Port VPN Router Figure 6-14: Time - Automatic Figure 6-15: Time - Manual Figure 6-16: DMZ Host Figure 6-17: Forwarding Figure 6-18: Service Management Figure 6-19: UPnP Figure 6-20: One-to-One NAT Figure 6-21: MAC Clone Figure 6-22: Edit MAC Clone...
  • Page 8 10/100 16-Port VPN Router Figure 6-44: Access Rules Figure 6-45: Add a New Access Rule Figure 6-46: Content Filter Figure 6-47: VPN Summary Figure 6-48: VPN Tunnel Details Figure 6-49: Types of VPN Tunnels Figure 6-50: GroupVPN List Figure 6-51: Gateway to Gateway...
  • Page 9 10/100 16-Port VPN Router Figure 6-66: Remote Security Group Type - Subnet Figure 6-67: Remote Security Group Type - IP Range Figure 6-68: IPSec Setup - IKE with Preshared Key Figure 6-69: IPSec Setup - Manual Figure 6-70: IKE with Preshared Key - Advanced...
  • Page 10 10/100 16-Port VPN Router Figure 6-88: IPSec Setup - IKE with Preshared Key Figure 6-89: IPSec Setup - Manual Figure 6-90: IKE with Preshared Key - Advanced Figure 6-91: VPN Pass Through Figure 6-92: System Log Figure 6-93: View All Logs...
  • Page 11 Figure C-2: MAC Address/Adapter Address Figure C-3: MAC Address/Physical Address Figure C-4: MAC Clone Figure C-5: Edit MAC Clone Figure D-1: Mounting Brackets Figure D-2: Attaching the Brackets to the Router and Rack-Mounting the Router Figure D-3: Wall-Mounting the Router Figure D-4: Wall-Mounting Hardware...
  • Page 12: Chapter 1: Introduction

    Chapter 1: Introduction Welcome Thank you for choosing the 10/100 16-Port VPN Router. The Linksys 10/100 16-Port VPN Router is an advanced Internet-sharing network solution for your small business needs. Like any router, it lets multiple computers in your office share an Internet connection, but the 16 ports on this Router feature unprecedented versatility. Two are dedicated Internet ports that let you connect a second Internet line as a backup to ensure that you're never disconnected.
  • Page 13: What's In This Guide

    10/100 16-Port VPN Router. • Appendix B: Upgrading Firmware This appendix instructs you on how to upgrade the firmware on your Router if you should need to do so. • Appendix C: Finding the MAC Address and IP Address for your Ethernet Adapter.
  • Page 14 • Appendix J: Regulatory Information This appendix supplies the regulatory information regarding the Router. • Appendix K: Contact Information This appendix provides contact information for a variety of Linksys resources, including Technical Support. Chapter 1: Introduction What’s in this Guide?
  • Page 15: Chapter 2: Networking Basics

    A Router is a network device that connects two networks together. The Router connects your local area network (LAN), or the group of PCs in your home or office, to the Internet. The Router processes and regulates the data that travels between these two networks.
  • Page 16: Why Do I Need A Vpn

    It also will provide the Router with a dynamic IP address to establish a connection to the Internet. By default, a DHCP server (on the LAN side) is enabled on the Router. If you already have a DHCP server running on your network, you MUST disable one of the two DHCP servers.
  • Page 17: What Is A Vpn

    What is a VPN? A VPN, or Virtual Private Network, is a connection between two endpoints - a VPN Router, for instance - in different networks that allows private data to be sent securely over a shared or public network, such as the Internet.
  • Page 18: Figure 2-1: Vpn Router-To-Vpn Router Vpn

    VPN settings. She accesses the VPN client software that supports IPSec and connects to the 10/100 16-Port VPN Router at the central office. As VPNs utilize the Internet, distance is not a factor. Using the VPN, the businesswoman now has a secure connection to the central office's network, as if her computer were physically connected.
  • Page 19: Chapter 3: Getting To Know The Router

    10/100 16-Port VPN Router Chapter 3: Getting to Know the Router The Front Panel The Router’s LEDs, Ethernet ports, and Reset button are located on the front panel of the Router. Figure 3-1: Front Panel LEDs DIAG Orange. The DIAG LED lights up when the system is not ready. The LED turns off when the system is ready.
  • Page 20 Orange. The DMZ LED serves two purposes. If the LED is continuously lit, the Router is connected to a DMZ host through the DMZ port. If the LED is flashing, the Router is actively sending or receiving data over that port.
  • Page 21: The Back Panel

    10/100 16-Port VPN Router The Back Panel The Router’s Power port is located on the back panel of the Router. Figure 3-2: Back Panel Power The Power port is where you connect the power adapter. Proceed to “Chapter 4: Connecting the Router.”...
  • Page 22: Chapter 4: Connecting The Router

    • Connect the Router to one of your PCs according to the instructions in this chapter. • If necessary, configure your PCs to obtain an IP address automatically from the Router, according to “Chapter 5: Configuring the PCs.” (By default, Windows 98, 2000, Millennium, and XP computers are set to obtain an IP address automatically, so unless you have changed the default setting, then you will not need to configure your PCs.)
  • Page 23: Connection Instructions

    DSL modem. 2. Connect one end of an Ethernet network cable to one of the numbered ports on the front of the Router (see Figure 4-2). Connect the other end to an Ethernet port on a network device, e.g., a PC, print server, hub, or switch.
  • Page 24: Chapter 5: Configuring The Pcs

    The instructions in this chapter will help you configure each of your computers so they will be able to communicate with the Router. Each PC must be set to obtain an IP address (or TCP/IP) address automatically (called DHCP). Computers use IP addresses to communicate with each other across a network or the Internet.
  • Page 25: Configuring Windows 2000 Pcs

    6. Windows may ask you to restart your PC. Click the Yes button. If Windows does not ask you to restart, restart your computer anyway. Go to “Chapter 6: Setting up and Configuring the Router.” Configuring Windows 2000 PCs 1. Click the Start button. Click Settings and then Control Panel. From there, double-click the Network and Dial-up Connections icon.
  • Page 26: Figure 5-5: Internet Protocol (Tcp/Ip) For Windows Xp

    Click the OK button again (or the Close button if any settings were changed) to complete the PC configuration. 5. Restart your computer. Go to “Chapter 6: Setting up and Configuring the Router.” Chapter 5: Configuring the PCs Configuring Windows XP PCs...
  • Page 27: Chapter 6: Setting Up And Configuring The Router

    Router's password from the default. • Time. On this screen, configure the Router’s time settings. You can set the time, select a time zone, enable or disable the Daylight Savings feature, and configure the NTP (Network Time Protocol) settings.
  • Page 28 Router and receive notification of any critical events as they occur on the network. (SNMP can only be used to monitor and configure the Router from inside the local network.) •...
  • Page 29 • Wizard. Use this tab to access two Setup Wizards, the Basic Setup Wizard and Access Rule Setup Wizard. Support Tab • Support. Use this screen to conveniently access this User Guide and the Linksys website. Logout Tab • Logout. Click the Logout tab to exit the Utility.
  • Page 30: How To Access The Web-Based Utility

    Configuration If you need help to set up the Router, click the Setup Wizard button. For more details, see the Wizard Tab section. Figure 6-3: System Summary Chapter 6: Setting up and Configuring the Router...
  • Page 31: Figure 6-4: Site Map

    Port Statistics Click any port on the Router’s front panel image to see the status of the selected port. If the port is disabled, it will be red; if enabled, it will be black. If the port is connected, it will be green. Information about the selected port will appear in a separate window.
  • Page 32 If you have set up the e-mail server and the log cannot be sent to the e-mail server, the message, “E-mail cannot be sent out, probably use incorrect settings,” will be displayed. Chapter 6: Setting up and Configuring the Router System Summary Tab...
  • Page 33: Setup Tab - Network

    Setup Tab - Network The Setup screen shows all of the Router’s basic setup functions. The Router can be used in most network setups without changing any of the default values; however, you may need to enter additional information in order to connect to the Internet through an ISP (Internet Service Provider) or broadband (DSL or cable) carrier.
  • Page 34: Figure 6-8: Obtain An Ip Automatically

    The default is 5 minutes. If you select the Keep Alive option, the Router will keep the connection alive by sending out a few data packets periodically, so your ISP thinks that the connection is still active. This option keeps your PPPoE-enabled connection active indefinitely, even when it sits idle.
  • Page 35: Figure 6-11: Pptp

    The default is 5 minutes. If you select the Keep Alive option, the Router will keep the connection alive by sending out a few data packets periodically, so your Internet service thinks that the connection is still active. This option keeps your PPPoE-enabled connection active indefinitely, even when it sits idle.
  • Page 36: Setup Tab - Password

    10/100 16-Port VPN Router Setup Tab - Password The Router's default User Name and Password is admin, and it is strongly recommended that you change the Router's password from the default to a unique password. Old Password. Enter the old password. The default Password is admin when you first power up the Router.
  • Page 37: Setup Tab - Dmz Host

    Port forwarding can be used to set up public services on your network. When users from the Internet make certain requests on your network, the Router can forward those requests to computers equipped to handle the requests. If, for example, you set the port number 80 (HTTP) to be forwarded to IP address 192.168.1.2, then all HTTP requests from outside users will be forwarded to 192.168.1.2.
  • Page 38: Figure 6-18: Service Management

    Router, so that when the requested data returns through the Router, the data is pulled back to the proper computer by way of IP address and port mapping rules. Some Internet applications or games use alternate ports to communicate between the server and LAN host.
  • Page 39: Setup Tab - Upnp

    Click the Save Settings button to save your changes, or click the Cancel Changes button to undo your changes. Click the Show Tables button to see the details of your UPnP entries. Chapter 6: Setting up and Configuring the Router Setup Tab - UPnP...
  • Page 40: Setup Tab - One-To-One Nat

    To create this relationship between internal and external addresses, define internal and external address ranges of equal length. (The Router’s WAN IP address may not be included in the range of external addresses.) Once that relationship is defined, the device with the first internal address is accessible at the first IP address in the external address range, the second device at the second external IP address, and so forth.
  • Page 41: Setup Tab - Mac Clone

    The MAC Clone feature “clones” your network adapter's MAC address onto the Router, so you don’t have to call your ISP to change the registered MAC address to the Router's MAC address. The MAC Clone table displays the number of WAN ports you have configured on the Network or Port Management screen.
  • Page 42: Setup Tab - Ddns

    Then click the Save Settings button, and the status of the DDNS function will be updated. In the Internet IP Address section, the Router’s current Internet IP address is displayed. Because it is dynamic, this will change.
  • Page 43: Setup Tab - Advanced Routing

    Static Routing If the Router is connected to more than one network or there are multiple routers installed on your network, it may be necessary to set up static routes. The static routing function determines the path that data follows over your network before and after it passes through the Router.
  • Page 44 Subnet Mask is 255.255.255.0. 3. In the Default Gateway field, enter the IP address of your network’s gateway. If this Router is used to connect your network to the Internet, then the gateway IP is the Router's Internet IP address. If you have another router handling your network's Internet connection, enter the IP address of that router instead.
  • Page 45: Dhcp Tab - Setup

    Client Lease Time. The Client Lease Time is the amount of time a network user will be allowed connection to the Figure 6-26: DHCP Setup Router with their current dynamic IP address. Enter the amount of time, in minutes, that the user will be “leased” this dynamic IP address. The range is 5-43,200 minutes.
  • Page 46 10/100 16-Port VPN Router You can assign DNS server(s) to the DHCP clients so the Router will use the DNS server(s) for faster access to functioning DNS server(s). You do not need to complete either of these DNS Server fields; it is an optional feature.
  • Page 47: Dhcp Tab - Status

    • IP Address. It is the dynamic IP address assigned to a client. • MAC Address. This indicates the MAC address of a client. • Leased Time. It displays the amount of time a network user will be allowed connection to the Router with their current dynamic IP address.
  • Page 48: System Management Tab - Multi-Wan

    For the Load Balance feature, you have a choice of Intelligent Balancer (Auto Mode) and IP Group (By Users), except for WAN1. The Router reserves at least one WAN port for non-IP Group users, so WAN1 will always be set to Intelligent Balancer (Auto Mode).
  • Page 49: Figure 6-31: Ip Group (By Users)

    Downstream drop-down menu, select 512K, 1024K, 1.5M, 2M, or 2.5M or above. You can enable the Router to check the network service layer using DNS lookup. This tool can detect the network connection status of the ISP if you have set up the DNS server in the Network section of the Setup page. If you did not set up the DNS server, the checkbox will be grayed out, and then you cannot use the DNS lookup tool.
  • Page 50 Click the Save Settings button to save your changes, or click the Cancel Changes button to undo your changes. To return to the Load Balance screen, click the Back button. Chapter 6: Setting up and Configuring the Router System Management Tab - Multi-WAN...
  • Page 51: System Management Tab - Snmp

    SNMP, Simple Network Management Protocol, is a network protocol that provides network administrators with the ability to monitor the status of the Router and receive notification of any critical events as they occur on the network. The Router supports SNMP v1/v2c and all relevant Management Information Base II (MIBII) groups. The Router replies to SNMP Get commands for MIBII via any LAN (local) interface and supports a custom MIB for generating trap messages.
  • Page 52: System Management Tab - Diagnostic

    The Router’s DNS Name Lookup tool will return the numerical TCP/IP address of a host name. The ping test bounces a packet off a machine on the Internet back to the sender. This test shows if the Router is able to contact the remote host.
  • Page 53: System Management Tab - Factory Default

    If you need to download the latest version of the Router’s firmware, click the Firmware Download from Linksys Web Site button. You will see the Support page of the Linksys website. Select the 10/100 16-Port VPN Router from the pull-down menu, and choose the firmware from the available options. After downloading the firmware, follow the Firmware Upgrade instructions.
  • Page 54: System Management Tab - Restart

    To export the Router’s current configuration file, click the Export button, and a dialog box will appear and ask you to select a location where you would like to store your preferences file. This file will be called RV016.exp by default, but you may rename it if you wish.
  • Page 55: Port Management Tab - Port Setup

    Port Management Tab - Port Setup On this screen you can choose the number of WAN ports the Router will provide and configure the connection settings for each port, such as priority, speed, and duplex. You can also enable or disable the auto-negotiation feature for all ports.
  • Page 56: Port Management Tab - Port Status

    Click the Refresh button to retrieve the most recent settings and statistics. Chapter 6: Setting up and Configuring the Router Port Management Tab - Port Status Figure 6-42: Port Status...
  • Page 57: Firewall Tab - General

    When it is enabled, the Router will drop both unaccepted TCP request and ICMP packets from the WAN side. Hackers will not find the Router by pinging the WAN IP address. If the Router’s DMZ feature is enabled, then the Block WAN Request feature will be disabled.
  • Page 58: Firewall Tab - Access Rules

    Firewall Tab - Access Rules Access Rules evaluate network traffic to decide whether or not it is allowed to pass through the Router’s firewall. Access Rules look specifically at a data transmission’s source IP address, destination IP address, and IP protocol type, and you can apply each Access Rule according to a different schedule.
  • Page 59: Figure 6-45: Add A New Access Rule

    Click the Exit button to return to the Add a New Access Rule screen. 3. For this service, you can decide whether or not you want the Router to keep a log tracking this type of activity.
  • Page 60: Firewall Tab - Content Filter

    Use this screen to block specific domains during the designated days and times. When the Block Forbidden Domains checkbox is selected, the Router will forbid access to websites on the Forbidden Domains list. To add a domain to the list, enter the address of the domain in the Add field, and then click the Add to list button.
  • Page 61: Vpn Tab - Summary

    Click the Add Now button to see the Gateway to Gateway screen. Proceed to the Gateway to Gateway section for further instructions. Client to Gateway. The Client to Gateway tunnel is a tunnel created between the VPN Router and the client host Figure 6-48: VPN Tunnel Details who is using VPN client software that supports IPSec.
  • Page 62: Figure 6-50: Groupvpn List

    Group Name, IP address, and Connection Time. Click the Refresh button to update the status information. Click the Close button to exit this screen. Figure 6-50: GroupVPN List Chapter 6: Setting up and Configuring the Router VPN Tab - Summary...
  • Page 63: Vpn Tab - Gateway To Gateway

    Dynamic Domain Name System (DDNS) account. Then enable and configure the 10/100 16-Port VPN Router’s DDNS settings on the DDNS screen.) The Local Security Gateway Type you select should match the Remote Security Gateway Type selected on the VPN device at the other end of the tunnel.
  • Page 64: Figure 6-52: Local Security Gateway Type - Ip Only

    Local Security Group Type Select the local LAN user(s) behind the Router that can use this VPN tunnel. Select one of these three available types: IP, Subnet, or IP Range. The Local Security Group Type you select should match the Remote Security Group Type selected on the VPN device at the other end of the tunnel.
  • Page 65: Figure 6-59: Local Security Group Type - Ip Range

    Before you configure the Remote Group Setup, make sure your VPN tunnel will have two different IP subnets. For example, if the local 10/100 16-Port VPN Router has an IP scheme of 192.168.1.x (x being a number from 1 to 254), then the remote VPN router should have a different IP scheme, such as 192.168.2.y (y being a number from...
  • Page 66: Figure 6-63: Remote Security Gateway Type - Dynamic Ip + Domain Name (Fqdn) Authentication

    Domain Name for authentication, then select this type. When the Remote Security Gateway asks to create a tunnel with the Router, the Router will work as a responder. For authentication, complete the Domain Name field, and make sure it matches the Domain Name set on the Local Gateway of the remote VPN device.
  • Page 67: Figure 6-68: Ipsec Setup - Ike With Preshared Key

    ESP packets. DES uses 56-bit encryption, and 3DES uses 168-bit encryption. 3DES is recommended because it is more secure. If you enable the AH Hash Algorithm on the Advanced Chapter 6: Setting up and Configuring the Router VPN Tab - Gateway to Gateway...
  • Page 68: Figure 6-69: Ipsec Setup - Manual

    Hexadecimal values are acceptable, and the valid range of hexadecimal values is from 100 to ffffffff. Each tunnel must have a unique Inbound SPI and Outbound SPI. The Incoming SPI of the Router must match the Outgoing SPI set on the remote VPN device at the other end of the tunnel. For example, if the Incoming SPI is 20123, then the Outgoing SPI would be 32102.
  • Page 69: Figure 6-70: Ike With Preshared Key - Advanced

    Click the Save Settings button to save your changes, or click the Cancel Changes button to undo the changes. Advanced For most users, the settings on the VPN page should suffice; however, the Router provides advanced IPSec settings for advanced users. Click the Advanced button to view the Advanced settings, which are available only for VPN tunnels using the IKE with Preshared Key mode.
  • Page 70: Vpn Tab - Client To Gateway

    Compress (Support IP Payload compression Protocol (IP Comp)). The Router supports IP Payload Compression Protocol, which is used to reduce the size of IP datagrams. If this feature is enabled, the Router will propose compression when initiating a connection. If the responders reject this proposal, then the Router will not implement compression.
  • Page 71: Figure 6-72: Local Security Gateway Type - Ip Only

    IP Only. If you select IP Only, then only the computer with a specific IP address will be able to access the tunnel. The WAN (or Internet) IP address of the Router will automatically appear in the IP address field.
  • Page 72: Figure 6-74: Local Security Gateway Type - Ip + E-Mail Addr. (User Fqdn) Authentication

    Local Security Group Type Select the local LAN user(s) behind the Router that can use this VPN tunnel. Select one of these three available types: IP, Subnet, or IP Range. The Local Security Group Type you select should match the Remote Security Group Type selected on the remote VPN client(s) at the other end of the tunnel(s).
  • Page 73: Figure 6-80: Remote Client For Vpn Tunnel - Ip Only

    Domain Name for authentication, then select this type. When the Remote Security Gateway asks to create a tunnel with the Router, the Router will work as a responder. For authentication, complete the Domain Name field, and make sure it matches the Domain Name set on the Local Gateway of the Remote Client.
  • Page 74: Figure 6-84: Remote Client For Vpn Tunnel - Dynamic Ip + E-Mail Addr. (User Fqdn) Authentication

    Client in the Domain Name field. The FQDN is the host name and domain name for a specific computer on the Internet. An example of a FQDN is vpn.remotevpnserver.com. The FQDN must match the FQDN setting on the Remote Client. When the Remote Client asks to create a tunnel with the Router, the Router will work as a responder.
  • Page 75: Figure 6-88: Ipsec Setup - Ike With Preshared Key

    3DES is recommended because it is more secure. If you enable the AH Hash Algorithm on the Advanced screen, then it is recommended to select Null to disable the encryption and decryption of ESP packets in Chapter 6: Setting up and Configuring the Router VPN Tab - Client to Gateway...
  • Page 76: Figure 6-89: Ipsec Setup - Manual

    Hexadecimal values are acceptable, and the valid range of hexadecimal values is from 100 to ffffffff. Each tunnel must have a unique Inbound SPI and Outbound SPI. The Incoming SPI of the Router must match the Outgoing SPI set on the remote VPN device at the other end of the tunnel. For example, if the Incoming SPI is 20123, then the Outgoing SPI would be 32102.
  • Page 77: Figure 6-90: Ike With Preshared Key - Advanced

    Click the Save Settings button to save your changes, or click the Cancel Changes button to undo the changes. Advanced For most users, the settings on the VPN page should suffice; however, the Router provides advanced IPSec settings for advanced users. Click the Advanced button to view the Advanced settings, which are available only for VPN tunnels using the IKE with Preshared Key mode.
  • Page 78 Compress (Support IP Payload compression Protocol (IP Comp)). The Router supports IP Payload Compression Protocol, which is used to reduce the size of IP datagrams. If this feature is enabled, the Router will propose compression when initiating a connection. If the responders reject this proposal, then the Router will not implement compression.
  • Page 79: Vpn Tab - Vpn Pass Through

    IPSec Pass Through Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. IPSec Pass Through is enabled by default to allow IPSec tunnels to pass through the Router. PPTP Pass Through...
  • Page 80: Log Tab - System Log

    10/100 16-Port VPN Router Log Tab - System Log On this screen you will be able to configure the Router’s log settings, so you can specify how you want its activity logs handled. Syslog Syslog is a standard protocol used to capture information about network activity. The Router supports this protocol and can send its activity logs to an external server.
  • Page 81: Figure 6-93: View All Logs

    Access Log shows all activities involving local network or Internet access. The Firewall Log displays all activities regarding the Router’s firewall, while the VPN Log shows information about VPN tunnel activity.
  • Page 82: Log Tab - System Statistics

    Log Tab - System Statistics This screen displays statistics about all of the Router’s ports (LAN, DMZ, and all WAN ports). For each port, the following statistics are listed: Device Name, Status, IP Address, MAC Address, Subnet Mask, Default Gateway,...
  • Page 83: Wizard Tab

    Use this tab to access two Setup Wizards, the Basic Setup Wizard and the Access Rule Setup Wizard. Run the Basic Setup Wizard to set up the Router for your Internet connection(s). Run the Access Rule Setup Wizard to set up the security policy for the Router.
  • Page 84: Figure 6-101: Save Settings

    1. Click the Launch Now button to run the Basic Setup Wizard. 2. The screen shown in Figure 6-102 will appear. If you want to edit the Router’s network settings, select Edit Network Settings. Click the Next button to continue. Click the Exit button if you want to exit the Setup Wizard.
  • Page 85: Figure 6-104: Wan Connection Type

    Click the Next button to continue, and proceed to step 6. Click the Previous button if you want to return to the previous screen. Click the Exit button if you want to exit the Setup Wizard. Chapter 6: Setting up and Configuring the Router Wizard Tab...
  • Page 86: Figure 6-106: Static Ip

    6. Click the Previous button if you want to return to the previous screen. Click the Exit button if you want to exit the Setup Wizard. Chapter 6: Setting up and Configuring the Router Wizard Tab...
  • Page 87: Figure 6-108: Pppoe

    Router to wait before your Internet access disconnects. If you select the Keep Alive option, the Router will keep the connection alive by sending out a few data packets periodically, so your ISP thinks that the connection is still active. This option keeps your PPPoE-enabled connection active indefinitely, even when it sits idle.
  • Page 88: Figure 6-110: Dmz

    10/100 16-Port VPN Router 6. Repeat step 5 for the rest of the Router’s WAN ports. When it is time to configure the DMZ port, proceed to step 7. 7. On the screen shown in Figure 6-110, enter the DMZ IP address provided by the ISP in the DMZ IP fields. Then complete the Subnet Mask field.
  • Page 89: Figure 6-112: Access Rules

    1. Click the Launch Now button to run the Access Rule Wizard. 2. The screen shown in Figure 6-112 will appear. This screen explains the Access Rules, including the Router’s Default Rules. Click the Next button to continue. Click the Exit button if you want to exit the Access Rule Setup Wizard.
  • Page 90: Figure 6-114: Service

    5. The screen shown in Figure 6-115 will appear. For this service, you can select whether or not you want the Router to keep a log tracking this type of activity. To keep a log, select Log packets matching this access rule.
  • Page 91: Figure 6-117: Destination

    OK button, and the first screen of the Access Rule Setup Wizard will appear. If you want to exit the Access Rule Setup Wizard, click the Cancel button, and the Access Rules screen will appear. Chapter 6: Setting up and Configuring the Router Wizard Tab...
  • Page 92: Support Tab

    10/100 16-Port VPN Router Support Tab From this tab, you will be able to access the Support page of the Linksys website, which offers a variety of resources. You must have an active Internet connection before you can visit the Linksys website.
  • Page 93: Appendix A: Troubleshooting

    Appendix A: Troubleshooting This appendix provides solutions to problems that may occur during the installation and operation of the Router. Read the descriptions below to help solve your problems. If you can't find an answer here, check the Linksys website at www.linksys.com.
  • Page 94 Properties button. Select Use the following IP address option. D. Enter a unique IP address that is not used by any other computer on the network connected to the Router. You can only use an IP address in the ranges 192.168.1.2 to 192.168.1.99 and 192.168.1.151 to 192.168.1.254.
  • Page 95 D. In the This connection uses the following items box, highlight Internet Protocol (TCP/IP). Click the Properties button. E. Enter a unique IP address that is not used by any other computer on the network connected to the Router. You can only use an IP address in the ranges 192.168.1.2 to 192.168.1.99 and 192.168.1.151 to 192.168.1.254.
  • Page 96 C. In the command prompt, type ping 192.168.1.1 and press the Enter key. • If you get a reply, the computer is communicating with the Router. • If you do NOT get a reply, check the cable, and make sure Obtain an IP address automatically is selected in the TCP/IP settings for your Ethernet adapter.
  • Page 97 D. In the command prompt, type ping followed by your Internet IP address and press the Enter key. The Internet IP Address can be found in the web interface of the Router. For example, if your Internet IP address is 1.2.3.4, you would enter ping 1.2.3.4 and press the Enter key.
  • Page 98 AH has limitations due to occasional incompatibility with the NAT standard. Change the IP address for the Router to another subnet to avoid a conflict between the VPN IP address and your local IP address. For example, if your VPN server assigns an IP address 192.168.1.X (X is a number from 1 to 254) and your local LAN IP address is 192.168.1.X (X is the same number used in the VPN IP address), the...
  • Page 99 DMZ hosting. There may be cases when you want to host an online game or Internet application. This would require you to set up the Router to deliver incoming packets or data to a specific computer. This also applies to the Internet applications you are using. The best way to get the information on what port services to use is to go to the website of the online game or application you want to use.
  • Page 100 DMZ hosting. (In other words, data that enters the Router will be checked first by the forwarding settings. If the port number that the data enters from does not have port forwarding, then the Router will send the data to whichever PC or network device you set for DMZ hosting.) Follow these steps to set DMZ hosting: A.
  • Page 101 15. I need to upgrade the firmware. In order to upgrade the firmware with the latest features, you need to go to the Linksys website and download the latest firmware at www.linksys.com. Follow these steps: A. Go to the Linksys website at http://www.linksys.com and download the latest firmware, or use the Web-based Utility to be automatically redirected to the download webpage.
  • Page 102 “keep alive” the connection. This may not always work, so you may need to re-establish connection periodically. A. To connect to the Router, go to the web browser, and enter http://192.168.1.1 or the IP address of the Router. B. Enter the user name and password, if asked. (The default user name and password are admin.) C.
  • Page 103 For most DSL users, it is strongly recommended to use MTU 1492. If you are having some difficulties, perform the following steps: A. To connect to the Router, go to the web browser, and enter http://192.168.1.1 or the IP address of the Router.
  • Page 104: Frequently Asked Questions

    ISP. Does the Router support any operating system other than Windows 98, Millennium, 2000, or XP? Yes, but Linksys does not, at this time, provide technical support for setup, configuration or troubleshooting of any non-Windows operating systems.
  • Page 105 Reset the Router by holding down the Reset button for ten seconds. Reset your cable or DSL modem by powering the unit off and then on. Obtain and flash the latest firmware release that is readily available on the Linksys website, www.linksys.com.
  • Page 106 How can I be notified of new Router firmware upgrades? All Linksys firmware upgrades are posted on the Linksys website at www.linksys.com, where they can be downloaded for free. The Router’s firmware can be upgraded using the Web-based Utility. If the Router’s Internet connection is working well, there is no need to download a newer firmware version, unless that version contains new features that you would like to use.
  • Page 107 How do I get mIRC to work with the Router? Under the Setup => Forwarding tab, set port forwarding to 113 for the PC on which you are using mIRC. If your questions are not addressed here, refer to the Linksys website, www.linksys.com. Appendix A: Troubleshooting...
  • Page 108: Appendix B: Upgrading Firmware

    10/100 16-Port VPN Router Appendix B: Upgrading Firmware You can use the Router’s Web-based Utility to upgrade the firmware; however, if you do so, you may lose the settings you have configured on the Router. To upgrade the Router’s firmware, follow these instructions: 1.
  • Page 109: Appendix C: Finding The Mac Address And Ip Address For Your Ethernet Adapter

    This section describes how to find the MAC address for your computer’s Ethernet adapter so you can use the MAC address cloning feature of the Router. You can also find the IP address of your computer’s Ethernet adapter. This IP address is used for the Router’s filtering, forwarding, and/or DMZ features. Follow the steps in this appendix to find the adapter’s MAC or IP address in Windows 98, Me, 2000, or XP.
  • Page 110: For The Router's Web-Based Utility

    WAN MAC Address, and then enter the 12 digits of your adapter’s MAC address. If you want to clone the MAC address of the PC you are currently using to configure the Router, then select MAC Address from this PC.
  • Page 111: Appendix D: Physical Setup Of The Router

    This section describes the physical setup of the Router, including installation of the mounting brackets. Setting up the Router You can set the Router on a desktop, install it in a rack with attached brackets, or mount it on the wall. Placement of the Router Set the Router on a desktop or other flat, secure surface.
  • Page 112: Figure D-2: Attaching The Brackets To The Router And Rack-Mounting The Router

    Router. When the brackets are attached to the Router, you can rack-mount it. Attach the Router to the rack, using two screws on each side of the Router, as shown below in Figure D-2.
  • Page 113: Figure D-3: Wall-Mounting The Router

    3.701 inches (94 mm). Install two screws or nails into the wall, 3.701 inches (94 mm) apart. After the screws or nails are secured on the wall, line up the Router’s holes with the screws or nails, and mount the Router on the wall.
  • Page 114: Figure D-4: Wall-Mounting Hardware

    10/100 16-Port VPN Router Figure D-4: Wall-Mounting Hardware Appendix D: Physical Setup of the Router Setting up the Router...
  • Page 115: Appendix E: Battery Replacement

    Linksys Technical Support. Do not attempt to replace this battery yourself. You must call Linksys Technical Support to replace the battery. Danger of explosion exists if the lithium battery is incorrectly replaced. The battery can only be replaced with the same or equivalent type of CR2032 lithium battery.
  • Page 116: Appendix F: Windows Help

    10/100 16-Port VPN Router Appendix F: Windows Help Almost all Linksys networking products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix.
  • Page 117: Appendix G: Glossary

    Bandwidth - The transmission capacity of a given device or network. Beacon Interval - The frequency interval of the beacon, which is a packet broadcast by a router to synchronize a wireless network. Bit - A binary digit.
  • Page 118 DHCP (Dynamic Host Configuration Protocol) - A protocol that lets one device on a local network, known as a DHCP server, assign temporary IP addresses to the other network devices, typically computers. DMZ (Demilitarized Zone) - Removes the Router's firewall protection from one PC, allowing it to be “seen” from the Internet.
  • Page 119 10/100 16-Port VPN Router Dynamic IP Address - A temporary IP address assigned by a DHCP server. EAP (Extensible Authentication Protocol) - A general authentication protocol used to control network access. Many specific authentication methods work within this framework. EAP-PEAP (Extensible Authentication Protocol-Protected Extensible Authentication Protocol) - A mutual authentication method that uses a combination of digital certificates and another system, such as passwords.
  • Page 120 10/100 16-Port VPN Router IEEE (The Institute of Electrical and Electronics Engineers) - An independent institute that develops networking standards. Infrastructure - Currently installed computing and networking equipment. Infrastructure Mode - Configuration in which a wireless network is bridged to a wired network via an access point.
  • Page 121 Router - A networking device that connects multiple networks together, such as a local network and the Internet. RTS (Request To Send) - A packet sent when a computer has data to transmit. The computer will wait for a CTS (Clear To Send) message before sending data.
  • Page 122 10/100 16-Port VPN Router SMTP (Simple Mail Transfer Protocol) - The standard e-mail protocol on the Internet. SNMP (Simple Network Management Protocol) - A widely used network monitoring and control protocol. Software - Instructions for the computer. A series of instructions that performs a particular task is called a “program”.
  • Page 123 10/100 16-Port VPN Router Upload - To transmit a file over a network. URL (Uniform Resource Locator) - The address of a file located on the Internet. VPN (Virtual Private Network) - A security measure to protect data as it leaves one network and goes to another over the Internet.
  • Page 124: Appendix H: Specifications

    10/100 16-Port VPN Router Appendix H: Specifications Model RV016 Standards IEEE 802.3, 802.3u Ports 16 10/100 RJ-45 Ports, 2 10/100 RJ-45 Internet Port, 1 10/100 RJ-45 DMZ Port, Up to 7 10/100 RJ-45 Internet Ports Button Reset Cabling Type Category 5 Ethernet...
  • Page 125: Appendix I: Warranty Information

    Your exclusive remedy and Linksys' entire liability under this warranty will be for Linksys at its option to repair or replace the Product or refund Your purchase price less any rebates.
  • Page 126: Appendix J: Regulatory Information

    10/100 16-Port VPN Router Appendix J: Regulatory Information FCC STATEMENT This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 127: Appendix K: Contact Information

    Can't find information about a product you want to buy on the web? Do you want to know more about networking with Linksys products? Give our advice line a call at: Or fax your request in to: If you experience problems with any Linksys product,...

Table of Contents