Linksys RVS4000 User Manual
Linksys RVS4000 User Manual

Linksys RVS4000 User Manual

4-port gigabit security router with vpn business series
Hide thumbs Also See for RVS4000:
Table of Contents

Advertisement

Advertisement

Table of Contents
loading

Summary of Contents for Linksys RVS4000

  • Page 2 4-Port Gigabit Security Router with VPN Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2006 Cisco Systems, Inc. All rights reserved.
  • Page 3: Table Of Contents

    VPN Tab QoS Tab Administration Tab IPS Tab L2 Switch Tab Status Tab Appendix A: Troubleshooting Common Problems and Solutions Frequently Asked Questions Appendix B: Using the Linksys QuickVPN Software for Windows 2000 or XP 57 Overview Before You Begin...
  • Page 4 4-Port Gigabit Security Router with VPN Installing the Linksys QuickVPN Software Using the Linksys QuickVPN Software Appendix C: Configuring IPSec between a Windows 2000 or XP Computer and the Router Introduction Environment How to Establish a Secure IPSec Tunnel Appendix D: Configuring a Gateway-to-Gateway IPSec Tunnel...
  • Page 5 4-Port Gigabit Security Router with VPN List of Figures Figure 3-1: VPN Router to VPN Router Figure 3-2: Computer to VPN Router Figure 4-1: Front Panel Figure 4-2: Back Panel Figure 4-3: Right Side Panel Figure 4-4: Left Side Panel...
  • Page 6 4-Port Gigabit Security Router with VPN Figure 6-19: Internet Policy Summary Figure 6-20: Single Port Forwarding Figure 6-21: Port Range Forwarding Figure 6-22: Port Range Triggering Figure 6-23: VPN Figure 6-24: VPN Client Accounts Figure 6-25: VPN Passthrough Figure 6-26: Application-based QoS...
  • Page 7 4-Port Gigabit Security Router with VPN Figure 6-49: Content Filter Figure 6-50: VPN Summary Figure 6-51: Choose Mode Figure 6-52: Gateway to Gateway Figure 6-53: Client to Gateway Figure 6-54: Gateway to Gateway Figure 6-55: Client to Gateway Figure 6-56: Advanced...
  • Page 8 4-Port Gigabit Security Router with VPN Figure 6-79: When it Works Figure 6-80: Save Settings Figure 6-81: Settings are Successful Figure 6-82: Support Figure B-1: VPN Client Accounts Screen Figure B-2: License Agreement Figure B-3: Copying Files Figure B-4: Finished Installing Files...
  • Page 9 4-Port Gigabit Security Router with VPN Figure C-13: Authentication Methods Figure C-14: Preshared Key Figure C-15: New Preshared Key Figure C-16: Tunnel Setting Tab Figure C-17: Connection Type Tab Figure C-18: Properties Screen Figure C-19: IP Filter List Tab Figure C-20: Filter Action Tab...
  • Page 10: Chapter 1: Introduction

    Chapter 1: Introduction Welcome Thank you for choosing the 4-Port Gigabit Security Router with VPN. The Linksys 4-Port Gigabit Security Router with VPN is an advanced Internet-sharing network solution for your small business needs. Like any router, it lets multiple computers in your office share an Internet connection.
  • Page 11: What's In This Guide

    4-Port Gigabit Security Router with VPN. • Appendix B: Using the Linksys QuickVPN Software for Windows 2000 or XP This appendix instructs you on how to use the Linksys QuickVPN software if you are using a Windows 2000 or XP PC.
  • Page 12 • Appendix K: Regulatory Information This appendix supplies the regulatory information regarding the Router. • Appendix L: Contact Information This appendix provides contact information for a variety of Linksys resources, including Technical Support. Chapter 1: Introduction What’s in this Guide?
  • Page 13: Chapter 2: Networking Basics

    A Router is a network device that connects two networks together. The Router connects your local area network (LAN), or the group of PCs in your home or office, to the Internet. The Router processes and regulates the data that travels between these two networks.
  • Page 14 It also will provide the Router with a dynamic IP address to establish a connection to the Internet. By default, a DHCP server (on the LAN side) is enabled on the Router. If you already have a DHCP server running on your network, you MUST disable one of the two DHCP servers.
  • Page 15: Chapter 3: Planning Your Virtual Private Network (Vpn)

    4-Port Gigabit Security Router with VPN Chapter 3: Planning Your Virtual Private Network (VPN) Why do I need a VPN? Computer networking provides a flexibility not available when using an archaic, paper-based system. With this flexibility, however, comes an increased risk in security. This is why firewalls were first introduced. Firewalls help to protect data inside of a local network.
  • Page 16: What Is A Vpn

    The VPN Router creates a “tunnel” or channel between two endpoints, so that data transmissions between them are secure. A computer with the Linksys VPN client software can be one of the two endpoints (refer to “Appendix C: Using the Linksys QuickVPN Software for Windows 2000 or XP”). If you choose not to run the VPN client software, any computer with the built-in IPSec Security Manager (Microsoft 2000 and XP) allows the VPN Router to create a VPN tunnel using IPSec (refer to “Appendix C: Configuring IPSec between a Windows 2000 or...
  • Page 17: Figure 3-1: Vpn Router To Vpn Router

    ISP. Her notebook computer has the Linksys VPN client software, which is configured with her office's IP address. She accesses the Linksys VPN client software and connects to the VPN Router at the central office. As VPNs utilize the Internet, distance is not a factor. Using the VPN, the businesswoman now has a secure...
  • Page 18: Chapter 4: Getting To Know The Router

    Green. For each port, there are three LEDs. If the corresponding LED is continuously lit, the Router is connected to a device at the speed indicated through the corresponding port (1, 2, 3, or 4). If the LED is flashing, the Router is actively sending or receiving data over that port.
  • Page 19: The Back And Side Panels

    4-Port Gigabit Security Router with VPN The Back and Side Panels The Router’s ports and Reset button are located on the back panel of the Router. Figure 4-2: Back Panel Reset Button Reset Button The Reset button can be used in one of two ways: If the Router is having problems connecting to the Internet, press the Reset button for just a second with a paper clip or a pencil tip.
  • Page 20: Chapter 5: Connecting The Router

    PCs. (If you do need to configure your PCs, refer to Windows Help for more information.) • Set up and configure the Router with the setting(s) provided by your Internet Service Provider (ISP) according to “Chapter 6: Setting Up and Configuring the Router.”...
  • Page 21: Connection Instructions

    4. Power on the cable or DSL modem and the other network device if using one. 5. Connect the included AC power cable to the Router’s Power port on the side of the Router, and then plug the power adapter into an electrical outlet.
  • Page 22: Chapter 6: Setting Up And Configuring The Router

    Chapter 6: Setting Up and Configuring the Router Overview For your convenience, use the Router’s Web-based Utility to set it up and configure it. This chapter will explain all of the functions in this Utility. There are eight main tabs in the Utility: Setup, Firewall, VPN, QoS, Administration, IPS, L2 Switch, and Status.
  • Page 23 • Reporting. Allows configuration of Log settings. • Diagnostics. Use this screen to check the connection between the Router and a PC on the LAN or Internet. • Backup & Restore. Allows you to save and load router configuration settings.
  • Page 24: How To Access The Web-Based Utility

    • VPN Clients. This screen provides status information about the Router’s VPN clients. How to Access the Web-based Utility The router is configured using the built-in Web-based utility. To access the Web-based Utility of the Router: • Launch Internet Explorer or Netscape Navigator, and enter the Router’s default IP address, 192.168.1.1, in the Address field.
  • Page 25: Setup Tab

    If your connection uses a permanent IP address to connect to the Internet, then select Static IP. Internet IP Address. This is the Router’s IP address, when seen from the WAN, or the Internet. Your ISP will provide you with the IP Address you need to specify here.
  • Page 26: Figure 6-6: Pppoe

    Point-to-Point Tunneling Protocol (PPTP) is a service that applies to connections in Europe and Israel only. IP Address. This is the Router’s IP address, when seen from the WAN, or the Internet. Your ISP will provide you with the IP Address you need to specify here.
  • Page 27: Figure 6-8: Heart Beat Signal

    User Name and Password. Enter the User Name and Password provided by your ISP. Connect on Demand: Max Idle Time. You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time). If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again.
  • Page 28: Figure 6-9: L2Tp

    European countries. Check with your ISP for the necessary setup information. IP Address. This is the Router’s IP address, when seen from the WAN, or the Internet. Your ISP will provide you with the IP Address you need to specify here.
  • Page 29 • Host Name (DynDNS) or Domain name (TZO) 4. Click Save Settings. The Router will now advise the DDNS Service of your current WAN (Internet) IP address whenever this address changes. If using TZO, you should NOT use the TZO software to perform this “IP address update”.
  • Page 30: Figure 6-10: Lan

    DHCP server, then select Disabled (no other DHCP features will be available). If you already have a DHCP server on your network, and you want this Router to act as a Relay for that DHCP Server, select DHCP Relay, then enter the DHCP Server IP Address.
  • Page 31: Figure 6-11: Dmz Host

    Some ISPs require that you register a MAC address. This feature “clones” your network adapter's MAC address onto the Router, and prevents you from having to call your ISP to change the registered MAC address to the Router's MAC address. The Router's MAC address is a 12-digit code assigned to a unique piece of hardware for identification.
  • Page 32: Figure 6-13: Advanced Routing

    (Internet) IP address. In Gateway mode, the NAT (Network Address Translation) mechanism is enabled. Router. You either need another Router to act as the Internet Gateway, or all PCs on your LAN must be assigned (fixed) Internet IP addresses. In Router mode, the NAT mechanism is disabled.
  • Page 33: Figure 6-15: Time

    4-Port Gigabit Security Router with VPN To set up static routing, you should add routing entries in the Router's table that tell the device where to send all incoming packets. All of your network routers should direct the default route entry to the Linksys Router.
  • Page 34: Firewall Tab

    4-Port Gigabit Security Router with VPN Firewall Tab From the Firewall Tab, you can configure the Router to deny or allow specific internal users from accessing the Internet. You can also configure the Router to deny or allow specific Internet users from accessing the internal servers.
  • Page 35: Figure 6-18: List Of Pc's

    Keywords appears in the URL of a web site, access to the site will be blocked. Note that only the URL is checked, not the content of each Web page. Chapter 6: Setting Up and Configuring the Router Firewall Tab Figure 6-18: List of PC’s...
  • Page 36: Figure 6-20: Single Port Forwarding

    Check with the software documentation of the Internet application for more information. Internal Port. This is the port number used by the Router when forwarding Internet traffic to the PC or server on your LAN. Normally, this is the same as the External Port number. If it is different, the Router performs a “Port Translation”, so that the port number used by Internet users is different to the port number used by the server or...
  • Page 37: Vpn Tab

    Summary Button. Clicking this button shows the settings and status of all enabled tunnels. IPSec VPN Tunnel. Check the Enable option to enable this tunnel. Figure 6-23: VPN Tunnel Name. Enter a name for this tunnel, such as “Anaheim Office”. Chapter 6: Setting Up and Configuring the Router VPN Tab...
  • Page 38 Remote Security Group. Select the remote LAN user(s) behind the remote gateway who can use this VPN tunnel. This may be a single IP address, a Sub-network, or any addresses. If “Any” is set, the router acts as responder and accepts request from any remote user. Notice that the Remote Security Group must match the other router's Local Security Group.
  • Page 39 SA, under which a packet should be processed. The SPI is a 32-bit value. Both decimal and hexadecimal values are acceptable. e.g. “987654321” or “0x3ade68b1”. Each tunnel must have Chapter 6: Setting Up and Configuring the Router VPN Tab...
  • Page 40 Advanced Settings button. If the Key Exchange Method is Auto (IKE), this button provides access to some additional settings relating to IKE. Use this if this router is unable to establish a VPN tunnel to the remote VPN Gateway; ensure the Advanced Settings match those on the remote VPN Gateway.
  • Page 41: Figure 6-24: Vpn Client Accounts

    Use this page to administer your VPN Client users. Enter the information at the top of the screen and the users you’ve entered will appear in the list at the bottom, showing their status. This will work with the Linksys QuickVPN client only.
  • Page 42: Qos Tab

    QoS (Quality of Service) allows you to prioritize network traffic using either Application-based priority (such as Web browsing applications, FTP applications, etc...) or Port-based priority which allows you to assign priority to the four physical network ports. Chapter 6: Setting Up and Configuring the Router QoS Tab...
  • Page 43: Administration Tab

    Administration Tab Management Local Gateway Access Gateway Userlist. Select the desired Gateway User List. Chapter 6: Setting Up and Configuring the Router Administration Tab Primary Use Figure 6-26: Application-based QoS Figure 6-27: Port-based QoS...
  • Page 44: Figure 6-28: Administration

    Firewall before an e-mail alert is sent. The minimum value is 20, the maximum value is 100. SMTP Mail Server. Enter the address (domain name) or IP address of the SMTP (Simple Mail Transport Protocol) Server you use for outgoing e-mail. Chapter 6: Setting Up and Configuring the Router Administration Tab...
  • Page 45: Figure 6-29: Log

    Backup button to start the download. Figure 6-30: Diagnostics Restore configuration. This allows you to restore a previously saved config file back to the Router. Click the Browse button to select the config file, then click Restore button to upload the config file.
  • Page 46: Ips Tab

    WARNING: Uploading a configuration file will destroy (overwrite) ALL of the existing settings. To upgrade firmware, download the latest firmware for the product from Linksys.com, extract it to your computer, and perform the steps below: 1. File. Type in the name of the extracted firmware upgrade file or click Browse to locate the file.
  • Page 47: Figure 6-35: P2P/Im

    Last Time Upload. This displays when the signature patterns in the router were last updated. Protect Scope. Displays a list of the categories of attacks that the IPS feature in the router protects against. Chapter 6: Setting Up and Configuring the Router...
  • Page 48: L2 Switch Tab

    VLANs are software based and not defined by physical attributes. VLANs function at layer 2. Since VLANs isolate traffic within the VLAN, a Layer 3 router functioning router is needed to allow traffic flow between VLANs. Layer 3 routers identify segments and coordinate with VLANs.
  • Page 49: Figure 6-38: Radius

    Port. Select the port number. Pair. Each cable consists of 8 pins (4 pairs). Cable Length. The length of the cable. Status. The status of the pair. Figure 6-40: Statistics Chapter 6: Setting Up and Configuring the Router L2 Switch Tab...
  • Page 50: Status Tab

    Figure 6-42: Status Current IP address System. This shows the current system. MAC Address. This is the Router MAC Address, as seen on your local, Ethernet network. IP Address. The Internet IP Address is displayed here. Subnet Mask. This Subnet Mask is associated with the IP address above.
  • Page 51: Figure 6-43: Local Network

    End IP Address. This shows the end of the range of IP addresses used by the DHCP Server. DHCP Client Table. Clicking this button will open a screen showing you which PCs are utilizing the Router as a DHCP server. On the DHCP Client Table screen, you will see a list of DHCP clients (PCs and other network devices) with the following information: Client Names, Interfaces, IP Addresses, MAC Addresses, and the length of time before their assigned IP addresses expire.
  • Page 52: Appendix A: Troubleshooting

    Appendix A: Troubleshooting This appendix provides solutions to problems that may occur during the installation and operation of the Router. Read the descriptions below to help solve your problems. If you can't find an answer here, check the Linksys website at www.linksys.com.
  • Page 53 Properties button. Select Use the following IP address option. D. Enter a unique IP address that is not used by any other computer on the network connected to the Router. You can only use an IP address in the ranges 192.168.1.2 to 192.168.1.99 and 192.168.1.151 to 192.168.1.254.
  • Page 54 4-Port Gigabit Security Router with VPN 2. I want to test my Internet connection. A. Check your TCP/IP settings. For Windows 98 and Millennium: Refer to Windows Help for details. Make sure Obtain IP address automatically is selected in the settings.
  • Page 55 D. In the command prompt, type ping followed by your Internet IP address and press the Enter key. The Internet IP Address can be found in the web interface of the Router. For example, if your Internet IP address is 1.2.3.4, you would enter ping 1.2.3.4 and press the Enter key.
  • Page 56 AH has limitations due to occasional incompatibility with the NAT standard. Change the IP address for the Router to another subnet to avoid a conflict between the VPN IP address and your local IP address. For example, if your VPN server assigns an IP address 192.168.1.X (X is a number from 1 to 254) and your local LAN IP address is 192.168.1.X (X is the same number used in the VPN IP address), the...
  • Page 57 DMZ hosting. There may be cases when you want to host an online game or Internet application. This would require you to set up the Router to deliver incoming packets or data to a specific computer. This also applies to the Internet applications you are using. The best way to get the information on what port services to use is to go to the website of the online game or application you want to use.
  • Page 58 DMZ hosting. (In other words, data that enters the Router will be checked first by the forwarding settings. If the port number that the data enters from does not have port forwarding, then the Router will send the data to whichever PC or network device you set for DMZ hosting.) Follow these steps to set DMZ hosting:...
  • Page 59 12. I need to upgrade the firmware. In order to upgrade the firmware with the latest features, you need to go to the Linksys website and download the latest firmware at www.linksys.com. Follow these steps: Appendix A: Troubleshooting...
  • Page 60 The upgrade could have failed for a number of reasons. Follow these steps to upgrade the firmware: A. Use the Linksys TFTD program to upgrade the firmware. Go to the Linksys website at http:// www.linksys.com and download the TFTP program, which will be listed with the firmware.
  • Page 61 For most DSL users, it is strongly recommended to use MTU 1492. If you are having some difficulties, perform the following steps: A. To connect to the Router, go to the web browser, and enter http://192.168.1.1 or the IP address of the Router.
  • Page 62: Frequently Asked Questions

    Never dial a connection. For Netscape Navigator, click Edit, Preferences, Advanced, and Proxy. Make sure that Netscape Navigator is set to Direct connection to the Internet. 18. I’m trying to access the Router’s Web-based Utility, but I do not see the login screen. Instead, I see a screen saying, “404 Forbidden.”...
  • Page 63 ISP. Does the Router support any operating system other than Windows 98, Millennium, 2000, or XP? Yes, but Linksys does not, at this time, provide technical support for setup, configuration or troubleshooting of any non-Windows operating systems.
  • Page 64 Reset the Router by holding down the Reset button for ten seconds. Reset your cable or DSL modem by powering the unit off and then on. Obtain and flash the latest firmware release that is readily available on the Linksys website, www.linksys.com.
  • Page 65 Any platform that supports Ethernet and TCP/IP is compatible with the Router. How many ports can be simultaneously forwarded? Theoretically, the Router can establish 4,000 sessions at the same time, but you can only forward 30 ranges of ports. Does the Router replace a modem? Is there a cable or DSL modem in the Router? No, this version of the Router must work in conjunction with a cable or DSL modem.
  • Page 66: Appendix B: Using The Linksys Quickvpn Software For Windows 2000 Or Xp

    Windows 2000 or XP Overview The Linksys 4-Port Gigabit Security Router with VPN offers a free QuickVPN software program for computers running Windows 2000 or XP. (Computers running other operating systems will have to use a third-party VPN software program.) This guide describes how to install and use the Linksys QuickVPN software.
  • Page 67: Installing The Linksys Quickvpn Software

    Installing the Linksys QuickVPN Software Installing from the CD-ROM 1. Insert the RVS4000 CD-ROM into your CD-ROM drive. Go to the Start menu and then click Run. In the field provided, enter D:\VPN_Client.exe (if “D” is the letter of your CD-ROM drive).
  • Page 68: Using The Linksys Quickvpn Software

    Then enter the User Name and Password you have been assigned. In the Server Address field, enter the IP address or domain name of the Linksys 4-Port Gigabit Security Router with VPN. To save this profile, click the Save button. Multiple profiles can be set up if you want to establish a tunnel to multiple sites.
  • Page 69: Figure B-11: Quickvpn Software - Status

    Click the OK button to save your new password. Click the Cancel button to cancel your change. For information, click the Help button. Appendix B: Using the Linksys QuickVPN Software for Windows 2000 or XP Using the Linksys QuickVPN Software...
  • Page 70: Appendix C: Configuring Ipsec Between A Windows 2000 Or Xp Computer And The Router

    This document demonstrates how to establish a secure IPSec tunnel using preshared keys to join a private network inside the Router and a Windows 2000 or XP computer. You can find detailed information on configuring the Windows 2000 server at the Microsoft website: Microsoft KB Q252735 - How to Configure IPSec Tunneling in Windows 2000 http://support.microsoft.com/support/kb/articles/Q252/7/35.asp...
  • Page 71: How To Establish A Secure Ipsec Tunnel

    Add button to create a new rule. 2. Make sure the IP Filter List tab is selected, and click the Add button. Appendix C: Configuring IPSec between a Windows 2000 or XP Computer and the Router How to Establish a Secure IPSec Tunnel Figure C-1: Local Security Screen NOTE: The references in this section to “win”...
  • Page 72: Figure C-4: Ip Filter List

    4-Port Gigabit Security Router with VPN 3. The IP Filter List screen should appear. Enter an appropriate name, such as win->Router, for the filter list, and de-select the Use Add Wizard check box. Then, click the Add button. 4. The Filters Properties screen will appear. Select the Addressing tab. In the Source address field, select My IP Address.
  • Page 73: Figure C-7: Ip Filter List

    4-Port Gigabit Security Router with VPN Filter List 2: Router ->win 7. The New Rule Properties screen will appear. Select the IP Filter List tab, and make sure that win -> Router is highlighted. Then, click the Add button. 8. The IP Filter List screen should appear. Enter an appropriate name, such as Router->win for the filter list, and de-select the Use Add Wizard check box.
  • Page 74: Figure C-10: Ip Filter List Tab

    IPSec check box. Select Session key Perfect Forward Secrecy, and click the OK button. Appendix C: Configuring IPSec between a Windows 2000 or XP Computer and the Router How to Establish a Secure IPSec Tunnel...
  • Page 75: Figure C-13: Authentication Methods

    6. This new Preshared key will be displayed. Click the Apply button to continue, if it appears on your screen; otherwise, proceed to the next step. Appendix C: Configuring IPSec between a Windows 2000 or XP Computer and the Router How to Establish a Secure IPSec Tunnel...
  • Page 76: Figure C-16: Tunnel Setting Tab

    Tunnel 2: Router->win 9. In the new policy’s properties screen, make sure that “win -> Router” is selected and deselect the Use Add Wizard check box. Then, click the Add button to create the second IP filter.
  • Page 77: Figure C-19: Ip Filter List Tab

    4-Port Gigabit Security Router with VPN 10. Go to the IP Filter List tab, and click the filter list Router->win. 11. Click the Filter Action tab, and select the filter action Require Security. Then, click the Edit button. From the Security Methods tab, verify that the Negotiate security option is enabled, and deselect the Accept unsecured communication, but always respond using IPSec check box.
  • Page 78: Figure C-22: Preshared Key

    15. Click the Tunnel Setting tab. Click the radio button for The tunnel endpoint is specified by this IP Address, and enter the Windows 2000/XP computer’s IP Address. Appendix C: Configuring IPSec between a Windows 2000 or XP Computer and the Router How to Establish a Secure IPSec Tunnel...
  • Page 79: Figure C-25: Connection Type

    In the IP Security Policies on Local Machine window, right-click the policy named to_Router, and click Assign. A green arrow appears in the folder icon. Figure C-27: Local Computer Appendix C: Configuring IPSec between a Windows 2000 or XP Computer and the Router How to Establish a Secure IPSec Tunnel...
  • Page 80: Figure C-28: Vpn Tab

    IP subnet, enter 0 for the last set of IP Addresses (e.g. 192.168.1.0). 6. Enter the IP Address and Subnet Mask of the VPN device at the other end of the tunnel (the remote VPN Router or device with which you wish to communicate) in the Remote Security Router fields.
  • Page 81: Appendix D: Configuring A Gateway-To-Gateway Ipsec Tunnel

    Configuring the VPN Settings for the VPN Routers Configuring VPN Router 1 Follow these instructions for the first VPN Router, designated VPN Router 1. The other VPN Router is designated VPN Router 2. Appendix D: Configuring a Gateway-to-Gateway IPSec Tunnel...
  • Page 82: Figure D-2: Login Screen

    Mask fields. Note that the subnet of Router 2 must be different than the subnet of Router 1. 10. For the Remote Secure Gateway, select IP Addr. Enter VPN Router 2’s WAN IP address in the IP Address field.
  • Page 83: Figure D-4: Security - Vpn Screen (Vpn Tunnel)

    10. For the Remote Secure Group, select Subnet. Enter VPN Router 1’s local network settings in the IP Address and Mask fields. 11. For the Remote Secure Gateway, select IP Addr. Enter VPN Router 1’s WAN IP address in the IP Address field. 12. Click the Save Settings button.
  • Page 84: Configuring The Key Management Settings

    6. If you need more detailed settings, click the Advanced Settings button. Otherwise, click the Save Settings button and proceed to the next section, “Configuring VPN Router 2.” 7. On the Auto (IKE) Advanced Settings screen, keep the default Operation Mode, Main.
  • Page 85: Configuring Pc 1 And Pc 2

    4-Port Gigabit Security Router with VPN Configuring VPN Router 2 For VPN Router 2, follow the same instructions in the previous section, “Configuring VPN Router 1.” Configuring PC 1 and PC 2 1. Set PC 1 and PC 2 to be DHCP clients (refer to Windows Help for more information).
  • Page 86: Appendix E: Finding The Mac Address And Ip Address For Your Ethernet Adapter

    This section describes how to find the MAC address for your computer’s Ethernet adapter so you can use the MAC address cloning feature of the Router. You can also find the IP address of your computer’s Ethernet adapter. This IP address is used for the Router’s filtering, forwarding, and/or DMZ features. Follow the steps in this appendix to find the adapter’s MAC or IP address in Windows 98, Me, 2000, or XP.
  • Page 87: For The Router's Web-Based Utility

    4-Port Gigabit Security Router with VPN 3. Write down the Physical Address as shown on your computer screen (Figure C-3); it is the MAC address for your Ethernet adapter. This appears as a series of numbers and letters. The MAC address/Physical Address is what you will use for MAC address cloning or MAC filtering.
  • Page 88: Appendix F: Physical Setup Of The Router

    You can set the Router on a desktop or mount it on the wall. Placement of the Router Set the Router on a desktop or other flat, secure surface. Do not place excessive weight on top of the Router. Wall-Mount Option You will need 2 suitable screws (See Figure F-1) to mount the Router.
  • Page 89: Appendix G: Windows Help

    4-Port Gigabit Security Router with VPN Appendix G: Windows Help Almost all Linksys networking products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix.
  • Page 90: Appendix H: Glossary

    This glossary contains some basic networking terms you may come across when using this product. For more advanced terms, see the complete Linksys glossary at http://www.linksys.com/glossary. Access Point - A device that allows wireless-equipped computers and other devices to communicate with a wired network.
  • Page 91 4-Port Gigabit Security Router with VPN DMZ (Demilitarized Zone) - Removes the Router's firewall protection from one PC, allowing it to be "seen" from the Internet. DNS (Domain Name Server) - The IP address of your ISP's server, which translates the names of websites into IP addresses.
  • Page 92 Passphrase - Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products. Ping (Packet INternet Groper) - An Internet utility used to determine whether a particular IP address is online.
  • Page 93 Roaming - The ability to take a wireless device from one access point's range to another without losing the connection. Router - A networking device that connects multiple networks together. Server - Any computer whose function in a network is to provide user access to files, printing, communications, and other services.
  • Page 94 4-Port Gigabit Security Router with VPN TKIP (Temporal Key Integrity Protocol) - a wireless encryption protocol that provides dynamic encryption keys for each packet transmitted. Topology - The physical layout of a network. TX Rate - Transmission Rate. Upgrade - To replace existing software or firmware with a newer version.
  • Page 95: Appendix I: Specifications

    4-Port Gigabit Security Router with VPN Appendix I: Specifications Model RVS4000 Standards IEEE802.3, 802.3u, 802.1x, RFC791 (IP Protocol) Ports Ethernet, Power Buttons Reset Cabling Type UTP CAT 5 LEDs Power, Diag, IPS (Blinks RED - Internal attack, Blinks Green - external attack), LAN 1-4, Internet...
  • Page 96 4-Port Gigabit Security Router with VPN Security Access Control Access Control List (ACL) Capability: MAC-based, IP-based Firewall SPI stateful packet inspection firewall Content Filtering URL blocking, keyword blocking IPS (Intrusion Prevention System) IP Sweep Detection, Application Anomaly Detection (HTTP, FTP, Telnet, RCP), P2P Control, Instant Messenger Control,...
  • Page 97 4-Port Gigabit Security Router with VPN 5 QuickVPN Tunnels for remote client access 5 IPSec Gateway-to-Gateway Tunnels for branch office connectivity 3DES Encryption MD5/SHA1 Authentication IPSec NAT-T VPN Passthrough of PPTP, L2TP, IPSec Routing Static and RIP v1,v2 Environmental Device Dimensions 6.69 x 1.61 x 6.69 inches...
  • Page 98: Appendix J: Warranty Information

    Your exclusive remedy and Linksys' entire liability under this warranty will be for Linksys at its option to repair or replace the Product or refund Your purchase price less any rebates.
  • Page 99: Appendix K: Regulatory Information

    4-Port Gigabit Security Router with VPN Appendix K: Regulatory Information FCC Statement This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 100 Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products. Consumers are required to comply with this notice for all electronic products bearing the following symbol: Appendix K: Regulatory Information...
  • Page 101 4-Port Gigabit Security Router with VPN Appendix K: Regulatory Information...
  • Page 102 4-Port Gigabit Security Router with VPN Appendix K: Regulatory Information...
  • Page 103 4-Port Gigabit Security Router with VPN Appendix K: Regulatory Information...
  • Page 104 4-Port Gigabit Security Router with VPN For more information, visit www.linksys.com. Appendix K: Regulatory Information...
  • Page 105: Appendix L: Contact Information

    Can't find information about a product you want to buy on the web? Do you want to know more about networking with Linksys products? Give our advice line a call at: Or fax your request in to: If you experience problems with any Linksys product,...

Table of Contents