Linksys BEFSX41 User Manual

Broadband firewall router with 4-port switch/vpn endpoint
Hide thumbs Also See for BEFSX41:

Advertisement

USER GUIDE
Broadband Firewall Router with
4-Port Switch/VPN Endpoint
BEFSX41
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Linksys BEFSX41

  • Page 1 USER GUIDE Broadband Firewall Router with 4-Port Switch/VPN Endpoint BEFSX41 Model:...
  • Page 2: About This Guide

    Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco, and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview Front Panel..........1 Back Panel .
  • Page 4: Chapter 1: Product Overview

    Chapter 1: Back Panel Product Overview Thank you for choosing the Linksys by Cisco Broadband Firewall Router with 4-Port Switch/VPN Endpoint. The Router lets you access the Internet through its four switched ports. You can also use the Router to share...
  • Page 5: Chapter 2: Advanced Configuration

    Advanced Configuration Chapter 2 Chapter 2: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you’d like to change its advanced settings, use the Router’s web-based utility. This chapter describes each web page of the utility and each page’s key functions.
  • Page 6 Advanced Configuration Chapter 2 (otherwise, leave it set at Disable) and enter the value connected to the Internet through a DSL line, check with desired. You should leave this value in the 1200 to 1500 your ISP to see if they use PPPoE. If they do, you will have range.
  • Page 7 Advanced Configuration Chapter 2 PPTP Remote Access Service (RAS) is a service that applies to Point-to-Point Tunneling Protocol (PPTP) is a service that connections in Singapore only. For users in Singapore, applies to connections in Europe only. check with Singtel for information on RAS. Internet Connection Type >...
  • Page 8 Advanced Configuration Chapter 2 desired. You should leave this value in the 1200 to 1500 When you are finished, click the Save Settings button. range. Most DSL users should use the default of 1492. Then click the Status tab, and click the Connect button to start the connection.
  • Page 9: Setup > Ddns

    Advanced Configuration Chapter 2 Network Setup down menu. Select Default NTP Server or User-Defined NTP Server. The Network Setup section changes the settings on the Click Save Settings to apply your changes, or click Cancel network connected to the Router’s Ethernet ports. Changes to cancel your changes.
  • Page 10: Setup > Mac Address Clone

    Advanced Configuration Chapter 2 Clone TZO.com Click this button to clone the MAC address of the computer you are using. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Setup > Advanced Routing This screen is used to set up the Router’s advanced functions.
  • Page 11: Security > Firewall

    Advanced Configuration Chapter 2 Static Routing A static route is a pre-determined pathway that network information must travel to reach a specific host or network. Enter the information described below to set up a new static route. Select Entry To set up a static route between the Router and another network, select a number from the drop- down list.
  • Page 12: Security > Vpn

    Advanced Configuration Chapter 2 VPN Tunnel computers. Select Enabled to filter multicasting. This feature is disabled by default. Filter Internet NAT Redirection This feature uses port forwarding to block access to local servers from local networked computers. Select Enabled to filter Internet NAT redirection.
  • Page 13 Advanced Configuration Chapter 2 IP Address If you select IP Address, only the computer must be the same type of encryption that is being used by with the specific IP Address that you enter will be able to the VPN device at the other end of the tunnel. Or, you may access the tunnel.
  • Page 14: Restrict Access

    Advanced Configuration Chapter 2 Log screen of the Administration tab, will show you VPN Key Lifetime In the Key Lifetime field, you may optionally activity on a separate screen. The VPN Log screen displays select to have the key expire at the end of a time period of successful connections, transmissions and receptions, your choosing.
  • Page 15 Advanced Configuration Chapter 2 Internet Access Click the Edit List button to select which PCs will be affected by the policy. You can enter the PC by MAC Address or IP Address. You can also enter a range of IP Addresses if you wish this policy to affect a group of PCs.
  • Page 16 Advanced Configuration Chapter 2 Applications & Gaming > Port Range If you wish to deny or allow Internet access for those PCs you listed on the List of PCs screen, click the Forwarding option. You can filter access to various services accessed over The Port Range Forwarding screen allows you to set up the Internet, such as FTP or Telnet, by selecting a service public services on your network, such as web servers,...
  • Page 17: Applications & Gaming > Port Triggering

    Advanced Configuration Chapter 2 Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Applications & Gaming > Port Triggering The Port Triggering screen allows the Router to watch outgoing data for specific port numbers. The IP address of the computer that sends the matching data is remembered by the Router, so that when the requested data returns through the Router, the data is pulled back to the proper...
  • Page 18: Applications & Gaming > Dmz

    Advanced Configuration Chapter 2 “fingered” must have placed his or her profile on the system in order for the information to be available. Fingering requires entering the full user@domain address. HTTP (HyperText Transport Protocol) communications protocol used to connect to servers on the World Wide Web.
  • Page 19: Administration > Log

    Advanced Configuration Chapter 2 SNMP The Router supports Simple Network Management Protocol (SNMP), which is a widely used network monitoring and control protocol. This allows network supervisors to monitor the Router using network management systems such as HP OpenView. Enabled/Disabled To use SNMP, select Enabled.
  • Page 20: Administration > Factory Defaults

    Advanced Configuration Chapter 2 Administration > Diagnostics The Log screen provides you with options for email Diagnostics allow you to check the connections of your alerts and a log of all incoming and outgoing URLs or IP network components as well as locations outside your addresses for your Internet connection.
  • Page 21: Administration > Firmware Upgrade

    Advanced Configuration Chapter 2 Upgrade Firmware Before upgrading the firmware, download the Router’s firmware upgrade file from the Linksys website, www.linksys.com. Then extract the file. Please select a file to upgrade Click Browse and select the extracted firmware upgrade file. Upgrade After you have selected the appropriate file, click this button, and follow the on-screen instructions.
  • Page 22: Status > Local Network

    Advanced Configuration Chapter 2 DHCP Renew Click the DHCP Renew button to replace client. To remove a DHCP client, select the client and click Delete. To retrieve the most up-to-date your Gateway’s current IP address with a new IP address. information, click Refresh.
  • Page 23: Appendix A: Troubleshooting

    Troubleshooting Appendix A Appendix A: When you double-click the web browser, you are prompted for a username and password. If you want to Troubleshooting get rid of the prompt, follow these instructions. Launch the web browser and perform the following steps (these steps are specific to Internet Explorer but are similar Your computer cannot connect to the Internet.
  • Page 24: Appendix B: Specifications

    Specifications Appendix B Appendix B: Specifications Model BEFSX41 Standards IEEE 802.3 (10BaseT), 802.3u (100BaseTX) Ports One 10/100 RJ-45 Port, Four 10/100 RJ-45 Ports Button Reset Cabling Type Ethernet Category 5 LEDs Power, DMZ, Ethernet, Internet Environmental Dimensions 7.32" x 1.88" x 6.06"...
  • Page 25: Appendix C: Warranty Information

    Warranty Information Appendix C Appendix C: service offerings. This limited warranty shall not apply to such third party software or service offerings. This limited Warranty Information warranty does not guarantee any continued availability of a third party’s service for which this product’s use or operation may require.
  • Page 26 Warranty Information Appendix C rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
  • Page 27: Appendix D: Regulatory Information

    Regulatory Information Appendix D Appendix D: Industry Canada Statement Regulatory Information This Class B digital apparatus complies with Canadian ICES-003. Operation is subject to the following two conditions: FCC Statement This device may not cause interference and This product has been tested and complies with the This device must accept any interference, including specifications for a Class B digital device, pursuant to Part interference that may cause undesired operation of...
  • Page 28: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    Regulatory Information Appendix D User Information for Consumer Products Čeština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno Waste Electric and Electronic Equipment s netříděným komunálním odpadem.
  • Page 29 Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 30 Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 31 Regulatory Information Appendix D Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
  • Page 32: Appendix E: Software License Agreement

    CISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR USING THE PRODUCT CONTAINING This product from Cisco-Linksys LLC or from one of its THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco- THIS AGREEMENT.
  • Page 33 Software License Agreement Appendix E your Linksys product and/or the Software is being used in OR RELATED TO THE USE OF OR INABILITY TO USE THE accordance with the terms of this Agreement; (iii) to provide SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF improvements to the way Linksys delivers technology to THE POSSIBILITY OF SUCH DAMAGES.
  • Page 34 Software License Agreement Appendix E GNU General Public License is intended to guarantee your TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND freedom to share and change free software–to make sure MODIFICATION the software is free for all its users. This General Public This License applies to any program or other work License applies to most of the Free Software Foundation’s which contains a notice placed by the copyright...
  • Page 35 Software License Agreement Appendix E If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
  • Page 36 Software License Agreement Appendix E If, as a consequence of a court judgment or allegation not specify a version number of this License, you of patent infringement or for any other reason (not may choose any version ever published by the Free limited to patent issues), conditions are imposed on Software Foundation.
  • Page 37 Software License Agreement Appendix E GNU LESSER GENERAL PUBLIC LICENSE To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the Version 2.1, February 1999 library is modified by someone else and passed on, the recipients should know that what they have is not the Copyright (C) 1991, 1999 Free Software Foundation, Inc.
  • Page 38 Software License Agreement Appendix E freedom and the wherewithal to run that program using a You may copy and distribute verbatim copies of the modified version of the Library. Library’s complete source code as you receive it, in any medium, provided that you conspicuously and The precise terms and conditions for copying, distribution appropriately publish on each copy an appropriate and modification follow.
  • Page 39 Software License Agreement Appendix E Thus, it is not the intent of this section to claim When a “work that uses the Library” uses material from rights or contest your rights to work written entirely a header file that is part of the Library, the object code by you;...
  • Page 40 Software License Agreement Appendix E Use a suitable shared library mechanism for linking You may not copy, modify, sublicense, link with, or with the Library. A suitable mechanism is one that distribute the Library except as expressly provided (1) uses at run time a copy of the library already under this License.
  • Page 41 Software License Agreement Appendix E software distributed through that system in reliance BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, on consistent application of that system; it is up to THERE IS NO WARRANTY FOR THE LIBRARY, TO THE the author/donor to decide if he or she is willing to EXTENT PERMITTED BY APPLICABLE LAW.
  • Page 42 Software License Agreement Appendix E OpenSSL License Original SSLeay License Copyright © 1998-2007 The OpenSSL Project. All rights Copyright © 1995-1998 Eric Young (eay@cryptsoft.com) reserved. All rights reserved. Redistribution and use in source and binary forms, with This package is an SSL implementation written by Eric or without modification, are permitted provided that the Young (eay@cryptsoft.com).
  • Page 43 Software License Agreement Appendix E DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Table of Contents