User Guide
Page 3
... a VPN 3 VPN Router to VPN Router 4 Computer (using the Linksys VPN client software) to VPN Router 4 Chapter 4: Product Overview 5 Front Panel 5 Back Panel 5 Chapter 5: Configuring the Wireless-G VPN Router 6 Overview 6 How to Access the Web-based Utility 7 Setup 7 Setup > Basic Settings 7 Setup > VLAN 10 Setup > DDNS 10 Setup > MAC Address Clone 11 Setup > Advanced Routing 12 Wireless 13 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 13 Wireless > Wireless...
... a VPN 3 VPN Router to VPN Router 4 Computer (using the Linksys VPN client software) to VPN Router 4 Chapter 4: Product Overview 5 Front Panel 5 Back Panel 5 Chapter 5: Configuring the Wireless-G VPN Router 6 Overview 6 How to Access the Web-based Utility 7 Setup 7 Setup > Basic Settings 7 Setup > VLAN 10 Setup > DDNS 10 Setup > MAC Address Clone 11 Setup > Advanced Routing 12 Wireless 13 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 13 Wireless > Wireless...
User Guide
Page 4
... Administration > Factory Default 28 Administration > Firmware Upgrade 28 Administration > Reboot 29 Status 29 Status > Router 29 Status > Local Network 30 Status > Wireless 30 Status > System Performance 30 Status > VPN Clients 31 Appendix A: Troubleshooting 32 Frequently Asked Questions 37 Appendix B: Wireless Security Checklist 39 General Network Security Guidelines 39 Additional Security Tips 39 Appendix C: Using Linksys...
... Administration > Factory Default 28 Administration > Firmware Upgrade 28 Administration > Reboot 29 Status 29 Status > Router 29 Status > Local Network 30 Status > Wireless 30 Status > System Performance 30 Status > VPN Clients 31 Appendix A: Troubleshooting 32 Frequently Asked Questions 37 Appendix B: Wireless Security Checklist 39 General Network Security Guidelines 39 Additional Security Tips 39 Appendix C: Using Linksys...
User Guide
Page 6
The WRV200 is a built-in business environments requires additional flexibility. The WRV200 has the advanced security functions needed for Wireless Distribution System (WDS), which utilizes a MIMO antennae configuration to your wireless network. For the LAN interface, there is a VPN router with other security features including enabling/disabling SSID Broadcasts and MAC-based filtering. It has a SPI based firewall...
The WRV200 is a built-in business environments requires additional flexibility. The WRV200 has the advanced security functions needed for Wireless Distribution System (WDS), which utilizes a MIMO antennae configuration to your wireless network. For the LAN interface, there is a VPN router with other security features including enabling/disabling SSID Broadcasts and MAC-based filtering. It has a SPI based firewall...
User Guide
Page 8
... Internet. When data is when a VPN serves its purpose. You may already have a firewall, which will help to VPN Router IMPORTANT: You must have a second VPN Router or a computer with the Linksys VPN client software. Without the security of the VPN tunnel. That is constantly open to hackers...help. But what do you have at least one VPN Router on one network to another user. 2) Data Sniffing Data "sniffing" is not received by creating a "tunnel". How is done by its final destination. Wireless-G VPN Router with an individual over a shared or public network...
... Internet. When data is when a VPN serves its purpose. You may already have a firewall, which will help to VPN Router IMPORTANT: You must have a second VPN Router or a computer with the Linksys VPN client software. Without the security of the VPN tunnel. That is constantly open to hackers...help. But what do you have at least one VPN Router on one network to another user. 2) Data Sniffing Data "sniffing" is not received by creating a "tunnel". How is done by its final destination. Wireless-G VPN Router with an individual over a shared or public network...
User Guide
Page 9
...example of the two endpoints (refer to "Appendix C: Configuring IPSec between a Windows 2000 or XP PC and the Router"). Wireless-G VPN Router with the Linksys VPN client software can also refer to "Appendix B: Using Linksys QuickVPN for Windows 2000, XP, or Vista", "Appendix C:...Home Office PC 1 WRV200 VPN Router PC 2 VPN Router to VPN Router Computer (using IPSec (refer to "Appendix B: Using Linksys QuickVPN for his VPN Router for Windows 2000, XP, or Vista"). Her notebook computer has the Linksys VPN client software, which is not a factor. As VPNs utilize the Internet, ...
...example of the two endpoints (refer to "Appendix C: Configuring IPSec between a Windows 2000 or XP PC and the Router"). Wireless-G VPN Router with the Linksys VPN client software can also refer to "Appendix B: Using Linksys QuickVPN for Windows 2000, XP, or Vista", "Appendix C:...Home Office PC 1 WRV200 VPN Router PC 2 VPN Router to VPN Router Computer (using IPSec (refer to "Appendix B: Using Linksys QuickVPN for his VPN Router for Windows 2000, XP, or Vista"). Her notebook computer has the Linksys VPN client software, which is not a factor. As VPNs utilize the Internet, ...
User Guide
Page 11
... privileges, SNMP settings, and UPnP settings. • Log. Setup • Basic Setup. Wireless • Basic Wireless Settings. To set up triggered ranges and forwarded ranges for firsttime installation of a computer connected to designate VPN clients and their passwords. • VPN Passthrough. The VPN Router creates a tunnel or secure channel between two endpoints, so that the transmitted data...
... privileges, SNMP settings, and UPnP settings. • Log. Setup • Basic Setup. Wireless • Basic Wireless Settings. To set up triggered ranges and forwarded ranges for firsttime installation of a computer connected to designate VPN clients and their passwords. • VPN Passthrough. The VPN Router creates a tunnel or secure channel between two endpoints, so that the transmitted data...
User Guide
Page 12
... from your Internet connection type. This provides status information about the Router's VPN clients. For additional information, click More. This tab allows you want to access all network traffic. • VPN Clients. Automatic Configuration - Chapter 5 Configuring the Wireless-G Router • Diagnostics. Use this to upgrade the Router's firmware. • Reboot. This screen provides status information about the local...
... from your Internet connection type. This provides status information about the Router's VPN clients. For additional information, click More. This tab allows you want to access all network traffic. • VPN Clients. Automatic Configuration - Chapter 5 Configuring the Wireless-G Router • Diagnostics. Use this to upgrade the Router's firmware. • Reboot. This screen provides status information about the local...
User Guide
Page 15
... time for the DHCP server to two IP addresses in the fields provided. Static IP Table Time Settings This is the amount of time a DHCP client can keep the assigned IP address before it is useful when you to each PC on your changes. Setup > VLAN The Setup > VLAN screen allows... disable DHCP, assign a static IP address to the number of DHCP addresses is the broadcast IP address. IP Address Range The range of DHCP users. Wireless-G VPN Router with the desired port. When you assign a fixed host and domain name to enable the feature. DDNS lets you have one of MAC addresses to...
... time for the DHCP server to two IP addresses in the fields provided. Static IP Table Time Settings This is the amount of time a DHCP client can keep the assigned IP address before it is useful when you to each PC on your changes. Setup > VLAN The Setup > VLAN screen allows... disable DHCP, assign a static IP address to the number of DHCP addresses is the broadcast IP address. IP Address Range The range of DHCP users. Wireless-G VPN Router with the desired port. When you assign a fixed host and domain name to enable the feature. DDNS lets you have one of MAC addresses to...
User Guide
Page 18
... transfer files between the Router and a wireless client by the Router. Wireless Channel Select the appropriate channel from a range of your wireless network. Select SSID Select the SSID that are configured on this drop-down menu, you have only 802.11b devices, select B-Only. TX Rate Limitation The rate of your wireless network. Wireless-G VPN Router with dynamic encryption keys...
... transfer files between the Router and a wireless client by the Router. Wireless Channel Select the appropriate channel from a range of your wireless network. Select SSID Select the SSID that are configured on this drop-down menu, you have only 802.11b devices, select B-Only. TX Rate Limitation The rate of your wireless network. Wireless-G VPN Router with dynamic encryption keys...
User Guide
Page 22
...RTS Threshold The RTS Threshold value should be able to communicate with the Router but a series of data transmission. This can transmit. This function boosts the Router's ability Wireless-G VPN Router with heavy 802.11b traffic. For help prevented unwanted eavesdropping on your ... and multicast messages. The Router will advertise its Basic Rate to the other wireless devices in an environment with RangeBooster to the Router in your Wireless-G products are experiencing severe problems and are 1-2Mbps, for associated clients, it will severely decrease performance...
...RTS Threshold The RTS Threshold value should be able to communicate with the Router but a series of data transmission. This can transmit. This function boosts the Router's ability Wireless-G VPN Router with heavy 802.11b traffic. For help prevented unwanted eavesdropping on your ... and multicast messages. The Router will advertise its Basic Rate to the other wireless devices in an environment with RangeBooster to the Router in your Wireless-G products are experiencing severe problems and are 1-2Mbps, for associated clients, it will severely decrease performance...
User Guide
Page 23
... recipients at the same time. This mode allows a wireless client to connect to Internet sites created using this option. This mode allows you to extend the coverage of the Router by hiding your network ports, so it Wireless-G VPN Router with RangeBooster is more difficult for intruders to work with... them to enter your network. When you run the risk of not having access to the Router through a repeater, such as WAP54GP...
... recipients at the same time. This mode allows a wireless client to connect to Internet sites created using this option. This mode allows you to extend the coverage of the Router by hiding your network ports, so it Wireless-G VPN Router with RangeBooster is more difficult for intruders to work with... them to enter your network. When you run the risk of not having access to the Router through a repeater, such as WAP54GP...
User Guide
Page 24
... when the requested data returns through Software DMZ. When you have a new static IP address assigned to it because its DHCP client function disabled and must have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes... Wireless-G VPN Router with RangeBooster Firewall > DMZ Software DMZ This feature allows one PC, enter the computer's IP address. When you have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to undo your changes. Chapter 5 Configuring the Wireless-G Router The...
... when the requested data returns through Software DMZ. When you have a new static IP address assigned to it because its DHCP client function disabled and must have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes... Wireless-G VPN Router with RangeBooster Firewall > DMZ Software DMZ This feature allows one PC, enter the computer's IP address. When you have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to undo your changes. Chapter 5 Configuring the Wireless-G Router The...
User Guide
Page 25
...number. Select a number from the Internet Access Policy dropdown menu. 2. After making your changes. 5. VPN > VPN Client Access The Router offers a QuickVPN Client utility for the connection. Use the settings on this policy to cancel any changes you can be ...Wireless-G Router Firewall > Access Restriction The Access Restriction screen allows you to specific sites on the Internet. Firewall > URL Filtering URL filtering is clicked). Firewall > Access Restriction Internet Access Policy Access can designate the QuickVPN clients and their passwords on the VPN > VPN Client...
...number. Select a number from the Internet Access Policy dropdown menu. 2. After making your changes. 5. VPN > VPN Client Access The Router offers a QuickVPN Client utility for the connection. Use the settings on this policy to cancel any changes you can be ...Wireless-G Router Firewall > Access Restriction The Access Restriction screen allows you to specific sites on the Internet. Firewall > URL Filtering URL filtering is clicked). Firewall > Access Restriction Internet Access Policy Access can designate the QuickVPN clients and their passwords on the VPN > VPN Client...
User Guide
Page 26
.... When you to manage the certificate used to implement secure exchange of the VPN client, click Add/Save to add the VPN client to your computer, then click Import. Wireless-G VPN Router with RangeBooster Certificate Management This section allows you have finished making changes to the... your changes. For QuickVPN users to securely connect to the router, this button to import a certificate previously saved to a file using IPSec, L2TP, or PPTP protocols. Chapter 5 Configuring the Wireless-G Router VPN > VPN Client Access User Name Enter a name for administrator contains the private...
.... When you to manage the certificate used to implement secure exchange of the VPN client, click Add/Save to add the VPN client to your computer, then click Import. Wireless-G VPN Router with RangeBooster Certificate Management This section allows you have finished making changes to the... your changes. For QuickVPN users to securely connect to the router, this button to import a certificate previously saved to a file using IPSec, L2TP, or PPTP protocols. Chapter 5 Configuring the Wireless-G Router VPN > VPN Client Access User Name Enter a name for administrator contains the private...
User Guide
Page 28
... field specifies how long an ISAKMP key channel should be the same type of the VPN tunnel. Or, both ends of encryption: 3DES, AES-128, AES-192, or AES256. Chapter 5 Configuring the Wireless-G Router the VPN will accept requests from any IP address. Select Auto (IKE) for ISAKMP SA establishment... , but it must be another level of the tunnel is 1024. Tunnel Options Dead Peer Detection You can be the Wireless-G VPN Router with VPN client software that is dynamic, select FQDN for the last set the operation mode to scramble (encrypt) the data being used by the...
... field specifies how long an ISAKMP key channel should be the same type of the VPN tunnel. Or, both ends of encryption: 3DES, AES-128, AES-192, or AES256. Chapter 5 Configuring the Wireless-G Router the VPN will accept requests from any IP address. Select Auto (IKE) for ISAKMP SA establishment... , but it must be another level of the tunnel is 1024. Tunnel Options Dead Peer Detection You can be the Wireless-G VPN Router with VPN client software that is dynamic, select FQDN for the last set the operation mode to scramble (encrypt) the data being used by the...
User Guide
Page 30
... applications. Specific Port # You can select either Priority Queue or Bandwidth Allocation. It depends on the settings of a VPN Tunnel and VPN Client. Guaranteed will reserve specific bandwidth for other applications. You also can define the policies regarding source or destination IP, protocol... Port-Based QoS Priority Select the QoS priority for the five preset applications and up to view the VPN operation situation. The bandwidth utilization could be Wireless-G VPN Router with specific value to WAN. The QoS tab allows you specify. Bandwidth Allocation For each of Service...
... applications. Specific Port # You can select either Priority Queue or Bandwidth Allocation. It depends on the settings of a VPN Tunnel and VPN Client. Guaranteed will reserve specific bandwidth for other applications. You also can define the policies regarding source or destination IP, protocol... Port-Based QoS Priority Select the QoS priority for the five preset applications and up to view the VPN operation situation. The bandwidth utilization could be Wireless-G VPN Router with specific value to WAN. The QoS tab allows you specify. Bandwidth Allocation For each of Service...
User Guide
Page 35
... on -screen information. DHCP Active IP Table Wireless-G VPN Router with RangeBooster 30 Click Refresh to update the on the Wireless tab, this displays the status of your wireless network. Subnet Mask The Router's Subnet Mask is displayed here. DHCP Clients Table Click this button to update the on the Wireless tab, this will display what type of...
... on -screen information. DHCP Active IP Table Wireless-G VPN Router with RangeBooster 30 Click Refresh to update the on the Wireless tab, this displays the status of your wireless network. Subnet Mask The Router's Subnet Mask is displayed here. DHCP Clients Table Click this button to update the on the Wireless tab, this will display what type of...
User Guide
Page 36
.... Packets Received The number of packets received is shown here. Bytes Sent The number of bytes sent is displayed here. Wireless-G VPN Router with RangeBooster Status > VPN Clients VPN Summary VPN Client Users Display Select the group of VPN client users whose Disconnect checkboxes have been checked. Error Packets Received The number of error packets received is displayed here. Status...
.... Packets Received The number of packets received is shown here. Bytes Sent The number of bytes sent is displayed here. Wireless-G VPN Router with RangeBooster Status > VPN Clients VPN Summary VPN Client Users Display Select the group of VPN client users whose Disconnect checkboxes have been checked. Error Packets Received The number of error packets received is displayed here. Status...
User Guide
Page 45
...third-party VPN software.) For Windows Vista, QuickVPN Client version 1.2.5 or later is required. License Agreement Copying Files VPN Client Access Screen 3. Click Save Settings. Click Finished to the next section, "Using the Linksys QuickVPN Software". 40 Click Business. 3....Wireless-G VPN Router with computers running Windows 2000, XP, or Vista. (Computers using other operating systems will have to your CD-ROM drive. Click WRV200. 5. Click VPN > VPN Client Access. Click Yes to accept the agreement and the appropriate files are copied to configure the Router's VPN client...
...third-party VPN software.) For Windows Vista, QuickVPN Client version 1.2.5 or later is required. License Agreement Copying Files VPN Client Access Screen 3. Click Save Settings. Click Finished to the next section, "Using the Linksys QuickVPN Software". 40 Click Business. 3....Wireless-G VPN Router with computers running Windows 2000, XP, or Vista. (Computers using other operating systems will have to your CD-ROM drive. Click WRV200. 5. Click VPN > VPN Client Access. Click Yes to accept the agreement and the appropriate files are copied to configure the Router's VPN client...
User Guide
Page 47
...WRV200 for Client and save the certificate as a .PEM file. 2. c. Click Export for distribution to QuickVPN users, as well as how to install the certificate on the QuickVPN users' PCs. 1. For example: C:\Program Files\Linksys\QuickVPN Client\ b. c. Select VPN, then VPN Client... Access. For more information on to generate a new certificate. Each QuickVPN user must then install the certificate as follows: a. Wireless-G VPN Router with RangeBooster 42 Log on certificate management, go ...
...WRV200 for Client and save the certificate as a .PEM file. 2. c. Click Export for distribution to QuickVPN users, as well as how to install the certificate on the QuickVPN users' PCs. 1. For example: C:\Program Files\Linksys\QuickVPN Client\ b. c. Select VPN, then VPN Client... Access. For more information on to generate a new certificate. Each QuickVPN user must then install the certificate as follows: a. Wireless-G VPN Router with RangeBooster 42 Log on certificate management, go ...