User Guide
Page 1
USER GUIDE Wireless-G VPN Router with RangeBooster Model: WRV200 BUSINESS SERIES v
USER GUIDE Wireless-G VPN Router with RangeBooster Model: WRV200 BUSINESS SERIES v
User Guide
Page 2
... require it is a registered trademark or trademark of Cisco Systems, Inc. If you use an older web browser, you may have to add http:// in the U.S. and certain other open -source software source code is something that could damage your property or product. Wireless-G VPN Router with RangeBooster Open Source This product may contain... of interest and is available at cost from Linksys for at least three years from the product purchase date. All rights reserved. Copyright © 2007 Cisco Systems, Inc.
... require it is a registered trademark or trademark of Cisco Systems, Inc. If you use an older web browser, you may have to add http:// in the U.S. and certain other open -source software source code is something that could damage your property or product. Wireless-G VPN Router with RangeBooster Open Source This product may contain... of interest and is available at cost from Linksys for at least three years from the product purchase date. All rights reserved. Copyright © 2007 Cisco Systems, Inc.
User Guide
Page 3
... Clone 11 Setup > Advanced Routing 12 Wireless 13 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 13 Wireless > Wireless Network Access 16 Wireless > Advanced Wireless Settings 17 Wireless > WDS 17 Firewall 18 Firewall > General 18 Firewall > Port Forwarding 18 Firewall > Port Triggering 19 Firewall > DMZ 19 Firewall > Access Restriction 20 Firewall > URL Filtering 20 VPN 20 VPN > VPN Client Access 20 Wireless-G VPN Router with RangeBooster
... Clone 11 Setup > Advanced Routing 12 Wireless 13 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 13 Wireless > Wireless Network Access 16 Wireless > Advanced Wireless Settings 17 Wireless > WDS 17 Firewall 18 Firewall > General 18 Firewall > Port Forwarding 18 Firewall > Port Triggering 19 Firewall > DMZ 19 Firewall > Access Restriction 20 Firewall > URL Filtering 20 VPN 20 VPN > VPN Client Access 20 Wireless-G VPN Router with RangeBooster
User Guide
Page 4
...Default 28 Administration > Firmware Upgrade 28 Administration > Reboot 29 Status 29 Status > Router 29 Status > Local Network 30 Status > Wireless 30 Status > System Performance 30 Status > VPN Clients 31 Appendix A: Troubleshooting 32 Frequently Asked Questions 37 Appendix B: Wireless Security Checklist 39 General Network Security Guidelines 39 Additional Security Tips 39 Appendix C: ...Establish a Secure IPSec Tunnel 43 Step 1: Create an IPSec Policy 43 Step 2: Build Filter Lists 43 Step 3: Configure Individual Tunnel Rules 45 Wireless-G VPN Router with RangeBooster ii
...Default 28 Administration > Firmware Upgrade 28 Administration > Reboot 29 Status 29 Status > Router 29 Status > Local Network 30 Status > Wireless 30 Status > System Performance 30 Status > VPN Clients 31 Appendix A: Troubleshooting 32 Frequently Asked Questions 37 Appendix B: Wireless Security Checklist 39 General Network Security Guidelines 39 Additional Security Tips 39 Appendix C: ...Establish a Secure IPSec Tunnel 43 Step 1: Create an IPSec Policy 43 Step 2: Build Filter Lists 43 Step 3: Configure Individual Tunnel Rules 45 Wireless-G VPN Router with RangeBooster ii
User Guide
Page 5
...of the RV082 51 Configuration of PC 1 and PC 2 52 Configuration when Both Gateways Use Dynamic IP Addresses 52 Configuration of the WRV200 52 Configuration of the RV082 53 Configuration of PC 1 and PC 2 53 Appendix F: Glossary 54 Appendix G: Specifications 57 Appendix ...233;quences 62 Wireless Disclaimer 62 Avis de non-responsabilité concernant les appareils sans fil 62 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 63 Appendix J: Contact Information 67 Wireless-G VPN Router with RangeBooster iii
...of the RV082 51 Configuration of PC 1 and PC 2 52 Configuration when Both Gateways Use Dynamic IP Addresses 52 Configuration of the WRV200 52 Configuration of the RV082 53 Configuration of PC 1 and PC 2 53 Appendix F: Glossary 54 Appendix G: Specifications 57 Appendix ...233;quences 62 Wireless Disclaimer 62 Avis de non-responsabilité concernant les appareils sans fil 62 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 63 Appendix J: Contact Information 67 Wireless-G VPN Router with RangeBooster iii
User Guide
Page 6
..., along with the ability to increase or decrease the RF output power, allows for small offices and home offices. Wireless-G VPN Router with a Wireless-G access point for optimal wireless coverage. For the LAN interface, there is a built-in business environments requires additional flexibility. The WRV200's Wireless AP implements WPA2-PSK, WPA2-ENT, and WEP encryption, along with other security...
..., along with the ability to increase or decrease the RF output power, allows for small offices and home offices. Wireless-G VPN Router with a Wireless-G access point for optimal wireless coverage. For the LAN interface, there is a built-in business environments requires additional flexibility. The WRV200's Wireless AP implements WPA2-PSK, WPA2-ENT, and WEP encryption, along with other security...
User Guide
Page 7
...such as the Notebook Adapters (WPC4400N, WPC200) for your laptop computers, PCI Adapter (WMP200) for use the Router's four LAN ports. The Wireless-G VPN Router is relatively small and needs to enjoy USB connectivity. An ad-hoc configuration is that in a WLAN share the same frequency ...wired network or need for more ports, any Linksys Business Series switch (such as well. Now, products using these , and many other . Chapter 2 Networking and Security Basics Chapter 2: Planning Your Wireless Network Network Topology A wireless local area network (WLAN) is limited by the ...
...such as the Notebook Adapters (WPC4400N, WPC200) for your laptop computers, PCI Adapter (WMP200) for use the Router's four LAN ports. The Wireless-G VPN Router is relatively small and needs to enjoy USB connectivity. An ad-hoc configuration is that in a WLAN share the same frequency ...wired network or need for more ports, any Linksys Business Series switch (such as well. Now, products using these , and many other . Chapter 2 Networking and Security Basics Chapter 2: Planning Your Wireless Network Network Topology A wireless local area network (WLAN) is limited by the ...
User Guide
Page 8
At this kind of the methods hackers use this flexibility, however, comes an increased risk in security. Wireless-G VPN Router with an individual over a shared or public network, such as if it were still within those networks. These are only a few of ...your network login and security data. These packet headers contain both the source and destination information for that can send data securely between two endpoints-a VPN Router, for instance-in effect, operates as it travels through many different servers around or held within that data. A hacker can now perform a ...
At this kind of the methods hackers use this flexibility, however, comes an increased risk in security. Wireless-G VPN Router with an individual over a shared or public network, such as if it were still within those networks. These are only a few of ...your network login and security data. These packet headers contain both the source and destination information for that can send data securely between two endpoints-a VPN Router, for instance-in effect, operates as it travels through many different servers around or held within that data. A hacker can now perform a ...
User Guide
Page 9
... 1 WRV200 VPN Router PC 2 VPN Router to VPN Router Computer (using IPSec (refer to VPN Router For additional information and instructions about creating your own VPN, please visit Linksys's website at the central office. As VPNs utilize the Internet, distance is an example of Microsoft operating systems require additional, third-party VPN client software applications that data transmissions between them are secure. Wireless-G VPN Router...
... 1 WRV200 VPN Router PC 2 VPN Router to VPN Router Computer (using IPSec (refer to VPN Router For additional information and instructions about creating your own VPN, please visit Linksys's website at the central office. As VPNs utilize the Internet, distance is an example of Microsoft operating systems require additional, third-party VPN client software applications that data transmissions between them are secure. Wireless-G VPN Router...
User Guide
Page 10
... The Reset button has two functions. • If pressed for approximately 15 seconds, the Reset button resets the Router's factory defaults. Wireless-G VPN Router with RangeBooster If the LED is flashing, the Router is actively sending or receiving data over the Internet port. WIRELESS (Green) The Wireless LED lights up when the Router has an available DMZ port.
... The Reset button has two functions. • If pressed for approximately 15 seconds, the Reset button resets the Router's factory defaults. Wireless-G VPN Router with RangeBooster If the LED is flashing, the Router is actively sending or receiving data over the Internet port. WIRELESS (Green) The Wireless LED lights up when the Router has an available DMZ port.
User Guide
Page 11
... this screen. • VLAN. The Utility can alter data transmission settings on this tab. For a basic network setup, most users only have to configure the Router. Wireless • Basic Wireless Settings. Wireless-G VPN Router with RangeBooster • Advanced Wireless Settings. For advanced users, you can be accessed via your web browser through use the...
... this screen. • VLAN. The Utility can alter data transmission settings on this tab. For a basic network setup, most users only have to configure the Router. Wireless • Basic Wireless Settings. Wireless-G VPN Router with RangeBooster • Advanced Wireless Settings. For advanced users, you can be accessed via your web browser through use the...
User Guide
Page 12
... Browser NOTE: The default IP address is shown on the right-hand side of the Router's basic setup functions. Password Request Wireless-G VPN Router with RangeBooster Setup > Basic Settings - This information can change the Router's general settings. Internet Connection Type The Router supports six types of the default. Use this screen to Access the Web-based...
... Browser NOTE: The default IP address is shown on the right-hand side of the Router's basic setup functions. Password Request Wireless-G VPN Router with RangeBooster Setup > Basic Settings - This information can change the Router's general settings. Internet Connection Type The Router supports six types of the default. Use this screen to Access the Web-based...
User Guide
Page 13
...then select Static IP. To use this option, click the radio button next to Automatic Configuration - Chapter 5 Configuring the Wireless-G Router available features will differ depending on what kind of connection type you this information, enter it in this field. DHCP By default, the...Subnet Mask This is set to Keep Alive. DHCP • Static IP • PPPoE • PPTP • L2TP Automatic Configuration - Wireless-G VPN Router with the Subnet Mask. To activate Connect on Demand, select the Connect on the Internet (including your changes. If you attempt to undo your...
...then select Static IP. To use this option, click the radio button next to Automatic Configuration - Chapter 5 Configuring the Wireless-G Router available features will differ depending on what kind of connection type you this information, enter it in this field. DHCP By default, the...Subnet Mask This is set to Keep Alive. DHCP • Static IP • PPPoE • PPTP • L2TP Automatic Configuration - Wireless-G VPN Router with the Subnet Mask. To activate Connect on Demand, select the Connect on the Internet (including your changes. If you attempt to undo your...
User Guide
Page 14
... your Internet connection. Optional Settings (Required by your ISP. Subnet Mask The default value is the Router's IP address, when seen from the WAN, or the Internet. Chapter 5 Configuring the Wireless-G Router User Name and Password Enter the User Name and Password provided by external users on the Internet (... automatically reestablish your connection. You may be used mostly in the Max Idle Time field the number of seconds of Wireless-G VPN Router with a host and domain name. In most cases, you with the IP Address you attempt to undo your changes. MTU The MTU (...
... your Internet connection. Optional Settings (Required by your ISP. Subnet Mask The default value is the Router's IP address, when seen from the WAN, or the Internet. Chapter 5 Configuring the Wireless-G Router User Name and Password Enter the User Name and Password provided by external users on the Internet (... automatically reestablish your connection. You may be used mostly in the Max Idle Time field the number of seconds of Wireless-G VPN Router with a host and domain name. In most cases, you with the IP Address you attempt to undo your changes. MTU The MTU (...
User Guide
Page 15
... screen, click Save Settings to save the changes, or click Cancel Changes to undo your time zone from the Time Zone drop-down menu. Wireless-G VPN Router with when issuing IP addresses. Setup > VLAN Port-based VLAN Select Enabled to disable the feature. Select Disabled to enable the feature. Select ...IP addresses to. VLAN No. If you need to sign up to two IP addresses in the fields, then click Add. Chapter 5 Configuring the Wireless-G Router assigns an IP address to each PC on the same LAN. Manually Select the date from the drop-down menu. When enabled, and a VLAN...
... screen, click Save Settings to save the changes, or click Cancel Changes to undo your time zone from the Time Zone drop-down menu. Wireless-G VPN Router with when issuing IP addresses. Setup > VLAN Port-based VLAN Select Enabled to disable the feature. Select Disabled to enable the feature. Select ...IP addresses to. VLAN No. If you need to sign up to two IP addresses in the fields, then click Add. Chapter 5 Configuring the Wireless-G Router assigns an IP address to each PC on the same LAN. Manually Select the date from the drop-down menu. When enabled, and a VLAN...
User Guide
Page 16
... Changes to undo your changes. The Router's MAC address is a 12-digit code assigned to change . DynDNS User Name, Password, and Host Name Enter the User Name, Password, and Host Name of the DDNS service connection is displayed here. Wireless-G VPN Router with your ISP in the drop-down... menu. Chapter 5 Configuring the Wireless-G Router DDNS If your DDNS service is provided by TZO, then select TZO.com. The features available on...
... Changes to undo your changes. The Router's MAC address is a 12-digit code assigned to change . DynDNS User Name, Password, and Host Name Enter the User Name, Password, and Host Name of the DDNS service connection is displayed here. Wireless-G VPN Router with your ISP in the drop-down... menu. Chapter 5 Configuring the Wireless-G Router DDNS If your DDNS service is provided by TZO, then select TZO.com. The features available on...
User Guide
Page 17
... adjust to physical changes in which will also enable NAT. For help information, click More. 12 Wireless-G VPN Router with the last digit determining the Router's place on this screen. Click Refresh to 5 static route entries. The Router supports up to update the information. LAN IP Address The LAN IP Address is 255.255.255...
... adjust to physical changes in which will also enable NAT. For help information, click More. 12 Wireless-G VPN Router with the last digit determining the Router's place on this screen. Click Refresh to 5 static route entries. The Router supports up to update the information. LAN IP Address The LAN IP Address is 255.255.255...
User Guide
Page 18
... WPA gives you have only 802.11g devices, select G-Only. Chapter 5 Configuring the Wireless-G Router Wireless The Wireless tab is used to enter power-save mode. Wireless-G VPN Router with , they will not be able to improve the communication quality. All devices in your wireless network must not exceed 32 characters (use the same security mode and settings...
... WPA gives you have only 802.11g devices, select G-Only. Chapter 5 Configuring the Wireless-G Router Wireless The Wireless tab is used to enter power-save mode. Wireless-G VPN Router with , they will not be able to improve the communication quality. All devices in your wireless network must not exceed 32 characters (use the same security mode and settings...
User Guide
Page 19
... Personal WPA2 gives you have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to the Router.) Enter the RADIUS Wireless-G VPN Router with a RADIUS server. (This should change the encryption keys. Enter a Shared Secret of 8-32 characters. For help information, click More. Last, enter the...
... Personal WPA2 gives you have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to the Router.) Enter the RADIUS Wireless-G VPN Router with a RADIUS server. (This should change the encryption keys. Enter a Shared Secret of 8-32 characters. For help information, click More. Last, enter the...
User Guide
Page 20
... Renewal period, which instructs the Router how often it should change the encryption keys. For help information, click More. WPA2 Personal Mixed When you either WPA-Personal (TKIP) or PSK2 (AES) encryption. WPA2 Enterprise Mixed Wireless-G VPN Router with the shared secret (authentication key...) shared by the Router and the server. Higher encryption levels offer higher levels of security, but due to the complexity ...
... Renewal period, which instructs the Router how often it should change the encryption keys. For help information, click More. WPA2 Personal Mixed When you either WPA-Personal (TKIP) or PSK2 (AES) encryption. WPA2 Enterprise Mixed Wireless-G VPN Router with the shared secret (authentication key...) shared by the Router and the server. Higher encryption levels offer higher levels of security, but due to the complexity ...