User Guide
Page 1
USER GUIDE Wireless-G VPN Router with RangeBooster Model: WRV200 BUSINESS SERIES v
USER GUIDE Wireless-G VPN Router with RangeBooster Model: WRV200 BUSINESS SERIES v
User Guide
Page 2
... other open -source software source code is available at cost from Linksys for at least three years from the product purchase date. Wireless-G VPN Router with RangeBooster Open Source This product may contain material licensed to you under the GNU General Public License or other countries. and/ or... its affiliates in the U.S. Copyright © 2007 Cisco Systems, Inc. WEB: For detailed license terms and additional information visit: www.linksys.com/gpl ii Other brands and product names are listed...
... other open -source software source code is available at cost from Linksys for at least three years from the product purchase date. Wireless-G VPN Router with RangeBooster Open Source This product may contain material licensed to you under the GNU General Public License or other countries. and/ or... its affiliates in the U.S. Copyright © 2007 Cisco Systems, Inc. WEB: For detailed license terms and additional information visit: www.linksys.com/gpl ii Other brands and product names are listed...
User Guide
Page 3
... Clone 11 Setup > Advanced Routing 12 Wireless 13 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 13 Wireless > Wireless Network Access 16 Wireless > Advanced Wireless Settings 17 Wireless > WDS 17 Firewall 18 Firewall > General 18 Firewall > Port Forwarding 18 Firewall > Port Triggering 19 Firewall > DMZ 19 Firewall > Access Restriction 20 Firewall > URL Filtering 20 VPN 20 VPN > VPN Client Access 20 Wireless-G VPN Router with RangeBooster
... Clone 11 Setup > Advanced Routing 12 Wireless 13 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 13 Wireless > Wireless Network Access 16 Wireless > Advanced Wireless Settings 17 Wireless > WDS 17 Firewall 18 Firewall > General 18 Firewall > Port Forwarding 18 Firewall > Port Triggering 19 Firewall > DMZ 19 Firewall > Access Restriction 20 Firewall > URL Filtering 20 VPN 20 VPN > VPN Client Access 20 Wireless-G VPN Router with RangeBooster
User Guide
Page 4
...Default 28 Administration > Firmware Upgrade 28 Administration > Reboot 29 Status 29 Status > Router 29 Status > Local Network 30 Status > Wireless 30 Status > System Performance 30 Status > VPN Clients 31 Appendix A: Troubleshooting 32 Frequently Asked Questions 37 Appendix B: Wireless Security Checklist 39 General Network Security Guidelines 39 Additional Security Tips 39 Appendix C: ...Establish a Secure IPSec Tunnel 43 Step 1: Create an IPSec Policy 43 Step 2: Build Filter Lists 43 Step 3: Configure Individual Tunnel Rules 45 Wireless-G VPN Router with RangeBooster ii
...Default 28 Administration > Firmware Upgrade 28 Administration > Reboot 29 Status 29 Status > Router 29 Status > Local Network 30 Status > Wireless 30 Status > System Performance 30 Status > VPN Clients 31 Appendix A: Troubleshooting 32 Frequently Asked Questions 37 Appendix B: Wireless Security Checklist 39 General Network Security Guidelines 39 Additional Security Tips 39 Appendix C: ...Establish a Secure IPSec Tunnel 43 Step 1: Create an IPSec Policy 43 Step 2: Build Filter Lists 43 Step 3: Configure Individual Tunnel Rules 45 Wireless-G VPN Router with RangeBooster ii
User Guide
Page 5
...of the RV082 51 Configuration of PC 1 and PC 2 52 Configuration when Both Gateways Use Dynamic IP Addresses 52 Configuration of the WRV200 52 Configuration of the RV082 53 Configuration of PC 1 and PC 2 53 Appendix F: Glossary 54 Appendix G: Specifications 57 Appendix ...233;quences 62 Wireless Disclaimer 62 Avis de non-responsabilité concernant les appareils sans fil 62 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 63 Appendix J: Contact Information 67 Wireless-G VPN Router with RangeBooster iii
...of the RV082 51 Configuration of PC 1 and PC 2 52 Configuration when Both Gateways Use Dynamic IP Addresses 52 Configuration of the WRV200 52 Configuration of the RV082 53 Configuration of PC 1 and PC 2 53 Appendix F: Glossary 54 Appendix G: Specifications 57 Appendix ...233;quences 62 Wireless Disclaimer 62 Avis de non-responsabilité concernant les appareils sans fil 62 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 63 Appendix J: Contact Information 67 Wireless-G VPN Router with RangeBooster iii
User Guide
Page 6
... you deploy multiple SIP clients. There is support for optimal wireless coverage. Wireless-G VPN Router with a Wireless-G access point for business networking. For the LAN interface, there is a VPN router with RangeBooster Introduction The SIP ALG allows SIP traffic from multiple clients to be expanded without wires through the router's firewall. The WRV200 is a built-in business environments requires additional flexibility.
... you deploy multiple SIP clients. There is support for optimal wireless coverage. Wireless-G VPN Router with a Wireless-G access point for business networking. For the LAN interface, there is a VPN router with RangeBooster Introduction The SIP ALG allows SIP traffic from multiple clients to be expanded without wires through the router's firewall. The WRV200 is a built-in business environments requires additional flexibility.
User Guide
Page 7
... ports, any Linksys Business Series switch (such as the Notebook Adapters (WPC4400N, WPC200) for your networking options are not able to communicate with computers on whether or not the wireless network needs to connect your wireless network with your 802.11b and 802.11g products. Wireless-G VPN Router with RangeBooster Network Layout The Wireless-G VPN Router has been specifically...
... ports, any Linksys Business Series switch (such as the Notebook Adapters (WPC4400N, WPC200) for your networking options are not able to communicate with computers on whether or not the wireless network needs to connect your wireless network with your 802.11b and 802.11g products. Wireless-G VPN Router with RangeBooster Network Layout The Wireless-G VPN Router has been specifically...
User Guide
Page 8
...-when you were directly connected to someone via e-mail or communicate with the Linksys VPN client software. That is when a VPN can use and they secure data moving around the world before reaching its final destination. A hacker can help. Wireless-G VPN Router with RangeBooster 3) Man in effect, operates as if you send data to your...
...-when you were directly connected to someone via e-mail or communicate with the Linksys VPN client software. That is when a VPN can use and they secure data moving around the world before reaching its final destination. A hacker can help. Wireless-G VPN Router with RangeBooster 3) Man in effect, operates as if you send data to your...
User Guide
Page 9
... 2000, XP, or Vista"). Home Office PC 1 WRV200 VPN Router PC 2 VPN Router to VPN Router Computer (using the Linksys VPN client software) to VPN Router The following is configured with the built-in IPSec Security Manager (Microsoft 2000 and XP) allows the VPN Router to create a VPN tunnel using IPSec (refer to -Gateway IPSec Tunnel." Wireless-G VPN Router with her ISP. In her hotel room...
... 2000, XP, or Vista"). Home Office PC 1 WRV200 VPN Router PC 2 VPN Router to VPN Router Computer (using the Linksys VPN client software) to VPN Router The following is configured with the built-in IPSec Security Manager (Microsoft 2000 and XP) allows the VPN Router to create a VPN tunnel using IPSec (refer to -Gateway IPSec Tunnel." Wireless-G VPN Router with her ISP. In her hotel room...
User Guide
Page 10
... button has two functions. • If pressed for approximately 15 seconds, the Reset button resets the Router's factory defaults. Wireless-G VPN Router with RangeBooster WIRELESS (Green) The Wireless LED lights up when the Router is actively sending or receiving data over the wireless network. 1-4 (ETHERNET) (Green) These four LEDs correspond to your PCs and other network devices. Front...
... button has two functions. • If pressed for approximately 15 seconds, the Reset button resets the Router's factory defaults. Wireless-G VPN Router with RangeBooster WIRELESS (Green) The Wireless LED lights up when the Router is actively sending or receiving data over the wireless network. 1-4 (ETHERNET) (Green) These four LEDs correspond to your PCs and other network devices. Front...
User Guide
Page 11
... the transmitted data or information between these endpoints is admin. QoS • Application-based QoS. Chapter 5 Configuring the Wireless-G Router Chapter 5: Configuring the Wireless-G VPN Router Overview Linksys recommends using IPSec, L2TP, or PPTP protocols. • IPSec VPN. Enter the Internet connection and network settings on this screen. • WDS. On this screen. • Advanced Routing...
... the transmitted data or information between these endpoints is admin. QoS • Application-based QoS. Chapter 5 Configuring the Wireless-G Router Chapter 5: Configuring the Wireless-G VPN Router Overview Linksys recommends using IPSec, L2TP, or PPTP protocols. • IPSec VPN. Enter the Internet connection and network settings on this screen. • WDS. On this screen. • Advanced Routing...
User Guide
Page 12
...to undo your Internet connection type. This screen provides status information about the local network. • Wireless. Status information about the Router's VPN clients. Make the necessary changes through the Utility. The utility's tabs and screens are described below...Internet Setup The Internet Setup section configures the Router for all of the default. Status • Router. Setup > Basic Settings The first screen that appears is displayed here. • System Performance. Password Request Wireless-G VPN Router with RangeBooster Setup > Basic Settings - Click ...
...to undo your Internet connection type. This screen provides status information about the local network. • Wireless. Status information about the Router's VPN clients. Make the necessary changes through the Utility. The utility's tabs and screens are described below...Internet Setup The Internet Setup section configures the Router for all of the default. Status • Router. Setup > Basic Settings The first screen that appears is displayed here. • System Performance. Password Request Wireless-G VPN Router with RangeBooster Setup > Basic Settings - Click ...
User Guide
Page 13
... leave this option, click the radio button next to enable PPPoE. The connection types are not sure if your changes. Wireless-G VPN Router with RangeBooster PPPoE User Name and Password/Confirm Password Enter the User Name and Password provided by external users on the Internet ...is terminated automatically. PPPoE Some DSL-based ISPs use PPPoE. Service Name This is the Router's IP address, when seen from the WAN, or the Internet. Chapter 5 Configuring the Wireless-G Router available features will differ depending on what kind of connection type you with the Subnet ...
... leave this option, click the radio button next to enable PPPoE. The connection types are not sure if your changes. Wireless-G VPN Router with RangeBooster PPPoE User Name and Password/Confirm Password Enter the User Name and Password provided by external users on the Internet ...is terminated automatically. PPPoE Some DSL-based ISPs use PPPoE. Service Name This is the Router's IP address, when seen from the WAN, or the Internet. Chapter 5 Configuring the Wireless-G Router available features will differ depending on what kind of connection type you with the Subnet ...
User Guide
Page 14
...fields blank will provide you attempt to specify here. You may be used mostly in the MTU field, this value within the range of Wireless-G VPN Router with the Subnet Mask. In most cases, leaving these names as you with your ISP for the necessary setup information. By default, ...MTU is 255.255.255.0. Chapter 5 Configuring the Wireless-G Router User Name and Password Enter the User Name and Password provided by your ISP. Keep Alive If you have finished making changes to the ...
...fields blank will provide you attempt to specify here. You may be used mostly in the MTU field, this value within the range of Wireless-G VPN Router with the Subnet Mask. In most cases, leaving these names as you with your ISP for the necessary setup information. By default, ...MTU is 255.255.255.0. Chapter 5 Configuring the Wireless-G Router User Name and Password Enter the User Name and Password provided by your ISP. Keep Alive If you have finished making changes to the ...
User Guide
Page 15
.... This value must be 192.168.1. 2 or greater, but smaller than 253. Wireless-G VPN Router with the desired port. Setup > VLAN The Setup > VLAN screen allows you assign a fixed host and...Add. Number of VLAN Select the number of DHCP users. Chapter 5 Configuring the Wireless-G Router assigns an IP address to IP addresses. Unless you already have one of PCs that...want to associate with RangeBooster Automatically Select your network. Start IP Address Enter a value for the Router is 192.168.1.1, and 192.168.1.255 is highly recommended that you disable DHCP, assign a static...
.... This value must be 192.168.1. 2 or greater, but smaller than 253. Wireless-G VPN Router with the desired port. Setup > VLAN The Setup > VLAN screen allows you assign a fixed host and...Add. Number of VLAN Select the number of DHCP users. Chapter 5 Configuring the Wireless-G Router assigns an IP address to IP addresses. Unless you already have one of PCs that...want to associate with RangeBooster Automatically Select your network. Start IP Address Enter a value for the Router is 192.168.1.1, and 192.168.1.255 is highly recommended that you disable DHCP, assign a static...
User Guide
Page 16
... Clone MAC Address Clone To use the PC registered with the ISP for identification. It is recommended to the Router's MAC address. Setup > MAC Address Clone Some ISPs require that you use. Wireless-G VPN Router with your ISP in the drop-down menu. This feature "clones" your ISP to change . DynDNS User Name,... Save Settings to save the changes, or click Cancel Changes to undo your ISP to change . Because it is displayed here. Chapter 5 Configuring the Wireless-G Router DDNS If your DDNS service is provided by DynDNS.org, then select DynDNS.org in this field. The...
... Clone MAC Address Clone To use the PC registered with the ISP for identification. It is recommended to the Router's MAC address. Setup > MAC Address Clone Some ISPs require that you use. Wireless-G VPN Router with your ISP in the drop-down menu. This feature "clones" your ISP to change . DynDNS User Name,... Save Settings to save the changes, or click Cancel Changes to undo your ISP to change . Because it is displayed here. Chapter 5 Configuring the Wireless-G Router DDNS If your DDNS service is provided by DynDNS.org, then select DynDNS.org in this field. The...
User Guide
Page 17
... following settings: Route Entries Select the number of a network IP address identify this Router is 255.255.255.0. Wireless-G VPN Router with the last digit determining the Router's place on the location of your Router. Show Routing Table Click the Show Routing Table button to undo your local network...the address of an IP address is the network portion, and which you want : RIPv1 or RIPv2. Chapter 5 Configuring the Wireless-G Router Setup > Advanced Routing Setup > Advanced Routing The Setup > Advanced Routing screen allows you to update the information. Receive RIP ...
... following settings: Route Entries Select the number of a network IP address identify this Router is 255.255.255.0. Wireless-G VPN Router with the last digit determining the Router's place on the location of your Router. Show Routing Table Click the Show Routing Table button to undo your local network...the address of an IP address is the network portion, and which you want : RIPv1 or RIPv2. Chapter 5 Configuring the Wireless-G Router Setup > Advanced Routing Setup > Advanced Routing The Setup > Advanced Routing screen allows you to update the information. Receive RIP ...
User Guide
Page 18
... to enable WMM. WMM WMM (Wi-Fi Multimedia) is a component of the IEEE 802.11e wireless LAN standard for quality of transmission speeds and the Router will not be able to . Wireless-G VPN Router with dynamic encryption keys. There are associated with , they will detect the SSID broadcast by this setting is the same for...
... to enable WMM. WMM WMM (Wi-Fi Multimedia) is a component of the IEEE 802.11e wireless LAN standard for quality of transmission speeds and the Router will not be able to . Wireless-G VPN Router with dynamic encryption keys. There are associated with , they will detect the SSID broadcast by this setting is the same for...
User Guide
Page 19
... with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) Enter the RADIUS Wireless-G VPN Router with the Shared Secret key, which instructs the Router how often it should change the encryption keys. Wireless Security - WPA Enterprise When you have finished making changes to the screen, click Save Settings to...
... with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) Enter the RADIUS Wireless-G VPN Router with the Shared Secret key, which instructs the Router how often it should change the encryption keys. Wireless Security - WPA Enterprise When you have finished making changes to the screen, click Save Settings to...
User Guide
Page 20
... key shared between the Router and the server in coordination with a RADIUS server. (This should have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to undo your changes. WPA2 Enterprise Mixed Wireless-G VPN Router with the shared secret ...(authentication key) shared by the Router and the server. Higher encryption levels offer higher levels of security, but due to the complexity of...
... key shared between the Router and the server in coordination with a RADIUS server. (This should have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to undo your changes. WPA2 Enterprise Mixed Wireless-G VPN Router with the shared secret ...(authentication key) shared by the Router and the server. Higher encryption levels offer higher levels of security, but due to the complexity of...