Linksys BEFVP41v1 Router Manual PDF (Setup & Configuration Guide)

Given below is full router user manual of Linksys BEFVP41v1 router model. You can also download this manual in PDF Format to read later on your computer.

Product user manuals come handy in case you want to know all functionalities of your device, troubleshooting, fist time configuration & setup and in many other situations.

Page 1 / 63
Instant Broadband™
Series
EtherFast
®
Cable/DSL
VPN Router with
4-Port 10/100 Switch
Use this guide to install: BEFVP41
User Guide
Downloaded from
www.Manualslib.com
manuals search engine
Page 2 / 63
COPYRIGHT & TRADEMARKS
Copyright © 2003 Linksys, All Rights Reserved.
Instant Broadband is a registered trade-
mark of Linksys.
Microsoft, Windows, and the Windows logo are registered trademarks
of Microsoft Corporation.
All other trademarks and brand names are the property of their
respective proprietors.
LIMITED WARRANTY
Linksys guarantees that every Instant Broadband EtherFast
®
Cable/DSL VPN Router with
4-Port 10/100 Switch will be free from physical defects in material and workmanship for
one year from the date of purchase, when used within the limits set forth in the
Specifications section of this User Guide.
If the product proves defective during this war-
ranty period, call Linksys Technical Support in order to obtain a Return Authorization
Number. BE SURE TO HAVE YOUR PROOF OF PURCHASE AND A BARCODE FROM
THE PRODUCT'S PACKAGING ON HAND WHEN CALLING. When returning a product,
mark the Return Authorization Number clearly on the outside of the package and include
a copy of your original proof of purchase. RETURN REQUESTS CANNOT BE
PROCESSED WITHOUT PROOF OF PURCHASE. All customers located outside the
United States of America and Canada shall be held responsible for shipping and han-
dling charges.
IN NO EVENT SHALL LINKSYS’S LIABILITY EXCEED THE PRICE PAID FOR THE PROD-
UCT FROM DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAM-
AGES RESULTING FROM THE USE OF THE PRODUCT, ITS ACCOMPANYING SOFT-
WARE, OR ITS DOCUMENTATION. LINKSYS DOES NOT OFFER REFUNDS FOR ANY
PRODUCT. Linksys makes no warranty or representation, expressed, implied, or statuto-
ry, with respect to its products or the contents or use of this documentation and all
accompanying software, and specifically disclaims its quality, performance, mer-
chantability, or fitness for any particular purpose. Linksys reserves the right to revise or
update its products, software, or documentation without obligation to notify any individ-
ual or entity. Please direct all inquiries to:
Linksys
P.O. Box 18558, Irvine, CA 92623.
FCC STATEMENT
This Instant Broadband EtherFast
®
Cable/DSL VPN Router with 4-Port 10/100 Switch has
been tested and complies with the specifications for a Class B digital device, pursuant
to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This equipment generates, uses,
and can radiate radio frequency energy and, if not installed and used according to the
instructions, may cause harmful interference to radio communications. However, there is
no guarantee that interference will not occur in a particular installation. If this equipment
does cause harmful interference to radio or television reception, which is found by turn-
ing the equipment off and on, the user is encouraged to try to correct the interference by
one or more of the following measures:
• Reorient or relocate the receiving antenna
• Increase the separation between the equipment or devices
• Connect the equipment to an outlet other than the receiver’s
• Consult a dealer or an experienced radio/TV technician for assistance
UG-BEFVP41-010603G-KL
Downloaded from
www.Manualslib.com
manuals search engine
Page 3 / 63
EtherFast
®
Cable/DSL VPN Router with 4-Port 10/100 Switch
Instant Broadband
®
Series
Table of Contents
Chapter 1: Introduction
1
The EtherFast
®
Cable/DSL VPN Router with 4-Port 10/100 Switch
1
Features
1
Chapter 2: Your Virtual Private Network (VPN)
2
Why Do I Need a VPN?
2
What is a Virtual Private Network?
3
Chapter 3: Getting to Know the EtherFast
®
Cable/DSL VPN Router with 4-Port 10/100 Switch
6
The VPN Router’s Rear Panel
6
The VPN Router’s Front Panel LEDs
7
Chapter 4: Connecting the Cable/DSL VPN Router
to Your Network
9
Overview
9
About Static & Dynamic IP Addresses
9
Connecting Everything Together & Booting Up
10
Chapter 5: Configuring Your Network
12
Configuring Your PCs to Connect to the Cable/DSL VPN Router
12
Configuring the Cable/DSL VPN Router
14
Chapter 6: The Cable/DSL VPN Router’s
Web-based Utility
19
Logging into the Web-based Utility
19
Setup
20
VPN
25
Password
27
Status
28
DHCP
40
Log
42
Help
43
Filters
46
Forwarding
49
Dynamic Routing
51
Static Routing
52
DMZ Host
54
MAC Address Cloning
55
Appendix A: Troubleshooting
56
Common Problems and Solutions
56
Frequently Asked Questions
69
Appendix B: Maximizing VPN Security
74
Appendix C: Configuring IPSec between a
Windows 2000 or XP PC and a Linksys
Cable/DSL VPN Router
76
Introduction
76
Environment
76
Step One: Create an IPSec Policy
77
Step Two: Build Filter Lists
78
Step Three: Configure Individual Tunnel Rules
83
Step Four: Assign New IPSec Policy
91
Step Five: Create a Tunnel Through the Web-Based Utility
92
Downloaded from
www.Manualslib.com
manuals search engine
Page 4 / 63
EtherFast
®
Cable/DSL VPN Router with 4-Port 10/100 Switch
Chapter 1: Introduction
Congratulations on your purchase of an Instant Broadband
®
EtherFast
®
Cable/DSL VPN Router with 4-Port 10/100 Switch. The Instant Broadband™
EtherFast
®
Cable/DSL VPN Router from Linksys is the perfect solution for
sharing a high-speed broadband Internet connection while still maintaining the
ultimate in network security.
Utilizing 56-bit DES and 168-bit 3DES encryption, Encapsulated Secure
Payload (ESP), and IKE key exchange access control, the EtherFast
®
Router’s
full IPSec Virtual Private Network (VPN) capability provides complete data
privacy.
The EtherFast
®
Cable/DSL VPN Router also boasts an impressive array of fea-
tures including PPPoE support, NAT firewall, and a convenient web manage-
ment interface.
Since the Router is compatible with virtually all major operat-
ing systems, it’s easy to set up and use, making the Instant Broadband™
EtherFast
®
Cable/DSL VPN Router the perfect solution for your broadband
needs.
Full IPSec Virtual Private Network (VPN) capability
Supports (56-Bit) DES and (168-Bit) 3DES Encryption Algorithms
Supports MD5 and SHA Authentication
Supports IKE Key Management
Hardware Security Co-Processor Inside
Supports Up to 70 Simultaneous Tunnels
Compatible with other IPSec VPN Software/Hardware Products
Acts as a DHCP Server for Your Existing Network
NAT, PPPoE, IP Filter, and MAC Filter Support
Free Technical Support—24 Hours a Day, 7 Days a Week, Toll-Free
US Calls
1-Year Limited Warranty
1
Instant Broadband
®
Series
Appendix D: SNMP Functions
94
Appendix E: How to Ping Your ISP’s E-mail &
Web Addresses
95
Appendix F: Installing the TCP/IP Protocol
98
Appendix G: Finding the MAC Address and
IP Address for Your Ethernet Adapter
100
Appendix H: Glossary
104
Appendix I: Specifications
115
Environmental
115
Appendix J: Warranty Information
116
Appendix K: Contact Information
117
The EtherFast
®
Cable/DSL VPN Router with 4-Port 10/100
Switch
Features
Downloaded from
www.Manualslib.com
manuals search engine
Page 5 / 63
EtherFast
®
Cable/DSL VPN Router with 4-Port 10/100 Switch
3
Instant Broadband
®
Series
2
Chapter 2: Your Virtual Private
Network (VPN)
Computer networking provides a flexibility not available when using an archa-
ic, paper-based system. With this flexibility, however, comes an increased risk
in security. This is why firewalls were first introduced. Firewalls help to protect
data inside of a local network. But what do you do once information is sent out-
side of your local network, when emails are sent to their destination, or when
you have to connect to your company's network when you are out on the road?
How is your data protected?
That is when a VPN can help. VPNs are called Virtual Private Networks
because they secure data moving outside of your network as if it were still with-
in that network.
When data is sent out across the Internet from your computer, it is always open
to attacks. You may already have a firewall, which will help protect data mov-
ing around or held within your network from being corrupted or intercepted by
entities outside of your network, but once data moves outside of your network
- when you send data to someone via email or communicate with an individual
over the Internet - the firewall will no longer protect that data.
At this point, your data becomes open to hackers using a variety of methods to
steal not only the data you are transmitting but also your network login and
security data. Some of the most common methods are as follows:
1) MAC Address Spoofing
Packets transmitted over a network, either your local network or the Internet,
are preceded by a packet header. These packet headers contain both the source
and destination information for that packet to transmit efficiently. A hacker can
use this information to spoof (or fake) a MAC address allowed on the network.
With this spoofed MAC address, the hacker can also intercept information
meant for another user.
Why Do I Need a VPN?
2) Data Sniffing
Data "sniffing" is a method used by hackers to obtain network data as it travels
through unsecured networks, such as the Internet. Tools for just this kind of
activity, such as protocol analyzers and network diagnostic tools, are often built
into operating systems and allow the data to be viewed in clear text.
3) Man in the middle attacks
Once the hacker has either sniffed or spoofed enough information, he can now
perform a "man in the middle" attack. This attack is performed, when data is
being transmitted from one network to another, by rerouting the data to a new
destination. Even though the data is not received by its intended recipient, it
appears that way to the person sending the data.
These are only a few of the methods hackers use and they are always develop-
ing more. Without the security of your VPN, your data is constantly open to
such attacks as it travels over the Internet. Data travelling over the Internet will
often pass through many different servers around the world before reaching its
final destination. That's a long way to go for unsecured data and this is when a
VPN serves its purpose.
A VPN, or Virtual Private Network, is a connection between two endpoints - a
VPN Router, for instance - in different networks that allows private data to be
sent securely over a shared or public network, such as the Internet. This estab-
lishes a private network that can send data securely between these two locations
or networks.
This is done by creating a "tunnel". A VPN tunnel connects the two PCs or net-
works and allows data to be transmitted over the Internet as if it were still with-
in those networks. Not a literal tunnel, it is a connection secured by encrypting
the data sent between the two networks.
VPN was created as a cost-effective alternative to using a private, dedicated,
leased line for a private network. Using industry standard encryption and
authentication techniques - IPSec, short for IP Security - the VPN creates a
secure connection that, in effect, operates as if you were directly connected to
your local network. Virtual Private Networking can be used to create secure
networks linking a central office with branch offices, telecommuters, and/or
professionals on the road (travelers can connect to a VPN Router using any
computer with VPN client software that supports IPSec, such as SSH Sentinel.)
What is a Virtual Private Network?
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top