Page 151 / 199 Scroll up to view Page 146 - 150
VPN
Setting Up PPTP Server
Cisco Small Business RV0xx Series Routers Administration Guide
151
9
user launches the client and logs in with the user name and password that you
configured. For more information, users should refer to the Windows
documentation or Help files.
To open this page:
Click
VPN > PPTP Server
in the navigation tree.
NOTE
Before navigating away from this page, click
Save
to save your settings, or click
Cancel
to undo them. Any unsaved changes are abandoned.
Check the
Enable PPTP Server
box to allow PPTP VPN tunnels. Uncheck the box
to disable this feature. It is disabled by default. After you check the box, additional
fields appear.
IP Address Range
Enter the range of LAN address to assign to the PPTP VPN clients. Enter the first
address in the
Range Start
field, and enter the final address in the
Range End
field. The default range is 192.168.1.200 to 92.168.1.204.
NOTE
The LAN IP address range for PPTP VPN clients should be outside of the normal
DHCP range of the router.
PPTP Server
Add or edit the list of PPTP VPN users.
To add a user to the list:
Enter the following information, and then click
Add
to list
.
-
Username:
Enter a name for this user.
-
New Password:
Enter a password.
-
Confirm New Password:
Re-enter the password to confirm.
Page 152 / 199
VPN
Setting Up PPTP Server
Cisco Small Business RV0xx Series Routers Administration Guide
152
9
To add another new user:
Enter the information, and then click
Add to list
.
To modify a user in the list:
Click the entry that you want to modify. The
information appears in the text fields. Make the changes, and then click
Update
. If you do not need to make changes, you can click
Add New
to de-
select the entry and clear the text fields.
To delete a user from the list:
Click the entry that you want to delete. To
select a block of entries, click the first entry, hold down the
Shift
key, and
click the final entry in the block. To select individual entries, hold down the
Ctrl
key while clicking. Click
Delete
.
Connection List
The following read-only information appears. You can click
Refresh
to update the
data.
Username:
The name of the PPTP VPN client.
Remote Address:
The WAN IP address of the PPTP VPN client.
PPTP IP Address:
The LAN IP address that the PPTP server assigned to
the client upon connection.
Page 153 / 199
10
Cisco Small Business RV0xx Series Routers Administration Guide
153
Logging System Statistics
Use the Log module to set up the system log, to configure alerts, and to view
system statistics. Refer to these topics:
Setting Up the System Log and Alerts, page 153
Viewing the System Log, page 157
Setting Up the System Log and Alerts
Use the
Log > System Log
page to configure logs and alerts and to view the log
tables.
To open this page:
Click
Log > System Log
in the navigation tree.
NOTE
Before navigating away from this page, click
Save
to save your settings, or click
Cancel
to undo them. Any unsaved changes are abandoned.
This page has the following sections:
Syslog section, page 154
E-mail section, page 154
Page 154 / 199
Logging System Statistics
Setting Up the System Log and Alerts
Cisco Small Business RV0xx Series Routers Administration Guide
154
10
Log Setting, page 155
Buttons, page 156
Syslog section
You can enable the router to send detailed log files to your syslog server when
events are logged.
Enable Syslog:
Syslog is an industry-standard protocol used to capture
information about network activity. When this feature is enabled, the router
will send all log activities, including every source/destination IP address
and service, to syslog server. Check the box to enable syslog. Uncheck the
box to disable this feature.
Syslog Server:
Enter the Syslog server name or IP address. Restart the
RV0xx for the change to take effect.
E-mail section
You can enable the router to send email alerts when events are logged.
Enable E-Mail Alert:
Check this box to enable the router to send email
alerts to the specified email address. Uncheck the box to disable this
feature.
Mail Server:
Enter the IP address or name of your ISP's SMTP server.
NOTE:
Your ISP may require that you identify your router by entering a host
name on the
Setup > Network
page.
Send Email to:
Enter the email address where you want to send the alerts.
Log Queue Length:
Specify the number of log entries to include in the
email. The default is 50.
Log Time Threshold:
Log time threshold is the maximum wait time before a
email log message is sent. When the Log Time Threshold expires, an email
is sent whether the email log buffer is full or not. Specify the number of
minutes to collect data before sending the log. The default is 10.
Email Log Now:
Click this button to immediately send a message to the
specified email address, to test your settings.
Page 155 / 199
Logging System Statistics
Setting Up the System Log and Alerts
Cisco Small Business RV0xx Series Routers Administration Guide
155
10
Log Setting
Choose the events to report in the logs:
Alert Log:
These events include common types of attacks as well as
unauthorized login attempts. Check each type of attack to include in the
alert log. Uncheck each event to omit from the alert log.
-
Syn Flooding:
An attacker sends a succession of SYN packets, causing
the router to open so many sessions that it is overwhelmed and denies
service to legitimate traffic.
-
IP Spoofing:
An attacker sends packets with a forged source IP address
to disguise an attack as legitimate traffic.
-
Win Nuke:
An attacker sends an Out-of-Band message to a Windows
machine with the purpose of causing the target computer to crash.
-
Ping of Death:
An attacker sends a very large IP packet with the
purpose of causing the target computer to crash.
-
Unauthorized Login Attempt:
Someone tried to log in to the router
configuration utility without providing the correct username or
password.
-
Output Blocking Event:
There was an event in ProtectLink web
reputation or URL filtering.
General Log:
These events include actions that are performed to enforce
configured policies as well as routine events such as authorized logins and
configuration changes. Check each type of event to include in the general
log. Uncheck each event to omit from the general log.
-
System Error Messages:
All system error messages.
-
Deny Policies:
Instances when the router denied access based on your
Access Rules.
-
Allow Policies:
Instances when the router allowed access based on
your firewall access rules. Note that events for specific access rules can
be included in the log or excluded based on the
Log
setting in the
access rule configuration. For more information, see
Configuring
Firewall Access Rules, page 103
.
-
Configuration Changes:
Instances when someone saved changes in
the configuration.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top