Page 41 / 105 Scroll up to view Page 36 - 40
32
Chapter 6: Setting Up and Configuring the Router
VPN Tab
4-Port Gigabit Security Router with VPN
Encryption
. Encryption Algorithm used for the IKE SA. This setting must match the setting used at the other
end of this tunnel.
Authentication
. Authentication Algorithm used for the IKE SA. This setting must match the setting used at the
other end of this tunnel.
MD5: A one way hashing algorithm that produces a 128-bit digest.
SHA1: A one way hashing algorithm that produces a 160-bit digest.
Group
. The Group setting determines the bit size used in the IKE exchange. This value must match the value
used at the other end of this tunnel.
Key Life Time
. This determines the time interval before the IKE SA (Security Association) expires. (It will
automatically be re-established if necessary.) While using a short time period increases security, it also
degrades performance. While this unit is in seconds, it is common to use periods over an hour (3600 seconds)
for the SA Life Time.
VPN Client Accounts
Use this page to administer your VPN Client users. Enter the information at the top of the screen and the users
you’ve entered will appear in the list at the bottom, showing their status. This will work with the Linksys
QuickVPN client only. (The Router supports up to five Linksys QuickVPN Clients by default. Additional QuickVPN
Client licenses can be purchased separately. See www.linksys.com for more information.)
Username
. Enter the username using any combination of keyboard characters.
Password
. Enter the password you would like to assign to this user.
Re-enter to Confirm
. Retype the password to ensure it has been entered correctly.
Allow User to Change Password
. This option determines whether the user is allowed to change their password.
VPN Client List Table
No
. Displays the user number.
Active
. When checked, the designated user can connect, otherwise the VPN client account is disabled.
Username
. Displays the username.
Figure 6-24: VPN Client Accounts
Downloaded from
www.Manualslib.com
manuals search engine
Page 42 / 105
33
Chapter 6: Setting Up and Configuring the Router
QoS Tab
4-Port Gigabit Security Router with VPN
Edit
button. This button is used to modify the username, password or toggle whether the user is allowed to
change their password.
Remove
button. This button is used to delete a user account.
Click the
Save Settings
button to save the settings or the
Cancel Changes
button to undo your changes.
VPN Passthrough
Ipsec Passthrough
. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange
of packets at the IP layer. IPSec Passthrough is enabled by default to allow IPSec tunnels to pass through the
Router. To disable IPSec Passthrough, select Disabled.
PPTP Passthrough
. Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. PPTP Passthrough is enabled by default. To disable PPTP Passthrough, select
Disabled.
L2TP Passthrough
. Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. L2TP Passthrough is enabled by default. To disable L2TP Passthrough, select
Disabled.
Click the
Save Settings
button when you finish the VPN Passthrough settings, or click the
Cancel Changes
button to undo the changes.
QoS Tab
QoS (Quality of Service) allows you to prioritize network traffic using either
Application-based
priority (such as
Web browsing applications, FTP applications, etc...) or
Port-based
priority which allows you to assign priority to
the four physical network ports.
Figure 6-25: VPN Passthrough
Downloaded from
www.Manualslib.com
manuals search engine
Page 43 / 105
34
Chapter 6: Setting Up and Configuring the Router
Administration Tab
4-Port Gigabit Security Router with VPN
Application-based
Application-based QoS
. QoS (Quality of Service) is disabled by default. When enabled, this option allows you to
assign priority based on the application type.
Select the desired option:
High priority
Medium priority
Low priority
Port-based
Physical ports 1-4 can be assigned High, Medium, Normal, or Low priority. Lower priority traffic will be slowed
down to allow greater throughput for higher priority traffic.
Administration Tab
Management
Local Gateway Access
Gateway Userlist
. Select the desired Gateway User List.
Table 1: Application-based QoS
Application
Name
Port(s)
Primary Use
FTP
TCP Port 20
FTP (File Transfer Protocol) is used for transferring files over the Internet.
HTTP
TCP Port 80
HTTP (HyperText Transfer Protocol) is used for browsing the Internet.
Telnet
TCP Port 23
Telnet is a client-server protocol used to communicate over a network or
the Internet.
SMTP
TCP Port 25
SMTP (Simple Mail Transfer Protocol) is used for sending e-mail.
POP3
TCP Port 110
POP3 (Post Office Protocol version 3) is used for retrieving e-mail.
Specific Port
User Defined
User Defined (0-65535)
Figure 6-27: Port-based QoS
Figure 6-26: Application-based QoS
Downloaded from
www.Manualslib.com
manuals search engine
Page 44 / 105
35
Chapter 6: Setting Up and Configuring the Router
Administration Tab
4-Port Gigabit Security Router with VPN
Gateway Username
. Enter the user name here.
Gateway Password
. Enter the password.
Re-enter to Confirm
. Retype the password in this field.
Remote Gateway Access
Remote Management
. To access the Gateway remotely, from outside the local network, select Enable.
Otherwise, keeps the default setting, Disable.
Management Port
. Enter the port number that will be open to outside access. The default setting is 8080. This
port must be used when you establish a remote connection.
SNMP
Device Name
. Enter a suitable name. This name will be used to identify this device, and will be displayed by your
SNMP software.
SNMP
. Select Enable if you wish to use SNMP. To use SNMP, you need SNMP software on your PC.
Read Community
. Enter the SNMP community name for SNMP “Get” commands.
Write Community
. Enter the SNMP community name for SNMP “Set” commands.
Trap To
. Enter the IP Address of the SNMP Manager to which traps will be sent. If desired, this may be left blank.
UPnP
. If you want to use UPnP, keep the default setting, Enable. Otherwise, select Disable.
IGMP Proxy
. IGMP (Internet Group Membership Protocol) Proxy can facilitate the communication between IGMP
clients and IGMP routers. Enable this feature if you are using IGMP-based multicast services in your network.
Log
Email Alerts
. If enabled, an e-mail will be sent immediately if a DoS (Denial of Service) attack is detected. If
enabled, the E-mail address information (below) must be provided.
Denial of Service Thresholds
. Enter the number of DoS (Denial of Service) attacks which need to be blocked by
the built-in Firewall before an e-mail alert is sent. The minimum value is 20, the maximum value is 100.
SMTP Mail Server
. Enter the address (domain name) or IP address of the SMTP (Simple Mail Transport Protocol)
Server you use for outgoing e-mail.
Figure 6-28: Administration
Downloaded from
www.Manualslib.com
manuals search engine
Page 45 / 105
36
Chapter 6: Setting Up and Configuring the Router
Administration Tab
4-Port Gigabit Security Router with VPN
Email Address for Alert Logs
. Enter the e-mail address the Log is to be sent to.
Return Email Address
. The e-mail will show this address as the Sender's address.
Enable Syslog
. Enable the checkbox if you want to this feature.
Syslog Server
. Enter the IP Address in the Syslog Server field when Enable Syslog is checked.
Local Log
. Enable this if you want to see a log of all incoming and outgoing URLs or IP addresses.
View Log
button. When you wish to view the logs, click View Log. A new window will appear with the log data.
Diagnostics
Ping Test Parameters
Ping Target IP
. Enter the IP address or URL that you want to ping.
Ping Size
. Enter the size of the packet you want to use.
Number of Pings
. Enter the number of times you wish to ping the target device.
Ping Interval
. Enter the time period (Milliseconds) between each ping.
Ping Timeout
. Enter the desired time period (Milliseconds). If a response is not received within the defined ping
period, the ping is considered to have failed.
Start Test
. Click this button to begin the test. A new screen will appear and display the test results. A summary of
the results will be shown on this screen.
Ping Result
. It displays the Ping status.
Backup & Restore
Backup & Restore
. Use this to download a copy of the current configuration, and store the file on your PC. Click
Backup
button to start the download.
Restore configuration
. This allows you to restore a previously saved config file back to the Router. Click the
Browse
button to select the config file, then click
Restore
button to upload the config file.
Figure 6-30: Diagnostics
Figure 6-29: Log
Downloaded from
www.Manualslib.com
manuals search engine

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top