Page 71 / 134 Scroll up to view Page 66 - 70
63
Chapter 6: Setting Up and Configuring the Router
VPN Tab
Wireless-N Gigabit Security Router with VPN
VPN Client Accounts
You can allow remote users to easily establish a VPN connection to your Router using the Linksys QuickVPN client
utility without using a compatible VPN Router with IPsec VPN settings. This is achieved by creating user accounts
on the Router and authenticate users through Username and Password. After creating user accounts, it will be
summarized in the table below.
For users using QuickVPN, it will first establish an SSL connection with remote Wireless Router to get
authenticated. Then QuickVPN will automatically negotiate IPsec settings with the remote Router. All the data
packets will be encrypted using IPsec thereafter.
The Wireless Router supports up to five Linksys QuickVPN clients by default. Additional QuickVPN Client licenses
can be purchased separately.
Username
. Enter the username using any combination of keyboard characters.
Password
. Enter the password you would like to assign to this user.
Re-enter to Confirm
. Retype the password to ensure that it has been entered correctly.
Allow User to Change Password
. This option determines whether the user is allowed to change their password.
VPN Client List Table
No
. Displays the user number.
Active
. When checked, the designated user can connect, otherwise the VPN client account is disabled.
Username
. Displays the username.
Edit
button. This button is used to modify the username, password, or toggle between whether the user is
allowed to change their password.
Remove
button. This button is used to delete a user account.
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes. Help information is displayed on the right-hand side of the screen, and click
More
for additional details.
Figure 6-45: VPN - VPN Client Accounts
Downloaded from
www.Manualslib.com
manuals search engine
Page 72 / 134
64
Chapter 6: Setting Up and Configuring the Router
VPN Tab
Wireless-N Gigabit Security Router with VPN
VPN Passthrough
This screen allows users to use their own VPN algorithms to connect to their remote Routers. The Wireless Router
will just pass the traffic through.
IPsec Passthrough
. Internet Protocol Security (IPsec) is a suite of protocols used to implement secure exchange
of packets at the IP layer. IPsec Passthrough is enabled by default to allow IPsec tunnels to pass through the
Router. To disable IPsec Passthrough, select
Disabled
.
PPTP Passthrough
. Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. PPTP Passthrough is enabled by default. To disable PPTP Passthrough, select
Disabled
.
L2TP Passthrough
. Layer 2 Tunneling Protocol is the similar to PPP but allows Layer 2 and the PPP session to
terminate at different servers or locations. L2TP Passthrough is enabled by default. To disable L2TP Passthrough,
select
Disabled
.
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes. Help information is displayed on the right-hand side of the screen, and click
More
for additional details.
Figure 6-46: VPN - VPN Passthrough
Downloaded from
www.Manualslib.com
manuals search engine
Page 73 / 134
65
Chapter 6: Setting Up and Configuring the Router
QoS Tab
Wireless-N Gigabit Security Router with VPN
QoS Tab
QoS (Quality of Service) allows you to prioritize network traffic using either
Application-based
priority (such as
Web browsing applications, FTP applications, etc.) or
Port-based
priority, which allows you to assign priorities to
the four physical network ports. Higher priority traffic will be allocated more bandwidth, which results in lower
latency (or delay).
Application-based
The Application-based QoS controls priority differentiation for data packets between LAN (including WLAN) and
WAN ports. Application-based QoS is achieved by software running on the CPU so it cannot control traffic
between LANs that are switched directly by a hardware switch chipset.
Application-based QoS
. QoS (Quality of Service) is
disabled
by default. When enabled, this option allows you to
assign priority based on the application type.
Set Internet Bandwidth
. Enter approximate bandwidth number for your WAN connection. This will help the
software-based algorithm to allocate bandwidth to different priorities.
Select the desired option for each application: High priority, Medium priority, or Low priority.
Table 1: Application-based QoS
Application
Name
Port(s)
Primary Use
FTP
TCP Port 20
FTP (File Transfer Protocol) is used for transferring files over the Internet.
HTTP
TCP Port 80
HTTP (HyperText Transfer Protocol) is used for browsing the Internet.
Telnet
TCP Port 23
Telnet is a client-server protocol used to communicate over a network or
the Internet.
SMTP
TCP Port 25
SMTP (Simple Mail Transfer Protocol) is used for sending e-mail.
POP3
TCP Port 110
POP3 (Post Office Protocol version 3) is used for retrieving e-mail.
Specific Port
User Defined
User Defined (0-65535)
Figure 6-47: QoS - Application Based
IMPORTANT:
If you don’t assign different priorities to applications, there will be
no differentiation between different traffic types.
Downloaded from
www.Manualslib.com
manuals search engine
Page 74 / 134
66
Chapter 6: Setting Up and Configuring the Router
QoS Tab
Wireless-N Gigabit Security Router with VPN
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes. Help information is displayed on the right-hand side of the screen, and click
More
for additional details.
Port-based
Port-based QoS is implemented in hardware so it can achieve better throughput. It can only control traffic among
the four LAN ports.
LAN ports 1-4 can be assigned High, Medium, Normal, or Low priority. Lower priority traffic will be slowed down
to allow greater throughput for higher priority traffic.
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes. Help information is displayed on the right-hand side of the screen, and click
More
for additional details.
Figure 6-48: Port-based
Downloaded from
www.Manualslib.com
manuals search engine
Page 75 / 134
67
Chapter 6: Setting Up and Configuring the Router
Administration Tab
Wireless-N Gigabit Security Router with VPN
Administration Tab
Management
Local Gateway Access
This configures the administrator user accounts to manage the Wireless Router through Web based Utility. Only
the first user is created by default. Other accounts are not created by default so you can leave them alone. Make
sure to change the first user account username and password when you configure your Wireless Router for the
first time.
Gateway Userlist
. Select a user to configure from the drop-down menu.
Gateway Username
. Enter the user name here.
Gateway Password
. Enter the password.
Re-enter to Confirm
. Retype the password in this field.
SNMP
This configures the Simple Network Management Protocol settings. Users can use management software to read
or write information from or to the device.
Device Name
. Enter a suitable name. This name will be used to identify this device, and will be displayed by your
SNMP software.
SNMP
. Select
Enable
if you wish to use SNMP. To use SNMP, you need SNMP software on your PC.
Read Community
. Enter the SNMP community name for SNMP “Get” commands.
Write Community
. Enter the SNMP community name for SNMP “Set” commands.
Trap To
. Enter the IP Address of the SNMP Manager where traps will be sent. If desired, this may be left blank.
UPnP
. Universal Plug and Play allows Windows MP and XP to automatically configure the Internet Gateway on its
routing table. If you want to use UPnP, keep the default setting,
Enable
. Otherwise, select
Disable
.
IGMP Proxy
. IGMP (Internet Group Membership Protocol) Proxy can facilitate the communication between IGMP
clients and IGMP Routers. Enable this feature if you are using IP multicast services in your network.
Figure 6-49: Administration - Management
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top