Page 6 / 134 Scroll up to view Page 1 - 5
Wireless-N Gigabit Security Router with VPN
Figure 6-11: Setup - LAN
32
Figure 6-12: Setup - DMZ
34
Figure 6-13: Setup - MAC Address Clone
34
Figure 6-14: Setup - Advanced Routing
35
Figure 6-15: Setup - Advanced Routing (Routing Table)
36
Figure 6-16: Setup - Time
37
Figure 6-17: Wireless - Basic Wireless Settings
38
Figure 6-18: Wireless - Wireless Security (Disabled)
40
Figure 6-19: Wireless - Wireless Security (WPA-Personal)
40
Figure 6-20: Wireless - Wireless Security (WPA2-Personal)
41
Figure 6-21: Wireless - Wireless Security (WPA2-Personal Mixed)
41
Figure 6-22: Wireless - Wireless Security (WPA-Enterprise)
42
Figure 6-23: Wireless - Wireless Security (WPA2-Enterprise)
42
Figure 6-24: Wireless - Wireless Security (WPA2-Enterprise Mixed)
43
Figure 6-25: Wireless - Wireless Security (WEP)
43
Figure 6-26: Wireless - Wireless Connection Control
44
Figure 6-27: Select MAC Address from Wireless Client List
44
Figure 6-28: Wireless - Advanced Wireless Settings
45
Figure 6-29: Firewall - Basic Settings
47
Figure 6-30: Firewall - IP Based ACL
49
Figure 6-31: Firewall - IP Based ACL (pre-defined services)
49
Figure 6-32: Firewall - IP Based ACL (Service definition)
50
Figure 6-33: Firewall - Edit IP ACL Rule
50
Figure 6-34: Firewall - Internet Access Policy
52
Figure 6-35: Firewall - Internet Access Policy Summary
53
Figure 6-36: Firewall - Internet Access Policy (List of PCs to apply policy)
53
Figure 6-37: Firewall - Single Port Forwarding
54
Figure 6-38: Port Range Forwarding
55
Figure 6-39: Port Range Triggering
56
Figure 6-40: Firewall - Services
57
Downloaded from
www.Manualslib.com
manuals search engine
Page 7 / 134
Wireless-N Gigabit Security Router with VPN
Figure 6-41: VPN - IPsec VPN
58
Figure 6-42: VPN Tunnel Summary
58
Figure 6-43: View VPN Tunnel Log
60
Figure 6-44: IPsec VPN Advanced Settings
61
Figure 6-45: VPN - VPN Client Accounts
63
Figure 6-46: VPN - VPN Passthrough
64
Figure 6-47: QoS - Application Based
65
Figure 6-48: Port-based
66
Figure 6-49: Administration - Management
67
Figure 6-50: Administration - Log
68
Figure 6-51: View Log pop-up window
68
Figure 6-52: Administration - Diagnostics
69
Figure 6-53: Ping Test Screen
69
Figure 6-54: Trace Route Test Screen
70
Figure 6-55: Administration - Config Management
70
Figure 6-56: Administration - Factory Default
71
Figure 6-57: Administration - Firmware Upgrade
71
Figure 6-58: IPS - Configuration
72
Figure 6-59: IPS - P2P / IM
73
Figure 6-60: IPS - Report
74
Figure 6-61: IPS Log Raw Data
74
Figure 6-62: IPS - Information
75
Figure 6-63: L2 Switch - VLAN
76
Figure 6-64: L2 Switch - RADIUS
77
Figure 6-65: L2 Switch - RADIUS
77
Figure 6-66: L2 Switch - Port Settings
78
Figure 6-67: L2 Switch - Cable Diagnostics
79
Figure 6-68: Status - WAN / Gateway
80
Figure 6-69: Status - LAN
81
Figure 6-70: LAN DHCP Client Table
81
Downloaded from
www.Manualslib.com
manuals search engine
Page 8 / 134
Wireless-N Gigabit Security Router with VPN
Figure 6-71: LAN ARP Table
81
Figure 6-72: Status - Wireless LAN
82
Figure 6-73: Status - System Performance
83
Figure 6-74: Status - VPN Clients
84
Figure 6-75: Status - IPsec VPN
84
Figure B-1: VPN Client Accounts Screen
99
Figure B-2: QuickVPN Desktop Icon
101
Figure B-3: QuickVPN Tray Icon - No Connection
101
Figure B-4: QuickVPN Software - Profile
101
Figure B-5: Connecting
101
Figure B-6: Activating Policy
101
Figure B-7: Verifying Network
101
Figure B-8: QuickVPN Software - Status
102
Figure B-9: QuickVPN Tray Icon - Connection
102
Figure B-10: QuickVPN Tray Icon - No Connection
102
Figure B-11: QuickVPN Software - Change Password
102
Figure C-1: Diagram of Gateway-to-Gateway VPN Tunnel
103
Figure C-2: Login Screen
104
Figure C-3: VPN - IPsec VPN Configuration
104
Figure C-4: Advanced IPsec VPN Tunnel Settings
106
Figure C-5: Auto (IKE) Advanced Settings Screen
106
Figure D-1: IP Configuration Screen
108
Figure D-2: MAC Address/Adapter Address
108
Figure D-3: MAC Address/Physical Address
109
Figure D-4: MAC Address Clone
109
Downloaded from
www.Manualslib.com
manuals search engine
Page 9 / 134
1
Chapter 1: Introduction
Welcome
Wireless-N Gigabit Security Router with VPN
Chapter 1: Introduction
Welcome
Thank you for choosing the Wireless-N Gigabit Security Router with VPN. The Wireless-N Gigabit Security Router
with VPN is an advanced Internet-sharing network solution for your small business needs. The Router features a
built-in 4-Port full-duplex 10/100/1000 Ethernet switch to connect four PCs directly, or you can connect more
hubs and switches to create as big a network as you need. Like any wireless router, it lets multiple computers in
your office share an Internet connection through both wired and wireless connections. It can also be used as an
intranet router to aggregate traffic to a company backbone network.
The Router has a built-in access point that supports the latest 802.11n draft specification by IEEE. It also supports
802.11g and 802.11b clients in a mixed environment. The access point can support an 11n data rate of up to 300
Mbps. Besides having a higher data rate, 802.11n technology also promises longer coverage by using multiple
antennas to transmit and receive data streams in different directions. Users are encouraged to upgrade their
firmware through www.linksys.com when 802.11n specification is finalized by IEEE to ensure compatibility with
all the wireless-N devices.
The Wireless-N Gigabit Security Router with VPN is equipped with advanced security technologies like Intrusion
Prevention System (IPS), Stateful Packet Inspection (SPI) Firewall, IP based Access List (IP ACL), and Network
Address Port Translation (NAPT, also called NAT as a more generic term). These technologies work together by
providing self-defensive strategy. Malicious attack traffic is identified, classified, and stopped in real time while
passing through the Router. Users are encouraged to update their IPS signature file to stay current on stopping
malicious worms. The SPI Firewall provides deep packet inspection to analyze packets in network layer (IP) and
transport layer (TCP, UDP) to block illegal packet transactions. Users can also use IP based ACL to limit traffic to a
specific source, destination and protocol. NAPT allows users to open specific TCP/UDP port numbers to the
Internet to provide limited service while minimizing harmful traffic at the same time.
The Virtual Private Network (VPN) capability is another security feature that creates encrypted “tunnels” through
the Internet, allowing up to five remote offices and five traveling users to securely connect into your office
network from off-site. Users connecting through a VPN tunnel are attached to your company's network with
secure access to files, e-mail, and your intranet as if they were in the building. You can also use the VPN
capability to allow users on your small office network to securely connect out to a corporate network. The QoS
features provide consistent voice and video quality throughout your business.
This user guide will give you all the information you need to connect, set up, and configure your Router.
Ethernet:
a network protocol that specifies
how data is placed on and retrieved from a
common transmission medium.
Downloaded from
www.Manualslib.com
manuals search engine
Page 10 / 134
2
Chapter 1: Introduction
What’s in this Guide?
Wireless-N Gigabit Security Router with VPN
What’s in this Guide?
This user guide covers the steps for setting up and using the Wireless-N Gigabit Security Router with VPN.
Chapter 1: Introduction
This chapter describes the Wireless-N Gigabit Security Router with VPN applications and this User Guide.
Chapter 2: Networking and Security Basics
This chapter describes the basics of networking and network security.
Chapter 3: Planning Your Virtual Private Network (VPN)
This chapter describes a VPN and its various applications.
Chapter 4: Getting to Know the Router
This chapter describes the physical features of the Router.
Chapter 5: Connecting the Router
This chapter instructs you on how to connect the Router to your network.
Chapter 6: Setting Up and Configuring the Router
This chapter explains how to use the Web-Based Utility to perform basic setup and configure its advanced
settings.
Appendix A: Troubleshooting
This appendix describes some problems and solutions, as well as frequently asked questions, regarding
installation and use of the Wireless-N Gigabit Security Router with VPN.
Appendix B: Using the Linksys QuickVPN Software for Windows 2000 or XP
This appendix instructs you on how to use the Linksys QuickVPN software if you are using a Windows 2000 or
XP PC.
Appendix C: Configuring a Gateway-to-Gateway IPSec Tunnel
This appendix describes how to configure an IPSec VPN Tunnel between two VPN Routers.
Appendix D: Finding the MAC Address and IP Address for your Ethernet Adapter.
This appendix describes how to find the MAC address for your computer’s Ethernet adapter so you can use
the MAC filtering and/or MAC address cloning feature of the Router. It also explains how to find the IP address
for your computer.
Appendix E: Glossary
This appendix gives a brief glossary of terms frequently used in networking.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top