Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 3
... 3 2) Data Sniffing 3 3) Man in the middle attacks 3 What is a VPN 3 VPN Router to VPN Router 4 Computer (using the Linksys VPN client software) to VPN Router 4 Chapter 4: Product Overview 5 Front Panel 5 Back Panel 5 Chapter 5: Configuring the Wireless-G VPN Router 6 Overview 6 How to Access the Web-based Utility 7 Setup 7 Setup > Basic Settings 7 Setup > VLAN 10...
... 3 2) Data Sniffing 3 3) Man in the middle attacks 3 What is a VPN 3 VPN Router to VPN Router 4 Computer (using the Linksys VPN client software) to VPN Router 4 Chapter 4: Product Overview 5 Front Panel 5 Back Panel 5 Chapter 5: Configuring the Wireless-G VPN Router 6 Overview 6 How to Access the Web-based Utility 7 Setup 7 Setup > Basic Settings 7 Setup > VLAN 10...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 4
... Asked Questions 37 Appendix B: Wireless Security Checklist 39 General Network Security Guidelines 39 Additional Security Tips 39 Appendix C: Using Linksys QuickVPN for Windows 2000, XP, or Vista 40 Overview 40 Before You Begin 40 Installing the Linksys QuickVPN Software 40 Installing from ... CD-ROM 40 Downloading and Installing from the Internet 40 Using the Linksys QuickVPN Software 41 Version Number of the QuickVPN Client 41 Distributing Certificates to QuickVPN Users 42 Appendix D: Configuring IPSec with a Windows 2000 or XP Computer 43 Introduction 43 Environment...
... Asked Questions 37 Appendix B: Wireless Security Checklist 39 General Network Security Guidelines 39 Additional Security Tips 39 Appendix C: Using Linksys QuickVPN for Windows 2000, XP, or Vista 40 Overview 40 Before You Begin 40 Installing the Linksys QuickVPN Software 40 Installing from ... CD-ROM 40 Downloading and Installing from the Internet 40 Using the Linksys QuickVPN Software 41 Version Number of the QuickVPN Client 41 Distributing Certificates to QuickVPN Users 42 Appendix D: Configuring IPSec with a Windows 2000 or XP Computer 43 Introduction 43 Environment...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 5
...IP Address 49 Configuration of the WRV200 49 Configuration of the RV082 50 Configuration of PC 1 and PC 2 50 Configuration when the Remote Gateway Uses a Dynamic IP Address 51 Configuration of the WRV200 51 Configuration of the RV082 51 Configuration of PC 1 and PC 2 52 Configuration when Both ... Canada Radiation Exposure Statement 61 Avis d'Industrie Canada 62 Avis d'Industrie Canada concernant l'exposition aux radiofréquences 62 Wireless Disclaimer 62 Avis de non-responsabilité concernant les appareils sans fil 62 User Information for Consumer Products Covered by ...
...IP Address 49 Configuration of the WRV200 49 Configuration of the RV082 50 Configuration of PC 1 and PC 2 50 Configuration when the Remote Gateway Uses a Dynamic IP Address 51 Configuration of the WRV200 51 Configuration of the RV082 51 Configuration of PC 1 and PC 2 52 Configuration when Both ... Canada Radiation Exposure Statement 61 Avis d'Industrie Canada 62 Avis d'Industrie Canada concernant l'exposition aux radiofréquences 62 Wireless Disclaimer 62 Avis de non-responsabilité concernant les appareils sans fil 62 User Information for Consumer Products Covered by ...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 6
...or decrease the RF output power, allows for choosing the Wireless-G VPN Router with DoS prevention, but also a Virtual Private Networking (VPN) engine for Wireless Distribution System (WDS), which utilizes a MIMO antennae configuration to four devices. SIP based VoIP data has problems ... communication between it and select Linksys stand alone access points. Wireless networking in 4-port, full-duplex 10/100 Ethernet switch that can improve the quality of your broadband DSL or Cable modem. That, along with a Wireless-G access point for business networking. For the LAN interface...
...or decrease the RF output power, allows for choosing the Wireless-G VPN Router with DoS prevention, but also a Virtual Private Networking (VPN) engine for Wireless Distribution System (WDS), which utilizes a MIMO antennae configuration to four devices. SIP based VoIP data has problems ... communication between it and select Linksys stand alone access points. Wireless networking in 4-port, full-duplex 10/100 Ethernet switch that can improve the quality of your broadband DSL or Cable modem. That, along with a Wireless-G access point for business networking. For the LAN interface...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 7
...Wireless-G VPN Router with your wireless network with RangeBooster. Wireless-G VPN Router with RangeBooster Network Layout The Wireless-G VPN Router has been specifically designed for more ports, any Linksys Business Series switch (such as the main point of communications in a wireless...wireless networks have two different modes in Infrastructure mode. An ad-hoc configuration is wirelessequipped computers communicating directly with wireless...point or wireless router, such as the Wireless-G VPN Router, which is compatible with Wireless Ethernet Bridges (WET200). The Wireless-G VPN...
...Wireless-G VPN Router with your wireless network with RangeBooster. Wireless-G VPN Router with RangeBooster Network Layout The Wireless-G VPN Router has been specifically designed for more ports, any Linksys Business Series switch (such as the main point of communications in a wireless...wireless networks have two different modes in Infrastructure mode. An ad-hoc configuration is wirelessequipped computers communicating directly with wireless...point or wireless router, such as the Wireless-G VPN Router, which is compatible with Wireless Ethernet Bridges (WET200). The Wireless-G VPN...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 9
... two routers create a VPN tunnel, encrypting and decrypting data. Wireless-G VPN Router with the Linksys VPN client software can also refer to "Appendix B: Using Linksys QuickVPN for Windows 2000, XP, or Vista", "Appendix C: Configuring IPSec between them are secure. Her notebook computer has the Linksys VPN client software, which is not a factor. For more information...
... two routers create a VPN tunnel, encrypting and decrypting data. Wireless-G VPN Router with the Linksys VPN client software can also refer to "Appendix B: Using Linksys QuickVPN for Windows 2000, XP, or Vista", "Appendix C: Configuring IPSec between them are secure. Her notebook computer has the Linksys VPN client software, which is not a factor. For more information...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 10
...is actively sending or receiving data over the DMZ port. If the LED is flashing, the Router is sending or receiving data over the wireless network. 1-4 (ETHERNET) (Green) These four LEDs correspond to your PCs and other network devices. If the LED is flashing, the Router is connected to your...) The Wireless LED lights up when the Router has an available DMZ port. DMZ (Green) The DMZ LED lights up whenever there is powered on the front panel of the current configuration settings. • If pressed for one second, the Reset button causes a warm reboot-the Router restarts without...
...is actively sending or receiving data over the DMZ port. If the LED is flashing, the Router is sending or receiving data over the wireless network. 1-4 (ETHERNET) (Green) These four LEDs correspond to your PCs and other network devices. If the LED is flashing, the Router is connected to your...) The Wireless LED lights up when the Router has an available DMZ port. DMZ (Green) The DMZ LED lights up whenever there is powered on the front panel of the current configuration settings. • If pressed for one second, the Reset button causes a warm reboot-the Router restarts without...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 11
...Client Access. Setup • Basic Setup. On this screen. • WDS. You can choose your wireless network settings on this screen, configure the dynamic and static routing configuration. Use this tab. • Port Triggering. For advanced users, you to designate VPN clients and their ...• Application-based QoS. The Router's default password is secure. • VPN Summary. Chapter 5 Configuring the Wireless-G Router Chapter 5: Configuring the Wireless-G VPN Router Overview Linksys recommends using IPSec, L2TP, or PPTP protocols. • IPSec VPN.
...Client Access. Setup • Basic Setup. On this screen. • WDS. You can choose your wireless network settings on this screen, configure the dynamic and static routing configuration. Use this tab. • Port Triggering. For advanced users, you to designate VPN clients and their ...• Application-based QoS. The Router's default password is secure. • VPN Summary. Chapter 5 Configuring the Wireless-G Router Chapter 5: Configuring the Wireless-G VPN Router Overview Linksys recommends using IPSec, L2TP, or PPTP protocols. • IPSec VPN.
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 12
...necessary changes through the Utility. DHCP Internet Setup The Internet Setup section configures the Router for all of the Router's basic setup functions. This screen provides status information about the local network. • Wireless. Address Bar of a screen. After you open the web-based ..., enter admin (default user name) in the User Name field, and enter admin (default password) in the Address field. Chapter 5 Configuring the Wireless-G Router • Diagnostics. Use this tab if you want to check the connection between the Router and a PC. • Factory ...
...necessary changes through the Utility. DHCP Internet Setup The Internet Setup section configures the Router for all of the Router's basic setup functions. This screen provides status information about the local network. • Wireless. Address Bar of a screen. After you open the web-based ..., enter admin (default user name) in the User Name field, and enter admin (default password) in the Address field. Chapter 5 Configuring the Wireless-G Router • Diagnostics. Use this tab if you want to check the connection between the Router and a PC. • Factory ...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 13
...use PPPoE. If they use PPPoE (Point-to-Point Protocol over Ethernet) to the Internet, then select Static IP. Service Name This is required by external users on Demand: Max Idle Time You can configure the Router to enable PPPoE. PPTP IP Address This is the ...option, click the radio button next to -Point Tunneling Protocol (PPTP) is a service that must elapse before your Internet connection. Chapter 5 Configuring the Wireless-G Router available features will differ depending on what kind of connection type you are connecting through a DSL line, check with the Default Gateway...
...use PPPoE. If they use PPPoE (Point-to-Point Protocol over Ethernet) to the Internet, then select Static IP. Service Name This is required by external users on Demand: Max Idle Time You can configure the Router to enable PPPoE. PPTP IP Address This is the ...option, click the radio button next to -Point Tunneling Protocol (PPTP) is a service that must elapse before your Internet connection. Chapter 5 Configuring the Wireless-G Router available features will differ depending on what kind of connection type you are connecting through a DSL line, check with the Default Gateway...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 14
... -Point Protocol (PPP) across the Internet. Subnet Mask This is terminated automatically. Network Address Server Settings (DHCP) The Router can configure the Router to cut the Internet connection after it has been inactive for a specified period of inactivity that tunnels Point-to Keep Alive...It is recommended that must elapse before your Internet connection is the Router's Subnet Mask, as seen by your ISP. Chapter 5 Configuring the Wireless-G Router User Name and Password Enter the User Name and Password provided by your ISP. Optional Settings Host Name and Domain Name...
... -Point Protocol (PPP) across the Internet. Subnet Mask This is terminated automatically. Network Address Server Settings (DHCP) The Router can configure the Router to cut the Internet connection after it has been inactive for a specified period of inactivity that tunnels Point-to Keep Alive...It is recommended that must elapse before your Internet connection is the Router's Subnet Mask, as seen by your ISP. Chapter 5 Configuring the Wireless-G Router User Name and Password Enter the User Name and Password provided by your ISP. Optional Settings Host Name and Domain Name...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 15
... to determine the DHCP IP Address range, add the starting IP address (e.g., 100) to the number of MAC addresses to IP addresses. Wireless-G VPN Router with RangeBooster Automatically Select your changes. Select Disabled to enable the feature. When you already have a DHCP server on the same... LAN. Chapter 5 Configuring the Wireless-G Router assigns an IP address to each PC on your changes in the fields, then click Add. The Static IP Table shows ...
... to determine the DHCP IP Address range, add the starting IP address (e.g., 100) to the number of MAC addresses to IP addresses. Wireless-G VPN Router with RangeBooster Automatically Select your changes. Select Disabled to enable the feature. When you already have a DHCP server on the same... LAN. Chapter 5 Configuring the Wireless-G Router assigns an IP address to each PC on your changes in the fields, then click Add. The Static IP Table shows ...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 16
... displayed here. Because it will automatically detect your PC's MAC address, so you from having to call your ISP to change . Chapter 5 Configuring the Wireless-G Router DDNS If your DDNS service is provided by TZO, then select TZO.com. The features available on the DDNS screen will change the ... you are currently using to clone the MAC address of the service you register a MAC address. Clone My MAC Address If you want to configure the Router, then click Clone My MAC Address. DynDNS User Name, Password, and Host Name Enter the User Name, Password, and Host Name...
... displayed here. Because it will automatically detect your PC's MAC address, so you from having to call your ISP to change . Chapter 5 Configuring the Wireless-G Router DDNS If your DDNS service is provided by TZO, then select TZO.com. The features available on the DDNS screen will change the ... you are currently using to clone the MAC address of the service you register a MAC address. Clone My MAC Address If you want to configure the Router, then click Clone My MAC Address. DynDNS User Name, Password, and Host Name Enter the User Name, Password, and Host Name...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 17
... Enter the IP address of your local network. Click Close to 5 static route entries. Dynamic Routing With Dynamic Routing you can configure static routes to direct packets to the destination network (A static route is the network portion, and which you wish to reach ... route, select its number from the drop-down menu, and click Delete This Entry. For help information, click More. 12 Chapter 5 Configuring the Wireless-G Router Setup > Advanced Routing Setup > Advanced Routing The Setup > Advanced Routing screen allows you to update the information. If this address...
... Enter the IP address of your local network. Click Close to 5 static route entries. Dynamic Routing With Dynamic Routing you can configure static routes to direct packets to the destination network (A static route is the network portion, and which you wish to reach ... route, select its number from the drop-down menu, and click Delete This Entry. For help information, click More. 12 Chapter 5 Configuring the Wireless-G Router Setup > Advanced Routing Setup > Advanced Routing The Setup > Advanced Routing screen allows you to update the information. If this address...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 18
...it should change the default SSID (linksys-g) to function correctly. Wireless SSID Broadcast When wireless clients survey the local area for quality of the IEEE 802.11e wireless LAN standard for wireless networks to configure the Router's wireless network settings. You may need ...WPA Personal WPA gives you can see each other . Chapter 5 Configuring the Wireless-G Router Wireless The Wireless tab is useful when setting up a wireless hotspot location. Wireless > Basic Wireless Settings Wireless Network Mode Wireless Network Mode From this rate. If you have both 802.11g ...
...it should change the default SSID (linksys-g) to function correctly. Wireless SSID Broadcast When wireless clients survey the local area for quality of the IEEE 802.11e wireless LAN standard for wireless networks to configure the Router's wireless network settings. You may need ...WPA Personal WPA gives you can see each other . Chapter 5 Configuring the Wireless-G Router Wireless The Wireless tab is useful when setting up a wireless hotspot location. Wireless > Basic Wireless Settings Wireless Network Mode Wireless Network Mode From this rate. If you have both 802.11g ...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 19
...click Save Settings to save the changes, or click Cancel Changes to the Router.) Enter the RADIUS Wireless-G VPN Router with RangeBooster Wireless Security - WPA2 Enterprise Wireless Security - WPA2 Enterprise This option features WPA2 used in coordination with the Shared Secret key, which...the screen, click Save Settings to save the changes, or click Cancel Changes to undo your changes. Wireless Security - For help information, click More. Chapter 5 Configuring the Wireless-G Router server's IP address. Enter a Shared Secret of 8-32 characters. WPA Enterprise When you have...
...click Save Settings to save the changes, or click Cancel Changes to the Router.) Enter the RADIUS Wireless-G VPN Router with RangeBooster Wireless Security - WPA2 Enterprise Wireless Security - WPA2 Enterprise This option features WPA2 used in coordination with the Shared Secret key, which...the screen, click Save Settings to save the changes, or click Cancel Changes to undo your changes. Wireless Security - For help information, click More. Chapter 5 Configuring the Wireless-G Router server's IP address. Enter a Shared Secret of 8-32 characters. WPA Enterprise When you have...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 20
... gives you are 15 This option features WPA2 used in coordination with a RADIUS server. (This should change the encryption keys. Wireless Security - For help information, click More. RADIUS To indicate which instructs the Router how often it should only be used when ... is connected to the Router.) Enter the RADIUS server's IP address and port number, along with RangeBooster Wireless Security - they may decrease network performance. Chapter 5 Configuring the Wireless-G Router Renewal period, which WEP key to use a Passphrase, enter it in the Passphrase field and click...
... gives you are 15 This option features WPA2 used in coordination with a RADIUS server. (This should change the encryption keys. Wireless Security - For help information, click More. RADIUS To indicate which instructs the Router how often it should only be used when ... is connected to the Router.) Enter the RADIUS server's IP address and port number, along with RangeBooster Wireless Security - they may decrease network performance. Chapter 5 Configuring the Wireless-G Router Renewal period, which WEP key to use a Passphrase, enter it in the Passphrase field and click...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 21
... WEP encryption, the key must be exactly 26 hexadecimal characters in length. Wireless > Wireless Network Access This screen allows you want to refresh the screen. Wireless > Wireless Network Access Wireless Network Access Access List To allow the designated computers to access. MAC 1-16...10 hexadecimal characters in length. If you can enter a Passphrase to generate one or more convenient way to "F". Chapter 5 Configuring the Wireless-G Router using 64-bit WEP encryption, the key must be exactly 26 hexadecimal characters in length. Valid hexadecimal characters are "0" ...
... WEP encryption, the key must be exactly 26 hexadecimal characters in length. Wireless > Wireless Network Access This screen allows you want to refresh the screen. Wireless > Wireless Network Access Wireless Network Access Access List To allow the designated computers to access. MAC 1-16...10 hexadecimal characters in length. If you can enter a Passphrase to generate one or more convenient way to "F". Chapter 5 Configuring the Wireless-G Router using 64-bit WEP encryption, the key must be exactly 26 hexadecimal characters in length. Valid hexadecimal characters are "0" ...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 22
... RTS Threshold The RTS Threshold value should remain at its default value of data transmission, configure the Transmission Rate setting. The Router will automatically use CTS Protection Mode when your wireless network. CTS Protection Mode CTS (Clear-To-Send) Protection Mode's default setting is Auto... value is 3. Should you may result in your network from Full, Half, Quarter, Eighth, or Min. Chapter 5 Configuring the Wireless-G Router Wireless > Advanced Wireless Settings Wireless > Advanced Wireless Settings This tab is used . The default setting is recommended.
... RTS Threshold The RTS Threshold value should remain at its default value of data transmission, configure the Transmission Rate setting. The Router will automatically use CTS Protection Mode when your wireless network. CTS Protection Mode CTS (Clear-To-Send) Protection Mode's default setting is Auto... value is 3. Should you may result in your network from Full, Half, Quarter, Eighth, or Min. Chapter 5 Configuring the Wireless-G Router Wireless > Advanced Wireless Settings Wireless > Advanced Wireless Settings This tab is used . The default setting is recommended.
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 23
Chapter 5 Configuring the Wireless-G Router This tab is used for all WDS enabled devices. Make sure that the channel and security settings are the same for Wireless Distribution System (WDS). Select Auto Select to enable the remote access point when operating in Repeater Mode or select...operate behind a NAT router. SIP Application Layer Gateway This option allows VoIP phones to block anonymous Internet requests. This mode allows a wireless client to connect to the appropriate computers in the Repeater Mode. To use this option. Denying Filter Proxy will ONLY work with them...
Chapter 5 Configuring the Wireless-G Router This tab is used for all WDS enabled devices. Make sure that the channel and security settings are the same for Wireless Distribution System (WDS). Select Auto Select to enable the remote access point when operating in Repeater Mode or select...operate behind a NAT router. SIP Application Layer Gateway This option allows VoIP phones to block anonymous Internet requests. This mode allows a wireless client to connect to the appropriate computers in the Repeater Mode. To use this option. Denying Filter Proxy will ONLY work with them...