free stats
Cisco RV042 - Small Business Dual WAN VPN Router User Manual

Cisco RV042 - Small Business Dual WAN VPN Router User Manual

Business series 10/100 4-port vpn router
Hide thumbs Also See for RV042 - Small Business Dual WAN VPN Router:
Table of Contents

Advertisement

USER GUIDE
BUSINESS SERIES
10/100 4-Port
VPN Router
RV042
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Cisco RV042 - Small Business Dual WAN VPN Router

  • Page 1 USER GUIDE BUSINESS SERIES 10/100 4-Port VPN Router RV042 Model:...
  • Page 2: Icon Descriptions

    U.S. and various icons that call attention to specific items. Below is certain other countries. Copyright a description of these icons: © 2008 Cisco Systems, Inc. All rights reserved. Trend Micro, InterScan, and NOTE: This check mark indicates that there is...
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Introduction Introduction to the Router........1 Introduction to VPNs .
  • Page 4 Table of Contents One-to-One NAT ......... . .16 Setup >...
  • Page 5 Table of Contents VPN > Client to Gateway .........40 Add a New Tunnel .
  • Page 6 Table of Contents Configuration of PC 1 and PC 2 ........63 Configuration when the Remote Gateway Uses a Dynamic IP Address .
  • Page 7 Table of Contents Appendix I: Warranty Information Exclusions and Limitations........82 Obtaining Warranty Service .
  • Page 8: Chapter 1: Introduction

    Chapter 1 Introduction Chapter 1: For an IPSec VPN tunnel, the VPN Router and any computer with the built-in IPSec Security Manager (Windows 2000 Introduction and XP) can create a VPN tunnel using IPSec (Windows Vista uses a similar utility). Other Windows operating systems require additional, third-party VPN client software Introduction to the Router applications that support IPSec to be installed.
  • Page 9: Computer (Using Vpn Client Software) To Vpn Router

    Chapter 1 Introduction Computer (using VPN client software) to VPN Router The following is an example of a computer-to-VPN Router VPN. In her hotel room, a traveling businesswoman connects to her Internet Service Provider (ISP). Her notebook computer has VPN client software that is configured with her office’s VPN settings.
  • Page 10: Chapter 2: Product Overview

    Chapter 2 Product Overview Chapter 2: Reset The Reset button can be used for a warm reset or a reset to factory defaults. Product Overview Warm Reset If the Router is having • problems connecting to the Internet, press and hold in the Reset button for a Front Panel second using the tip of a pen.
  • Page 11: Chapter 3: Installation

    Chapter 3 Installation Chapter 3: Follow these instructions: Determine where you want to mount the Router. Make Installation sure that the wall you use is smooth, flat, dry, and sturdy. Also make sure the location is within reach of an electrical outlet. Physical Installation Drill two holes into the wall.
  • Page 12 Chapter 3 Installation Connect one end of an Ethernet network cable to Connect the included power adapter to the Router’s one of the numbered ports on the back of the Router. Power port, and then plug the power adapter into an Connect the other end to an Ethernet port on a electrical outlet.
  • Page 13: Chapter 4: Advanced Configuration

    Chapter 4 Advanced Configuration Chapter 4: System Summary Advanced Configuration The first screen that appears is the System Summary screen, which displays the Router’s current status and settings. This information is read-only. Underlined text Overview is hyperlinked to related setup pages, so if you click a hyperlink, the related setup screen will appear.
  • Page 14: System Information

    Chapter 4 Advanced Configuration System Up Time This is the length of time in days, hours, and minutes that the Router has been active. The current time and date are also displayed. Trend Micro™ ProtectLink Gateway The optional Trend Micro ProtectLink Gateway service provides security for your network.
  • Page 15: Network Setting Status

    Chapter 4 Advanced Configuration DDNS It shows the DDNS settings of the Router’s WAN port(s) and hyperlinks to the Setup > DDNS screen. DMZ Host It shows the DMZ private IP address and hyperlinks to the Setup > DMZ Host screen. The default is Disabled.
  • Page 16: Setup Tab > Network

    Chapter 4 Advanced Configuration be sent out, probably use incorrect settings, ” will be displayed. Setup Tab > Network The Network screen shows all of the Router’s basic setup functions. The Router can be used in most network setups without changing any of the default values; however, you may need to enter additional information in order to connect to the Internet through an ISP (Internet Service Provider) or broadband (DSL or cable) carrier.
  • Page 17 Chapter 4 Advanced Configuration If you want to modify a subnet you have created, select Dual-WAN/DMZ Setting it and make changes. Click Save Settings to save your Before configuring the WAN Connection Type settings, changes, or click Cancel Changes to undo them. Click select Dual WAN or DMZ.
  • Page 18 Chapter 4 Advanced Configuration Service Name Enter the Service Name, if provided by your ISP. Connect on Demand If you select the Connect on Demand option, the connection will be disconnected after a specified period of inactivity (Max Idle Time). If you have been disconnected due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the...
  • Page 19: Setup > Password

    Chapter 4 Advanced Configuration Default Gateway Address Enter the IP address of the default gateway. User Name and Password Enter your account’s User Name and Password. The maximum number of characters is 60. Connect on Demand If you select the Connect on Demand option, the connection will be disconnected DMZ (Subnet) after a specified period of inactivity (Max Idle Time).
  • Page 20: Password

    Chapter 4 Advanced Configuration Daylight Saving To use the daylight saving feature, select Enabled. Enter the Month and Day of the start date, and then enter the Month and Day of the end date. NTP Server Enter the URL or IP address of the NTP server. The default is time.nist.gov.
  • Page 21: Setup Tab > Forwarding

    Chapter 4 Advanced Configuration Setup Tab > Forwarding Enable Select Enable to enable this port range forwarding entry. The Forwarding screen allows you to set up port range If the Service you need is not listed in the menu, click forwarding and port triggering applications.
  • Page 22: Setup > Upnp

    Chapter 4 Advanced Configuration Some Internet applications or games use alternate ports to communicate between the server and LAN host. When you want to use these applications, enter the triggering (outgoing) port and alternate incoming port in the Port Triggering table. Then the Router will forward the incoming packets to the LAN host.
  • Page 23: Setup > One-To-One Nat

    Chapter 4 Advanced Configuration If you want to modify a service you have created, select it and click Update this service. Make changes. Click Save Settings to save your changes, or click Cancel Changes to undo them. Click Exit to return to the UPnP screen. If you want to delete a service you have created, select it and click Delete selected service.
  • Page 24: Mac Clone

    Chapter 4 Advanced Configuration DynDNS.org Setup > MAC Clone MAC Clone WAN1/2 Setup > DDNS > DynDNS.org If you have enabled the Dual WAN feature, then you will have two ports, WAN1 and WAN2, available for MAC User name Enter your DynDNS.org account information. address assignment or cloning.
  • Page 25: Setup > Advanced Routing

    Chapter 4 Advanced Configuration Host Name Enter your host name in the three Host Name fields. For example, if your host name were myhouse.3322. org, then myhouse would go into the first field, 3322 would go into the second field, and org would go into the last field.
  • Page 26: Dhcp > Setup

    Chapter 4 Advanced Configuration Static Routing If the Router is connected to more than one network or there are multiple routers installed on your network, it may be necessary to set up static routes. The static routing function determines the path that data follows over your network before and after it passes through the Router.
  • Page 27: Setup

    Chapter 4 Advanced Configuration corresponding MAC addresses. The Unknown MAC Addresses List appears. Unknown MAC Addresses List To add an IP address and MAC address set to the Static IP list, select Enable, and then click Apply. To add all IP addresses and MAC addresses to the Static IP list, click Select All.
  • Page 28: Dhcp > Status

    Chapter 4 Advanced Configuration Client Host Name This is the name assigned to a client NOTE: support NetBIOS DHCP host. clients, the Router uses two methods. IP Address It is the dynamic IP address assigned to a First, when the DHCP clients receive dynamic client.
  • Page 29 Chapter 4 Advanced Configuration Network Service Detection Load Balance Enable Network Service Detection Network Service Detection helps manage your connection and can report when your connection experiences problems. To use this service, select this option. Retry Count Enter the number of times the Router will try to reconnect if the connection fails.
  • Page 30: System Management > Bandwidth Management

    Chapter 4 Advanced Configuration DNS Lookup Host Source IP Select this option to ping the DNS Enter the source IP address or range. If you Lookup Host. Then enter the IP address. need Service Binding only, then you can keep the default, which is 0.
  • Page 31: Bandwidth Management

    Chapter 4 Advanced Configuration Bandwidth Management If you want to modify a service you have created, select it and click Update this service. Make changes. Click Save Settings to save your changes, or click Cancel Changes The Maximum Bandwidth provided by ISP to undo them.
  • Page 32: System Management > Snmp

    Chapter 4 Advanced Configuration Priority If you want to modify a service you have created, select it and click Update this service. Make changes. Click Save Settings to save your changes, or click Cancel Changes to undo them. Click Exit to return to the Bandwidth Management screen.
  • Page 33: System Management > Diagnostic

    Chapter 4 Advanced Configuration The ping test bounces a packet off a machine on the Internet back to the sender. This test shows if the Router is able to contact the remote host. If users on the LAN are having problems accessing services on the Internet, try pinging the DNS server or other machine at the ISP’s location.
  • Page 34: System Management > Factory Default

    Chapter 4 Advanced Configuration Factory Default Confirmation System Management > Firmware Upgrade You can use this feature to upgrade the Router’s firmware to the latest version. System Management > Diagnostic > Ping Ping host or IP address Enter the IP address of the device being pinged, and click Go.
  • Page 35: Restart

    Chapter 4 Advanced Configuration Import After you select the file, click Import. This process from the Restart screen, then the Router will send out your log file before it is reset. may take up to a minute. Then restart the Router so that the changes will take effect.
  • Page 36: Port Management > Port Status

    Chapter 4 Advanced Configuration Priority For port-based QoS, select the appropriate Statistics priority level, High or Normal. For the selected port, the Statistics table displays the Speed Select the port speed, 10M or 100M. following: Duplex Select the duplex mode, Half or Full. Port Receive Packet Count The number of packets received is displayed.
  • Page 37: Firewall > Access Rules

    Chapter 4 Advanced Configuration ActiveX as SYN Flooding, Smurf, LAND, Ping of Death, IP Spoofing, ActiveX is a programming language for • and reassembly attacks. websites. If you deny ActiveX, you run the risk of losing access to Internet sites created using this programming Block WAN Request This option is enabled by default.
  • Page 38: Access Rules

    Chapter 4 Advanced Configuration Click Add New Rule to add new access rules, and the Add a New Access Rule screen appears. Click the Restore to Default Rules to restore the default rules and delete the custom access rules. Add a New Access Rule Firewall >...
  • Page 39: Firewall > Content Filter

    Chapter 4 Advanced Configuration Source Interface Select WAN1, WAN2, LAN, or Any. Source Select the Source IP address(es) for the access rule. If it can be any IP address, select Any. If it is one IP address, select Single and enter the IP address. If it is a range of IP addresses, select Range, and enter the starting and ending IP addresses in the fields provided.
  • Page 40: Content Filter

    Chapter 4 Advanced Configuration Content Filter Forbidden Domains Block Forbidden Domains To block access to the websites on the Forbidden Domains list, select this option. Enter the domain you want to block. To add a domain to the list, click Add to list. To remove a domain from the list, select the entry, and click the Delete selected domain.
  • Page 41 Chapter 4 Advanced Configuration Remote Group The IP address and subnet mask of the Remote Group are displayed here. Remote Gateway It shows the IP address of the Remote Gateway. Tunnel Test Click Connect to verify the status of the VPN tunnel.
  • Page 42: Vpn > Gateway To Gateway

    Chapter 4 Advanced Configuration Add a New Tunnel VPN Clients Status This section identifies the VPN clients currently connected Tunnel No The tunnel number is automatically to the Router. generated. It shows the number of the VPN client. Tunnel Name Enter a name for this VPN tunnel, such as Los Angeles Office, Chicago Branch, or New York Division.
  • Page 43 Chapter 4 Advanced Configuration Local Security Gateway Type > Dynamic IP + E-mail Addr.(USER FQDN) Local Security Gateway Type > IP + Domain Name(FQDN) Authentication Authentication E-mail address Enter e-mail address Domain Name The Fully Qualified Domain Name (FQDN) authentication. is the host name and domain name for a specific computer on the Internet.
  • Page 44 Chapter 4 Advanced Configuration IP + Domain Name(FQDN) Authentication The IP address and domain name ID must match the Local Local Security Group Type > IP Range Gateway of the remote VPN device, and they can only be used for one tunnel connection. IP range Enter the range of IP addresses.
  • Page 45: Ipsec Setup

    Chapter 4 Advanced Configuration Remote Security Group Type > Subnet IP address Enter the IP address. Remote Security Gateway Type > Dynamic IP + Domain Name(FQDN) Authentication Subnet Mask Enter the subnet mask. The default is Domain Name 255.255.255.0. Enter the domain name for authentication. (Once used, you cannot use it again to create a new tunnel IP Range connection.)
  • Page 46 Chapter 4 Advanced Configuration a one-way hashing algorithm that produces a 128-bit Manual digest. SHA is a one-way hashing algorithm that produces If you select Manual, you generate the key yourself, and a 160-bit digest. SHA is recommended because it is more no key negotiation is needed.
  • Page 47: Vpn > Client To Gateway

    Chapter 4 Advanced Configuration If MD5 is selected, the Authentication Key is 32-bit, which of portions of the original IP header in the hashing process. Select this option to use this feature. Then select MD5 or requires 32 hexadecimal values. If you do not enter enough hexadecimal values, then the rest of the Authentication Key SHA1.
  • Page 48: Add A New Tunnel

    Chapter 4 Advanced Configuration This allows you to identify multiple tunnels and does not have to match the name used at the other end of the tunnel. Interface Select the appropriate WAN port, WAN1 or WAN2 (available if the Dual WAN feature is enabled). Enable Check this box to enable a VPN tunnel.
  • Page 49 Chapter 4 Advanced Configuration IP + E-mail Addr.(USER FQDN) Authentication NOTE: The Local Security Group Type you select should match the Remote Security Group Type selected on the VPN device at the other end of the tunnel. After you have selected the Local Security Group Type, the settings available on this screen may change, depending Local Security Gateway Type >...
  • Page 50 Chapter 4 Advanced Configuration IP Only IP address of the remote VPN device via its public DNS records. The default is IP Only. Only the computer with a specific IP address will be able to access the tunnel. Select IP address E-mail address Enter the e-mail address as an ID.
  • Page 51: Ipsec Setup

    Chapter 4 Advanced Configuration Domain Name(FQDN) NOTE: The Local Security Group Type you select should match the Remote Security Group Type The default is Domain Name(FQDN). selected on the remote computer at the other end of the tunnel. After you have selected the Local Security Group Type, the Remote Client >...
  • Page 52 Chapter 4 Advanced Configuration shared keys. There are three groups of different prime it is more secure. Both ends of the VPN tunnel must use key lengths. Group 1 is 768 bits, and Group 2 is 1,024 bits. the same Phase 2 Authentication setting. Group 5 is 1,536 bits.
  • Page 53: Vpn > Vpn Client Access

    Chapter 4 Advanced Configuration If DES is selected, the Encryption Key is 16-bit, which connection. If the responders reject this proposal, then the requires 16 hexadecimal values. If you do not enter enough Router will not implement compression. When the Router hexadecimal values, then the rest of the Encryption works as a responder, it will always accept compression, Key will be automatically completed with zeroes, so the...
  • Page 54: Vpn Client Access

    Chapter 4 Advanced Configuration Generate Certificate Confirmation Export Certificate for Administrator The certificate for the administrator contains the private key and should be stored in a safe place as a backup. If you reset the Router to its factory defaults, then you can import the certificate and restore it on the Router.
  • Page 55: Vpn Pass Through

    Chapter 4 Advanced Configuration PPTP Server Enable PPTP Server Select this option to allow PPTP VPN tunnels. IP Address Range Range Start Enter the starting LAN IP address of the range allotted to PPTP VPN clients. The default is 192.168.1.200. Range End Enter the ending LAN IP address of the range allotted to PPTP VPN clients.
  • Page 56: System Log

    Chapter 4 Advanced Configuration your changes, and then restart the Router for the changes to take effect. E-mail You may want logs or alert messages to be e-mailed to you. If so, then configure the E-mail settings. Enable E-Mail Alert Select this option to enable the Router’s E-Mail Alert feature.
  • Page 57: Log > System Statistics

    Chapter 4 Advanced Configuration Outgoing Log Table General Log To view the outgoing log information, click this option. System Error Messages If this option is enabled, system error messages are included. This option is enabled by default. Deny Policies Select this option if you do not want to include log events from Deny rules on the Firewall >...
  • Page 58: Wizard

    Chapter 4 Advanced Configuration To use the WAN2 (DMZ/Internet) port as a WAN (Internet) port, select Dual WAN. To use the WAN2 (DMZ/Internet) port as a DMZ port, select DMZ. Then click Next to continue. Click Exit if you want to exit the Setup Wizard.
  • Page 59 Chapter 4 Advanced Configuration Select the WAN (or Internet) Connection Type for the Static IP WAN port. Select the appropriate connection type: Complete the Static IP, Subnet Mask, and Default Obtain an IP automatically, Static IP, or PPPoE. Click Gateway fields with the settings provided by your ISP. Next to continue.
  • Page 60 Chapter 4 Advanced Configuration PPPoE Complete the User Name and Password fields with the information provided by your ISP. Click Next to continue. Click Previous if you want to return to the previous screen. Click Exit if you want to exit the Setup Wizard.
  • Page 61: Access Rule Setup

    Chapter 4 Advanced Configuration Save Settings. Allow or Deny If you want to save your changes, click From the drop-down menu, select Click Previous if you want to return to the previous depending on the intent of the Access Rule. screen.
  • Page 62 Chapter 4 Advanced Configuration For this service, you can select whether or not you want Select the Destination IP address(es) for this Access Rule. If it can be any IP address, select Any. If it is one the Router to keep a log tracking this type of activity. To keep a log, select Log packets match this rule.
  • Page 63: Support

    Chapter 4 Advanced Configuration Next to continue. Click Previous if you want to return to the previous screen. Click Exit if you want to exit the Setup Wizard. Support Manual If you want the latest version of this User Guide, click On Line Manual.
  • Page 64: Appendix A: Troubleshooting

    Appendix A Troubleshooting Appendix A: The Router does not have a coaxial port for the cable connection. Troubleshooting The Router does not replace your modem. You still need your cable modem in order to use the Router. Connect your cable connection to the cable modem, insert the setup The firmware upgrade has failed.
  • Page 65: Appendix B: Linksys Quickvpn For Windows 2000, Xp, Or Vista

    Appendix B Linksys QuickVPN for Windows 2000, XP, or Vista Appendix B: Linksys QuickVPN Instructions Linksys QuickVPN for This appendix has two sections. The first section explains how to do the following for each QuickVPN client, using Windows 2000, XP, or Vista the Router’s web-based utility: Export a client certificate.
  • Page 66: Add Vpn Client Users

    Appendix B Linksys QuickVPN for Windows 2000, XP, or Vista VPN tab. In the Router’s web-based utility, click the For the Change Password Allowed setting, select Yes to allow the user to change his or her password. Click the VPN Client Access tab. Otherwise, keep the default, No.
  • Page 67: Download From The Internet

    Appendix B Linksys QuickVPN for Windows 2000, XP, or Vista Copying Files Copying Files Installation Complete Installation Complete Finish to complete the installation. Proceed to Finish to complete the installation. Proceed to Click Click the section, “Install the Client Certificate”. the section, “Install the Client Certificate”.
  • Page 68: Version Number Of Linksys Quickvpn

    Appendix B Linksys QuickVPN for Windows 2000, XP, or Vista Password To terminate the VPN tunnel, click Disconnect. To Enter the Password assigned to you. • change your password, click Change Password. For Server Address Enter the IP address or domain name •...
  • Page 69: Appendix C: Gateway-To-Gateway Vpn Tunnel

    Appendix C Gateway-to-Gateway VPN Tunnel Appendix C: Configuration of the RVL200 Gateway-to-Gateway VPN Follow these instructions for the first VPN Router, designated RVL200. The other VPN Router is designated Tunnel the RV042. Launch the web browser for a networked computer, designated PC 1.
  • Page 70: Configuration Of The Rv042

    Appendix C Gateway-to-Gateway VPN Tunnel IP Only. In the Preshared Key field, enter a string for this key, for For the Remote Security Gateway Type, select example, 13572468. Enter the RVL200’s WAN IP address in the IP Address field. For the Remote Security Group Type, select Subnet.
  • Page 71: Configuration When The Remote Gateway Uses A Dynamic Ip Address

    Appendix C Gateway-to-Gateway VPN Tunnel Configuration when the Remote Gateway Uses a Dynamic IP Address This example assumes the Remote Gateway is using a dynamic IP address. If the Remote Gateway uses a static IP address, refer to “Configuration when the Remote Gateway Uses a Static IP Address.
  • Page 72: Configuration Of Pc 1 And Pc 2

    Appendix C Gateway-to-Gateway VPN Tunnel Configuration when Both Gateways Use Enable. Select For the Local Security Gateway Type, select IP Only. Dynamic IP Addresses The WAN IP address (B.B.B.B) of the RV042 will be automatically detected. This example assumes both Gateways are using dynamic IP addresses.
  • Page 73: Configuration Of The Rv042

    Appendix C Gateway-to-Gateway VPN Tunnel Enable. Select For the Local Security Gateway Type, select IP Only. The WAN IP address (B.B.B.B) of the RV042 will be automatically detected. For the Local Security Group Type, select Subnet. Enter the RV042’s local network settings in the IP Address and Subnet Mask fields.
  • Page 74: Appendix D: Ipsec Nat Traversal

    Appendix D IPSec NAT Traversal Appendix D: Configuration of Scenario 1 IPSec NAT Traversal In this scenario, Router A is the RVL200 Initiator, while Router B is the RVL200 Responder. Overview Network Address Translation (NAT) traversal is a technique developed so that data protected by IPSec can pass through a NAT.
  • Page 75: Configuration Of Router B

    Appendix D IPSec NAT Traversal IP Only. For the Local Security Group Type, select Subnet. Enter For the Local Security Gateway Type, select The WAN IP address of Router A will be automatically Router B’s local network settings in the IP Address and detected.
  • Page 76: Configuration Of Scenario 2

    Appendix D IPSec NAT Traversal Configuration of the One-to-One NAT Rules Configuration of Scenario 2 The one-to-one NAT rules must be configured on In this scenario, Router B is the RVL200 Initiator, while NAT 2 - RV042 and NAT 1 - RVO42. Router A is the RVL200 Responder.
  • Page 77: Configuration Of Router B

    Appendix D IPSec NAT Traversal One-to-One NAT tab. Subnet. Click the For the Remote Security Group Type, select Enter Router A’s local network settings in the IP Address For the One-to-One NAT setting, select Enable. and Subnet Mask fields. In the Private Range Begin field, enter 111.11.
  • Page 78 Appendix D IPSec NAT Traversal Subnet. For the Remote Security Group Type, select Enter Router B’s local network settings in the IP Address and Subnet Mask fields. In the IPSec Setup section, select the appropriate encryption, authentication, and other key management settings.
  • Page 79: Appendix E: Bandwidth Management

    Appendix E Bandwidth Management Appendix E: Bandwidth Management Overview This appendix explains how to ensure Quality of Service (QoS) on Vonage Voice over Internet Protocol (VoIP) phone service. This example uses Vonage; however, similar instructions will apply to other VoIP services. Creation of New Services Create services,...
  • Page 80: Creation Of New Bandwidth Management Rules

    Appendix E Bandwidth Management Creation of New Bandwidth Management Enable to enable this rule. Select After you have set up the rule, click Add to list. Rules Set up a rule for Vonage 2. Select Vonage 2 from the Create four new rules: Vonage VoIP (Upstream), Vonage Service drop-down menu.
  • Page 81: Appendix F: Firmware Upgrade

    Appendix F Firmware Upgrade Appendix F: lick Firmware In the Firmware Download section, c Download from Linksys Web Site. Firmware Upgrade Overview This appendix explains how to upgrade the firmware of the Router. How to Access the Web-Based Utility For local access of the Router’s web-based utility, launch your web browser, and enter the Router’s default IP address, 192.168.1.1, in the Address field.
  • Page 82 Appendix F Firmware Upgrade The utility zip file will automatically open. Extract .exe file to an appropriate location on your computer. .exe file. Double-click the In the Router IP field, enter the IP address of the Router. Firmware Upgrade Utility Login In the Password field, enter the password for access to the Router.
  • Page 83: Appendix G: Trend Micro Protectlink Gateway Service

    Appendix G Trend Micro ProtectLink Gateway Service Appendix G: How to Purchase, Register, or Activate the Service Trend Micro ProtectLink You can purchase, register, or activate the service using Gateway Service the System Summary or ProtectLink screen. System Summary Overview The optional Trend Micro ProtectLink Gateway service provides security for your network.
  • Page 84: Protectlink

    Appendix G Trend Micro ProtectLink Gateway Service NOTE: To have your e-mail checked, you will need to provide the domain name and IP address of your e-mail server. If you do not know this information, contact your ISP. Activate If you have registered, click Activate. A wizard begins.
  • Page 85: Protectlink > Web Protection

    Appendix G Trend Micro ProtectLink Gateway Service ProtectLink > Web Protection the sub-categories for each category. Then select the appropriate Filtering option: The Web Protection features are provided by the Router. Business Hours To filter this URL category during the Configure the website filtering settings on this screen.
  • Page 86: Protectlink > Email Protection

    Appendix G Trend Micro ProtectLink Gateway Service IP addresses/range https://us.imhs.trendmicro.com/linksys Enter the appropriate IP addresses or ranges. Separate multiple URLs with semicolons (“;”). e-mail protection, click this link. You will be redirected to For a range of IP addresses, use a hyphen (“-”). Example: the Trend Micro ProtectLink Gateway website.
  • Page 87 Appendix G Trend Micro ProtectLink Gateway Service Platform The platform type, Gateway Service, is automatically displayed. License expires on The date and time your license expires are displayed. Renew To renew your license, click Renew. Then follow the on-screen instructions. Add Seats Each seat allows an e-mail account to use Email Protection.
  • Page 88: Appendix H: Specifications

    Appendix H Specifications Appendix H: Rate Control Upstream/Downstream Bandwidth can be Configured per Service Specifications Priority Each Service can be Mapped to One of the 3 Priority Levels Specifications IPSec 50 IPSec Tunnels for Branch Office Model RV042 Connectivity Standards IEEE 802.3, 802.3u QuickVPN 50 QuickVPN Users for Remote...
  • Page 89: Appendix I: Warranty Information

    Appendix I Warranty Information Appendix I: service offerings. This limited warranty shall not apply to such third party software or service offerings. This limited Warranty Information warranty does not guarantee any continued availability of a third party’s service for which this product’s use or operation may require.
  • Page 90: Technical Support

    Appendix I Warranty Information original purchase when returning your product. Products received without a RMA number and dated proof of original purchase will be rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge.
  • Page 91: Appendix J: Software License Agreement

    Software in Linksys Products: K.K. (“LINKSYS”) LICENSING THE SOFTWARE INSTEAD OF CISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLING This product from Cisco-Linksys LLC or from one of its THE SOFTWARE, OR USING THE PRODUCT CONTAINING affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco- THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY Linksys K.K.
  • Page 92: End Of Schedule 1

    Appendix J Software License Agreement and process information about your Linksys product Disclaimer of Liabilities. IN NO EVENT WILL LINKSYS OR and/or the Software and/or your use of either in order ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA, REVENUE (i) to enable Linksys to offer you Upgrades;...
  • Page 93 Appendix J Software License Agreement Everyone is permitted to copy and distribute verbatim TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND copies of this license document, but changing it is not MODIFICATION allowed. 0. This License applies to any program or other work Preamble which contains a notice placed by the copyright holder saying it may be distributed under the terms...
  • Page 94 Appendix J Software License Agreement a notice that there is no warranty (or else, saying in object code or executable form with such an that you provide a warranty) and that users may offer, in accord with Subsection b above.) redistribute the program under these conditions, The source code for a work means the preferred form and telling the user how to view a copy of...
  • Page 95: End Of Schedule 2

    Appendix J Software License Agreement that contradict the conditions of this License, they do may choose any version ever published by the Free not excuse you from the conditions of this License. If Software Foundation. you cannot distribute so as to satisfy simultaneously If you wish to incorporate parts of the Program into your obligations under this License and any other other free programs whose distribution conditions are...
  • Page 96: Openssl License

    Appendix J Software License Agreement The OpenSSL toolkit stays under a dual license, i.e. both OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF the conditions of the OpenSSL License and the original THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SSLeay license apply to the toolkit.
  • Page 97: End Of Schedule 3

    Appendix J Software License Agreement If you include any Windows specific code (or a derivative thereof ) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@cryptsoft.com)” THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS’’ AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR...
  • Page 98: Appendix K: Regulatory Information

    Appendix K Regulatory Information Appendix K: Industry Canada Statement Regulatory Information This Class B digital apparatus complies with Canadian ICES-003. Operation is subject to the following two conditions: FCC Statement This device may not cause interference and This product has been tested and complies with the This device must accept any interference, including specifications for a Class B digital device, pursuant to Part interference that may cause undesired operation of...
  • Page 99: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    Appendix K Regulatory Information User Information for Consumer Products Ceština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno Waste Electric and Electronic Equipment s netříděným komunálním odpadem.
  • Page 100 Appendix K Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 101 Appendix K Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 102 Appendix K Regulatory Information Português (Portuguese) - Informação ambiental para Slovenčina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/EC prepoveduje odlaganje opreme, que exibe este símbolo no produto e/ou na sua embalagem označene s tem simbolom –...
  • Page 103: Appendix L: Contact Information

    Appendix L Contact Information Appendix L: Contact Information Linksys Contact Information Website http://www.linksys.com Support Site http://www.linksys.com/support FTP Site ftp.linksys.com Advice Line 800-546-5797 (LINKSYS) Support 800-326-7114 RMA (Return Merchandise http://www.linksys.com/warranty Authorization) NOTE: Details on warranty and RMA issues can be found in the Warranty section of this Guide. 8061710C-JL 10/100 4-Port VPN Router...

This manual is also suitable for:

Profile series

Table of Contents