Linksys RV082 manual 10/100 8-Port VPN Router

Page 61

10/100 8-Port VPN Router

groups of different prime key lengths. Group 1 is 768 bits, Group 2 is 1,024 bits and Group 5 is 1,536 bits. If network speed is preferred, select Group 1. If network security is preferred, select Group 5.

Phase 1 Encryption: There are two methods of encryption, DES and 3DES. The Encryption method determines the length of the key used to encrypt/decrypt ESP packets. DES is 56-bit encryption and 3DES is 168-bit encryption. Both sides must use the same Encryption method. 3DES is recommended because it is more secure.

Phase 1 Authentication: There are two methods of authentication, MD5 and SHA. The Authentication method determines a method to authenticate the ESP packets. Both sides must use the same Authentication method. MD5 is a one-way hashing algorithm that produces a 128-bit digest.

SHA is a one-way hashing algorithm that produces a 160-bit digest. SHA is recommended because it is more secure, and both sides must use the same Authentication method.

Phase 1 SA Life Time: This field allows you to configure the length of time a VPN tunnel is active in Phase 1. The default value is 28,800 seconds.

Perfect Forward Secrecy: If PFS is enabled, IKE Phase 2 negotiation will generate a new key material for IP traffic encryption and authentication. If PFS is enabled, a hacker using brute force to break encryption keys is not able to obtain other or future IPSec keys.

Phase 2 DH Group: There are three groups of different prime key lengths. Group1 is 768 bits, Group2 is 1,024 bits and Group 5 is 1,536 bits. If network speed is preferred, select Group 1. If network security is preferred, select Group 5. You can choose the different Group with the Phase 1 DH Group you chose. If Perfect Forward Secrecy is disabled, there is no need to setup the Phase 2 DH Group since no new key generated, and the key of Phase 2 will be the same with the key in Phase 1.

Phase 2 Encryption: Phase 2 is used to create one or more IPSec SAs, which are then used to key IPSec sessions. There are two methods of encryption, DES and 3DES. The Encryption method determines the length of the key used to encrypt/decrypt ESP packets. DES is 56-bit encryption and 3DES is 168-bit encryption. Both sides must use the same Encryption method. If users enable the AH Hash Algorithm in Advanced, then it is recommended to select Null to disable encrypting/decrypting ESP packets in Phase 2, but both sides of the tunnel must use the same setting.

Phase 2 Authentication: There are two methods of authentication, MD5 and SHA. The Authentication method determines a method to authenticate the ESP packets. Both sides must use the same Authentication method. MD5 is a one-way hashing algorithm that produces a 128-bit digest. If users enable the AH Hash Algorithm in Advanced, then it is recommended to select Null to disable authenticating ESP packets in Phase 2, but both sides of the tunnel must use the same setting.

Chapter 5: Setting Up and Configuring the Router

52

VPN Tab - Client to Gateway

Image 61
Contents 10/100 8-Port Copyright and Trademarks How to Use this GuideWord definition Table of Contents Appendix B Installing the Linksys VPN Client Appendix a TroubleshootingAppendix D Physical Setup of the Router Appendix E Battery Replacement10/100 8-Port VPN Router VPN Router-to-VPN Router VPN List of Figures21 Setup Tab Advanced Routing 51 VPN tab Client to Gateway Remote Group Setup Figure C-3 MAC Address/Physical Address Welcome IntroductionIP a protocol used to send data over a network Adapter a device that adds network functionality to your PC What’s in this Guide?Introduction What’s in this Guide? An Introduction to LANs Networking BasicsUse of IP Addresses MAC Address Spoofing Why do I need a VPN?What is a VPN? VPN Router-to-VPN Router VPN VPN Router to VPN RouterLAN WAN2 WAN1 Getting to Know the RouterBack Panel Power Overview Connecting the RouterConnect a PC Connection InstructionsSetup Tab Setting Up and Configuring the RouterSystem Summary Tab System Management Tab Dhcp TabDomain a specific name for a network of computers Firewall Tab Port Management TabVPN Tab Log TabSystem Summary Tab How to Access the Web-based UtilitySystem Information Network Setting Status ConfigurationPort Statistics VPN Setting Status Firewall Setting StatusLog Setting Status Dual-WAN / DMZ Setting LAN SettingNetwork WAN Connection TypePPPoE Point-to-Point Protocol over Ethernet most DSL users Static IPPptp Point-to-Point Tunneling Protocol Transparent Bridge Heart Beat SignalSetup Tab Password Setup Tab TimeTime Setup Tab Forwarding Setup Tab DMZ HostPort Triggering Port Range ForwardingSetup Tab One-to-One NAT Setup Tab UPnPSetup Tab Ddns Setup Tab MAC CloneDynamic Routing Setup Tab Advanced RoutingEnter the following data to create a static route entry Static RoutingSetup Dhcp Tab SetupDynamic IP Static IPDhcp Tab Status Network Service DetectionSystem Management Tab Dual-WAN Dual-WANProtocol Binding Bandwidth27 System Management Tab Snmp System Management Tab SnmpDNS Name Lookup System Management Tab DiagnosticPing System Management Tab Firmware Upgrade System Management Tab Factory DefaultFirmware Upgrade Firmware DownloadPort Management Tab Port Setup System Management Tab Setting BackupSystem Management Tab Restart 36 Port Management Tab Port Status Port Management Tab Port StatusFirewall Tab General Restrict WEB features38 Firewall Tab Access Rules Firewall Tab Access RulesServices Add a New Access RuleScheduling Editing an Access Rule Firewall Tab Content FilterForbidden Domains Website Blocking by KeywordsSummary VPN Tab SummaryTunnel Status VPN Clients Status GroupVPN StatusVPN Tab Gateway to Gateway Local Group Setup47 VPN tab Gateway to Gateway Remote Group Setup Remote Group SetupManual IPSec SetupBit a binary digit IKE with Preshared Key automatic Advanced VPN Tab Client to Gateway With Tunnel Enabled49 VPN tab Client to Gateway 51 VPN tab Client to Gateway Remote Group Setup With Group VPN enabled 52 VPN tab Client to Gateway IPSec Setup 10/100 8-Port VPN Router 53 VPN tab Client to Gateway Advanced 54 VPN tab VPN Client Access VPN Tab VPN Client AccessVPN Tab VPN Pass Through Users SettingVPN Tab Pptp Server IP Address RangeLog Tab System Log Log SettingSyslog Mail59 Log tab System Statistics Log Tab System StatisticsWizard Tab Basic Setup62 Basic Setup Wizard Host and Domain Name 65 Access Rule Wizard What is Access Rules Access Rule Setup67 Access Rule Wizard Select the Service 69 Access Rule Wizard Select the Destination Logout Tab Support TabOn Line Manual Linksys Web SiteCommon Problems and Solutions Appendix a TroubleshootingFor Windows 98 and Millennium Need to set a static IP address on a PCFor Windows XP For WindowsFor Windows 98 and Millennium 10/100 8-Port VPN Router Need to set up a server behind my Router Am not able to access the Router’s Web-based Utility SetupTCP Application Start and End Protocol IP Address EnableCan’t get the Internet game, server, or application to work Application Start and End Protocol IP Address EnabledNeed to upgrade the firmware To start over, I need to set the Router to factory defaultFor Microsoft Internet Explorer 5.0 or higher For Netscape 4.7 or higherMy DSL service’s PPPoE is always disconnecting Firmware upgrade failedNeed to use port triggering Where is the Router installed on the network? Frequently Asked QuestionsIs IPSec Passthrough supported by the Router? Does the Router support IPX or AppleTalk?How can I block corrupted FTP downloads? Is the Router cross-platform compatible? What is DMZ Hosting?Which modems are compatible with the Router? How many ports can be simultaneously forwarded?How can I check whether I have static or Dhcp IP addresses? How do I get mIRC to work with the Router?Figure B-2 Linksys VPN Installation Complete Appendix B Installing the Linksys VPN ClientFigure B-3 Linksys QuickVPN Windows 2000 or XP Instructions Windows 98 or Me InstructionsFigure C-3 MAC Address/Physical Address For the Router’s Web-based UtilitySetting up the Router Appendix D Physical Setup of the RouterPlacement of the Router Rack-Mounting the Router10/100 8-Port VPN Router Figure D-3 Wall-Mounting the Router Wall-Mounting the RouterFigure D-4 Wall-Mounting Hardware Replacing a Lithium Battery Appendix E Battery ReplacementAppendix F Upgrading Firmware Figure F-1 Upgrade FirmwareShared Resources Appendix G Windows HelpNetwork Neighborhood/My Network Places Appendix H Glossary 10/100 8-Port VPN Router 10/100 8-Port VPN Router 10/100 8-Port VPN Router Standards Ieee 802.3, 802.3u Ports Appendix I SpecificationsDMZ/Internet Port SPI Firewall, DES and 3DES Encryption for IPSec VPN TunnelLimited Warranty Appendix J Warranty InformationFCC Statement Appendix K Regulatory InformationNeed to contact Linksys? Appendix L Contact InformationInformation section in this Guide

RV082 specifications

The Linksys RV082 is a robust dual WAN VPN router that stands out in the market for small to medium-sized businesses seeking reliable network connectivity and security. Designed to meet the demands of a dynamic business environment, the RV082 offers a host of features that enhance both performance and reliability.

One of the primary attributes of the RV082 is its dual WAN capability. This feature allows businesses to connect to two different internet connections simultaneously, ensuring uninterrupted internet access. In case one connection fails, the router can automatically switch to the other, minimizing downtime and maintaining productivity. This failover capability is essential for businesses that rely heavily on internet connectivity.

The RV082 also boasts impressive VPN support, enabling secure communication between remote users and branch offices. With support for up to 50 simultaneous VPN connections, the router accommodates a growing workforce that may require access to the company’s network from remote locations. This is particularly beneficial for businesses with telecommuting employees or those that operate across multiple locations.

Security is a paramount concern for any business, and the RV082 addresses this with various built-in security features. It utilizes advanced firewall capabilities, including Stateful Packet Inspection (SPI) and Denial of Service (DoS) protection, safeguarding internal networks from external threats. The router also supports strong encryption protocols such as IPSec and PPTP, ensuring that sensitive data transmitted over the VPN remains secure.

Performance-wise, the RV082 includes eight switched LAN ports, allowing numerous devices to connect directly to the network without the need for additional hardware. This feature simplifies network management and helps keep connectivity organized. Furthermore, the router supports Quality of Service (QoS) prioritization, which allows businesses to allocate bandwidth effectively among different applications and users, promoting seamless performance even during high traffic periods.

The user-friendly web-based interface facilitates easy configuration and management, making it accessible for users with varying levels of technical expertise. Additionally, the RV082’s compact design ensures that it can fit into nearly any office environment without taking up too much space.

In summary, the Linksys RV082 is an excellent choice for businesses looking for a dependable and secure networking solution. With its dual WAN capabilities, extensive VPN support, robust security features, and user-friendly management tools, the RV082 successfully meets the challenging needs of modern business networking.