Linksys BEFVP41 manual Chapter Introduction, Introduction to VPNs, VPN Examples

Page 5

Chapter 1

Introduction

Chapter 1:

Introduction

Thank you for choosing the Linksys by Cisco EtherFast Cable/DSL VPN Router with 4-Port Switch. The Router lets you access the Internet through its four switched ports. You can also use the Router to share resources such as computers, printers and files. A variety of security features help to protect your data and your privacy while online. Security features include Virtual Private Network (VPN) technology and a Stateful Packet Inspection (SPI) firewall. Configuring the Router is easy using the provided browserbased utility.

Introduction to VPNs

A VPN is a connection between two endpoints—a VPN Router, for instance—in different networks that allows private data to be sent securely over a shared or public network, such as the Internet. This establishes a private network that can send data securely between these two locations or networks.

The private network is established by creating a “tunnel”. A VPN tunnel connects the two computers or networks and allows data to be transmitted over the Internet as if it were still within those networks. A VPN tunnel uses industrystandard encryption and authentication techniques to secure the data sent between the two networks.

Virtual Private Networking was created as a cost-effective alternative to using a private, dedicated, leased line for a private network. It can be used to create secure networks linking a central office with branch offices, telecommuters, and/or professionals on the road.

There are two basic ways to create a VPN connection:

•• VPN Router to VPN Router

•• computer (using VPN client software) to VPN Router

The VPN Router creates a“tunnel”or channel between two endpoints, so that data transmissions between them are secure. A computer with VPN client software can be one of the two endpoints.

For an Internet Protocol Security (IPSec) VPN tunnel, the VPN Router and any computer with the built-in IPSec Security Manager (Windows 2000 and XP) can create a VPN tunnel using IPSec (Windows Vista uses a similar utility). Other Windows operating systems require additional, third-party VPN client software applications that support IPSec to be installed.

VPN Examples

The following are examples of a VPN tunnel between two VPN routers and a VPN tunnel between a computer using VPN client software and a VPN router.

VPN Router to VPN Router

For example, at home, a telecommuter uses his VPN Router for his always-on Internet connection. His Router is configured with his office’s VPN settings. When he connects to his office’s router, the two routers create a VPN tunnel, encrypting and decrypting data. As VPNs use the Internet, distance is not a factor. Using the VPN, the telecommuter now has a secure connection to the central office’s network, as if he were physically connected.

Home

Internet

VPN Router

Central Office

VPN Router

VPN Router to VPN Router

Computer (using VPN client software) to VPN Router

The following is an example of a computer-to-VPN Router VPN. In her hotel room, a traveling businesswoman connects to her Internet Service Provider (ISP). Her notebook computer has VPN client software that is configured with her office’s VPN settings. She accesses the VPN client software and connects to the VPN Router at the central office. As VPNs use the Internet, distance is not a factor. Using the VPN, the businesswoman now has a secure connection to the central office’s network, as if she were physically connected.

EtherFast Cable/DSL VPN Router with 4-Port Switch

1

Image 5
Contents EtherFast Cable/DSL VPN Router with 4-Port Switch Icon Descriptions About This GuideOnline Resources Copyright and TrademarksTable of Contents Appendix F Software License Agreement Chapter Introduction Computer using VPN client software to VPN RouterIntroduction to VPNs VPN ExamplesVPN Security Back Panel Chapter Product OverviewFront Panel How to Access the Web-Based Utility Chapter Advanced ConfigurationSetup Basic Setup Internet SetupPPPoE Static IPHeart Beat Signal Optional Settings and MTUNetwork Setup Setup DdnsSetup Advanced Routing Setup MAC Address CloneMAC Clone Advanced RoutingSecurity VPN Security FirewallFirewall VPN PassthroughRemote Security Gateway VPN TunnelLocal Secure Group and Remote Secure Group Key Management Advanced SettingStatus Auto IKEPhase Access RestrictionsOther Settings ProposalTo create an Internet Access policy Internet AccessApplications and Gaming Port Range Forwarding Port Range ForwardingPort Triggering Applications & Gaming Port TriggeringUPnP Forwarding Triggered RangeApplications and Gaming DMZ Administration ManagementGateway Password Administration LogUPnP LogAdministration Factory Defaults Administration DiagnosticsFactory Defaults Ping TestStatus Local Network Administration Firmware UpgradeStatus Gateway Dhcp Client Table Local NetworkYour computer cannot connect to the Internet Appendix a TroubleshootingInstructions Appendix B VPN TunnelOverview BEFVP41 Appendix C SpecificationsExclusions and Limitations Limited WarrantyObtaining Warranty Service Technical Support FCC Statement Safety NoticesIndustry Canada Statement Avis d’Industrie CanadaDansk Danish Miljøinformation for kunder i EU Regulatory Information Norsk Norwegian Miljøinformasjon for kunder i EU Regulatory Information Schedule 1 Linksys Software License Agreement Software in Linksys ProductsSoftware Licenses Preamble ScheduleSoftware License Agreement Software License Agreement No Warranty GNU Lesser General Public License Software License Agreement Software License Agreement Software License Agreement No Warranty Original SSLeay License OpenSSL License8112021NC-JL

BEFVP41 specifications

The Linksys BEFVP41 is a sophisticated yet user-friendly VPN router designed primarily for small office and home office networks. Known for its robust performance and versatility, it stands out as a solid choice for users looking to enhance their network security and connectivity.

One of its key features is the built-in VPN support, which allows users to establish secure connections to remote networks or clients. The BEFVP41 supports up to 50 simultaneous VPN connections, making it an excellent option for small businesses that require secure remote access for their employees without compromising on speed or reliability.

The router employs advanced security protocols including IPsec, which is well-known for ensuring encrypted communication over the internet. This level of security enables users to safeguard sensitive data and maintain privacy while accessing their networks remotely, critical for businesses that handle confidential information.

In terms of connectivity, the BEFVP41 is equipped with four Ethernet ports that support 10/100 Mbps speeds, allowing for high-speed wired connections. It also features a WAN port for connection to a broadband modem, ensuring a fast and stable internet connection. The router supports various connection types, including DHCP, static IP, and PPPoE, making it versatile for different networking environments.

Additional features include a user-friendly web-based interface, which simplifies the setup and configuration process for users. This intuitive design is combined with powerful QoS (Quality of Service) capabilities, enabling prioritized bandwidth allocation to specific applications or users, ensuring that critical business applications have the necessary speeds and reliability.

The BEFVP41 also offers dynamic DNS support, which allows users to access their home or office network using a domain name instead of remembering an IP address. Moreover, it includes a DHCP server for automated IP address assignment, making network management more streamlined.

Overall, the Linksys BEFVP41 combines essential networking technologies and security features into a compact design suitable for any small business or home office environment. With its robust performance, extensive VPN capabilities, and user-friendly interface, it caters effectively to the diverse needs of modern network requirements. The BEFVP41 is a reliable solution for those looking to enhance their connectivity while maintaining security and ease of use.