Linksys WRV200 manual Table of Contents

Page 3

Table of Contents

Chapter 1: Introduction

 

 

 

1

Chapter 2: Planning Your Wireless Network

 

 

 

2

Network Topology

. . . .

. .

 

2

Ad-Hoc versus Infrastructure Mode

. . . .

.

.

2

Network Layout

 

 

 

2

Chapter 3: Planning Your Virtual Private Network (VPN)

 

 

 

3

Why do I need a VPN?

 

 

 

3

1) MAC Address Spoofing

. . . .

.

.

3

2) Data Sniffing

. . . .

.

 

. 3

3) Man in the middle attacks

 

 

 

3

What is a VPN?

. . . .

.

 

. 3

VPN Router to VPN Router

. . . .

.

.

4

Computer (using the Linksys VPN client software) to VPN Router . .

. . . .

. .

 

4

Chapter 4: Product Overview

 

 

 

5

Front Panel

 

 

 

5

Back Panel

. . . .

.

 

. 5

Chapter 5: Configuring the Wireless-G VPN Router

 

 

 

6

Overview

 

 

 

6

How to Access the Web-based Utility

. . . .

. .

 

7

Setup

. . . .

.

 

. 7

Setup > Basic Settings

 

 

 

7

Setup > VLAN

. . . .

. .

 

10

Setup > DDNS

 

 

 

10

Setup > MAC Address Clone

 

 

 

11

Setup > Advanced Routing

. . . .

. .

 

12

Wireless

 

 

 

13

Wireless > Basic Wireless Settings

. . . .

.

 

13

Wireless > Wireless Security

. . . .

. .

 

13

Wireless > Wireless Network Access

. . . .

.

.16

Wireless > Advanced Wireless Settings

. . . .

.

 

17

Wireless > WDS

. . . .

.

 

17

Firewall

. . . .

.

.18

Firewall > General

. . . .

. .

 

18

Firewall > Port Forwarding

 

 

 

18

Firewall > Port Triggering

 

 

 

19

Firewall > DMZ

. . . .

.

 

19

Firewall > Access Restriction

 

 

 

20

Firewall > URL Filtering

. . . .

. .

 

20

VPN

. . . .

. .

 

20

VPN > VPN Client Access

. . . .

.

 

20

Wireless-G VPN Router with RangeBooster

Image 3
Contents Wireless-G VPN Router with RangeBooster About This Guide About This GuideTable of Contents Appendix B Wireless Security Checklist Appendix a TroubleshootingAppendix E Gateway-to-Gateway VPN Tunnel Appendix I Regulatory InformationAppendix J Contact Information Introduction ChapterNetwork Layout Chapter Planning Your Wireless NetworkAd-Hoc versus Infrastructure Mode Network TopologyWhy do I need a VPN? What is a VPN?Chapter Planning Your Virtual Private Network VPN VPN Router to VPN Router Computer using the Linksys VPN client software to VPN RouterBack Panel Chapter Product OverviewProduct Overview Front PanelOverview Chapter Configuring the Wireless-G VPN RouterInternet Setup How to Access the Web-based UtilitySetup Setup Basic SettingsPptp LAN Setup Optional Settings Required by some ISPsSetup Vlan Setup DdnsTime Settings Ddns Setup MAC Address CloneSetup Advanced Routing Dynamic RoutingStatic Routing Wireless Network Mode WirelessWireless Basic Wireless Settings Wireless Wireless SecurityWPA2 Personal WPA EnterpriseWPA2 Enterprise WPA2 Enterprise Mixed WPA2 Personal MixedWireless Network Access Wireless Wireless Network AccessWireless Advanced Wireless Settings Wireless WDSAdvanced Wireless Settings Internet Block FirewallFirewall General Firewall Port ForwardingFirewall DMZ Firewall Port TriggeringFirewall Access Restriction VPN VPN Client AccessFirewall URL Filtering VPN VPN Passthrough VPN Client List TableCertificate Management VPN IPSec VPN Local Secure GroupRemote Secure Group Remote Secure Gateway Key ManagementTunnel Options VPN VPN Summary Priority Queue QoSQoS Application-Based QoS QoS Port-Based QoSLocal Router Access AdministrationAdministration Management Admin PasswordAdministration Log Backup and RestoreUPnP Ping Test Administration DiagnosticsAdministration Factory Default Administration Firmware UpgradeInformation Administration RebootStatus Status RouterLocal Network Status WirelessStatus Local Network Status System PerformanceStatus VPN Clients System PerformanceVPN Summary Windows Appendix a TroubleshootingTroubleshooting Appendix aTroubleshooting Need to set up a server behind my Router Go to the Firewall DMZ tab Click Save SettingsClick the Firewall Port Triggering tab Go to the Setup Basic Setup tabWRV200 does not support NetBIOS Broadcast over Frequently Asked QuestionsIs the Router cross-platform compatible? General Network Security Guidelines Appendix B Wireless Security ChecklistWireless Security Checklist Appendix BOverview Before You Begin Installing from the CD-ROMAppendix C Appendix CVersion Number of the QuickVPN Client Using the Linksys QuickVPN SoftwareSelect VPN, then VPN Client Access Distributing Certificates to QuickVPN Users\Program Files\Linksys\QuickVPN Client\ Create an IPSec Policy Appendix DIntroduction EnvironmentFilter List 2 router win Tunnel 1 win-Router Configure Individual Tunnel RulesTunnel 2 Router-win Rules Tab Assign New IPSec Policy Create a Tunnel Through the Web-Based UtilityYour tunnel should now be established Click IPSec VPN Configuration of the WRV200Appendix E Appendix E Gateway-to-Gateway VPN TunnelConfiguration of the RV082 Configuration of PC 1 and PCClick the Gateway to Gateway tab RV082 WRV200 Dynamic IP B.B.B.B with Configuration when Both Gateways Use Dynamic IP Addresses RV082 VPN Settings Http HyperText Transport Protocol Appendix FAppendix F Glossary GlossarySmtp Simple Mail Transfer Protocol The standard e GlossaryAppendix F Appendix G Specifications SpecificationsAppendix G Specifications Exclusions and Limitations Warranty InformationObtaining Warranty Service Appendix HTechnical Support Warranty InformationRegulatory Information AppendixAvis d’Industrie Canada Wireless DisclaimerDansk Danish Miljøinformation for kunder i EU Appendix Norsk Norwegian Miljøinformasjon for kunder i EU Appendix Contact Information Appendix J
Related manuals
Manual 2 pages 11.27 Kb