Linksys WRV200 manual Administration Log, UPnP, Backup and Restore

Page 32

Chapter 5

Configuring the Wireless-G Router

SNMP

SNMP, Simple Network Management Protocol, is a network protocol that provides network administrators with the ability to monitor the status of the Router and receive notification of any critical events as they occur on the network.

To enable SNMP, check the Enabled box. To configure SNMP, complete all fields on this screen. To disable the SNMP agent, remove the checkmark.

Contact  Enter the name of the network administrator for the Router, as well as a contact number or e-mail address.

Device Name  Enter the name of the Router.

Location  Enter the location of the Router. For example, you could include the name of the building, floor number, and room location, such as Head Office - Floor 5 - Networking 3.

Get Community  Enter the password that allows read- only access to the Router’s SNMP information. The default name is public.

Set Community  Enter the password that allows read/ write access to the Router’s SNMP information. The default name is private. A name must be entered in this field.

SNMP Trap-Community  Enter the password required by the remote host computer that will receive trap messages or notices sent by the Router.

SNMPTrusted Host  You can restrict access to the Router’s SNMP information by IP address. Enter the IP address in the SNMP Trusted Host field. If this field is left blank, then access is permitted from any IP address.

SNMP Trap-Destination  Enter

the

IP address

of

the remote host computer that

will

receive the

trap

messages.

 

 

 

UPnP

Universal Plug and Play (UPnP) allows Windows XP and Windows 2000 to automatically configure the Router for various Internet applications, such as gaming and videoconferencing. To enable UPnP, check the Enabled box.

Backup and Restore

Backup Configurations  To back up the Router’s configuration, click this button and follow the on-screen instructions.

Restore Configurations  To restore the Router’s configuration, click this button and follow the on-screen instructions. (You must have previously backed up the Router’s configuration.)

When you have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to undo your changes. For help information, click More.

Administration > Log

The Administration > Log screen provides you with options for email alerts and a log of all incoming and outgoing URLs or IP addresses for your Internet connection.

Administration > Log

E-Mail Alert  To enable the Router to send email alerts in the event of Denial of Service attacks and the like, select Enabled. If you do not wish to have email alerts, select Disabled. The router will send out e-mail logs to a specific e-mail address.

Mail From  Enter the e-mail address so that the receiver can know where the mail is from.

Recipient To  Enter the e-mail address where you want the alerts to be sent.

Event Types  There are ACL, DoS, URL Detect and New Connection event types for E-Mail Alert. You can select some of them to enable those event alerts.

System Log  You may keep a log of the router’s activities. This requires the installation of an external log viewer. To enable System Log, click Enabled.

Logviewer IP Address  Enter the address where you want the system log to be sent.

Event Types  There are System, ACL, DoS, URL Detect and New Connection event types for System Log. You can select some of them to enable those event logs.

When you have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to undo your changes. For help information, click More.

Wireless-G VPN Router with RangeBooster

27

Image 32
Contents Wireless-G VPN Router with RangeBooster About This Guide About This GuideTable of Contents Appendix a Troubleshooting Appendix B Wireless Security ChecklistAppendix J Contact Information Appendix E Gateway-to-Gateway VPN TunnelAppendix I Regulatory Information Chapter IntroductionChapter Planning Your Wireless Network Ad-Hoc versus Infrastructure ModeNetwork Topology Network LayoutChapter Planning Your Virtual Private Network VPN Why do I need a VPN?What is a VPN? Computer using the Linksys VPN client software to VPN Router VPN Router to VPN RouterChapter Product Overview Product OverviewFront Panel Back PanelChapter Configuring the Wireless-G VPN Router OverviewHow to Access the Web-based Utility SetupSetup Basic Settings Internet SetupPptp Optional Settings Required by some ISPs LAN SetupTime Settings Setup VlanSetup Ddns Setup MAC Address Clone DdnsStatic Routing Setup Advanced RoutingDynamic Routing Wireless Wireless Basic Wireless SettingsWireless Wireless Security Wireless Network ModeWPA2 Enterprise WPA2 PersonalWPA Enterprise WPA2 Personal Mixed WPA2 Enterprise MixedWireless Wireless Network Access Wireless Network AccessAdvanced Wireless Settings Wireless Advanced Wireless SettingsWireless WDS Firewall Firewall GeneralFirewall Port Forwarding Internet BlockFirewall Port Triggering Firewall DMZFirewall URL Filtering Firewall Access RestrictionVPN VPN Client Access Certificate Management VPN VPN PassthroughVPN Client List Table Remote Secure Group VPN IPSec VPNLocal Secure Group Tunnel Options Remote Secure GatewayKey Management VPN VPN Summary QoS QoS Application-Based QoSQoS Port-Based QoS Priority QueueAdministration Administration ManagementAdmin Password Local Router AccessUPnP Administration LogBackup and Restore Administration Diagnostics Administration Factory DefaultAdministration Firmware Upgrade Ping TestAdministration Reboot StatusStatus Router InformationStatus Wireless Status Local NetworkStatus System Performance Local NetworkVPN Summary Status VPN ClientsSystem Performance Appendix a Troubleshooting TroubleshootingAppendix a WindowsTroubleshooting Need to set up a server behind my Router Click Save Settings Go to the Firewall DMZ tabGo to the Setup Basic Setup tab Click the Firewall Port Triggering tabFrequently Asked Questions WRV200 does not support NetBIOS Broadcast overIs the Router cross-platform compatible? Appendix B Wireless Security Checklist Wireless Security ChecklistAppendix B General Network Security GuidelinesInstalling from the CD-ROM Appendix CAppendix C Overview Before You BeginUsing the Linksys QuickVPN Software Version Number of the QuickVPN Client\Program Files\Linksys\QuickVPN Client\ Select VPN, then VPN Client AccessDistributing Certificates to QuickVPN Users Appendix D IntroductionEnvironment Create an IPSec PolicyFilter List 2 router win Configure Individual Tunnel Rules Tunnel 1 win-RouterTunnel 2 Router-win Rules Tab Your tunnel should now be established Assign New IPSec PolicyCreate a Tunnel Through the Web-Based Utility Configuration of the WRV200 Appendix EAppendix E Gateway-to-Gateway VPN Tunnel Click IPSec VPNClick the Gateway to Gateway tab Configuration of the RV082Configuration of PC 1 and PC RV082 WRV200 Dynamic IP B.B.B.B with Configuration when Both Gateways Use Dynamic IP Addresses RV082 VPN Settings Appendix F Appendix F GlossaryGlossary Http HyperText Transport ProtocolGlossary Smtp Simple Mail Transfer Protocol The standard eAppendix F Appendix G Appendix G SpecificationsSpecifications Specifications Warranty Information Obtaining Warranty ServiceAppendix H Exclusions and LimitationsWarranty Information Technical SupportAppendix Regulatory InformationWireless Disclaimer Avis d’Industrie CanadaDansk Danish Miljøinformation for kunder i EU Appendix Norsk Norwegian Miljøinformasjon for kunder i EU Appendix Appendix J Contact Information
Related manuals
Manual 2 pages 11.27 Kb