Linksys RV042 manual Firewall Content Filter, Scheduling

Page 39

Chapter 4

Advanced Configuration

Service Management

Service Name  Enter a name.

Protocol  Select the protocol it uses. Port Range  Enter its range.

Click Add to List. Click Save Settings to save your changes, or click Cancel Changes to undo them. Click Exit to return to the Add a New Access Rule screen.

If you want to modify a service you have created, select it and click Update this service. Make changes. Click Save Settings to save your changes, or click Cancel Changes to undo them. Click Exit to return to the Add a New Access Rule screen.

If you want to delete a service you have created, select it and click Delete selected service. Click Save Settings to save your changes, or click Cancel Changes to undo them. Click Exit to return to the Add a New Access Rule screen.

Log  The Router can keep a log tracking this type of activity. To keep a log, select Log packets match this access rule. If you do not want a log, select Do Not Log these packets.

NOTE: If the Deny Policies option is enabled on the Log > System Log screen, then the log will not include log events from the Deny access rules on the Firewall > Access Rules screen. Log events from the Deny access rules will be logged separately from Deny Policies if the option, Log packets match this rule, is selected.

If the Allow Policies option is enabled on the Log > System Log screen, then the log will include log events from the Allow access rules on the Firewall > Access Rules screen, regardless of the option, Log packets match this rule.

Source Interface  Select WAN1, WAN2, LAN, or Any.

Source  Select the Source IP address(es) for the access rule. If it can be any IP address, select Any. If it is one IP address, select Single and enter the IP address. If it is a range of IP addresses, select Range, and enter the starting and ending IP addresses in the fields provided.

Destination  Select the Destination IP address(es) for the access rule. If it can be any IP address, select Any. If it is one IP address, select Single and enter the IP address. If it is a range of IP addresses, select Range, and enter the starting and ending IP addresses in the fields provided.

Scheduling

Apply this rule  Decide when you want the access rule to be enforced. To specify days of the week, select 24 Hr, and then select the appropriate days.

To specify specific hours, select from, and enter the specific hours and minutes in 24-hour format. Then select the appropriate days.

The default for any new rule is to always enforce it.

Click Save Settings to save your changes, or click Cancel Changes to undo them. Click Return to return to the Access Rules screen.

Firewall > Content Filter

Use this screen to block specific domains during the designated days and times for specific devices.

Firewall > Content Filter

10/100 4-Port VPN Router

32

Image 39
Contents 10/100 4-Port VPN Router Online Resources About This GuideAbout This Guide Icon DescriptionsTable of Contents Ddns Appendix B Linksys QuickVPN for Windows 2000, XP, or Vista Appendix a TroubleshootingAppendix D IPSec NAT Traversal Appendix F Firmware UpgradeAppendix H Specifications Appendix G Trend Micro ProtectLink Gateway ServiceAppendix I Warranty Information Appendix K Regulatory InformationAppendix L Contact Information Chapter Chapter IntroductionIntroduction Computer using VPN client software to VPN Router Product Overview Chapter Product OverviewCable Connections Chapter InstallationInstallation Physical InstallationInstallation Overview Chapter Advanced ConfigurationAdvanced Configuration How to Access the Web-Based UtilityTrend Micro ProtectLink Gateway ConfigurationSystem Information Port StatisticsLog Setting Status Network Setting StatusFirewall Setting Status VPN Setting StatusSetup Tab Network LAN SettingNetwork WAN Connection Type Dual-WAN/DMZ SettingPptp Point-to-Point Tunneling Protocol PPPoE Point-to-Point Protocol over EthernetHeart Beat Signal Setup PasswordTime Setup TimeSetup DMZ Host PasswordPort Triggering Setup Tab ForwardingForwarding Port Range ForwardingUPnP Setup UPnPAdd Range Setup One-to-One NATSetup MAC Clone One-to-One NATDynDNS.org Setup DdnsMAC Clone WAN1/2Oray.net PeanutHull Ddns Setup Advanced RoutingAdvanced Routing Dynamic RoutingStatic Routing Dhcp SetupSetup Dynamic IPStatic IP Dual-WAN Smart Link BackupDhcp Status StatusLoad Balance Network Service DetectionSystem Management Bandwidth Management Bandwidth WAN1/2Protocol Binding Rate Control Bandwidth ManagementMaximum Bandwidth provided by ISP Bandwidth Management TypePriority System Management SnmpPing System Management DiagnosticDiagnostic DNS Name LookupFirmware Download Factory DefaultFirmware Upgrade System Management RestartBasic Per Port Config Port Management Port SetupImport Configuration File Export Configuration FileGeneral Port Management Port StatusFirewall General Port StatusRestrict WEB Features Firewall Access RulesAccess Rules Add a New Access RuleServices Scheduling Firewall Content FilterSummary Content FilterProtectLink VPN SummaryGroupVPN Status Gateway to GatewayClient to Gateway VPN Clients Status Local Group SetupVPN Gateway to Gateway Add a New TunnelLocal Security Group Type Remote Security Gateway Type Remote Group SetupIPSec Setup IKE with Preshared KeyRemote Security Group Type Keying Mode Manual Advanced VPN Client to GatewayTunnel No The tunnel number is automatically generated TunnelRemote Client Remote Client SetupGroup VPN Default is Domain NameFQDN Keying Mode Manual Tunnel Only VPN VPN Client Access Certificate Management VPN Client AccessVPN VPN Pass Through VPN Client UsersPptp Server VPN Pptp ServerLog System Log VPN Pass ThroughMail Log SettingSystem Log SyslogLog System Statistics Wizard Basic SetupObtain an IP automatically Minutes PPPoEAccess Rule Setup Select the Log Rule Linksys Web Site SupportLogout ManualAppendix a Troubleshooting TroubleshootingAppendix a Windows 2000, XP, or Vista Appendix BAppendix B Linksys QuickVPN forClick Add to list Click Save Settings Linksys QuickVPN Client Installation and ConfigurationInstall from the CD-ROM Click the VPN Client Access tabLinksys QuickVPN Connection Install the Client CertificateClick Business Click Router/VPN Solutions Download from the InternetVersion Number of Linksys QuickVPN Confirm New Password Re-enter your new passwordBefore You Begin Configuration of the RVL200Appendix C Appendix C Gateway-to-Gateway VPN TunnelConfiguration of PC 1 and PC Configuration of the RV042RV042 RVL200 Dynamic IP B.B.B.B with Configuration when Both Gateways Use Dynamic IP Addresses Appendix C Appendix D IPSec NAT Traversal Configuration of ScenarioConfiguration of Router a Appendix DIPSec NAT Traversal Configuration of Router BOne-to-One NAT Rule on NAT 2 RV042 One-to-One NAT Rule on NAT 1 RV042Click the One-to-One NAT tab Configuration of Router a Appendix D Bandwidth Management Creation of New ServicesAppendix E Appendix E Bandwidth ManagementCreation of New Bandwidth Management Rules Alternative Firmware Upgrade Option Appendix F Firmware UpgradeFirmware Upgrade Upgrade the FirmwareFirmware Upgrade System Summary Appendix G Trend Micro ProtectLink Gateway ServiceHow to Purchase, Register, or Activate the Service Appendix GProtectLink How to Use the ServiceWeb Protection ProtectLink Web ProtectionLicense ProtectLink Email ProtectionProtectLink License Email ProtectionAppendix G Appendix H Specifications SpecificationsAppendix H Exclusions and Limitations Warranty InformationObtaining Warranty Service AppendixTechnical Support Warranty InformationSoftware Licenses Appendix JAppendix J Software License Agreement Software in Linksys ProductsSoftware License Agreement SchedulePreamble Appendix J END of Terms and Conditions Original SSLeay License OpenSSL LicenseAppendix J Regulatory Information Appendix KDansk Danish Miljøinformation for kunder i EU Appendix K Norsk Norwegian Miljøinformasjon for kunder i EU Appendix K Contact Information Appendix L
Related manuals
Manual 26 pages 18.43 Kb

RV042 specifications

The Linksys RV042 is a robust and versatile VPN router designed for small to medium-sized businesses, offering a wide array of features that cater to networking demands. Boasting dual WAN ports, the RV042 allows users to have two internet connections, providing load balancing and failover capabilities. This means that the router can automatically switch to a secondary Internet connection if the primary fails, ensuring uninterrupted connectivity crucial for business operations.

A key feature of the RV042 is its support for Virtual Private Networking (VPN). It can accommodate up to 50 VPN tunnels simultaneously, enabling secure remote access for employees who need to connect to the office network from various locations. The router supports both PPTP and L2TP/IPsec protocols, which provide a layer of encryption, ensuring that data remains secure while transmitted over public networks.

In terms of connectivity, the Linksys RV042 is equipped with four Ethernet ports, supporting speeds of up to 1 Gbps through its LAN (Local Area Network) connections. This allows for high-speed data transfer within the office premises, making it suitable for bandwidth-intensive applications such as video conferencing and large file transfers. Additionally, the router features an integrated firewall, which helps protect the network from external threats by filtering incoming and outgoing traffic.

The RV042 also excels in its Quality of Service (QoS) capabilities, which enable users to prioritize traffic for more critical applications. This is particularly beneficial in environments where multiple applications rely on the same bandwidth, allowing businesses to maintain optimal performance for essential tasks.

For businesses looking to manage their network more effectively, the RV042 offers a web-based interface that simplifies configuration and monitoring. The user-friendly dashboard allows administrators to track network usage, configure access controls, and set up security measures easily.

Overall, the Linksys RV042 VPN router stands out for its reliability, security features, dual WAN support, and ease of management. It is an excellent choice for organizations that require a secure, stable, and high-performance networking solution, enabling seamless connectivity and productivity in an increasingly digital business landscape.