Cisco Systems RV042RF manual Setup One-to-One NAT, Setup MAC Clone, Add Range

Page 23

Chapter 4

Advanced Configuration

If you want to modify a service you have created, select it and click Update this service. Make changes. Click Save Settings to save your changes, or click Cancel Changes to undo them. Click Exit to return to the UPnP screen.

If you want to delete a service you have created, select it and click Delete selected service. Click Save Settings to save your changes, or click Cancel Changes to undo them. Click Exit to return to the UPnP screen.

On the UPnP screen, click Add to List, and configure as many entries as you would like, up to a maximum of 30. To delete an entry, select it and click Delete selected application.

Click Show Tables to see the details of your entries. The UPnP Forwarding Table List appears.

UPnP Forwarding Table List

Click Refresh to update the on-screen information. Click Close to exit this screen and return to the UPnP screen.

On the UPnP screen, click Save Settings to save your changes, or click Cancel Changes to undo them.

Setup > One-to-One NAT

One-to-One NAT (Network Address Translation) creates a relationship that maps valid external IP addresses to internal IP addresses hidden by NAT. A device with an internal IP address may be accessed at the corresponding external valid IP address.

To create this relationship, define internal and external IP address ranges of equal length. Once the relationship is defined, the device with the first internal IP address is accessible at the first IP address in the external IP address range, and so forth.

For example, you have a Local Area Network (LAN) for which the ISP has assigned the IP address range of 209.19.28.16 to 209.19.28.31, with 209.19.28.16 used as the Wide Area Network (WAN) or NAT public IP address of the Router. The address range of 192.168.168.1 to 192.168.168.255 is used for the devices on the LAN. With One-to-One NAT, the devices with the internal IP addresses of 192.168.168.2 to 192.168.168.15 may be accessed at the corresponding external IP addresses.

NOTE: The Router’s WAN IP address should not be included in the range you specify.

Setup > One-to-One NAT

One-to-One NAT

One-to-One NAT  Select Enable to use the One-to-One NAT function.

Add Range

Private Range Begin  Enter the starting IP address of the internal IP address range. This is the IP address of the first device that can be accessed from the Internet.

Public Range Begin  Enter the starting IP address of the public IP address range. This IP address is provided by the ISP. (Do not include the Router’s WAN IP Address.)

Range Length  Enter the number of IP addresses in the range. The range length cannot exceed the number of valid IP addresses. To map a single address, enter 1.

Click Add to List, and configure as many entries as you would like, up to a maximum of ten. To delete an entry, select it and click Delete selected range.

NOTE: One-to-One NAT affects how the firewall functions work. Access to LAN devices from the Internet is allowed unless additional Deny access rules are configured on the Firewall > Access Rules screen.

Click Save Settings to save your changes, or click Cancel Changes to undo them.

Setup > MAC Clone

Some ISPs require that you register a MAC address, which is a 12-digit code assigned to a unique piece of hardware for identification. The MAC Clone feature “clones” your network adapter’s MAC address onto the Router, so you don’t have to call your ISP to change the registered MAC address to the Router’s MAC address.

10/100 4-Port VPN Router

16

Image 23
Contents 10/100 4-Port VPN Router Online Resources About This GuideAbout This Guide Icon DescriptionsTable of Contents Ddns Appendix B Linksys QuickVPN for Windows 2000, XP, or Vista Appendix a TroubleshootingAppendix D IPSec NAT Traversal Appendix F Firmware UpgradeAppendix H Specifications Appendix G Trend Micro ProtectLink Gateway ServiceAppendix L Contact Information Appendix I Warranty InformationAppendix K Regulatory Information Introduction ChapterChapter Introduction Computer using VPN client software to VPN Router Product Overview Chapter Product OverviewCable Connections Chapter InstallationInstallation Physical InstallationInstallation Overview Chapter Advanced ConfigurationAdvanced Configuration How to Access the Web-Based UtilityTrend Micro ProtectLink Gateway ConfigurationSystem Information Port StatisticsLog Setting Status Network Setting StatusFirewall Setting Status VPN Setting StatusNetwork Setup Tab NetworkLAN Setting WAN Connection Type Dual-WAN/DMZ SettingPptp Point-to-Point Tunneling Protocol PPPoE Point-to-Point Protocol over EthernetHeart Beat Signal Setup PasswordTime Setup TimeSetup DMZ Host PasswordPort Triggering Setup Tab ForwardingForwarding Port Range ForwardingUPnP Setup UPnPAdd Range Setup One-to-One NATSetup MAC Clone One-to-One NATDynDNS.org Setup DdnsMAC Clone WAN1/2Oray.net PeanutHull Ddns Setup Advanced RoutingAdvanced Routing Dynamic RoutingStatic Routing Dhcp SetupStatic IP SetupDynamic IP Dual-WAN Smart Link BackupDhcp Status StatusLoad Balance Network Service DetectionProtocol Binding System Management Bandwidth ManagementBandwidth WAN1/2 Rate Control Bandwidth ManagementMaximum Bandwidth provided by ISP Bandwidth Management TypePriority System Management SnmpPing System Management DiagnosticDiagnostic DNS Name LookupFirmware Download Factory DefaultFirmware Upgrade System Management RestartBasic Per Port Config Port Management Port SetupImport Configuration File Export Configuration FileGeneral Port Management Port StatusFirewall General Port StatusRestrict WEB Features Firewall Access RulesServices Access RulesAdd a New Access Rule Scheduling Firewall Content FilterSummary Content FilterProtectLink VPN SummaryClient to Gateway GroupVPN StatusGateway to Gateway VPN Clients Status Local Group SetupVPN Gateway to Gateway Add a New TunnelLocal Security Group Type Remote Security Gateway Type Remote Group SetupRemote Security Group Type IPSec SetupIKE with Preshared Key Keying Mode Manual Advanced VPN Client to GatewayTunnel No The tunnel number is automatically generated TunnelRemote Client Remote Client SetupGroup VPN Default is Domain NameFQDN Keying Mode Manual Tunnel Only VPN VPN Client Access Certificate Management VPN Client AccessVPN VPN Pass Through VPN Client UsersPptp Server VPN Pptp ServerLog System Log VPN Pass ThroughMail Log SettingSystem Log SyslogLog System Statistics Wizard Basic SetupObtain an IP automatically Minutes PPPoEAccess Rule Setup Select the Log Rule Linksys Web Site SupportLogout ManualAppendix a Appendix a TroubleshootingTroubleshooting Windows 2000, XP, or Vista Appendix BAppendix B Linksys QuickVPN forClick Add to list Click Save Settings Linksys QuickVPN Client Installation and ConfigurationInstall from the CD-ROM Click the VPN Client Access tabLinksys QuickVPN Connection Install the Client CertificateClick Business Click Router/VPN Solutions Download from the InternetVersion Number of Linksys QuickVPN Confirm New Password Re-enter your new passwordBefore You Begin Configuration of the RVL200Appendix C Appendix C Gateway-to-Gateway VPN TunnelConfiguration of PC 1 and PC Configuration of the RV042RV042 RVL200 Dynamic IP B.B.B.B with Configuration when Both Gateways Use Dynamic IP Addresses Appendix C Appendix D IPSec NAT Traversal Configuration of ScenarioConfiguration of Router a Appendix DIPSec NAT Traversal Configuration of Router BClick the One-to-One NAT tab One-to-One NAT Rule on NAT 2 RV042One-to-One NAT Rule on NAT 1 RV042 Configuration of Router a Appendix D Bandwidth Management Creation of New ServicesAppendix E Appendix E Bandwidth ManagementCreation of New Bandwidth Management Rules Alternative Firmware Upgrade Option Appendix F Firmware UpgradeFirmware Upgrade Upgrade the FirmwareFirmware Upgrade System Summary Appendix G Trend Micro ProtectLink Gateway ServiceHow to Purchase, Register, or Activate the Service Appendix GProtectLink How to Use the ServiceWeb Protection ProtectLink Web ProtectionLicense ProtectLink Email ProtectionProtectLink License Email ProtectionAppendix G Appendix H Appendix H SpecificationsSpecifications Exclusions and Limitations Warranty InformationObtaining Warranty Service AppendixTechnical Support Warranty InformationSoftware Licenses Appendix JAppendix J Software License Agreement Software in Linksys ProductsSoftware License Agreement SchedulePreamble Appendix J END of Terms and Conditions Original SSLeay License OpenSSL LicenseAppendix J Regulatory Information Appendix KDansk Danish Miljøinformation for kunder i EU Appendix K Norsk Norwegian Miljøinformasjon for kunder i EU Appendix K Contact Information Appendix L