Cisco Systems RV042RF manual Chapter Introduction

Page 8

Chapter 1

Chapter 1:

Introduction

Introduction to the Router

Thank you for choosing the Linksys 10/100 4-Port VPN Router. The Router lets multiple computers in your office share an Internet connection. The dual Internet ports let you connect a second Internet line as a backup, or you can use both Internet ports at the same time, allowing the Router to manage bandwidth demands for maximum efficiency.

The Router features a built-in, 4-port, full-duplex, 10/100 Ethernet switch to connect four computers directly, or you can connect more switches to expand your network. For remote connections, up to 50 remote office or traveling users can securely connect to your office network using the Router’s Virtual Private Network (VPN) capability.

Use the browser-based utility to configure settings and run convenient wizards that will help you set up the Router and its access rules.

Introduction to VPNs

A VPN is a connection between two endpoints—a VPN Router, for instance—in different networks that allows private data to be sent securely over a shared or public network, such as the Internet. This establishes a private network that can send data securely between these two locations or networks.

The private network is established by creating a “tunnel”. A VPN tunnel connects the two computers or networks and allows data to be transmitted over the Internet as if it were still within those networks. A VPN tunnel uses industrystandard encryption and authentication techniques to secure the data sent between the two networks.

Virtual Private Networking was created as a cost-effective alternative to using a private, dedicated, leased line for a private network. It can be used to create secure networks linking a central office with branch offices, telecommuters, and/or professionals on the road.

There are two basic ways to create a VPN connection:

•• VPN Router to VPN Router

•• computer (using VPN client software) to VPN Router

The VPN Router creates a“tunnel”or channel between two endpoints, so that data transmissions between them are secure. A computer with VPN client software can be one of the two endpoints.

Introduction

For an IPSec VPN tunnel, the VPN Router and any computer with the built-in IPSec Security Manager (Windows 2000 and XP) can create a VPN tunnel using IPSec (Windows Vista uses a similar utility). Other Windows operating systems require additional, third-party VPN client software applications that support IPSec to be installed.

NOTE: The 10/100 4-Port VPN Router supports IPSec VPN client software, including the Linksys QuickVPN software. (For more information, refer to “Appendix B: Linksys QuickVPN for Windows 2000, XP, or Vista”.)

For a PPTP VPN tunnel, the 10/100 4-Port VPN Router and any computer running Windows 2000 or XP can create a VPN tunnel using PPTP.

VPN Examples

The following are examples of a VPN tunnel between two VPN routers and a VPN tunnel between a computer using VPN client software and a VPN router.

VPN Router to VPN Router

For example, at home, a telecommuter uses his VPN Router for his always-on Internet connection. His Router is configured with his office’s VPN settings. When he connects to his office’s router, the two routers create a VPN tunnel, encrypting and decrypting data. As VPNs use the Internet, distance is not a factor. Using the VPN, the telecommuter now has a secure connection to the central office’s network, as if he were physically connected.

Home

Internet

VPN Router

Central Office

VPN Router

VPN Router to VPN Router

10/100 4-Port VPN Router

1

Image 8
Contents 10/100 4-Port VPN Router About This Guide About This GuideIcon Descriptions Online ResourcesTable of Contents Ddns Appendix a Troubleshooting Appendix B Linksys QuickVPN for Windows 2000, XP, or VistaAppendix F Firmware Upgrade Appendix H SpecificationsAppendix G Trend Micro ProtectLink Gateway Service Appendix D IPSec NAT TraversalAppendix L Contact Information Appendix I Warranty InformationAppendix K Regulatory Information Introduction ChapterChapter Introduction Computer using VPN client software to VPN Router Chapter Product Overview Product OverviewChapter Installation InstallationPhysical Installation Cable ConnectionsInstallation Chapter Advanced Configuration Advanced ConfigurationHow to Access the Web-Based Utility OverviewConfiguration System InformationPort Statistics Trend Micro ProtectLink GatewayNetwork Setting Status Firewall Setting StatusVPN Setting Status Log Setting StatusNetwork Setup Tab NetworkLAN Setting Dual-WAN/DMZ Setting WAN Connection TypePPPoE Point-to-Point Protocol over Ethernet Pptp Point-to-Point Tunneling ProtocolSetup Password Heart Beat SignalSetup Time Setup DMZ HostPassword TimeSetup Tab Forwarding ForwardingPort Range Forwarding Port TriggeringSetup UPnP UPnPSetup One-to-One NAT Setup MAC CloneOne-to-One NAT Add RangeSetup Ddns MAC CloneWAN1/2 DynDNS.orgSetup Advanced Routing Advanced RoutingDynamic Routing Oray.net PeanutHull DdnsDhcp Setup Static RoutingStatic IP SetupDynamic IP Smart Link Backup Dhcp StatusStatus Dual-WANNetwork Service Detection Load BalanceProtocol Binding System Management Bandwidth ManagementBandwidth WAN1/2 Bandwidth Management Maximum Bandwidth provided by ISPBandwidth Management Type Rate ControlSystem Management Snmp PrioritySystem Management Diagnostic DiagnosticDNS Name Lookup PingFactory Default Firmware UpgradeSystem Management Restart Firmware DownloadPort Management Port Setup Import Configuration FileExport Configuration File Basic Per Port ConfigPort Management Port Status Firewall GeneralPort Status GeneralFirewall Access Rules Restrict WEB FeaturesServices Access RulesAdd a New Access Rule Firewall Content Filter SchedulingContent Filter ProtectLinkVPN Summary SummaryClient to Gateway GroupVPN StatusGateway to Gateway Local Group Setup VPN Gateway to GatewayAdd a New Tunnel VPN Clients StatusLocal Security Group Type Remote Group Setup Remote Security Gateway TypeRemote Security Group Type IPSec SetupIKE with Preshared Key Keying Mode Manual VPN Client to Gateway AdvancedTunnel Tunnel No The tunnel number is automatically generatedRemote Client Setup Remote ClientGroup VPN Default is Domain NameFQDN Keying Mode Manual Tunnel Only VPN VPN Client Access VPN Client Access VPN VPN Pass ThroughVPN Client Users Certificate ManagementVPN Pptp Server Log System LogVPN Pass Through Pptp ServerLog Setting System LogSyslog MailLog System Statistics Basic Setup WizardObtain an IP automatically PPPoE MinutesAccess Rule Setup Select the Log Rule Support LogoutManual Linksys Web SiteAppendix a Appendix a TroubleshootingTroubleshooting Appendix B Appendix BLinksys QuickVPN for Windows 2000, XP, or VistaLinksys QuickVPN Client Installation and Configuration Install from the CD-ROMClick the VPN Client Access tab Click Add to list Click Save SettingsInstall the Client Certificate Click Business Click Router/VPN SolutionsDownload from the Internet Linksys QuickVPN ConnectionConfirm New Password Re-enter your new password Version Number of Linksys QuickVPNConfiguration of the RVL200 Appendix CAppendix C Gateway-to-Gateway VPN Tunnel Before You BeginConfiguration of the RV042 Configuration of PC 1 and PCRV042 RVL200 Dynamic IP B.B.B.B with Configuration when Both Gateways Use Dynamic IP Addresses Appendix C Configuration of Scenario Configuration of Router aAppendix D Appendix D IPSec NAT TraversalConfiguration of Router B IPSec NAT TraversalClick the One-to-One NAT tab One-to-One NAT Rule on NAT 2 RV042One-to-One NAT Rule on NAT 1 RV042 Configuration of Router a Appendix D Creation of New Services Appendix EAppendix E Bandwidth Management Bandwidth ManagementCreation of New Bandwidth Management Rules Appendix F Firmware Upgrade Firmware UpgradeUpgrade the Firmware Alternative Firmware Upgrade OptionFirmware Upgrade Appendix G Trend Micro ProtectLink Gateway Service How to Purchase, Register, or Activate the ServiceAppendix G System SummaryHow to Use the Service ProtectLinkProtectLink Web Protection Web ProtectionProtectLink Email Protection ProtectLink LicenseEmail Protection LicenseAppendix G Appendix H Appendix H SpecificationsSpecifications Warranty Information Obtaining Warranty ServiceAppendix Exclusions and LimitationsWarranty Information Technical SupportAppendix J Appendix J Software License AgreementSoftware in Linksys Products Software LicensesSchedule Software License AgreementPreamble Appendix J END of Terms and Conditions OpenSSL License Original SSLeay LicenseAppendix J Appendix K Regulatory InformationDansk Danish Miljøinformation for kunder i EU Appendix K Norsk Norwegian Miljøinformasjon for kunder i EU Appendix K Appendix L Contact Information