Wireless-N Gigabit Security Router with VPN

L2TP

Layer 2 Tunneling Protocol (L2TP) is a service that tunnels Point-to-Point Protocol (PPP) across the Internet. It is used mostly in European countries. Check with your ISP for the necessary setup information.

IP Address. This is the Router’s IP address, when seen from the WAN, or the Internet. Your ISP will provide you with the IP Address you need to specify here.

Subnet Mask. This is the Router’s Subnet Mask. Your ISP will provide you with the Subnet Mask and your IP address.

Gateway. Your ISP will provide you with the Default Gateway IP Address.

L2TP Server. Enter the IP address of the L2TP server.

User Name and Password. Enter the User Name and Password provided by your ISP.

Connect on Demand: Max Idle Time. You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time). If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again. If you wish to activate Connect on Demand, click the Connect on Demand option and enter the number of minutes you want to have elapsed before your Internet connection terminates in the Max Idle Time field. Use this option to minimize your DSL connection time if it is charged based on time. This option is disabled by default.

Keep Alive Redial period. If you select this option, the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re-establish your connection. To use this option, click the option next to Keep Alive. In the Redial Period field, you specify how often you want the Router to check the Internet connection. This option is enabled by default and the default Redial Period is 30 seconds. Use this option to minimize your Internet connection response time since it will always be connected.

Chapter 6: Setting Up and Configuring the Router

Figure 6-7: Setup - WAN (L2TP)

29

Setup Tab

Page 37
Image 37
Linksys WRVS4400N manual L2TP

WRVS4400N specifications

The Linksys WRVS4400N is a versatile and powerful wireless router designed to cater to the needs of both small businesses and home users. Combining advanced security features with high-speed networking capabilities, this device stands out in a crowded market.

One of the key features of the WRVS4400N is its support for simultaneous dual-band wireless networking. It operates on both the 2.4 GHz and 5 GHz frequency bands, allowing users to enjoy faster data transfer rates while minimizing interference from other devices. The router supports the 802.11n wireless standard, which can deliver speeds of up to 300 Mbps, ensuring smooth streaming, gaming, and internet usage without disruptions.

Security is a top priority for the WRVS4400N, as it comes equipped with robust firewall protection and the latest encryption technologies. It supports both WPA and WPA2 wireless security protocols, providing users with peace of mind knowing that their data is safeguarded against potential threats. Additionally, the router features a built-in VPN that allows secure remote access to the network, making it ideal for businesses with employees who work from home or on the go.

Another notable characteristic is its four Gigabit Ethernet ports for wired connections. These ports enable users to connect devices directly to the router, benefiting from high-speed, stable connections ideal for bandwidth-heavy tasks. The WRVS4400N also includes a USB port that allows for the easily connected sharing of printers and storage devices across the network.

The router's user interface is user-friendly, making setup and configuration straightforward even for those who are not tech-savvy. Linksys also offers firmware updates to ensure the router remains secure and performs optimally over time.

In summary, the Linksys WRVS4400N is a feature-rich wireless router that combines performance, security, and versatility. With its dual-band capabilities, robust security protocols, and wired connectivity options, it is an appropriate choice for users looking to enhance their home or small business networks.