ملخص المحتوى في الصفحة رقم 1
USER GUIDE
Wireless-N Gigabit Security
with Ports BUSINESS SERIES
4-portuter
Router with VPN
Wireless
Model No. WRVS4400N
Model No.
Model No.
Model No Model No..
ملخص المحتوى في الصفحة رقم 2
Wireless-N Gigabit Security Router with VPN Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2006 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders. WARNING: This product contains chemicals, including lead, known to the State of Ca
ملخص المحتوى في الصفحة رقم 3
Wireless-N Gigabit Security Router with VPN Table of Contents Chapter 1: Introduction 1 Welcome 1 What’s in this Guide? 2 Chapter 2: Networking and Security Basics 4 An Introduction to LANs 4 The Use of IP Addresses 5 The Intrusion Prevention System (IPS) 7 Chapter 3: Planning Your Virtual Private Network (VPN) 9 Why do I need a VPN? 9 What is a VPN? 10 Chapter 4: Getting to Know the Router 12 The Front Panel 12 The Back Panels 14 Antennas and Positions 15 Chapter 5: Connecting the Router 16 Ove
ملخص المحتوى في الصفحة رقم 4
Wireless-N Gigabit Security Router with VPN Common Problems and Solutions 85 Frequently Asked Questions 95 Appendix B: Using the Linksys QuickVPN Software for Windows 2000 or XP 99 Overview 99 Before You Begin 99 Installing the Linksys QuickVPN Software 100 Using the Linksys QuickVPN Software 101 Appendix C: Configuring a Gateway-to-Gateway IPSec Tunnel 103 Overview 103 Before You Begin 103 Configuring the VPN Settings for the VPN Routers 104 Configuring the Key Management Settings 106 Configu
ملخص المحتوى في الصفحة رقم 5
Wireless-N Gigabit Security Router with VPN List of Figures Figure 2-1: Example network 5 Figure 2-2: IPS Scenarios 7 Figure 3-1: VPN Router to VPN Router 11 Figure 3-2: Computer to VPN Router 11 Figure 4-1: Front Panel 12 Figure 4-2: Back Panel 14 Figure 4-3: Stackable Position and its Antenna Setup 15 Figure 4-4: Standalone Position and its Antenna Setup 15 Figure 5-1: Example of a Typical Network 16 Figure 5-2: Connect a PC 17 Figure 5-3: Connect the Internet 17 Figure 5-4: Connect the Power
ملخص المحتوى في الصفحة رقم 6
Wireless-N Gigabit Security Router with VPN Figure 6-11: Setup - LAN 32 Figure 6-12: Setup - DMZ 34 Figure 6-13: Setup - MAC Address Clone 34 Figure 6-14: Setup - Advanced Routing 35 Figure 6-15: Setup - Advanced Routing (Routing Table) 36 Figure 6-16: Setup - Time 37 Figure 6-17: Wireless - Basic Wireless Settings 38 Figure 6-18: Wireless - Wireless Security (Disabled) 40 Figure 6-19: Wireless - Wireless Security (WPA-Personal) 40 Figure 6-20: Wireless - Wireless Security (WPA2-Personal) 41 Fig
ملخص المحتوى في الصفحة رقم 7
Wireless-N Gigabit Security Router with VPN Figure 6-41: VPN - IPsec VPN 58 Figure 6-42: VPN Tunnel Summary 58 Figure 6-43: View VPN Tunnel Log 60 Figure 6-44: IPsec VPN Advanced Settings 61 Figure 6-45: VPN - VPN Client Accounts 63 Figure 6-46: VPN - VPN Passthrough 64 Figure 6-47: QoS - Application Based 65 Figure 6-48: Port-based 66 Figure 6-49: Administration - Management 67 Figure 6-50: Administration - Log 68 Figure 6-51: View Log pop-up window 68 Figure 6-52: Administration - Diagnostics
ملخص المحتوى في الصفحة رقم 8
Wireless-N Gigabit Security Router with VPN Figure 6-71: LAN ARP Table 81 Figure 6-72: Status - Wireless LAN 82 Figure 6-73: Status - System Performance 83 Figure 6-74: Status - VPN Clients 84 Figure 6-75: Status - IPsec VPN 84 Figure B-1: VPN Client Accounts Screen 99 Figure B-2: QuickVPN Desktop Icon 101 Figure B-3: QuickVPN Tray Icon - No Connection 101 Figure B-4: QuickVPN Software - Profile 101 Figure B-5: Connecting 101 Figure B-6: Activating Policy 101 Figure B-7: Verifying Network 101 Fi
ملخص المحتوى في الصفحة رقم 9
Wireless-N Gigabit Security Router with VPN Chapter 1: Introduction Welcome Thank you for choosing the Wireless-N Gigabit Security Router with VPN. The Wireless-N Gigabit Security Router with VPN is an advanced Internet-sharing network solution for your small business needs. The Router features a built-in 4-Port full-duplex 10/100/1000 Ethernet switch to connect four PCs directly, or you can connect more hubs and switches to create as big a network as you need. Like any wireless router, it le
ملخص المحتوى في الصفحة رقم 10
Wireless-N Gigabit Security Router with VPN What’s in this Guide? This user guide covers the steps for setting up and using the Wireless-N Gigabit Security Router with VPN. Chapter 1: Introduction This chapter describes the Wireless-N Gigabit Security Router with VPN applications and this User Guide. Chapter 2: Networking and Security Basics This chapter describes the basics of networking and network security. Chapter 3: Planning Your Virtual Private Network (VPN) This chapter describes a
ملخص المحتوى في الصفحة رقم 11
Wireless-N Gigabit Security Router with VPN Appendix F: Specifications This appendix provides the technical specifications for the Router. Appendix G: Warranty Information This appendix supplies the warranty information for the Router. Appendix H: Regulatory Information This appendix supplies the regulatory information regarding the Router. Appendix I: Contact Information This appendix provides contact information for a variety of Linksys resources, including Technical Support. Chapter 1
ملخص المحتوى في الصفحة رقم 12
Wireless-N Gigabit Security Router with VPN Chapter 2: Networking and Security Basics An Introduction to LANs A Router is a network device that connects multiple networks together and forward traffic based on IP destination of each packet. The Wireless-N Gigabit Security Router can connect your local area network (LAN) or a group of PCs interconnected in your home or office to the Internet. You can use one public IP address from the ISP through NAT (Network Address Translation): WAN port and
ملخص المحتوى في الصفحة رقم 13
Wireless-N Gigabit Security Router with VPN Figure 2-1: Example network NOTE: Since the Router is a device that connects two networks, it needs two IP addresses—one for the LAN, The Use of IP Addresses and one for the Internet. In this User Guide, you’ll see references to the “Internet IP address” and the “LAN IP stands for Internet Protocol. Every device in an IP-based network, including PCs, print servers, and routers, IP address.” requires an IP address to identify its location, or addr
ملخص المحتوى في الصفحة رقم 14
Wireless-N Gigabit Security Router with VPN A static IP address is a fixed IP address that you assign manually to a PC or other device on the network. Since a static IP address remains valid until you disable it, static IP addressing ensures that the device assigned it will always have that same IP address until you change it. Static IP addresses are commonly used with dedicated network devices such as server PCs or print servers. Since a user’s PC is moving around in a network and is being
ملخص المحتوى في الصفحة رقم 15
Wireless-N Gigabit Security Router with VPN The Intrusion Prevention System (IPS) 1000+ Figure 2-2: IPS Scenarios IPS is an advanced technology to protect your network from malicious attacks. IPS works together with your SPI Firewall, IP Based Access List (IP ACL), Network Address Port Translation (NAPT), and Virtual Private Network (VPN) to achieve the highest amount of securities. IPS works by providing real-time detection and prevention as an in-line module in a router. The Wireless-N Sec
ملخص المحتوى في الصفحة رقم 16
Wireless-N Gigabit Security Router with VPN The P2P (peer to peer) and IM (instant messaging) control allows the system administrator to prevent network users from using those protocols to communicate with people over the Internet. This helps the administrators to set up company policies on how to use their Internet bandwidth wisely. The signature file is the heart of the IPS system. It is similar to the Virus definition files on your PC’s Anti-Virus programs. IPS uses this file to match aga
ملخص المحتوى في الصفحة رقم 17
Wireless-N Gigabit Security Router with VPN Chapter 3: Planning Your Virtual Private Network (VPN) Why do I need a VPN? vpn (virtual private network): a security Computer networking provides a flexibility not available when using an archaic, paper-based system. With this measure to protect data as it leaves one flexibility, however, comes an increased risk in security. This is why firewalls were first introduced. Firewalls help network and goes to another over the Internet to protect data in
ملخص المحتوى في الصفحة رقم 18
Wireless-N Gigabit Security Router with VPN data to a new destination. Even though the data is not received by its intended recipient, it appears that way to the person sending the data. These are only a few of the methods hackers use and they are always developing more. Without the security of your VPN, your data is constantly open to such attacks as it travels over the Internet. Data travelling over the Internet will often pass through many different servers around the world before reaching
ملخص المحتوى في الصفحة رقم 19
Wireless-N Gigabit Security Router with VPN to create a VPN tunnel using IPsec (refer to “Appendix C: Configuring IPsec between a Windows 2000 or XP PC Home Office and the Router”). Other versions of Microsoft operating systems require additional, third-party VPN client software applications that support IPsec to be installed. PC 1 WRVS4400N VPN Router PC 2 VPN Router to VPN Router An example of a VPN Router-to-VPN Router VPN would be as follows. At home, a telecommuter uses his VPN Figure 3
ملخص المحتوى في الصفحة رقم 20
Wireless-N Gigabit Security Router with VPN Chapter 4: Getting to Know the Router The Front Panel The Router’s LEDs are located on the front panel of the Router. Figure 4-1: Front Panel LEDs POWER Green. The POWER LED lights up when the Router is powered on. The LED flashes when the Router runs a diagnostic test. Chapter 4: Getting to Know the Router 12 The Front Panel