Summary of the content on the page No. 1
USER GUIDE
®
EtherFast Cable/DSL VPN Router
with 4-Port Switch
Model: BEFVP41
Summary of the content on the page No. 2
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product. WEB: T
Summary of the content on the page No. 3
Table of Contents Chapter 1: Introduction 1 Introduction to VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 VPN Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 VPN Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Chapter 2: Product Overview 3 Front Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Summary of the content on the page No. 4
Table of Contents Appendix F: Software License Agreement 30 Software in Linksys Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30 Software Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30 EtherFast Cable/DSL VPN Router with 4-Port Switch iii
Summary of the content on the page No. 5
Introduction Chapter 1 VPN Examples Chapter 1: The following are examples of a VPN tunnel between two Introduction VPN routers and a VPN tunnel between a computer using VPN client software and a VPN router. Thank you for choosing the Linksys by Cisco EtherFast Cable/DSL VPN Router with 4-Port Switch. The Router VPN Router to VPN Router lets you access the Internet through its four switched For example, at home, a telecommuter uses his VPN ports. You can also use the Router to share resou
Summary of the content on the page No. 6
Introduction Chapter 1 Off-Site There are additional ways to enhance data security beyond the VPN Router. Here are some suggestions: Internet • Enhance security on your other networks. Install firewall routers for your Internet connections, and use the most up-to-date security measures for wireless networking. Notebook with VPN • Narrow the scope of your VPN tunnel as much as Client Software possible. Rather than allowing a range of IP addresses, use the addresses specific to the endpoint
Summary of the content on the page No. 7
Product Overview Chapter 2 Back Panel Chapter 2: Product Overview Front Panel Reset There are two ways to reset the Router to its factory default settings. Use a straightened paper clip or similar object to press and hold the Reset button for approximately five seconds. You can also restore the defaults from the Power (Green) The Power LED lights up and Administration > Factory Defaults screen of the will stay on while the Router is powered on. Router’s web-based utility. It flashes whe
Summary of the content on the page No. 8
Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you’d like to change its advanced settings, use the Router’s web-based utility. This chapter describes each web page of the utility and each page’s key functions. You can access the utility via a web browser on a computer connected to the Router. The web-based utility has these main tabs: Setup, Securit
Summary of the content on the page No. 9
Advanced Configuration Chapter 3 before your Internet connection terminates. The default Static IP Max Idle Time is 5 minutes. If you are required to use a permanent IP address to Keep Alive: Redial Period If you select this option, connect to the Internet, select Static IP. the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re-establish your connection. To use this option, select Keep Alive. In the Redial Period field,
Summary of the content on the page No. 10
Advanced Configuration Chapter 3 PPTP Point-to-Point Tunneling Protocol (PPTP) is a service that applies to connections in Europe only. Connection Type > Heart Beat Signal User Name and Password Enter the User Name and Password provided by your ISP. Heart Beat Server Enter the IP address of your ISP’s Heart Beat server. This is provided by your ISP. Connection Type > PPTP Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been IP Addres
Summary of the content on the page No. 11
Advanced Configuration Chapter 3 Router select the best MTU for your Internet connection, amount of time, in minutes, that the user will be “leased” keep the default setting, Automatic. this dynamic IP address. After the time is up, the user will be automatically assigned a new dynamic IP address. The Size When Manual is selected in the MTU field, this option default is 0 minutes, which means one day. is enabled. Leave this value in the 1200 to 1500 range. The default size is 1400. Time Set
Summary of the content on the page No. 12
Advanced Configuration Chapter 3 Advanced Routing Setup > MAC Address Clone A MAC address is a 12-digit code assigned to a unique Dynamic Routing piece of hardware for identification. Some ISPs will require NAT If this Router is hosting your network’s connection to you to register a MAC address in order to access the the Internet, keep the default, Enabled. If another router Internet. If you do not wish to re-register the MAC address exists on your network, select Disabled. (When NAT is w
Summary of the content on the page No. 13
Advanced Configuration Chapter 3 Routing Table Block WAN Requests For each route, the Destination LAN IP address, Subnet Block Anonymous Internet Requests This feature Mask, Gateway, Hop Count, and Interface are displayed. makes it more difficult for outside users to work their Click Refresh to update the information. way into your network. This feature is enabled by default. Select Disabled to allow anonymous Internet requests. Click Save Settings to apply your changes, or click Cancel Cha
Summary of the content on the page No. 14
Advanced Configuration Chapter 3 IP Address VPN Tunnel Only the computer with a specific IP address will be able The Router creates a tunnel between two endpoints, to access the tunnel. so that the data traveling between these endpoints is secure. IP Addr. Enter the appropriate address. Select Tunnel Entry Select the tunnel you wish to create. IP Range It is possible to create up to 50 simultaneous tunnels. This option is a combination of the Subnet and IP Address Delete To delete a tunnel
Summary of the content on the page No. 15
Advanced Configuration Chapter 3 for a specific computer on the Internet (for example: encryption keys will not be able to obtain future IPSec keys. vpn.myvpnserver.com). Select Enabled to ensure that the initial key exchange and IKE proposals are secure. Any Pre-shared Key This specifies the pre-shared key used The remote VPN Router will accept a request from any to authenticate the remote IKE peer. Based on this Pre- IP address. The remote VPN device can be another VPN shared key, a key
Summary of the content on the page No. 16
Advanced Configuration Chapter 3 Key Lifetime Enter the number of seconds you want the key to last before a re-key negotiation between each endpoint is completed. The default is 3600 seconds. Phase 2 The Encryption, Authentication, and PFS settings are automatically displayed. Group Select the Diffie-Hellman Group, which is a cryptographic technique that uses public and private keys for encryption and decryption. Select 768-bit or 1024-bit. Key Lifetime Enter the number of seconds you want
Summary of the content on the page No. 17
Advanced Configuration Chapter 3 7. Select any Blocked Services and enter a range of ports in the fields provided. If the service you want to block is not listed or you want to edit a service’s settings, then click Add/Edit Service. 8. If you want to block websites with specific URL addresses, enter each URL in a separate field next to Website Blocking by URL Address. 9. If you want to block websites using specific keywords, enter each keyword in a separate field next to Website Blocking
Summary of the content on the page No. 18
Advanced Configuration Chapter 3 Start and End Enter the number or range of port(s) Click Save Settings to apply your changes, or click Cancel used by the server or Internet applications. Check Changes to cancel your changes. with the Internet application documentation for more information. Applications and Gaming > UPnP TCP UDP Select the protocol used for this application, Forwarding either TCP or UDP, or Both. The UPnP Forwarding screen displays preset application IP Address For each a
Summary of the content on the page No. 19
Advanced Configuration Chapter 3 TFTP (Trivial File Transfer Protocol) - A version of the TCP/IP Applications and Gaming > DMZ FTP protocol that has no directory or password capability. The DMZ feature allows one network computer to be Finger - A UNIX command widely used on the Internet exposed to the Internet for use of a special-purpose to find out information about a particular user, such as a service such as Internet gaming or videoconferencing. telephone number, whether the user is cu
Summary of the content on the page No. 20
Advanced Configuration Chapter 3 Data is passed from an SNMP agent, such as the Router, to the workstation console used to oversee the network. The Router then returns information contained in a Management Information Base (MIB), a data structure that defines what is obtainable from the device and what can be controlled. SNMP functions, such as statistics, configuration, and device information, are not available without third-party management software. The Router is compatible with all