RV016 Port VPN Router / Load Balance 7 Wan in - Manual

Download as pdf or txt
Download as pdf or txt
You are on page 1of 112

USER GUIDE

BUSINESS SERIES

10/100 16-Port
VPN Router
Model: RV016
About This Guide

About This Guide Copyright and Trademarks


Linksys, Cisco and the Cisco Logo
Icon Descriptions are registered trademarks or
trademarks of Cisco Systems, Inc.
While reading through the User Guide you may see and/or its affiliates in the U.S. and
various icons that call attention to specific items. Below is certain other countries. Copyright ©
a description of these icons: 2008 Cisco Systems, Inc. All rights
reserved. Trend Micro, InterScan, and
NOTE: This check mark indicates that there is ProtectLink are trademarks of Trend
a note of interest and is something that you Micro Incorporated. Other brands
should pay special attention to while using the and product names are trademarks
product. or registered trademarks of their
respective holders.

WARNING: This exclamation point indicates


that there is a caution or warning and it is
something that could damage your property or
product.

WEB: This globe icon indicates a noteworthy


website address or e-mail address.

Online Resources
Website addresses in this document are listed without
http:// in front of the address because most current web
browsers do not require it. If you use an older web browser,
you may have to add http:// in front of the web address.

Resource Website

Linksys www.linksys.com

Linksys International www.linksys.com/international

Glossary www.linksys.com/glossary

Network Security www.linksys.com/security

10/100 16-Port VPN Router i


Table of Contents

Chapter 1: Introduction 1
Introduction to the Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Introduction to VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
VPN Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
VPN Router to VPN Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Computer (using VPN client software) to VPN Router . . . . . . . . . . . . . . . . . . . . . 2

Chapter 2: Product Overview 3


Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Left Side Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Chapter 3: Installation 4
Physical Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Horizontal Placement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Wall-Mount Placement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Rack-Mount Placement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Cable Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

Chapter 4: Advanced Configuration 7


Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
How to Access the Web-Based Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
System Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
System Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Port Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Network Setting Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Firewall Setting Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
VPN Setting Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Log Setting Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Setup > Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Setup > Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Setup > Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Setup > DMZ Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
DMZ Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Setup > Forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Setup > UPnP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
UPnP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Setup > One-to-One NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

10/100 16-Port VPN Router ii


Table of Contents

One-to-One NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Setup > MAC Clone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
MAC Clone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
Setup > DDNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
DDNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Setup > Advanced Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Advanced Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
DHCP > Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
DHCP > Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
System Management > Multi-WAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Load Balance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
System Management > Bandwidth Management . . . . . . . . . . . . . . . . . . . . . . . . . 26
Bandwidth Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
System Management > SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
System Management > Diagnostic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Diagnostic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
System Management > Factory Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Factory Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
System Management > Firmware Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Firmware Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Restart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
System Management > Setting Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Import Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Export Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Port Management > Port Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Basic Per Port Config. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Port Management > Port Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Port Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Firewall > General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Firewall > Access Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Access Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Add a New Access Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Firewall > Content Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Content Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
ProtectLink . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
VPN > Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
VPN > Gateway to Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Add a New Tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
IPSec Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
10/100 16-Port VPN Router iii
Table of Contents

VPN > Client to Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43


Add a New Tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
IPSec Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
VPN > VPN Client Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
VPN Client Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
VPN > VPN Pass Through . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
VPN Pass Through . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
VPN > PPTP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
PPTP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Connection List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51
Log > System Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
System Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Log > System Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Basic Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Access Rule Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Linksys Web Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Logout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

Appendix A: Troubleshooting 61
Appendix B: Linksys QuickVPN for Windows 2000, XP, or Vista 62
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Computer (using VPN client software) to VPN Router . . . . . . . . . . . . . . . . . . . . 62
Linksys QuickVPN Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Router Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Export a Client Certificate from the Router . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Add VPN Client Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Linksys QuickVPN Client Installation and Configuration . . . . . . . . . . . . . . . . . . . . . 63
Install from the CD-ROM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Download from the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Install the Client Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Use of the Linksys QuickVPN Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Linksys QuickVPN Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Version Number of Linksys QuickVPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

Appendix C: Gateway-to-Gateway VPN Tunnel 66


Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Configuration when the Remote Gateway Uses a Static IP Address . . . . . . . . . . . . . . 66
Configuration of the RVL200 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Configuration of the RV016 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

10/100 16-Port VPN Router iv


Table of Contents

Configuration of PC 1 and PC 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Configuration when the Remote Gateway Uses a Dynamic IP Address . . . . . . . . . . . 68
Configuration of the RVL200 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Configuration of the RV016 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Configuration of PC 1 and PC 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Configuration when Both Gateways Use Dynamic IP Addresses . . . . . . . . . . . . . . . . 69
Configuration of the RVL200 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Configuration of the RV016 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Configuration of PC 1 and PC 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70

Appendix D: IPSec NAT Traversal 71


Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Configuration of Scenario 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Configuration of Router A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Configuration of Router B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Configuration of Scenario 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Configuration of the One-to-One NAT Rules . . . . . . . . . . . . . . . . . . . . . . . . . 73
Configuration of Router B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Configuration of Router A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

Appendix E: Bandwidth Management 76


Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Creation of New Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Creation of New Bandwidth Management Rules . . . . . . . . . . . . . . . . . . . . . . . . . 77

Appendix F: Firmware Upgrade 78


Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
How to Access the Web-Based Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Upgrade the Firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Alternative Firmware Upgrade Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78

Appendix G: Trend Micro ProtectLink Gateway Service 80


Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
How to Access the Web-Based Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
How to Purchase, Register, or Activate the Service . . . . . . . . . . . . . . . . . . . . . . . . 80
System Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
ProtectLink . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
How to Use the Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
ProtectLink > Web Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
ProtectLink > Email Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
ProtectLink > License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

Appendix H: Specifications 85

10/100 16-Port VPN Router v


Table of Contents

Appendix I: Warranty Information 86


Exclusions and Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Obtaining Warranty Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87

Appendix J: Software License Agreement 88


Software in Linksys Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Software Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Schedule 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Linksys Software License Agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
END OF SCHEDULE 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Schedule 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
GNU GENERAL PUBLIC LICENSE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
END OF SCHEDULE 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Schedule 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
GNU LESSER GENERAL PUBLIC LICENSE . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
END OF SCHEDULE 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Schedule 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
OpenSSL License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Original SSLeay License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
END OF SCHEDULE 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99

Appendix K: Regulatory Information 100


FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Safety Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Battery Recycling Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Industry Canada Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Avis d’Industrie Canada . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste
Electric and Electronic Equipment (WEEE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

Appendix L: Contact Information 105

10/100 16-Port VPN Router vi


Chapter 1 Introduction

Chapter 1: secure. A computer with VPN client software can be one


of the two endpoints.
Introduction For an IPSec VPN tunnel, the VPN Router and any computer
with the built-in IPSec Security Manager (Windows 2000
and XP) can create a VPN tunnel using IPSec (Windows
Introduction to the Router Vista uses a similar utility). Other Windows operating
systems require additional, third-party VPN client software
Thank you for choosing the Linksys 10/100 16-Port VPN
applications that support IPSec to be installed.
Router. The Router lets multiple computers in your office
share an Internet connection, and its 16 ports offer
versatility. NOTE: The 10/100 16-Port VPN Router supports
IPSec VPN client software, including the Linksys
Two are dedicated Internet ports that let you connect QuickVPN software. (For more information, refer
a second Internet line as a backup, or you can use both to “Appendix B: Linksys QuickVPN for Windows
Internet ports at the same time, allowing the Router to 2000, XP, or Vista”.)
manage bandwidth demands for maximum efficiency.
Up to five of the 13, full-duplex, 10/100 local ports can For a PPTP VPN tunnel, the 10/100 16-Port VPN Router and
be reconfigured as Internet ports, for an up to seven-port any computer running Windows 2000 or XP can create a
failover or load balanced redundancy. A dedicated DMZ VPN tunnel using PPTP.
port gives you a publicly accessible channel so you can set
up a web or FTP server.
VPN Examples
For remote connections, up to 50 remote office or traveling
The following are examples of a VPN tunnel between two
users can securely connect to your office network using
VPN routers and a VPN tunnel between a computer using
the Router’s Virtual Private Network (VPN) capability.
VPN client software and a VPN router.
Use the browser-based utility to configure settings and
run convenient wizards that will help you set up the VPN Router to VPN Router
Router and its access rules.
For example, at home, a telecommuter uses his VPN
Introduction to VPNs Router for his always-on Internet connection. His Router
is configured with his office’s VPN settings. When he
A VPN is a connection between two endpoints—a VPN connects to his office’s router, the two routers create a
Router, for instance—in different networks that allows VPN tunnel, encrypting and decrypting data. As VPNs use
private data to be sent securely over a shared or public the Internet, distance is not a factor. Using the VPN, the
network, such as the Internet. This establishes a private telecommuter now has a secure connection to the central
network that can send data securely between these two office’s network, as if he were physically connected.
locations or networks.
The private network is established by creating a “tunnel”.
A VPN tunnel connects the two computers or networks
and allows data to be transmitted over the Internet
as if it were still within those networks. A VPN tunnel
uses industry‑standard encryption and authentication
techniques to secure the data sent between the two
networks.
Virtual Private Networking was created as a cost-effective
alternative to using a private, dedicated, leased line for a
private network. It can be used to create secure networks
linking a central office with branch offices, telecommuters,
and/or professionals on the road.
There are two basic ways to create a VPN connection:
•• VPN Router to VPN Router
•• computer (using VPN client software) to VPN Router
The VPN Router creates a “tunnel” or channel between two
endpoints, so that data transmissions between them are
10/100 16-Port VPN Router 1
Chapter 1 Introduction

For additional information and instructions about


Home
Internet creating your own VPN, visit the Linksys website at
www.linksys.com.

VPN Router

Central Office

VPN Router

VPN Router to VPN Router

Computer (using VPN client software) to


VPN Router
The following is an example of a computer-to-VPN Router
VPN. In her hotel room, a traveling businesswoman
connects to her Internet Service Provider (ISP). Her
notebook computer has VPN client software that is
configured with her office’s VPN settings. She accesses
the VPN client software and connects to the VPN Router
at the central office. As VPNs use the Internet, distance is
not a factor. Using the VPN, the businesswoman now has a
secure connection to the central office’s network, as if she
were physically connected.

Off-Site

Internet

Notebook with VPN


Client Software

VPN Central Office


Router

Computer to VPN Router

10/100 16-Port VPN Router 2


Chapter 2 Product Overview

Chapter 2: Internet (1-7)  These Ethernet ports connect


the Router to Internet devices, such as cable or
Product Overview DSL modems.
Internet ports 3-7 can also be used as LAN
ports.
Front Panel DMZ  The DMZ port connects to a switch or
public server.
Reset  The Reset button can be used for a warm
reset or a reset to factory defaults.
•• Warm Reset  If the Router is having
problems connecting to the Internet,
Diag  (Orange)  The Diag LED lights up when
press and hold in the Reset button for a
the Router is not ready for use. It turns off when
second using the tip of a pen. This is similar
the Router is ready for use.
to pressing the power button on your
System  (Green)  The System LED lights up computer to reboot it.
when the Router is powered on. It flashes when
the Router is running a diagnostic test. •• Reset to Factory Defaults  If you are
experiencing extreme problems with
LAN/Act 1-13  (Green)  These numbered the Router and have tried all other
LEDs correspond with the numbered ports troubleshooting measures, press and hold
(white print). The LED is solidly lit when the in the Reset button for 30 seconds. This will
Router is connected to a device through the restore the factory defaults and clear all of
corresponding port. The LED flashes to indicate the Router’s custom settings.
network activity over that port.
You can also reset the Router to factory
LAN/Act LEDs 9-13 and Internet/Act LEDs 3-7 defaults using the System Management >
represent the dual-function ports, which can be Factory Default screen of the Router’s
used as LAN or Internet ports. These correspond web‑based utility.
with the LAN ports 9-13 (white print) or Internet
ports 3-7 (dark print) on the Router’s front
panel. Back Panel
Internet/Act 1-7  (Green)  These numbered
LEDs correspond with the numbered ports
(dark print). The LED lights up when the Router
is connected to a cable or DSL modem through
the corresponding port. The LED flashes to
indicate network activity over that port.
Power  The Power port connects to the AC
Internet/Act LEDs 1 and 2 are labeled Internet power cord.
because they can be used only as Internet
ports.
DMZ  (Orange)  The DMZ LED lights up when Left Side Panel
the Router is connected to a DMZ host through
the DMZ port. The LED flashes to indicate
network activity over the DMZ port.
1-13 (LAN)  These Ethernet ports connect the
Router to wired computers and other Ethernet
network devices.
LAN ports 9-13 can also be used as Internet Security Slot  You can attach a lock to the
ports. security slot so the Router will be protected
from theft.

10/100 16-Port VPN Router 3


Chapter 3 Installation

Chapter 3: Wall-Mount Placement

Installation The Router has two wall-mount slots on its bottom


panel. The distance between the two slots is 94 mm
(3.70 inches).
Physical Installation Two screws are needed to mount the Router.

There are three ways to place the Router. The first way is Suggested Mounting Hardware
to place the Router horizontally on a surface. The second
way is to mount the Router on a wall. The third way is to

3-3.8 mm
mount the Router in a standard-sized, 19-inch high rack.
5-6 mm 1.6-2 mm
Horizontal Placement
††Note: Mounting hardware illustrations are not
The Router has four rubber feet on its bottom panel. Set true to scale.
the Router on a flat surface near an electrical outlet.

WARNING: Do not place excessive weight NOTE: Linksys is not responsible for damages
on top of the Router; too much weight could incurred by insecure wall-mounting hardware.
damage it.
Follow these instructions:
1. Determine where you want to mount the Router. Make
sure that the wall you use is smooth, flat, dry, and
sturdy. Also make sure the location is within reach of
an electrical outlet.
2. Drill two holes into the wall. Make sure the holes are
94 mm (3.07 inches) apart.
3. Insert a screw into each hole and leave 2 mm
(0.8 inches) below the head exposed.
4. Maneuver the Router so two of the wall-mount slots
line up with the two screws.

94 mm

Print this page at 100% size. Cut along the dotted line,
and place on the wall to drill precise spacing.
Wall Mounting Template

10/100 16-Port VPN Router 4


Chapter 3 Installation

5. Place the wall-mount slots over the screws and slide 3. Repeat step 2 to attach the other bracket to the
the Router down until the screws fit snugly into the opposite side.
wall-mount slots.
4. After the brackets are attached to the Router, use
suitable screws to securely attach the brackets to any
Rack-Mount Placement standard 19-inch rack.
The Router includes two brackets and eight screws for
mounting on a standard-sized, 19-inch high rack. Observe
the following guidelines:
•• Elevated Operating Ambient  If installed in a closed
or multi-unit rack assembly, the operating ambient
temperature of the rack environment may be greater
than room ambient. Therefore, consideration should VPN Route r

be given to installing the equipment in an environment


RV016 10/100

compatible with the maximum ambient temperature


(Tma) specified by the manufacturer.
DMZ
1
et
r Intern
2
Route et
rt VPN Intern
0 16-Po 8
13 3
10/10 6
7
5
3
4 12 4
2
1 11 5

6 13

RV01
ct 12 10 6
11
LAN/A 10 2
1
9 9 7
3
4
ct 5
LAN/A 7
6

•• Reduced Air Flow  Installation of the equipment


et/Act
Intern

in a rack should be such that the amount of air flow


required for safe operation of the equipment is not
compromised.
•• Mechanical Loading  Mounting of the equipment in
the rack should be such that a hazardous condition is
Mount in Rack
not achieved due to uneven mechanical loading.
•• Circuit Overloading  Consideration should be given
to the connection of the equipment to the supply Cable Connections
circuit and the effect that overloading of the circuits To connect network devices to the Router, follow these
might have on overcurrent protection and supply instructions:
wiring. Appropriate consideration of equipment
nameplate ratings should be used when addressing 1. Before you begin, make sure that all of your hardware
this concern. is powered off, including the Router, computers,
switches, and cable or DSL modem.
•• Reliable Earthing  Reliable earthing of rack-mounted
equipment should be maintained. Particular attention 2. Connect one end of an Ethernet network cable to one
should be given to supply connections other than of the numbered local ports (white print). Connect the
direct connections to the branch circuit (e.g., use of other end to an Ethernet port on a network device,
power strips). such as a computer or switch.

To rack-mount the Router in any standard 19-inch rack, Repeat this step to connect more computers or other
follow these instructions. network devices to the Router.

1. Place the Router on a hard flat surface with the front


panel faced towards your front side.
2. Attach a rack–mount bracket to one side of the Router
with the supplied screws and secure the bracket
tightly.
Connect to LAN Port 1

VPN Route r
RV016 10/100

DMZ
1
et
r Intern
2
Route et
rt VPN Intern
0 16-Po 8
13 3
10/10 6
7
5
3
4 12 4
2
1 11 5

6 13

RV01
ct 12 10 6
11
LAN/A 10 2
1
9 9 7
3
4
ct 5
LAN/A 7
6

et/Act
Intern

Attach the Brackets

10/100 16-Port VPN Router 5


Chapter 3 Installation

3. Connect your cable or DSL modem’s Ethernet


cable to one of the Router’s Internet ports.

Repeat this step to connect additional Internet devices


to the Router’s other Internet ports.

Connect to Internet Port 1

4. If you are using the DMZ port, then connect an Ethernet


cable to the DMZ port. Connect the other end to an
appropriate network device, such as a public server.

Connect to DMZ Port

5. Power on the cable or DSL modem(s). If you have a


network device connected to the DMZ port, power on
that network device.
6. Connect the included power cord to the Router’s
Power port, and then plug the power cord into an
electrical outlet.

Connect the Power

7. The System LED on the front panel will light up as soon


as the power adapter is connected properly.
8. Power on your computers and other network devices.

10/100 16-Port VPN Router 6


Chapter 4 Advanced Configuration

Chapter 4: System Summary


Advanced Configuration The first screen that appears is the System Summary
screen, which displays the Router’s current status and
settings. This information is read-only. Underlined text
Overview is hyperlinked to related setup pages, so if you click a
hyperlink, the related setup screen will appear. On the
The Router’s web-based utility allows you to set up right-hand side of this screen and all other screens of the
the Router and perform advanced configuration and utility is a link to the Site Map, which has links to all of the
troubleshooting. This chapter will explain all of the utility’s tabs. Click Site Map to view the Site Map. Then,
functions in this utility. click the desired tab.
These are the main tabs of the utility: System Summary,
Setup, DHCP, System Management, Port Management,
Firewall, VPN, Log, Wizard, Support, and Logout. (The
ProtectLink tab is available with upgraded firmware.)
Additional tabs will be available after you click one of the
main tabs.

How to Access the Web-Based Utility


1. For local access of the Router’s web-based utility,
launch your web browser, and enter the Router’s
default IP address, 192.168.1.1, in the Address field.
Press the Enter key.

Address Bar

NOTE: If the Remote Management feature on


the Firewall > General screen has been enabled,
then users with administrative privileges can
remotely access the web-based utility. Use System Summary
http://<WAN IP address of the Router>, or
use https://<WAN IP address of the Router> if
you have enabled the HTTPS feature.

2. A login screen prompts you for your User name and


Password. Enter admin in the User name field, and
enter admin in the Password field. (You can change
the Password on the Setup > Password screen.) Then
click OK.

Login Screen

10/100 16-Port VPN Router 7


Chapter 4 Advanced Configuration

Flash  Displayed here is the size of flash memory installed


on the Router’s board.
System Up Time  This is the length of time in days, hours,
and minutes that the Router has been active. The current
time and date are also displayed.

Trend Micro™ ProtectLink Gateway


The optional Trend Micro ProtectLink Gateway service
provides security for your network. It checks e-mail
messages, filters website addresses (URLs), and blocks
potentially malicious websites.

NOTE: If the Trend Micro ProtectLink Gateway


options are not displayed on the System
Summary screen, you can upgrade the Router’s
firmware if you want to purchase and use this
optional service. Refer to “Appendix F: Firmware
Upgrade” for instructions.

Go buy  To purchase a license to use this service, click Go


buy. You will be redirected to a list of Linksys resellers on the
Linksys website. Then follow the on-screen instructions.
Register  If you already have a license, click Register. You
System Summary (ProtectLink™ Available) will be redirected to the Trend Micro ProtectLink Gateway
website. Then follow the on-screen instructions.

NOTE: To have your e-mail checked, you will


need to provide the domain name and IP
address of your e-mail server. If you do not
know this information, contact your Internet
Service Provider (ISP).

Activate  If you have registered, click Activate. You will


be redirected to the Trend Micro ProtectLink Gateway
website. Follow the on-screen instructions.
For more information, refer to “Appendix G: Trend Micro
ProtectLink Gateway Service.”

Configuration
If you need help to configure the Router, click Setup
Site Map
Wizard, and follow the on-screen instructions. For
additional information, refer to the “Wizard” section of this
System Information chapter.
Serial Number  Displayed here is the serial number of the
Router. Port Statistics
Firmware version  Displayed here is the current version The image of the Router’s front panel displays the status
number of the firmware installed on the Router. of each port. If a port is disabled, it will be red; if a port is
enabled, it will be black. If a port is connected, it will be
CPU  Displayed here are the type and speed of the green. Click any port to view the port’s Summary table in
processor installed on the Router. a separate window.
DRAM  Displayed here is the size of DRAM installed on
the Router’s motherboard.

10/100 16-Port VPN Router 8


Chapter 4 Advanced Configuration

The Summary table shows the settings of the selected Mode  It shows the Router’s Working Mode (Gateway or
port, including Type, Interface, Link Status, Port Activity, Router), and it hyperlinks to the Dynamic Routing section
Priority, Speed Status, Duplex Status, Auto negotiation, on the Setup > Advanced Routing screen.
and VLAN.
DNS  It shows all DNS server IP addresses and hyperlinks
to the WAN Connection Type settings on the Setup >
Network screen.
Bandwidth Management  It shows the Bandwidth
Management settings of the Router’s WAN port(s) and
hyperlinks to the System Management > Bandwidth
Management screen.
DDNS  It shows the DDNS settings of the Router’s WAN
port(s) and hyperlinks to the Setup > DDNS screen.
DMZ Host  It shows the DMZ private IP address and
hyperlinks to the Setup > DMZ Host screen. The default is
Disabled.

Firewall Setting Status


SPI (Stateful Packet Inspection)  It shows the status
(On/Off ) of the SPI setting and hyperlinks to the Firewall >
General screen.
Port 1 Information DoS (Denial of Service)  It shows the status (On/Off ) of
the DoS setting and hyperlinks to the Firewall > General
For the selected port, the statistics table shows this
screen.
information: number of packets received, number of
packet bytes received, number of packets transmitted, Block WAN Request  It shows the status (On/Off ) of
number of packet bytes transmitted, and number of the Block WAN Request setting and hyperlinks to the
packet errors. Firewall > General screen.
To update the on-screen information, click Refresh. To VPN Setting Status
exit this screen, click Close.
VPN Summary  It hyperlinks to the VPN > Summary
Network Setting Status screen.
LAN IP  It shows the current LAN IP address of the Router, Tunnel(s) Used  It shows the number of VPN tunnels
as seen by internal users on the network, and it hyperlinks used.
to the LAN Setting section on the Network screen of the Tunnel(s) Available  It shows the number of VPN tunnels
Setup tab. available.
WAN IP  This shows the current WAN IP addresses of Current Connected (The Group Name of GroupVPN1)
the Router, as seen by external users on the Internet users  It shows the number of users. (If the GroupVPN
and hyperlinks to the WAN Setting section on the Setup feature is disabled, the message, “No Group VPN was
> Network screen. By default, the Router provides two defined”, is displayed.)
WAN ports. On the Setup > Network screen, you can set up
additional WAN ports. Current Connected (The Group Name of GroupVPN2)
users  It shows the number of users.
If the port is set to Obtain an IP automatically, two buttons,
Release and Renew, will be available. Click Release to PPTP Server  It shows the status of the PPTP Server
release the IP address, and click Renew to update the feature.
DHCP Lease Time or get a new IP address. If the WAN
port is set to PPPoE or PPTP, two buttons, Connect and Log Setting Status
Disconnect, will be available. It hyperlinks to the Log > System Log screen of the Log
DMZ IP  This shows the DMZ IP address, as seen by tab.
external users on the Internet and hyperlinks to the DMZ If you have not set up the e-mail server on the Log tab,
Setting section on the Setup > Network screen. the message, “E-mail cannot be sent because you have

10/100 16-Port VPN Router 9


Chapter 4 Advanced Configuration

not specified an outbound SMTP server address,” will be Device IP Address and Subnet Mask  The default values
displayed. are 192.168.1.1 for the Router’s local IP address and
255.255.255.0 for the subnet mask.
If you have set up the mail server but the log has not been
generated due to the Log Queue Length and Log Time Multiple Subnet  You can add more Class C networks
Threshold settings, the message, “E-mail settings have to expand the network. Select this option to enable the
been configured,” will be displayed. Multiple Subnet feature. Then click Add/Edit to create or
modify subnet(s). A new screen appears.
If you have set up the e-mail server and the log has been
sent to the e-mail server, the message, “E-mail settings
have been configured and sent out normally,” will be
displayed.
If you have set up the e-mail server and the log cannot
be sent to the e-mail server, the message, “E-mail cannot
be sent out, probably use incorrect settings,” will be
displayed.

Setup > Network


The Network screen shows all of the Router’s basic setup
functions. The Router can be used in most network setups
without changing any of the default values; however,
you may need to enter additional information in order to
connect to the Internet through an ISP (Internet Service
Provider) or broadband (DSL or cable) carrier. The setup
information is provided by your ISP.
Create or Modify a Subnet

LAN IP Address  Enter the LAN IP address.


Subnet Mask  Enter the subnet mask.
For example, the current LAN settings show the Device
IP Address as 192.168.1.1 and the Subnet Mask as
255.255.255.0. To add one more Class C network, enter
the following:
•• LAN IP Address  192.168.2.1
•• Subnet Mask  255.255.255.0
Click Add to List. Click Save Settings to save your changes,
or click Cancel Changes to undo them. Click Exit to return
to the Network screen.

Setup > Network

Network
Host Name and Domain Name  Enter a host and domain
name for the Router. Some ISPs require these names as
identification. You may have to check with your ISP to see
if your broadband Internet service has been configured
with a host and domain name. In most cases, you can
leave these fields blank.

LAN Setting
The LAN MAC address of the Router is displayed.

10/100 16-Port VPN Router 10


Chapter 4 Advanced Configuration

Add One More Class C Network Create Three Additional Subnets

If you want to modify a subnet you have created, select WAN Setting
it and make changes. Click Save Settings to save your
changes, or click Cancel Changes to undo them. Click By default, the Router allows you to simultaneously
Exit to return to the Network screen. connect two broadband connections to the Router;
however, you can set up as many as seven broadband
If you want to delete a subnet you have created, select it
connections.
and click Delete selected subnet. Click Save Settings
to save your changes, or click Cancel Changes to undo From the drop-down menu, select how many WAN ports
them. Click Exit to return to the Network screen. you want to use. The default is 2. (You can also change
the number of WAN ports using the Port Management
You can also divide a Class C network into four subnets.
> Port Setup screen.) Make sure the physical network
For example, the current LAN settings show the Device
configuration matches the number of WAN port settings
IP Address as 192.168.1.1 and the Subnet Mask as
on this screen.
255.255.255.192.
If you change the number of WAN ports, click Save
Settings to save your change. A confirmation message
will appear. Then click OK to save the new setting.

LAN Settings Example


The WAN Setting table displays the WAN port numbers
in the Interface column and their respective connection
To get the other three subnets, enter the following: types in the Connection Type column. Click Edit in the
Config. column to change the WAN settings of the selected
Subnet 1 WAN port. You must save the new number of WAN ports
•• LAN IP Address  192.168.2.65
before you can click Edit to change the settings of any
new WAN ports.
•• Subnet Mask  255.255.255.192
The Connection Type column will display the word
Subnet 2 “Undefined” if you changed the number of WAN ports
but did not click Save Settings. After you save this setting,
•• LAN IP Address  192.168.2.129 the Connection Type column will display, “Obtain an IP
•• Subnet Mask  255.255.255.192 automatically.” The default Connection Type of all WAN
ports is Obtain an IP automatically.
Subnet 3
Edit WAN Connection
•• LAN IP Address  192.168.2.193
After you clicked Edit, configure the WAN settings for the
•• Subnet Mask  255.255.255.192
selected WAN port.
Click Add to List. Then click Save Settings. Interface  The selected WAN port will be displayed.

10/100 16-Port VPN Router 11


Chapter 4 Advanced Configuration

These are the available connection types: Obtain an IP Specify WAN IP Address  Enter the external IP address of
automatically, Static IP, PPPoE, PPTP, and Heart Beat Signal. the Router.
Depending on which connection type you select, you will
Subnet Mask  Enter the subnet mask of the Router.
see various settings.
Default Gateway Address  Enter the IP address of the
Obtain an IP Automatically default gateway.
If your ISP automatically assigns an IP address, select DNS Server (Required) 1/2  Enter at least one DNS server
Obtain an IP automatically. (Most cable modem IP address. Multiple DNS server IP settings are common. In
subscribers use this connection type.) Your ISP assigns most cases, the first available DNS entry is used.
these values.
MTU  The Maximum Transmission Unit (MTU) setting
specifies the largest packet size permitted for network
transmission. In most cases, keep the default, Auto.
To specify the MTU, select Manual, and then enter the
maximum MTU size.
Click Save Settings to save your changes, or click Cancel
Changes to undo them. Click Back to return to the
Network screen without saving any changes.

PPPoE (Point-to-Point Protocol over Ethernet)


Some DSL-based Internet Service Providers (ISPs) use
Obtain an IP Automatically
PPPoE (Point-to-Point Protocol over Ethernet) to establish
Use the Following DNS Server Addresses  If you want to Internet connections for end-users. If you use a DSL
specify DNS server IP addresses, select this option. line, check with your ISP to see if they use PPPoE, select
PPPoE.
DNS Server (Required) 1/2  If you select Use the Following
DNS Server Addresses, enter at least one DNS server IP
address. Multiple DNS server IP settings are common. In
most cases, the first available DNS entry is used.
MTU  The Maximum Transmission Unit (MTU) setting
specifies the largest packet size permitted for network
transmission. In most cases, keep the default, Auto.
To specify the MTU, select Manual, and then enter the
maximum MTU size.
Click Save Settings to save your changes, or click Cancel
Changes to undo them. Click Back to return to the
Network screen without saving any changes. PPPoE

Static IP User Name and Password  Enter your account’s User


Name and Password. The maximum number of characters
If you are required to use a permanent IP address, select
is 60.
Static IP.
Service Name  Enter the Service Name, if provided by
your ISP.
Connect on Demand  If you select the Connect on
Demand option, the connection will be disconnected
after a specified period of inactivity (Max Idle Time). If you
have been disconnected due to inactivity, Connect on
Demand enables the Router to automatically re-establish
your connection as soon as you attempt to access the
Internet again. Enter the number of minutes you want to
have elapsed before your Internet access disconnects. The
default Max Idle Time is 5 minutes.
Static IP

10/100 16-Port VPN Router 12


Chapter 4 Advanced Configuration

Keep Alive: Redial Period  If you select the Keep Alive packets periodically, so your ISP thinks that the connection
option, the Router will keep the connection alive by is still active. This option keeps your connection active
sending out a few data packets periodically, so your ISP indefinitely, even when it sits idle. The default Redial
thinks that the connection is still active. This option keeps Period is 30 seconds.
your connection active indefinitely, even when it sits idle.
MTU  The Maximum Transmission Unit (MTU) setting
The default Redial Period is 30 seconds.
specifies the largest packet size permitted for network
MTU  The Maximum Transmission Unit (MTU) setting transmission. In most cases, keep the default, Auto.
specifies the largest packet size permitted for network To specify the MTU, select Manual, and then enter the
transmission. In most cases, keep the default, Auto. maximum MTU size.
To specify the MTU, select Manual, and then enter the
Click Save Settings to save your changes, or click Cancel
maximum MTU size.
Changes to undo them. Click Back to return to the
Click Save Settings to save your changes, or click Cancel Network screen without saving any changes.
Changes to undo them. Click Back to return to the
Network screen without saving any changes. Heart Beat Signal

PPTP (Point-to-Point Tunneling Protocol) Heart Beat Signal is a service used in Australia only.

Point to Point Tunneling Protocol (PPTP) is a service used


in Europe, Israel, and other countries.

Heart Beat Signal

User Name and Password  Enter your account’s User


Name and Password. The maximum number of characters
is 60.
PPTP Heart Beat Server  Enter the IP address of the Heart Beat
server.
Specify WAN IP Address  Enter the external IP address of
MTU  The Maximum Transmission Unit (MTU) setting
the Router.
specifies the largest packet size permitted for network
Subnet Mask  Enter the subnet mask of the Router. transmission. In most cases, keep the default, Auto.
Default Gateway Address  Enter the IP address of the To specify the MTU, select Manual, and then enter the
default gateway. maximum MTU size.

User Name and Password  Enter your account’s User Click Save Settings to save your changes, or click Cancel
Name and Password. The maximum number of characters Changes to undo them. Click Back to return to the
is 60. Network screen without saving any changes.

Connect on Demand  If you select the Connect on DMZ Setting


Demand option, the connection will be disconnected
The Router comes with a special DMZ port, which is used
after a specified period of inactivity (Max Idle Time). If you
for setting up public servers. The DMZ port sits between
have been disconnected due to inactivity, Connect on
the local network ports and the Internet port. Servers on
Demand enables the Router to automatically re-establish
the DMZ are publicly accessible. Use of the DMZ port is
your connection as soon as you attempt to access the
optional; it may be left unconnected.
Internet again. Enter the number of minutes you want to
have elapsed before your Internet access disconnects. The Using the DMZ is preferred and is, if practical, a strongly
default Max Idle Time is 5 minutes. recommended alternative to using public LAN servers or
putting these servers on WAN ports where they are not
Keep Alive  If you select the Keep Alive option, the Router
protected and not accessible by users on the LAN.
will keep the connection alive by sending out a few data

10/100 16-Port VPN Router 13


Chapter 4 Advanced Configuration

Each of the servers on the DMZ will need a unique, public


Internet IP address. The ISP you use to connect your
network to the Internet should be able to provide these
addresses, as well as information on setting up public
Internet servers. If you plan to use the DMZ setting, contact
your ISP for the static IP information.
The DMZ Setting table displays the DMZ port name in
the Interface column and its IP address in the IP Address
column. Click Edit in the Config. column to change the
DMZ settings of the DMZ port.

Edit DMZ Connection Setup > Password

After you clicked Edit, configure the DMZ settings. Password


Interface  The DMZ port will be displayed.
The User Name is admin; it cannot be changed.
Static IP is automatically selected.
Old Password  Enter the old password. The default is
admin when you first power up the Router.
New Password  Enter a new password for the Router. Your
password must have 20 or fewer characters and cannot
contain any spaces.
Confirm New Password  Re-enter the new password to
confirm it.
Click Save Settings to save your change, or click Cancel
Changes to undo it.

DMZ
Setup > Time
The Router uses the time settings to time stamp log events,
Specify DMZ IP Address  Enter the IP address of the automatically apply the Access Rules and Content Filter,
computer connected to the DMZ port. and perform other activities for other internal purposes.
Subnet Mask  Enter the subnet mask of the computer
connected to the DMZ port. Time
Click Save Settings to save your changes, or click Cancel To set the local time, select Set the local time using the
Changes to undo them. Click Back to return to the Network Time Protocol (NTP) automatically or Set the
Network screen without saving any changes. local time Manually.

Setup > Password Automatic


The Router’s default User Name and Password is admin,
and Linksys strongly recommends that you change the
Router’s password from the default to a unique password.

NOTE: The password cannot be recovered if


it is lost or forgotten. If the password is lost or
forgotten, you have to reset the Router to its
factory default settings; this will remove all of
your configuration changes.

Setup > Time > Automatic

Time Zone  Select your time zone. The default is (GMT-


08:00) Pacific Time (US & Canada); Tijuana.

10/100 16-Port VPN Router 14


Chapter 4 Advanced Configuration

Daylight Saving  To use the daylight saving feature, select


Enabled. Enter the Month and Day of the start date, and
Setup > Forwarding
then enter the Month and Day of the end date. The Forwarding screen allows you to set up port range
forwarding and port triggering applications. Port range
NTP Server  Enter the URL or IP address of the NTP server.
forwarding can be used to set up public services or other
The default is time.nist.gov.
specialized Internet applications on your network, while
Manual port triggering can be used to set up triggered ranges and
forwarded ranges for Internet applications.

Setup > Time > Manual

Hours, Minutes, Seconds  Enter the time.


Month, Day, Year  Enter the date.
Click Save Settings to save your changes, or click Cancel
Changes to undo them.
Setup > Forwarding
Setup > DMZ Host
The DMZ (Demilitarized Zone) Host feature allows one Forwarding
local user to be exposed to the Internet for use of a
special-purpose service such as Internet gaming or Port Range Forwarding
videoconferencing. Although Port Range Forwarding can Port forwarding can be used to set up public services on
only forward ten ranges of ports maximum, DMZ hosting your network. When users from the Internet make certain
forwards all the ports to one computer at the same time. requests on your network, the Router can forward those
requests to computers equipped to handle the requests.
If, for example, you set the port number 80 (HTTP) to be
forwarded to IP address 192.168.1.2, then all HTTP requests
from outside users will be forwarded to 192.168.1.2.

NOTE: You must disable the Router’s DHCP


function to use port forwarding.

You may use this function to establish a web server or FTP


server via an IP gateway. Make sure that you enter a valid
IP address. (You may need to establish a static IP address
Setup > DMZ Host in order to properly run an Internet server.) For added
security, Internet users will be able to communicate with
DMZ Host the server, but they will not actually be connected. The
packets will simply be forwarded through the Router.
DMZ Private IP Address  Enter the local IP address of
the computer you want to expose. The default value of 0 Service  Select the Service you want.
deactivates the DMZ Host. IP Address  Enter the IP address of the server that you
Click Save Settings to save your change, or click Cancel want the Internet users to access.
Changes to undo it.

10/100 16-Port VPN Router 15


Chapter 4 Advanced Configuration

Enable  Select Enable to enable this port range forwarding Port Triggering table. Then the Router will forward the
entry. incoming packets to the LAN host.
If the Service you need is not listed in the menu, click Application Name  Enter the name of the application.
Service Management to add the new service. The Service
Trigger Port Range  Enter the starting and ending port
Management screen appears.
numbers of the trigger port range.
Incoming Port Range  Enter the starting and ending port
numbers of the incoming port range.
Click Add to List, and configure as many entries as you
would like, up to a maximum of 30. To delete an entry,
select it and click Delete selected application.
Click Show Tables to see the details of your entries. The
Port Range Forwarding Table List appears.

Port Range Forwarding Table List


Service Management
Port Range Forwarding  Select this option to view the
Service Name  Enter a name. Port Range Forwarding entries.
Protocol  Select the protocol it uses. Port Triggering  Select this option to view the Port
Port Range  Enter its range. Triggering entries.

Click Add to List. Click Save Settings to save your changes,


or click Cancel Changes to undo them. Click Exit to return
to the Forwarding screen.
If you want to modify a service you have created, select it
and click Update this service. Make changes. Click Save Port Triggering Table List
Settings to save your changes, or click Cancel Changes to
undo them. Click Exit to return to the Forwarding screen. Click Refresh to update the on-screen information. Click
Close to exit this screen and return to the Forwarding
If you want to delete a service you have created, select it screen.
and click Delete selected service. Click Save Settings
to save your changes, or click Cancel Changes to undo On the Forwarding screen, click Save Settings to save your
them. Click Exit to return to the Forwarding screen. changes, or click Cancel Changes to undo them.

On the Forwarding screen, click Add to List, and configure


as many entries as you would like, up to a maximum of
Setup > UPnP
30. To delete an entry, select it and click Delete selected Universal Plug and Play (UPnP) can be used to set up
application. public services on your network. When the UPnP function
is enabled, Windows XP or Vista can modify these entries
Port Triggering via UPnP.
Port triggering allows the Router to watch outgoing data
for specific port numbers. The IP address of the computer
that sends the matching data is remembered by the
Router, so that when the requested data returns through
the Router, the data is pulled back to the proper computer
by way of IP address and port mapping rules.
Some Internet applications or games use alternate ports
to communicate between the server and LAN host. When
you want to use these applications, enter the triggering
(outgoing) port and alternate incoming port in the

10/100 16-Port VPN Router 16


Chapter 4 Advanced Configuration

Settings to save your changes, or click Cancel Changes


to undo them. Click Exit to return to the UPnP screen.
If you want to delete a service you have created, select it
and click Delete selected service. Click Save Settings
to save your changes, or click Cancel Changes to undo
them. Click Exit to return to the UPnP screen.
On the UPnP screen, click Add to List, and configure as
many entries as you would like, up to a maximum of 30.
To delete an entry, select it and click Delete selected
application.
Click Show Tables to see the details of your entries. The
Setup > UPnP UPnP Forwarding Table List appears.

UPnP
UPnP Function  Select Yes to enable the UPnP function.
Otherwise, keep the default, No.
Service  Select the Service you want. UPnP Forwarding Table List

Name or IP Address  Enter the name or IP address of the Click Refresh to update the on-screen information. Click
server that you want the Internet users to access. Close to exit this screen and return to the UPnP screen.
Enable  Select Enable to enable this UPnP entry. On the UPnP screen, click Save Settings to save your
If the Service you need is not listed in the menu, click changes, or click Cancel Changes to undo them.
Service Management to add the new service. The Service
Management screen appears. Setup > One-to-One NAT
One-to-One NAT (Network Address Translation) creates
a relationship that maps valid external IP addresses to
internal IP addresses hidden by NAT. A device with an
internal IP address may be accessed at the corresponding
external valid IP address.
To create this relationship, define internal and external
IP address ranges of equal length. Once the relationship
is defined, the device with the first internal IP address is
accessible at the first IP address in the external IP address
range, and so forth.
For example, you have a Local Area Network (LAN) for which
the ISP has assigned the IP address range of 209.19.28.16
to 209.19.28.31, with 209.19.28.16 used as the Wide Area
Service Management Network (WAN) or NAT public IP address of the Router.
The address range of 192.168.168.1 to 192.168.168.255 is
Service Name  Enter a name. used for the devices on the LAN. With One-to-One NAT,
Protocol  Select the protocol it uses. the devices with the internal IP addresses of 192.168.168.2
to 192.168.168.15 may be accessed at the corresponding
External Port  Enter the external port number. external IP addresses.
Internal Port  Enter the internal port number.
NOTE: The Router’s WAN IP address should not
Click Add to List. Click Save Settings to save your changes,
be included in the range you specify.
or click Cancel Changes to undo them. Click Exit to return
to the UPnP screen.
If you want to modify a service you have created, select it
and click Update this service. Make changes. Click Save

10/100 16-Port VPN Router 17


Chapter 4 Advanced Configuration

Setup > MAC Clone

Setup > One-to-One NAT


MAC Clone
One-to-One NAT The MAC Clone table displays the number of WAN ports
and MAC addresses in the MAC Address column. Click Edit
One-to-One NAT  Select Enable to use the One-to-One
in the Config. column to change the MAC Clone setting of
NAT function.
the selected WAN port.
Add Range
Edit MAC Clone
Private Range Begin  Enter the starting IP address of the
After you clicked Edit, configure the MAC Clone settings
internal IP address range. This is the IP address of the first
for the selected WAN port.
device that can be accessed from the Internet.
Public Range Begin  Enter the starting IP address of the
public IP address range. This IP address is provided by the
ISP. (Do not include the Router’s WAN IP Address.)
Range Length  Enter the number of IP addresses in the
range. The range length cannot exceed the number of
valid IP addresses. To map a single address, enter 1.
Click Add to List, and configure as many entries as you
would like, up to a maximum of ten. To delete an entry,
select it and click Delete selected range.

NOTE: One-to-One NAT affects how the firewall Setup > MAC Clone > Edit MAC Clone
functions work. Access to LAN devices from
Interface  The selected WAN port will be displayed.
the Internet is allowed unless additional Deny
access rules are configured on the Firewall > Enable/Disable  Select the status of the MAC Clone
Access Rules screen. feature.
User Defined WAN MAC Address  To manually clone a
Click Save Settings to save your changes, or click Cancel MAC address, select User Defined WAN MAC Address,
Changes to undo them. and then enter the 12 digits of your adapter’s MAC
address.
Setup > MAC Clone MAC Address from this PC  To clone the MAC address
Some ISPs require that you register a MAC address, which of the computer you are currently using to configure the
is a 12-digit code assigned to a unique piece of hardware Router, select MAC Address from this PC.
for identification. The MAC Clone feature “clones” your Click Save Settings to save your changes, or click Cancel
network adapter’s MAC address onto the Router, so you Changes to undo them. Click Back to return to the MAC
don’t have to call your ISP to change the registered MAC Clone screen without saving any changes.
address to the Router’s MAC address.

10/100 16-Port VPN Router 18


Chapter 4 Advanced Configuration

Setup > DDNS Password  Enter your DynDNS.org account information.


Host Name  Enter your host name in the three Host Name
Dynamic Domain Name System (DDNS) service allows
fields. For example, if your host name were myhouse.
you to assign a fixed domain name to a dynamic WAN IP
dyndns.org, then myhouse would go into the first field,
address, so you can host your own web, FTP or other type
dyndns would go into the second field, and org would go
of TCP/IP server in your LAN. The DDNS feature is disabled
into the last field.
by default.
Custom DNS  DynDNS.org offers a free account and a paid
Before configuring DDNS, visit the website of the
account, which use different authentication methods. If
DDNS service you want to use: www.dyndns.org,
you have a paid account, select this option to register the
www.3322.org, or www.oray.net. Then register a domain
paid account with the DDNS server of DynDNS.org.
name.
Click Save Settings, and the status of the DDNS function
DDNS will be updated.

The DDNS table displays the number of WAN ports, their Internet IP Address  The Router’s current Internet IP
status, and Host Names. Click Edit in the Config. column address is displayed. Because it is dynamic, this will
to change the DDNS settings of the selected WAN port. change.
Status  The status of the DDNS function is displayed. If
the status information indicates an error, make sure you
have correctly entered the information for your account
with your DDNS service.
Click Save Settings to save your changes, or click Cancel
Changes to undo them. Click Back to return to the DDNS
screen without saving any changes.

3322.org

Setup > DDNS

Edit DDNS
After you clicked Edit, configure the DDNS settings for the
selected WAN port.
Interface  The selected WAN port will be displayed.
DDNS Service  The DDNS feature is disabled by default.
To enable this feature, select DynDNS.org, 3322.org, or
Oray.net PeanutHull DDNS. Setup > DDNS > 3322.org

DynDNS.org User name  Enter your 3322.org account information.


Password  Enter your 3322.org account information.
Host Name  Enter your host name in the three Host Name
fields. For example, if your host name were myhouse.3322.
org, then myhouse would go into the first field, 3322
would go into the second field, and org would go into the
last field.
Click Save Settings, and the status of the DDNS function
will be updated.
Internet IP Address  The Router’s current Internet IP
address is displayed. Because it is dynamic, this will
Setup > DDNS > DynDNS.org change.

User name  Enter your DynDNS.org account information.


10/100 16-Port VPN Router 19
Chapter 4 Advanced Configuration

Status  The status of the DDNS function is displayed. If


the status information indicates an error, make sure you
have correctly entered the information for your account
with your DDNS service.
Click Save Settings to save your changes, or click Cancel
Changes to undo them. Click Back to return to the DDNS
screen without saving any changes.

Oray.net PeanutHull DDNS

Setup > Advanced Routing

Advanced Routing
Setup > DDNS > Oray.net PeanutHull DDNS
Dynamic Routing
User name  Enter your PeanutHull account information. The Router’s dynamic routing feature can be used, so
Password  Enter your PeanutHull account information. the Router will automatically adjust to physical changes
in the network’s layout. Using the dynamic RIP protocol,
Host Name  Enter your host name in the three Host Name
the Router calculates the most efficient route for the
fields. For example, if your host name were myhouse.
network’s data packets to travel between the source and
oray.net, then myhouse would go into the first field, oray
the destination, based upon the shortest paths. The RIP
would go into the second field, and net would go into the
protocol regularly broadcasts routing information to
last field.
other routers on the network. It determines the route that
Click Save Settings, and the status of the DDNS function the network packets take based on the fewest number of
will be updated. hops between the source and the destination.
Internet IP Address  The Router’s current Internet IP Working Mode  Select Gateway mode if the Router
address is displayed. Because it is dynamic, this will is hosting your network’s connection to the Internet.
change. Select Router mode if the Router exists on a network
with other routers, including a separate network gateway
Status  The status of the DDNS function is displayed. If
that handles the Internet connection. In Router mode,
the status information indicates an error, make sure you
any computer connected to the Router will not be able
have correctly entered the information for your account
to connect to the Internet unless you have another router
with your DDNS service.
function as the gateway.
Click Save Settings to save your changes, or click Cancel
RIP (Routing Information Protocol)  To use dynamic
Changes to undo them. Click Back to return to the DDNS
routing for communication of network data, select
screen without saving any changes.
Enabled. Otherwise, keep the default, Disabled.
Setup > Advanced Routing Receive RIP versions  To use dynamic routing for
reception of network data, select the protocol you want:
The Advanced Routing screen allows you to configure the None, RIPv1, RIPv2, or Both RIP v1 and v2.
dynamic and static routing settings.
Transmit RIP versions  To use dynamic routing for
transmission of network data, select the protocol you want:
None, RIPv1, RIPv2 - Broadcast, or RIPv2 - Multicast.

10/100 16-Port VPN Router 20


Chapter 4 Advanced Configuration

Static Routing
If the Router is connected to more than one network or
there are multiple routers installed on your network, it
may be necessary to set up static routes. The static routing
function determines the path that data follows over your Routing Table Entry List
network before and after it passes through the Router. You
Click Refresh to update the on-screen information. Click
can use static routing to allow different IP domain users to
Close to exit this screen and return to the Advanced
access the Internet through the Router.
Routing screen.
Static routing is a powerful feature that should be used
On the Advanced Routing screen, click Save Settings
by advanced users only. In many cases, it is better to
to save your changes, or click Cancel Changes to undo
use dynamic routing because it enables the Router to
them.
automatically adjust to physical changes in the network’s
layout.
DHCP > Setup
NOTE: Static routing is an advanced feature. The Router can be used as a DHCP (Dynamic Host
Create these routes with care. Configuration Protocol) server on your network. A DHCP
server automatically assigns available IP addresses to
To create a static route entry, enter the following computers on your network. If you choose to enable the
information: DHCP server option, all of the computers on your LAN
must be set to obtain an IP address automatically from a
Destination IP  Enter the network address of the remote DHCP server. (By default, Windows computers are set to
LAN segment. For a standard Class C IP domain, the obtain an IP automatically.)
network address is the first three fields of the Destination
LAN IP, while the last field should be 0. If the Router’s DHCP server function is disabled, do one of
the following:
Subnet Mask  Enter the subnet mask used on the
destination LAN IP domain. For Class C IP domains, the •• Configure the IP address, subnet mask, and DNS
subnet mask is 255.255.255.0. settings of every computer on your network. (Make
sure you do not assign the same IP address to different
Default Gateway  Enter the IP address of the router of the
computers.)
network, for which this static route is created. For example,
if this network is connected to the local router’s LAN port •• Set up a stand-alone DHCP server with the Router as
through another router, use the WAN IP address of that the default gateway.
router.
Hop Count  Enter the appropriate value (maximum is 15).
This indicates the number of nodes that a data packet
passes through before reaching its destination. A node is
any device on the network, such as a computer or router.
Interface  Select the appropriate interface. The Interface
tells you whether your network is on the LAN or WAN.
If the gateway router is on a LAN port, then select LAN.
If you are connecting to another network through the
Internet, select the appropriate WAN port option.
Click Add to List, and configure as many entries as you
would like, up to a maximum of 30. To delete an entry,
select it and click Delete selected IP.
Click Show Routing Table to see the details of your
entries.

10/100 16-Port VPN Router 21


Chapter 4 Advanced Configuration

Unknown MAC Addresses List

For each device, you can enter a descriptive name in the


Name field. To add an IP address and MAC address set to
the Static IP list, select Enable, and then click Apply. To
add all IP addresses and MAC addresses to the Static IP list,
click Select All.
To update the on-screen information, click Refresh. To exit
this screen and return to the Setup screen, click Close.
Static IP Address  Enter the static IP address. You can
enter 0.0.0.0 if you want the Router to assign a static IP
address to the device.
MAC Address  Enter the MAC address of the device.
Name  Enter a descriptive name for the device.
Enable  Select Enable to assign the static IP address to
this device.
DHCP > Setup Click Add to List, and configure as many entries as you
would like, up to a maximum of 100. To delete an entry,
select it and click Delete selected Entry.
Setup
Block MAC address on the list with wrong IP address  To
Enable DHCP Server  To use the Router as your network’s
block traffic from devices with MAC addresses on the Static
DHCP server, select Enable DHCP Server. If you already
IP list but using the wrong IP addresses, select this option.
have a DHCP server on your network, remove the check
It prevents users from changing device IP addresses
mark. Then configure the Dynamic IP settings.
without your permission.
Dynamic IP Block MAC address not on the list  To block traffic from
devices using dynamic IP addresses, select this option. It
•• Client Lease Time  The Client Lease Time is the amount
blocks all devices with MAC addresses not listed on the
of time a network user will be allowed connection to
Static IP list.
the Router with their current dynamic IP address. Enter
the amount of time, in minutes, that the user will be DNS
“leased” this dynamic IP address. The range is 5-43,200
minutes. The default is 1440 minutes. DNS Server 1-2  You can assign DNS server(s) to the DHCP
clients so the Router will use the DNS server(s) for faster
•• Dynamic IP Range Start/End  Enter a starting IP
access to functioning DNS server(s). Enter the IP address
address and ending IP address to create a range of
of at least one DNS server.
available IP addresses. The default range is 100-149.
(Make sure the Router’s LAN IP address is not in this WINS
dynamic IP range.) For example, if the Router uses the
default LAN IP address, 192.168.1.1, then the starting WINS Server  Windows Internet Naming Service (WINS)
value must be 192.168.1.2 or greater. is a service that resolves NetBIOS names to IP addresses.
WINS is assigned if the computer (DHCP client) requests
Static IP one. If you do not know the IP address of the WINS server,
keep the default, 0.0.0.0.
You can assign a static IP address to a specific device based
on its MAC address.
Show unknown MAC addresses  Click Show unknown
MAC addresses to view all devices’ IP addresses and
corresponding MAC addresses. The Unknown MAC
Addresses List appears.
10/100 16-Port VPN Router 22
Chapter 4 Advanced Configuration

NOTE: To support NetBIOS for DHCP Client Host Name  This is the name assigned to a client
clients, the Router uses two methods. host.
IP Address  It is the dynamic IP address assigned to a
First, when the DHCP clients receive dynamic client.
IP addresses from the Router, it automatically
MAC Address  This indicates the MAC address of a client.
includes the information of the WINS server to
support NetBIOS. Second, if a user sets up a static Leased Time  It displays the amount of time a network
IP address, then the IP address, subnet mask, user will be allowed connection to the Router with their
default gateway, and DNS server settings must current dynamic IP address.
be configured on the Internet Protocol (TCP/IP)
Delete  Click the Trash Can icon to delete a DHCP client,
screen of the Windows operating system. Then
and the client host’s IP address will be released.
the WINS IP address must be configured on the
advanced TCP/IP screen. (For more information, Click Refresh to update the on-screen information.
refer to Windows Help.)
System Management > Multi-WAN
Click Save Settings to save your changes, or click Cancel
Changes to undo them. For the Load Balance feature, you have a choice of
Intelligent Balancer (Auto Mode) and IP Group (By Users),
except for WAN1. The Router reserves at least one WAN
DHCP > Status port for non-IP Group users, so WAN1 will always be set to
On the Status screen, view the status information for the Intelligent Balancer (Auto Mode).
DHCP server and its clients.

System Management > Multi-WAN > Intelligent Balancer (Auto Mode)


DHCP > Status

Status
For the DHCP server, the following information is shown:
DHCP Server  This is the IP address of the DHCP server.
Dynamic IP Used  It shows the number of dynamic IP
addresses used.
Static IP Used  It shows the number of static IP addresses
used.
DHCP Available  This indicates the number of dynamic IP System Management > Multi-WAN > IP Group (By Users)
addresses available.
Total  It shows the total number of dynamic IP addresses Load Balance
that can be assigned by the DHCP server.
Mode
Client Table
Intelligent Balancer (Auto Mode)  Select this option if
For all network clients using the DHCP server, the Client you want all WAN ports to be in Auto Mode. The Router
Table shows the current DHCP Client information: will automatically compute the maximum bandwidth of

10/100 16-Port VPN Router 23


Chapter 4 Advanced Configuration

all WAN ports by using Weighted Round Robin to balance Downstream  Enter the maximum downstream
the loading. bandwidth provided by your ISP. The default is
512 kbit/sec.
IP Group (By Users)  Select this option to group traffic by
different priority levels or classes of service (CoS). It can Network Service Detection
ensure bandwidth and higher priority for the specific IP
addresses of important users, and the IP Group users don’t Network Service Detection can test a WAN port’s network
need to share bandwidth with lower classification users connectivity by pinging the Default Gateway or a specific
who use Intelligent Balancer mode. IP address. This tool can detect the network connection
status of the ISP if you have set up the DNS server in the
If you change the Router’s Load Balance Mode, a Setup > Network screen. If you did not set up the DNS
confirmation message will appear. You have to save this server, the checkbox will be grayed out, and then you
change before you can change the settings of any WAN cannot use the DNS lookup tool.
ports.
Network Service Detection  Network Service Detection
Interface Setting helps manage your connection and can report when your
connection experiences problems. To use this service,
The Interface Setting displays the number of WAN ports
select this option.
and their Load Balance mode in the Mode column. Click
Edit in the Config. column to change the Load Balance Retry Count  Enter the number of times the Router will
settings of the selected WAN port. try to reconnect if the connection fails.

Edit Load Balance (Intelligent Balancer) Retry Timeout  Enter the number of times the Router will
try to make a connection to your ISP before it times out.
After you clicked Edit, configure the Load Balance settings
When Fail  Should the connection be lost, set the Router
for the selected WAN port.
to perform one of the following actions, Remove the
Connection or Generate the Error Condition in the
System Log.
•• Remove the Connection  Failover will occur; the
backup will be used. When the WAN port’s connectivity
is restored, its traffic will also be restored.
•• Generate the Error Condition in the System
Log  Failover will not occur; only an error condition
will be logged.
Default Gateway  Select this option to ping the Default
Gateway.
ISP Host  Select this option to ping the ISP Host. Then
enter the IP address.
Remote Host  Select this option to ping the Remote Host.
Then enter the IP address.
DNS Lookup Host  Select this option to ping the DNS
Lookup Host. Then enter the IP address.

Protocol Binding
System Management > Multi-WAN > Intelligent Balancer > Edit Load
Balance The Router supports Protocol Binding functionality. This
allows you to specify the internal IP and/or Service going
Bandwidth through the selected WAN port.

Interface  The selected WAN port will be displayed. Service  Select the Service you want.
If the Service you need is not listed in the menu, click
The Max. Bandwidth provided by ISP Service Management to add the new service. The Service
Upstream  Enter the maximum upstream bandwidth Management screen appears.
provided by your ISP. The default is 512 kbit/sec.

10/100 16-Port VPN Router 24


Chapter 4 Advanced Configuration

Edit Load Balance (IP Group)


After you clicked Edit, configure the Load Balance settings
for the selected WAN port.

Service Management

Service Name  Enter a name. For IP Binding only, select


All.
Protocol  Select the protocol it uses.
Port Range  Enter its range.
Click Add to List. Click Save Settings to save your changes,
or click Cancel Changes to undo them. Click Exit to return
to the Multi-WAN screen.
If you want to modify a service you have created, select it System Management > Multi-WAN > IP Group (By Users) > Edit Load
and click Update this service. Make changes. Click Save Balance
Settings to save your changes, or click Cancel Changes to
undo them. Click Exit to return to the Multi-WAN screen. Bandwidth
If you want to delete a service you have created, select it Interface  The selected WAN port will be displayed.
and click Delete selected service. Click Save Settings
to save your changes, or click Cancel Changes to undo The Max. Bandwidth provided by ISP
them. Click Exit to return to the Multi-WAN screen. Upstream  Enter the maximum upstream bandwidth
Source IP  Enter the source IP address or range. If you provided by your ISP. The default is 512 kbit/sec.
need Service Binding only, then you can keep the default, Downstream  Enter the maximum downstream
which is 0. bandwidth provided by your ISP. The default is
Destination IP  Enter the destination IP address or range. 512 kbit/sec.
If you need Service Binding only, then you can keep the
Network Service Detection
default, which is 0.
Enable  Select Enable to use this Protocol Binding rule. Network Service Detection can test a WAN port’s network
connectivity by pinging the Default Gateway or a specific
Click Add to List, and configure as many rules as you IP address. This tool can detect the network connection
would like, up to a maximum of 100. To delete a rule, select status of the ISP if you have set up the DNS server in the
it and click Delete selected application. Setup > Network screen. If you did not set up the DNS
Click Save Settings to save your changes, or click Cancel server, the checkbox will be grayed out, and then you
Changes to undo them. cannot use the DNS lookup tool.

On the Edit Load Balance screen, click Save Settings to Network Service Detection  Network Service Detection
save your changes, or click Cancel Changes to undo them. helps manage your connection and can report when your
Click Back to return to the Multi-WAN screen without connection experiences problems. To use this service,
saving any changes. select this option.
Retry Count  Enter the number of times the Router will
try to reconnect if the connection fails.

10/100 16-Port VPN Router 25


Chapter 4 Advanced Configuration

Retry Timeout  Enter the number of times the Router will Port Range  Enter its range.
try to make a connection to your ISP before it times out.
Click Add to List. Click Save Settings to save your changes,
When Fail  Should the connection be lost, set the Router or click Cancel Changes to undo them. Click Exit to return
to perform one of the following actions, Remove the to the Multi-WAN screen.
Connection or Generate the Error Condition in the
If you want to modify a service you have created, select it
System Log.
and click Update this service. Make changes. Click Save
•• Remove the Connection  Failover will occur; the Settings to save your changes, or click Cancel Changes to
backup will be used. When the WAN port’s connectivity undo them. Click Exit to return to the Multi-WAN screen.
is restored, its traffic will also be restored.
If you want to delete a service you have created, select it
•• Generate the Error Condition in the System and click Delete selected service. Click Save Settings
Log  Failover will not occur; only an error condition to save your changes, or click Cancel Changes to undo
will be logged. them. Click Exit to return to the Multi-WAN screen.
Default Gateway  Select this option to ping the Default Source IP  Enter the source IP address or range. If you only
Gateway. need to specify the Service, then keep the default, which
is 0 to 0.
ISP Host  Select this option to ping the ISP Host. Then
enter the IP address. Destination IP  Enter the destination IP address or range.
If you only need to specify the Service, then keep the
Remote Host  Select this option to ping the Remote Host.
default, which is a series of zeroes.
Then enter the IP address.
Enable  Select Enable to use this Protocol Binding rule.
DNS Lookup Host  Select this option to ping the DNS
Lookup Host. Then enter the IP address. Click Add to List, and configure as many rules as you
would like, up to a maximum of 100. To delete a rule, select
IP Group it and click Delete selected application.
The IP Group settings allow you to specify the IP Group, Click Save Settings to save your changes, or click Cancel
as well as the Service or Destination IP going through the Changes to undo them.
selected WAN port.
On the Edit Load Balance screen, click Save Settings to
These settings are not available for WAN1, which always save your changes, or click Cancel Changes to undo them.
uses Intelligent Balancer (Auto Mode). Click Back to return to the Multi-WAN screen without
Service  Select the Service you want. saving any changes.

If the Service you need is not listed in the menu, click


Service Management to add the new service. The Service
System Management > Bandwidth
Management screen appears. Management
Quality of Service (QoS) features let you control how
the Router manages network traffic. With Bandwidth
Management (Layer 3), the Router can provide better
service to selected types of network traffic. There are two
types of functionality available, and only one type can
work at one time. Rate Control functionality is for minimum
(guaranteed) bandwidth and maximum bandwidth by
service or IP address, while Priority functionality is for
services. Both types can control inbound or outbound
traffic.

Service Management

Service Name  Enter a name. For IP Binding only, select


All.
Protocol  Select the protocol it uses.
10/100 16-Port VPN Router 26
Chapter 4 Advanced Configuration

Service Management

Service Name  Enter a name.


Protocol  Select the protocol it uses.
Port Range  Enter its range.
System Management > Bandwidth Management > Rate Control
Click Add to List. Click Save Settings to save your changes,
or click Cancel Changes to undo them. Click Exit to return
Bandwidth Management to the Bandwidth Management screen.
The Maximum Bandwidth provided by ISP If you want to modify a service you have created, select it
and click Update this service. Make changes. Click Save
Upstream  Enter the maximum upstream bandwidth
Settings to save your changes, or click Cancel Changes
provided by your ISP. The default is 512 kbit/sec.
to undo them. Click Exit to return to the Bandwidth
Downstream  Enter the maximum downstream Management screen.
bandwidth provided by your ISP. The default is
If you want to delete a service you have created, select it
512 kbit/sec.
and click Delete selected service. Click Save Settings
Bandwidth Management Type to save your changes, or click Cancel Changes to undo
them. Click Exit to return to the Bandwidth Management
Type  Select the type of functionality you want to use, screen.
Rate Control or Priority. Rate Control functionality is
IP  Enter the IP address or range you need to control. To
for minimum (guaranteed) bandwidth and maximum
include all internal IP addresses, keep the default, 0.
(limited) bandwidth by service or IP address, while
Priority functionality is for services. Then proceed to the Direction  Select Upstream for outbound traffic, or select
instructions for the type you selected. Downstream for inbound traffic.
Min. Rate  Enter the minimum rate for the guaranteed
Rate Control
bandwidth.
Interface  Select the appropriate WAN interface.
Max. Rate  Enter the maximum rate for the maximum
Service  Select the Service you want. bandwidth.
If the Service you need is not listed in the menu, click Enable  Select Enable to use this Rate Control rule.
Service Management to add the new service. The Service
Click Add to List, and configure as many rules as you
Management screen appears.
would like, up to a maximum of 100. To delete a rule, select
it and click Delete selected application.
Click Summary to see a summary of the Rate Control
rules.

10/100 16-Port VPN Router 27


Chapter 4 Advanced Configuration

Service Name  Enter a name.


Protocol  Select the protocol it uses.
Port Range  Enter its range.
Summary (Rate Control Selected)
Click Add to List. Click Save Settings to save your changes,
To change a rule, click Edit. To update the list, click or click Cancel Changes to undo them. Click Exit to return
Refresh. To return to the Bandwidth Management screen, to the Bandwidth Management screen.
click Close. If you want to modify a service you have created, select it
On the Bandwidth Management screen, click Save Settings and click Update this service. Make changes. Click Save
to save your changes, or click Cancel Changes to undo Settings to save your changes, or click Cancel Changes
them. to undo them. Click Exit to return to the Bandwidth
Management screen.
Priority If you want to delete a service you have created, select it
and click Delete selected service. Click Save Settings
to save your changes, or click Cancel Changes to undo
them. Click Exit to return to the Bandwidth Management
screen.
Direction  Select Upstream for outbound traffic, or select
Downstream for inbound traffic.
Priority  Select High, Middle, or Low. High priority
services will share 30% of the total system bandwidth.
Middle priority services will share 60% of the total system
bandwidth. Low priority services will share 10% of the
total bandwidth. The default is Middle.
Enable  Select Enable to use this Priority rule.
Click Add to List, and configure as many rules as you
would like, up to a maximum of 50. To delete a rule, select
it and click Delete selected application.
Click Summary to see a summary of the Priority rules. The
System Management > Bandwidth Management > Priority Summary screen appears.
Interface  Select the appropriate WAN interface.
Service  Select the Service you want.
If the Service you need is not listed in the menu, click
Service Management to add the new service. The Service Summary (Priority Selected)
Management screen appears.
To change a rule, click Edit. To update the list, click
Refresh. To return to the Bandwidth Management screen,
click Close.
On the Bandwidth Management screen, click Save Settings
to save your changes, or click Cancel Changes to undo
them.

System Management > SNMP


SNMP, or Simple Network Management Protocol, is a
network protocol that provides network administrators
with the ability to monitor the status of the Router and
receive notification of any critical events as they occur on
the network. The Router supports SNMP v1/v2c and all
relevant Management Information Base II (MIBII) groups.
Service Management

10/100 16-Port VPN Router 28


Chapter 4 Advanced Configuration

The appliance replies to SNMP Get commands for MIBII via TCP/IP addresses to access Internet resources. The DNS
any interface and supports a custom MIB for generating Name Lookup tool will return the numerical TCP/IP address
trap messages. of a host name.
The ping test bounces a packet off a machine on the
Internet back to the sender. This test shows if the Router
is able to contact the remote host. If users on the LAN
are having problems accessing services on the Internet,
try pinging the DNS server or other machine at the ISP’s
location. If this test is successful, try pinging devices
outside the ISP. This will show if the problem lies with the
ISP’s connection.

Diagnostic
DNS Name Lookup/Ping  Select which tool you want
System Management > SNMP to use, DNS Name Lookup or Ping. Then proceed to the
appropriate instructions.
SNMP Enable  SNMP is enabled by default. To disable the
SNMP agent, click this option to remove the check mark. DNS Name Lookup
System Name  Set the hostname for the Router. Before using this tool, make sure the IP address of the DNS
System Contact  Enter the name of the network server is entered on the Setup > Network screen; otherwise,
administrator who can be contacted with updates about this tool will not work.
the Router.
System Location  Enter the network administrator’s
contact information: an e-mail address, telephone number,
or pager number.
Get Community Name  Create the name for a group
or community of administrators who can view SNMP
data. The default is public. A name of no more than 64
alphanumeric characters long must be entered.
Set Community Name  Create the name for a group or
community of administrators who can receive SNMP
traps, messages regarding the Router’s status. A name of System Management > Diagnostic > DNS Name Lookup
no more than 64 alphanumeric characters long must be
entered. Look up the name  Enter the host name, and click Go.
(Do not add the prefix http:// or else you will get an error
Trap Community Name  Create the password that will
message.) The Router will then query the DNS server and
be sent with each trap to the SNMP manager. A name of
display the results.
no more than 64 alphanumeric characters long must be
entered. Name  The host name is displayed.
Send SNMP Trap to  Enter the IP address or domain name Address  The URL of the host is displayed.
that should receive the traps sent by the Router.
Ping
Click Save Settings to save your changes, or click Cancel
Changes to undo them. Before using this tool make sure you know the device or
host’s IP address. If you do not know it, use the Router’s
System Management > Diagnostic DNS Name Lookup tool to find the IP address.

The Router has two built-in tools, DNS Name Lookup


and Ping, which are used for troubleshooting network
problems.
The Internet has a service called the Domain Name Service
(DNS), which allows users to enter an easily remembered
host name, such as www.linksys.com, instead of numerical

10/100 16-Port VPN Router 29


Chapter 4 Advanced Configuration

Factory Default Confirmation

System Management > Firmware Upgrade


You can use this feature to upgrade the Router’s firmware
to the latest version.
System Management > Diagnostic > Ping

Ping host or IP address  Enter the IP address of the device


being pinged, and click Go. The test will take a few seconds
to complete. Then the Router will display the results.
Status  The status of the ping test is displayed.
Packets  The number of packets transmitted, number
of packets received, and percentage of packets lost are
displayed.
Round Trip Time  The minimum, maximum, and average
round trip times are displayed.
System Management > Firmware Upgrade
System Management > Factory Default
Use this screen to clear all of your configuration information
Firmware Upgrade
and restore the Router to its factory default settings. Only To download the firmware, refer to the Firmware Download
use this feature if you wish to discard all the settings and instructions. If you have already downloaded the firmware
preferences that you have configured. onto your computer, then click the Browse button to look
for the extracted file.
Firmware Upgrade Right Now  After you have selected
the extracted file, click Firmware Upgrade Right Now.

NOTE: The Router will take approximately ten


minutes to upgrade its firmware. During this
process, do not power off the Router or press
the Reset button.

Firmware Download
System Management > Factory Default Firmware Download from Linksys Web Site  If you need
to download the latest version of the Router’s firmware,
Factory Default click Firmware Download from Linksys Web Site. The
Support page of the Linksys website appears.
Return to Factory Default Setting  Click Return to
Factory Default Setting if you want to restore the Router Follow the on-screen instructions to access the Downloads
to its factory default settings. After clicking the button, a page for the 10/100 16-Port VPN Router (model number:
confirmation screen appears. Click OK to continue. RV016). Then download the firmware upgrade file.
Extract the file on your computer. Then follow the Firmware
Upgrade instructions.

System Management > Restart


If you need to restart the Router, Linksys recommends that
you use the Restart tool on this screen. When you restart
10/100 16-Port VPN Router 30
Chapter 4 Advanced Configuration

from the Restart screen, then the Router will send out your
log file before it is reset.

System Management > Setting Backup

System Management > Restart


Import Configuration File
To import a configuration file, first specify where your
Restart backup preferences file is located. Click Browse, and then
select the appropriate configuration file.
Restart Router  Click Restart Router to restart the Router.
After clicking the button, a confirmation screen appears. Import  After you select the file, click Import. This process
Click OK to continue. may take up to a minute. Then restart the Router so that
the changes will take effect.

Export Configuration File


Export  To export the Router’s current configuration file,
click Export.

Restart Confirmation

Active Firmware Version  By default, the current firmware


version is selected.
Backup Firmware Version  You can restart the Router
using a previous firmware version; however, all custom
settings will be reset to their factory defaults. (If you want
to save your custom settings before the restart, use the
Setting Backup screen.) To use the previous firmware
version for the restart, select Backup Firmware Version.
File Download
System Management > Setting Backup
Click Save, and then select the location where you want
This screen allows you to make a backup file of your to store your backup preferences file. By default, this file
preferences file for the Router. To save the backup file, you will be called RV016.exp, but you may rename it if you
need to export the configuration file. wish. This process may take up to a minute.
To use the backup preferences file, you need to import the
configuration file that you previously exported. Port Management > Port Setup
Configure the connection settings for each local port,
such as priority, speed, and duplex. You can also enable or
disable the auto-negotiation feature for all ports.

10/100 16-Port VPN Router 31


Chapter 4 Advanced Configuration

Port Management > Port Status


Status information is displayed for the selected port.

Port Management > Port Setup


Port Management > Port Status
Basic Per Port Config. Port ID  To see the status information and settings for a
By default, the Router allows you to simultaneously specific port, select its ID number or name.
connect two broadband connections to the Router;
however, you can set up as many as seven broadband Port Status
connections.
Summary
From the drop-down menu, select how many WAN ports
you want to use. The default is 2. (You can also change the For the selected port, the Summary table displays the
number of WAN ports using the Setup > Network screen.) following:
Make sure the physical network configuration matches
Type  The port type is displayed.
the number of WAN port settings on this screen.
Interface  The interface type, LAN or WAN, is displayed.
If you change the number of WAN ports, click Save
Settings to save your change. A confirmation message Link Status  The status of the connection is displayed.
will appear. Then click OK to save the new setting. Port Activity  The status of the port is displayed.
The Basic Per Port Config. table displays the following: Speed Status  The speed of the port, 10 Mbps, or 100
Port ID  The port number or name is displayed. Mbps, is displayed.
Interface  The port’s interface type: LAN, WAN, or DMZ, is Duplex Status  The duplex mode is displayed, Half or
displayed. Full.
Disable  To disable a port, select Disable. Auto negotiation  The status of the feature is displayed.
Priority  For port-based QoS, select the appropriate VLAN  The VLAN of the port is displayed.
priority level, High or Normal.
Statistics
Speed  Select the port speed, 10M or 100M.
For the selected port, the Statistics table displays the
Duplex  Select the duplex mode, Half or Full.
following:
Auto Neg.  Select Enable if you want the Router’s ports
Port Receive Packet Count  The number of packets
to auto-negotiate connection speeds and duplex mode;
received is displayed.
then you will not need to set up speed and duplex settings
separately. Port Receive Packet Byte Count  The number of packet
bytes received is displayed.
VLAN  For each LAN port, a VLAN (a Virtual LAN, or
network within your network) can be established. Up to Port Transmit Packet Count  The number of packets
13 VLANs can be established. transmitted is displayed.
Click Save Settings to save your changes, or click Cancel Port Transmit Packet Byte Count  The number of packet
Changes to undo them. bytes transmitted is displayed.

10/100 16-Port VPN Router 32


Chapter 4 Advanced Configuration

Port Packet Error Count  The number of packet errors is Password screen (this prevents any user from accessing
displayed. the Router with the default password). Then select Enable
for the Remote Management setting, and enter the port
To update the on-screen information, click Refresh.
number (port 80, the default, or 8080 is usually used).
Firewall > General NOTE: If the Remote Management feature on
Enable or disable a variety of firewall, security, and web the Firewall > General screen has been enabled,
features. then users with administrative privileges can
remotely access the web-based utility. Use
http://<WAN IP address of the Router>, or
use https://<WAN IP address of the Router> if
you have enabled the HTTPS feature.

HTTPS  HTTPS is a secured HTTP session. If Remote


Management is enabled, HTTPS is enabled by default.

NOTE: If you disable the HTTPS feature, then


you also disable the Linksys QuickVPN service
on the Router.

Multicast Pass Through  This option is disabled by default.


IP multicasting occurs when a single data transmission
is sent to multiple recipients at the same time. Using
this feature, the Router allows IP multicast packets to be
forwarded to the appropriate LAN devices. Multicast Pass
Through is used for Internet games, videoconferencing,
and multimedia applications.

Firewall > General Restrict WEB Features


Block  Select the filters you want to use.
General
•• Java  Java is a programming language for websites. If
Firewall  The firewall is enabled by default. If you disable you deny Java applets, you run the risk of losing access
it, then the SPI, DoS, and Block WAN Request features, to Internet sites created using this programming
Access Rules, and Content Filters will also be disabled, and language. To block Java applets, select Java.
the Remote Management feature will be enabled.
•• Cookies  A cookie is data stored on your PC and used
SPI (Stateful Packet Inspection)  This option is enabled by Internet sites when you interact with them. To block
by default. The Router’s firewall uses Stateful Packet cookies, select Cookies.
Inspection to review the information that passes through
the firewall. It inspects all packets based on the established •• ActiveX  ActiveX is a programming language for
connection, prior to passing the packets for processing websites. If you deny ActiveX, you run the risk of losing
through a higher protocol layer. access to Internet sites created using this programming
language. To block ActiveX, select ActiveX.
DoS (Denial of Service)  This option is enabled by default.
It protects internal networks from Internet attacks, such •• Access to HTTP Proxy Servers  Use of WAN proxy
as SYN Flooding, Smurf, LAND, Ping of Death, IP Spoofing, servers may compromise the Router’s security. If you
and reassembly attacks. block access to HTTP proxy servers, then you block
access to WAN proxy servers. To block access, select
Block WAN Request  This option is enabled by default. Access to HTTP Proxy Servers.
Using this feature, the Router drops both unaccepted TCP
request and ICMP packets from the WAN side. Hackers will Don’t block Java/ActiveX/Cookies/Proxy to Trusted
not find the Router by pinging the WAN IP address. Domains  To keep trusted sites unblocked, select this
option.
Remote Management  This option is disabled by
default. If you want to manage the Router through a WAN Add  Enter the domain you want to block.
connection, first change the password on the Setup >

10/100 16-Port VPN Router 33


Chapter 4 Advanced Configuration

To add a domain to the list, click Add to list. To remove a Access Rules
domain from the list, select the entry, and click the Delete
selected domain. Except for the default rules, all configured access rules
are listed in the Access Rules table, and you can set the
Click Save Settings to save your changes, or click Cancel priority for each custom rule.
Changes to undo them.
If the Access Rules table has multiple pages, select a
Firewall > Access Rules different page to view from the Jump to drop-down menu.
If you want more or fewer entries listed per page, select
Access rules evaluate network traffic to decide whether a different number from the entries per page drop-down
or not it is allowed to pass through the Router’s firewall. menu.
Access Rules look specifically at a data transmission’s
For each access rule, the Access Rules table lists the
source IP address, destination IP address, and IP protocol
following:
type, and you can apply each access rule according to a
different schedule. Priority  The priority of the access rule is displayed, 1
indicating the highest priority. To change its priority, select
With the use of custom rules, it is possible to disable all
a different priority from the drop-down menu. (When an
firewall protection or block all access to the Internet, so
access rule is created, the Router automatically assigns a
use extreme caution when creating or deleting access
priority; however, you can change the priority after the
rules.
rule is created.) If there is a conflict between two access
The Router has the following default rules: rules, then the higher priority rule takes precedence. The
default access rules have the lowest priority.
•• All traffic from the LAN to the WAN is allowed.
Enable  The status of the access rule is displayed. To
•• All traffic from the WAN to the LAN is denied.
enable or disable a rule, click the Enable check box.
•• All traffic from the LAN to the DMZ is allowed.
Action  The Action, Allow or Deny, is displayed.
•• All traffic from the DMZ to the LAN is denied.
Service  The Service is displayed.
•• All traffic from the WAN to the DMZ is allowed.
Source Interface  The Source Interface, LAN or WAN, is
•• All traffic from the DMZ to the WAN is allowed. displayed.
Custom rules can be created to override the above default Source  The specific Source is displayed.
rules, but there are four additional default rules that will
be always active and cannot be overridden by any custom Destination  The specific Destination is displayed.
rules. Time  The time interval to which the access rule applies
is displayed.
•• HTTP service from the LAN to the Router is always
allowed. Day  The days to which the access rule applies is
displayed.
•• DHCP service from the LAN is always allowed.
Click Edit to edit an access rule, or click the Trash Can icon
•• DNS service from the LAN is always allowed.
to delete an access rule.
•• Ping service from the LAN to the Router is always
Click Add New Rule to add new access rules, and the Add
allowed.
a New Access Rule screen appears.
Click the Restore to Default Rules to restore the default
rules and delete the custom access rules.

Firewall > Access Rules

10/100 16-Port VPN Router 34


Chapter 4 Advanced Configuration

Add a New Access Rule Settings to save your changes, or click Cancel Changes
to undo them. Click Exit to return to the Add a New Access
Rule screen.
If you want to delete a service you have created, select it
and click Delete selected service. Click Save Settings to
save your changes, or click Cancel Changes to undo them.
Click Exit to return to the Add a New Access Rule screen.
Log  The Router can keep a log tracking this type of
activity. To keep a log, select Log packets match this
access rule. If you do not want a log, select Do Not Log
these packets.

NOTE: If the Deny Policies option is enabled on


Add a New Access Rule the Log > System Log screen, then the log will
not include log events from the Deny access
Services rules on the Firewall > Access Rules screen.
Log events from the Deny access rules will be
Wizard  If you need help to configure the access rules, logged separately from Deny Policies if the
click Wizard, and follow the on-screen instructions. For option, Log packets match this rule, is selected.
additional information, refer to the “Wizard” section of this
chapter. If the Allow Policies option is enabled on the
Action  Select Allow or Deny, depending on the purpose Log > System Log screen, then the log will
of the access rule. include log events from the Allow access rules
on the Firewall > Access Rules screen, regardless
Service  Select the Service you want.
of the option, Log packets match this rule.
If the Service you need is not listed in the menu, click
Service Management to add the new service. The Service Source Interface  Select WAN, LAN, or Any.
Management screen appears.
Source IP  Select the Source IP address(es) for the access
rule. If it can be any IP address, select Any. If it is one IP
address, select Single and enter the IP address. If it is a
range of IP addresses, select Range, and enter the starting
and ending IP addresses in the fields provided.
Destination IP  Select the Destination IP address(es) for
the access rule. If it can be any IP address, select Any. If it
is one IP address, select Single and enter the IP address.
If it is a range of IP addresses, select Range, and enter the
starting and ending IP addresses in the fields provided.

Scheduling
Apply this rule  Decide when you want the access rule to
be enforced. To specify days of the week, select 24 Hr, and
then select the appropriate days.
Service Management
To specify specific hours, select from, and enter the
Service Name  Enter a name. specific hours and minutes in 24-hour format. Then select
Protocol  Select the protocol it uses. the appropriate days.
Port Range  Enter its range. The default for any new rule is to always enforce it.
Click Add to List. Click Save Settings to save your changes, Click Save Settings to save your changes, or click Cancel
or click Cancel Changes to undo them. Click Exit to return Changes to undo them. Click Return to return to the
to the Add a New Access Rule screen. Access Rules screen.
If you want to modify a service you have created, select it
and click Update this service. Make changes. Click Save

10/100 16-Port VPN Router 35


Chapter 4 Advanced Configuration

Firewall > Content Filter Click Save Settings to save your changes, or click Cancel
Changes to undo them.
Use this screen to block specific domains during the
designated days and times for specific devices. NOTE: The content filter rules will be
automatically disabled if the Trend Micro
ProtectLink service is activated on the Router.

ProtectLink
For information about the ProtectLink tab, refer to
“Appendix G: Trend Micro ProtectLink Gateway Service”.

VPN > Summary


This screen displays general information about the
Router’s VPN tunnel settings. The Router supports up to
100 tunnels.

Firewall > Content Filter

Content Filter
Forbidden Domains
Block Forbidden Domains  To block access to the VPN > Summary
websites on the Forbidden Domains list, select this
option. Summary
Add  Enter the domain you want to block.
Tunnel Used  The number of VPN tunnels being used is
To add a domain to the list, click Add to list. To remove a displayed.
domain from the list, select the entry, and click the Delete
Tunnel Available  The number of available VPN tunnels
selected domain.
is displayed.
Website Blocking by Keywords Detail  Click Detail for more information.
Enable Website Blocking by Keywords  To block access
to websites using the keywords on the Website Blocking
by Keywords list, select this option.
Add  Enter the keyword you want to block.
To add a keyword to the list, click Add to list. To remove a
domain from the list, select the entry, and click the Delete
selected keywords. VPN Summary Details

Scheduling  Decide when you want the content filters The WAN IP addresses will be displayed.
rules to be enforced. To specify specific hours, select
from, and enter the specific hours and minutes in 24-hour For each VPN tunnel, the No., Name, Status, Phase 2 Enc/
format. Then select the appropriate days. Auth/Grp, Local Group, Remote Group, and Remote
Gateway will be displayed.
The default is to always enforce it.

10/100 16-Port VPN Router 36


Chapter 4 Advanced Configuration

For each group VPN, the Group Name, number of Phase2 Enc/Auth/Grp  This shows the Phase 2
Connected Tunnels, Phase 2 Encrypt/Auth/Group, Local Encryption type (NULL/DES/3DES/AES-128/AES-192/
Group, and Remote Client will be displayed. AES-256), Authentication method (NULL/MD5/SHA1),
and DH Group number (1/2/5) that you chose in the IPSec
Click Close to exit this screen and return to the Summary
Setup section.
screen.
If you selected Manual for the Keying Mode in the IPSec
Tunnel Status section, then only the Encryption type and Authentication
Add New Tunnel  Click Add New Tunnel to add a VPN method will be displayed.
tunnel. The Mode Choose screen appears. Local Group  This shows the IP address and subnet mask
of the Local Group.
Remote Group  The IP address and subnet mask of the
Remote Group are displayed here.
Remote Gateway  It shows the IP address of the Remote
Gateway.
Tunnel Test  Click Connect to verify the status of the
VPN tunnel. The test result will be updated in the Status
column. If the tunnel is connected, a Disconnect button
will be available so you can end the connection.
Config.  Click Edit to open a new screen where you
can change the tunnel’s settings. Refer to the “Gateway
to Gateway” or “Client to Gateway” section for more
information. Click the Trash Can icon to delete all of your
tunnel settings for each individual tunnel.
Mode Choose Tunnel Enabled  The number of enabled VPN tunnels is
displayed.
Gateway to Gateway
Tunnel Defined  The number of defined VPN tunnels is
To create a tunnel between two VPN devices, such as two displayed.
VPN Routers, click Add Now. The Gateway to Gateway
screen appears. Proceed to the “VPN > Gateway to GroupVPN Status
Gateway” section for instructions. Click Return to return
If you do not enable the GroupVPN setting for any of your
to the Summary screen.
Client to Gateway tunnels, then this section will be blank.
Client to Gateway Group Name  This shows the name you entered when
To create a tunnel between the VPN Router and the client you created the Client to Gateway tunnel.
using VPN client software that supports IPSec, click Add Connected Tunnels  This shows the number of users
Now. The Client to Gateway screen appears. Proceed to the logged into the group VPN.
“VPN > Client to Gateway” section for instructions. Click
Phase2 Enc/Auth/Grp  This shows the Phase 2
Return to return to the Summary screen.
Encryption type (NULL/DES/3DES/AES-128/AES-192/AES-
If the VPN Summary table has multiple pages, select a 256), Authentication method (NULL/MD5/SHA1), and DH
different page to view from the Jump to drop-down menu. Group number (1/2/5) that you chose in the IPSec Setup
If you want more or fewer entries listed per page, select section.
a different number from the entries per page drop-down
Local Group  This shows the IP address and subnet mask
menu.
of the Local Group.
After you have added the VPN tunnel, you will see it listed
Remote Client  This shows the remote clients in the
in the table.
group VPN.
No.  It shows the number of the VPN tunnel.
Remote Clients Status  Click Detail List to display the
Name  It shows the Tunnel Name that you gave the VPN Group Name, IP address and Connection Time of this group
tunnel. VPN. Click Refresh to update the on-screen information.
Status  This indicates the status of the VPN tunnel. Click Close to exit this screen and return to the Summary
screen.
10/100 16-Port VPN Router 37
Chapter 4 Advanced Configuration

Tunnel Test  Click Connect to verify the status of the


group VPN. The test result will be updated in the Status
column. If the group VPN is connected, a Disconnect
button will be available so you can end the connection.
Config.  Click Edit to open a new screen where you
can change the tunnel’s settings. Refer to the “Client to
Gateway” section for more information. Click the Trash
Can icon to delete all of your settings for each individual
group VPN.

VPN Clients Status


This section identifies the VPN clients currently connected
to the Router.
No.  It shows the number of the VPN client.
Username  It shows the name of the VPN client.
Status  This indicates the status of the VPN client
connection.
Start Time  This shows the time when the VPN client
established its VPN connection to the Router.
End Time  This shows the time when the VPN client ended VPN > Gateway to Gateway
its VPN connection to the Router.
Duration  This shows how long the VPN connection Add a New Tunnel
existed.
Tunnel No  The tunnel number is automatically
To disconnect any VPN client, select the VPN client in the generated.
Disconnect column, and then click Disconnect.
Tunnel Name  Enter a name for this VPN tunnel, such as
Los Angeles Office, Chicago Branch, or New York Division.
VPN > Gateway to Gateway This allows you to identify multiple tunnels and does not
Use this screen to create a new tunnel between two VPN have to match the name used at the other end of the
devices. tunnel.
Interface  Select the appropriate WAN port.
Enable  Check this box to enable a VPN tunnel. (When
you create a VPN tunnel, this check box will be disabled.)

Local Group Setup


Local Security Gateway Type
Select the type you want to use: IP Only, IP + Domain
Name(FQDN) Authentication, IP + E-mail Addr.(USER
FQDN) Authentication, Dynamic IP + Domain
Name(FQDN) Authentication, or Dynamic IP + E-
mail Addr.(USER FQDN) Authentication. Follow the
instructions for the type you want to use.

NOTE: The Local Security Gateway Type you


select should match the Remote Security
Gateway Type selected on the VPN device at the
other end of the tunnel.

10/100 16-Port VPN Router 38


Chapter 4 Advanced Configuration

IP Only
The default is IP Only. Only the device with a specific IP
address will be able to access the tunnel.

Local Security Gateway Type > Dynamic IP + Domain Name(FQDN)


Authentication

Domain Name  Enter the domain name for authentication.


(Once used, you cannot use it again to create a new tunnel
Local Security Gateway Type > IP Only connection.)

IP address  The WAN (or Internet) IP address of the Router Dynamic IP + E-mail Addr.(USER FQDN) Authentication
automatically appears. The Local Security Gateway will be a dynamic IP address,
IP + Domain Name(FQDN) Authentication so you do not need to enter the IP address. When the
Remote Security Gateway requests to create a tunnel with
The IP address and FQDN must match the Remote Security the Router, the Router will work as a responder.
Gateway of the remote VPN device, and they can only be
used for one tunnel connection.

Local Security Gateway Type > Dynamic IP + E-mail Addr.(USER FQDN)


Authentication

Local Security Gateway Type > IP + Domain Name(FQDN) E-mail address  Enter the e-mail address for
Authentication authentication.
Domain Name  The Fully Qualified Domain Name (FQDN) Local Security Group Type
is the host name and domain name for a specific computer
on the Internet. Enter the FQDN of the Router. Select the local LAN user(s) behind the Router that can
use this VPN tunnel. Select the type you want to use: IP,
IP address  The WAN (or Internet) IP address of the Router Subnet, or IP Range. Follow the instructions for the type
automatically appears. you want to use.
IP + E-mail Addr.(USER FQDN) Authentication
NOTE: The Local Security Group Type you select
should match the Remote Security Group Type
selected on the VPN device at the other end of
the tunnel.

After you have selected the Local Security Group Type, the
Local Security Gateway Type > IP + E-mail Addr.(USER FQDN) settings available on this screen may change, depending
Authentication on which selection you have made.
E-mail address  Enter the e-mail address for IP
authentication.
Only the computer with a specific IP address will be able
IP address  The WAN (or Internet) IP address of the Router to access the tunnel.
automatically appears.
Dynamic IP + Domain Name(FQDN) Authentication
The Local Security Gateway will be a dynamic IP address, Local Security Group Type > IP
so you do not need to enter the IP address. When the
Remote Security Gateway requests to create a tunnel with IP address  Enter the appropriate IP address. The default
the Router, the Router will work as a responder. IP is 192.168.1.0.

The domain name must match the Remote Security Subnet


Gateway of the remote VPN device and can only be used The default is Subnet. All computers on the local subnet
for one tunnel connection. will be able to access the tunnel.

10/100 16-Port VPN Router 39


Chapter 4 Advanced Configuration

IP address  Select this option if you know the static IP


address of the remote VPN device at the other end of the
tunnel, and then enter the IP address.
Local Security Group Type > Subnet
IP by DNS Resolved  Select this option if you do not
IP address  Enter the IP address. The default is know the static IP address of the remote VPN device but
192.168.1.0. you do know its domain name. Then enter the remote
VPN device’s domain name on the Internet. The Router
Subnet Mask  Enter the subnet mask. The default is
will retrieve the IP address of the remote VPN device via its
255.255.255.0.
public DNS records.
IP Range
IP + Domain Name(FQDN) Authentication
Specify a range of IP addresses within a subnet that will be
The IP address and domain name ID must match the Local
able to access the tunnel.
Gateway of the remote VPN device, and they can only be
used for one tunnel connection.

Local Security Group Type > IP Range

IP range  Enter the range of IP addresses. The default is


192.168.1.0~254.

Remote Group Setup Remote Security Gateway Type > IP + Domain Name(FQDN)
Authentication
Before you configure the Remote Group Setup, make
sure your VPN tunnel will have two different IP subnets. IP address  Select this option if you know the static IP
For example, if the local VPN Router has an IP scheme of address of the remote VPN device at the other end of the
192.168.1.x (x being a number from 1 to 254), then the tunnel, and then enter the IP address.
remote VPN router should have a different IP scheme, IP by DNS Resolved  Select this option if you do not
such as 192.168.2.y (y being a number from 1 to 254). know the static IP address of the remote VPN device but
Otherwise, the IP addresses will conflict, and the VPN you do know its domain name. Then enter the remote
tunnel cannot be created. VPN device’s domain name on the Internet. The Router
will retrieve the IP address of the remote VPN device via its
Remote Security Gateway Type public DNS records.
Select the type you want to use: IP Only, IP + Domain Domain Name  Enter the domain name as an ID (it cannot
Name(FQDN) Authentication, IP + E-mail Addr.(USER be a real domain name on the Internet).
FQDN) Authentication, Dynamic IP + Domain
Name(FQDN) Authentication, or Dynamic IP + E- IP + E-mail Addr.(USER FQDN) Authentication
mail Addr.(USER FQDN) Authentication. Follow the
instructions for the type you want to use.

NOTE: The Remote Security Gateway Type you


select should match the Local Security Gateway
Type selected on the VPN device at the other Remote Security Gateway Type > IP + E-mail Addr.(USER FQDN)
end of the tunnel. Authentication

IP Only IP address  Select this option if you know the static IP


address of the remote VPN device at the other end of the
The default is IP Only. Only the device with a specific IP tunnel, and then enter the IP address.
address will be able to access the tunnel. Select IP address
or IP by DNS Resolved. IP by DNS Resolved  Select this option if you do not
know the static IP address of the remote VPN device but
you do know its domain name. Then enter the remote
VPN device’s domain name on the Internet. The Router
will retrieve the IP address of the remote VPN device via its
public DNS records.
Remote Security Gateway Type > IP Only E-mail address  Enter the e-mail address as an ID.

10/100 16-Port VPN Router 40


Chapter 4 Advanced Configuration

Dynamic IP + Domain Name(FQDN) Authentication


The Local Security Gateway will be a dynamic IP address, Remote Security Group Type > IP
so you do not need to enter the IP address. When the
Remote Security Gateway requests to create a tunnel with IP address  Enter the appropriate IP address.
the Router, the Router will work as a responder.
Subnet
The domain name must match the Local Gateway of the
remote VPN device and can only be used for one tunnel The default is Subnet. All computers on the remote subnet
connection. will be able to access the tunnel.

Remote Security Group Type > Subnet

Remote Security Gateway Type > Dynamic IP + Domain Name(FQDN) IP address  Enter the IP address.
Authentication
Subnet Mask  Enter the subnet mask. The default is
Domain Name  Enter the domain name for authentication. 255.255.255.0.
(Once used, you cannot use it again to create a new tunnel IP Range
connection.)
Specify a range of IP addresses within a subnet that will be
Dynamic IP + E-mail Addr.(USER FQDN) Authentication able to access the tunnel.
The Remote Security Gateway will be a dynamic IP
address, so you do not need to enter the IP address. When
the Remote Security Gateway requests to create a tunnel
Remote Security Group Type > IP Range
with the Router, the Router will work as a responder.
IP range  Enter the range of IP addresses.

IPSec Setup
In order for any encryption to occur, the two ends of a
Remote Security Gateway Type > Dynamic IP + E-mail Addr.(USER VPN tunnel must agree on the methods of encryption,
FQDN) Authentication decryption, and authentication. This is done by sharing
a key to the encryption code. For key management, the
E-mail address  Enter the e-mail address for default mode is IKE with Preshared Key.
authentication.
Keying Mode  Select IKE with Preshared Key or Manual.
Remote Security Group Type Both ends of a VPN tunnel must use the same mode of
key management. After you have selected the mode, the
Select the Remote Security Group behind the Remote
settings available on this screen may change, depending
Gateway that can use this VPN tunnel. Select the type
on the selection you have made. Follow the instructions
you want to use: IP, Subnet, or IP Range. Follow the
for the mode you want to use.
instructions for the type you want to use.
IKE with Preshared Key
NOTE: The Remote Security Group Type you
select should match the Local Security Group IKE is an Internet Key Exchange protocol used to negotiate
Type selected on the VPN device at the other key material for Security Association (SA). IKE uses the
end of the tunnel. Preshared Key to authenticate the remote IKE peer.
Phase 1 DH Group  Phase 1 is used to create the SA. DH
After you have selected the Remote Security Group (Diffie-Hellman) is a key exchange protocol used during
Type, the settings available on this screen may change, Phase 1 of the authentication process to establish pre-
depending on which selection you have made. shared keys. There are three groups of different prime
IP key lengths. Group 1 is 768 bits, and Group 2 is 1,024 bits.
Group 5 is 1,536 bits. If network speed is preferred, select
Only the computer with a specific IP address will be able Group 1. If network security is preferred, select Group 5.
to access the tunnel.

10/100 16-Port VPN Router 41


Chapter 4 Advanced Configuration

Phase 1 Encryption  Select a method of encryption: Preshared Key  This specifies the pre-shared key used
DES (56-bit), 3DES (168-bit), AES-128 (128-bit), AES-192 to authenticate the remote IKE peer. Enter a key of
(192-bit), or AES-256 (256-bit). The method determines keyboard and hexadecimal characters, e.g., My_@123
the length of the key used to encrypt or decrypt ESP or 4d795f40313233. This field allows a maximum of 30
packets. AES-256 is recommended because it is more characters and/or hexadecimal values. Both ends of
secure. Make sure both ends of the VPN tunnel use the the VPN tunnel must use the same Preshared Key. It is
same encryption method. strongly recommended that you change the Preshared
Key periodically to maximize VPN security.
Phase 1 Authentication  Select a method of
authentication, MD5 or SHA. The authentication method Manual
determines how the ESP packets are validated. MD5 is
a one-way hashing algorithm that produces a 128-bit If you select Manual, you generate the key yourself, and
digest. SHA is a one-way hashing algorithm that produces no key negotiation is needed. Manual key management is
a 160-bit digest. SHA is recommended because it is more used in small static environments or for troubleshooting
secure. Make sure both ends of the VPN tunnel use the purposes.
same authentication method.
Phase 1 SA Life Time  Configure the length of time a VPN
tunnel is active in Phase 1. The default value is 28800
seconds.
Perfect Forward Secrecy  If the Perfect Forward Secrecy
(PFS) feature is enabled, IKE Phase 2 negotiation will
generate new key material for IP traffic encryption and
authentication, so hackers using brute force to break Keying Mode > Manual
encryption keys will not be able to obtain future IPSec
Incoming and Outgoing SPI (Security Parameter
keys.
Index)  SPI is carried in the ESP (Encapsulating Security
Phase 2 DH Group  If the Perfect Forward Secrecy feature Payload Protocol) header and enables the receiver and
is disabled, then no new keys will be generated, so you do sender to select the SA, under which a packet should be
not need to set the Phase 2 DH Group (the key for Phase 2 processed. Hexadecimal values is acceptable, and the
will match the key in Phase 1). valid range is 100~ffffffff. Each tunnel must have a unique
There are three groups of different prime key lengths. Incoming SPI and Outgoing SPI. No two tunnels share the
Group 1 is 768 bits, and Group 2 is 1,024 bits. Group 5 is same SPI. The Incoming SPI here must match the Outgoing
1,536 bits. If network speed is preferred, select Group 1. SPI value at the other end of the tunnel, and vice versa.
If network security is preferred, select Group 5. You do Encryption  Select a method of encryption, DES or 3DES.
not have to use the same DH Group that you used for This determines the length of the key used to encrypt or
Phase 1. decrypt ESP packets. DES is 56-bit encryption and 3DES
Phase 2 Encryption  Phase 2 is used to create one or is 168-bit encryption. 3DES is recommended because it is
more IPSec SAs, which are then used to key IPSec sessions. more secure. Make sure both ends of the VPN tunnel use
Select a method of encryption: NULL, DES (56-bit), 3DES the same encryption method.
(168-bit), AES-128 (128-bit), AES-192 (192-bit), or AES-256 Authentication  Select a method of authentication, MD5
(256-bit). It determines the length of the key used to or SHA1. The Authentication method determines how
encrypt or decrypt ESP packets. AES-256 is recommended the ESP packets are validated. MD5 is a one-way hashing
because it is more secure. Both ends of the VPN tunnel algorithm that produces a 128-bit digest. SHA is a one-way
must use the same Phase 2 Encryption setting. hashing algorithm that produces a 160-bit digest. SHA1
Phase 2 Authentication  Select a method of is recommended because it is more secure. Make sure
authentication, NULL, MD5, or SHA. The authentication both ends of the VPN tunnel use the same authentication
method determines how the ESP packets are validated. method.
MD5 is a one-way hashing algorithm that produces a Encryption Key  This field specifies a key used to encrypt
128-bit digest. SHA is a one-way hashing algorithm that and decrypt IP traffic. Enter a key of hexadecimal values.
produces a 160-bit digest. SHA is recommended because If DES is selected, the Encryption Key is 16-bit, which
it is more secure. Both ends of the VPN tunnel must use requires 16 hexadecimal values. If you do not enter enough
the same Phase 2 Authentication setting. hexadecimal values, then the rest of the Encryption
Phase 2 SA Life Time  Configure the length of time a VPN Key will be automatically completed with zeroes, so the
tunnel is active in Phase 2. The default is 3600 seconds. Encryption Key will be 16-bit. If 3DES is selected, the

10/100 16-Port VPN Router 42


Chapter 4 Advanced Configuration

Encryption Key is 48-bit, which requires 40 hexadecimal Keep-Alive  Keep-Alive helps maintain IPSec VPN tunnel
values. If you do not enter enough hexadecimal values, connections. If a connection is dropped and detected, it
then the rest of the Encryption Key will be automatically will be re-established immediately. Select this option to
completed with zeroes, so the Encryption Key will be use this feature.
48‑bit. Make sure both ends of the VPN tunnel use the
AH Hash Algorithm  The AH (Authentication Header)
same Encryption Key.
protocol describes the packet format and default
Authentication Key  This field specifies a key used to standards for packet structure. With the use of AH as the
authenticate IP traffic. Enter a key of hexadecimal values. security protocol, protection is extended forward into the
If MD5 is selected, the Authentication Key is 32-bit, which IP header to verify the integrity of the entire packet by use
requires 32 hexadecimal values. If you do not enter enough of portions of the original IP header in the hashing process.
hexadecimal values, then the rest of the Authentication Key Select this option to use this feature. Then select MD5 or
will be automatically completed with zeroes until it has 32 SHA1. MD5 produces a 128-bit digest to authenticate
hexadecimal values. If SHA is selected, the Authentication packet data. SHA produces a 160-bit digest to authenticate
Key is 40-bit, which requires 40 hexadecimal values. If you packet data. Both sides of the tunnel should use the same
do not enter enough hexadecimal values, then the rest of algorithm.
the Authentication Key will be automatically completed
NetBIOS Broadcast  Select this option to allow NetBIOS
with zeroes until it has 40 hexadecimal values. Make sure
traffic to pass through the VPN tunnel. By default, the
both ends of the VPN tunnel use the same Authentication
Router blocks this traffic.
Key.
NAT Traversal  Select this option to use this feature.
Advanced Both the IPSec initiator and responder must support the
For most users, the settings on the VPN page should suffice; mechanism for detecting the NAT router in the path and
however, the Router provides advanced IPSec settings for changing to a new port, as defined in RFC 3947.
advanced users using the IKE with Preshared Key mode. Dead Peer Detection (DPD)  When DPD is enabled, the
Click Advanced to view the Advanced settings. Router will send periodic HELLO/ACK messages to check
the status of the VPN tunnel (this feature can be used only
when both peers or VPN devices of the VPN tunnel use the
DPD mechanism). Once a dead peer has been detected,
the Router will disconnect the tunnel so the connection
can be re-established. Specify the interval between
HELLO/ACK messages (how often you want the messages
to be sent). DPD is enabled by default, and the default
interval is 10 seconds.
Advanced
Click Save Settings to save your changes, or click Cancel
Aggressive Mode  There are two types of Phase 1 Changes to undo them.
exchanges, Main Mode and Aggressive Mode.
Aggressive Mode requires half of the main mode messages VPN > Client to Gateway
to be exchanged in Phase 1 of the SA exchange. If network
Use this screen to create a new tunnel between a VPN
security is preferred, leave the Aggressive Mode check box
device and a remote computer using third-party VPN
unchecked (Main Mode will be used). If network speed is
client software, such as TheGreenBow or VPN Tracker.
preferred, select Aggressive Mode. If you select one of
the Dynamic IP types for the Remote Security Gateway
Type setting, then Main Mode will be unavailable, so
Aggressive Mode will be used.
Compress (Support IP Payload Compression Protocol
(IP Comp))  IP Payload Compression is a protocol that
reduces the size of IP datagrams. Select this option if you
want the Router to propose compression when it initiates a
connection. If the responders reject this proposal, then the
Router will not implement compression. When the Router
works as a responder, it will always accept compression,
even if compression is not enabled.

10/100 16-Port VPN Router 43


Chapter 4 Advanced Configuration

This allows you to identify multiple tunnels and does not


have to match the name used at the other end of the
tunnel.
Interface  Select the appropriate WAN port.
Enable  Check this box to enable a VPN tunnel.

Local Group Setup


Local Security Gateway Type
Select the type you want to use: IP Only, IP + Domain
Name(FQDN) Authentication, IP + E-mail Addr.(USER
FQDN) Authentication, Dynamic IP + Domain
Name(FQDN) Authentication, or Dynamic IP + E-
mail Addr.(USER FQDN) Authentication. Follow the
instructions for the type you want to use.

NOTE: The Local Security Gateway Type you


select should match the Remote Security
Gateway Type selected on the VPN device at the
other end of the tunnel.

IP Only
The default is IP Only. Only the device with a specific IP
address will be able to access the tunnel.
VPN > Client to Gateway

NOTE: The 10/100 16-Port VPN Router


supports IPSec VPN client software,
including the Linksys QuickVPN software.
Local Security Gateway Type > IP Only
To manage access for Linksys QuickVPN
IP address  The WAN (or Internet) IP address of the Router
clients, click the VPN Client Access tab. (For
automatically appears.
more information about QuickVPN, refer to
“Appendix B: Linksys QuickVPN for Windows IP + Domain Name(FQDN) Authentication
2000, XP, or Vista”.) The IP address and FQDN must match the Remote Security
Gateway of the remote VPN device, and they can only be
Add a New Tunnel used for one tunnel connection.

Tunnel/Group VPN  To create a tunnel for a single VPN


client, select Tunnel. To create a tunnel for multiple VPN
clients, select Group VPN. The Group VPN feature facilitates
setup and is not needed to individually configure remote
VPN clients.
Local Security Gateway Type > IP + Domain Name(FQDN)
Depending on your selection, the Local Group Setup and Authentication
Remote Client Setup settings will differ. Proceed to the
appropriate instructions for your selection. Domain Name  Enter the Fully Qualified Domain Name
(FQDN), which is the host name and domain name for a
Tunnel specific computer on the Internet.
Tunnel No  The tunnel number is automatically IP address  The WAN (or Internet) IP address of the Router
generated. automatically appears.
Tunnel Name  Enter a name for this VPN tunnel, such as
Los Angeles Office, Chicago Branch, or New York Division.
10/100 16-Port VPN Router 44
Chapter 4 Advanced Configuration

IP + E-mail Addr.(USER FQDN) Authentication NOTE: The Local Security Group Type you select
should match the Remote Security Group Type
selected on the VPN device at the other end of
the tunnel.

After you have selected the Local Security Group Type, the
Local Security Gateway Type > IP + E-mail Addr.(USER FQDN) settings available on this screen may change, depending
Authentication on which selection you have made.

E-mail address  Enter the e-mail address for IP


authentication. Only the computer with a specific IP address will be able
IP address  The WAN (or Internet) IP address of the Router to access the tunnel.
automatically appears.
Dynamic IP + Domain Name(FQDN) Authentication
Local Security Group Type > IP
The Local Security Gateway will be a dynamic IP address,
so you do not need to enter the IP address. When the IP address  Enter the appropriate IP address. The default
Remote Security Gateway requests to create a tunnel with IP is 192.168.1.0.
the Router, the Router will work as a responder.
Subnet
The domain name must match the Remote Security
Gateway of the remote VPN device and can only be used The default is Subnet. All computers on the local subnet
for one tunnel connection. will be able to access the tunnel.

Local Security Group Type > Subnet

Local Security Gateway Type > Dynamic IP + Domain Name(FQDN) IP address  Enter the IP address. The default is
Authentication 192.168.1.0.

Domain Name  Enter the domain name for authentication. Subnet Mask  Enter the subnet mask. The default is
(Once used, you cannot use it again to create a new tunnel 255.255.255.0.
connection.) IP Range
Dynamic IP + E-mail Addr.(USER FQDN) Authentication Specify a range of IP addresses within a subnet that will be
The Local Security Gateway will be a dynamic IP address, able to access the tunnel.
so you do not need to enter the IP address. When the
Remote Security Gateway requests to create a tunnel with
the Router, the Router will work as a responder.
Local Security Group Type > IP Range

IP range  Enter the range of IP addresses. The default is


192.168.1.0~254.

Remote Client Setup


Local Security Gateway Type > Dynamic IP + E-mail Addr.(USER FQDN)
Authentication Remote Client
E-mail address  Enter the e-mail address for Select the type you want to use: IP Only, IP + Domain
authentication. Name(FQDN) Authentication, IP + E-mail Addr.
(USER FQDN) Authentication, Dynamic IP + Domain
Local Security Group Type Name(FQDN) Authentication, or Dynamic IP +
Select the local LAN user(s) behind the Router that can E-mail Addr.(USER FQDN) Authentication. Follow the
use this VPN tunnel. Select the type you want to use: IP, instructions for the type you want to use.
Subnet, or IP Range. Follow the instructions for the type
you want to use.

10/100 16-Port VPN Router 45


Chapter 4 Advanced Configuration

IP Only IP address of the remote VPN device via its public DNS
records.
The default is IP Only. Only the computer with a specific IP
address will be able to access the tunnel. Select IP address E-mail address  Enter the e-mail address as an ID.
or IP by DNS Resolved.
Dynamic IP + Domain Name(FQDN) Authentication
The Local Security Gateway will be a dynamic IP address,
so you do not need to enter the IP address. When the
Remote Security Gateway requests to create a tunnel with
Remote Client > IP Only
the Router, the Router will work as a responder.
IP address  Select this option if you know the static IP The domain name must match the local setting of the
address of the remote computer at the other end of the remote computer and can only be used for one tunnel
tunnel, and then enter the IP address. connection.
IP by DNS Resolved  Select this option if you do not know
the static IP address of the remote computer but you do
know its domain name. Then enter the remote computer’s
domain name on the Internet. The Router will retrieve the Remote Client > Dynamic IP + Domain Name(FQDN) Authentication
IP address of the remote VPN device via its public DNS
records. Domain Name  Enter the domain name for authentication.
(Once used, you cannot use it again to create a new tunnel
IP + Domain Name(FQDN) Authentication
connection.)
The IP address and domain name ID must match the Local
Dynamic IP + E-mail Addr.(USER FQDN) Authentication
Gateway of the remote computer, and they can only be
used for one tunnel connection. The Remote Security Gateway will be a dynamic IP
address, so you do not need to enter the IP address. When
the remote computer requests to create a tunnel with the
Router, the Router will work as a responder.

Remote Client > IP + Domain Name(FQDN) Authentication

IP address  Select this option if you know the static IP


address of the remote computer at the other end of the Remote Client > Dynamic IP + E-mail Addr.(USER FQDN) Authentication
tunnel, and then enter the IP address.
E-mail address  Enter the e-mail address for
IP by DNS Resolved  Select this option if you do not know authentication.
the static IP address of the remote computer but you do
know its domain name. Then enter the remote computer’s Group VPN
domain name on the Internet. The Router will retrieve the
Group No  The group number is automatically generated.
IP address of the remote VPN device via its public DNS
(The Router supports up to two group VPNs.)
records.
Group Name  Enter a name for this group VPN, such as
Domain Name  Enter the domain name as an ID (it cannot
American Sales Group or West Coast Marketing. This allows
be a real domain name on the Internet).
you to identify multiple group VPNs and does not have to
IP + E-mail Addr.(USER FQDN) Authentication match the name used at the other end of the tunnel.
Interface  Select the appropriate WAN port.
Enable  Check this box to enable a group VPN.

Remote Client > IP + E-mail Addr.(USER FQDN) Authentication Local Group Setup
IP address  Select this option if you know the static IP Local Security Group Type
address of the remote computer at the other end of the
tunnel, and then enter the IP address. Select the local LAN user(s) behind the Router that can
use this VPN tunnel. Select the type you want to use: IP,
IP by DNS Resolved  Select this option if you do not know Subnet, or IP Range. Follow the instructions for the type
the static IP address of the remote computer but you do you want to use.
know its domain name. Then enter the remote computer’s
domain name on the Internet. The Router will retrieve the
10/100 16-Port VPN Router 46
Chapter 4 Advanced Configuration

NOTE: The Local Security Group Type you select Domain Name(FQDN)
should match the Remote Security Group Type The default is Domain Name(FQDN).
selected on the remote computer at the other
end of the tunnel.

After you have selected the Local Security Group Type, the
Remote Client > Domain Name(FQDN)
settings available on this screen may change, depending
on which selection you have made. Domain Name  Enter the Fully Qualified Domain Name
IP (FQDN), which is the host name and domain name for
a specific computer on the Internet. When the remote
Only the computer with a specific IP address will be able
computer requests to create a tunnel with the Router, the
to access the tunnel.
Router will work as a responder.
E-mail Address(UserFQDN)

Local Security Group Type > IP

IP address  Enter the appropriate IP address. The default Remote Client > E-mail Address(UserFQDN)
IP is 192.168.1.0.
E-mail address  Enter the e-mail address of the user
Subnet FQDN.
The default is Subnet. All computers on the local subnet Microsoft XP/2000 VPN Client
will be able to access the tunnel.
Dynamic IP users, such as PPPoE or DHCP users, who use
the Microsoft VPN client software, can use this option.
(The Microsoft VPN client software does not support
Aggressive mode and FQDN or User FQDN ID options.)

Local Security Group Type > Subnet

IP address  Enter the IP address. The default is Remote Client > Microsoft XP/2000 VPN Client
192.168.1.0.
Subnet Mask  Enter the subnet mask. The default is IPSec Setup
255.255.255.0.
In order for any encryption to occur, the two ends of a
IP Range VPN tunnel must agree on the methods of encryption,
Specify a range of IP addresses within a subnet that will be decryption, and authentication. This is done by sharing
able to access the tunnel. a key to the encryption code. For key management, the
default mode is IKE with Preshared Key.
Keying Mode  Select IKE with Preshared Key or Manual.
Both ends of a VPN tunnel must use the same mode of
Local Security Group Type > IP Range key management. After you have selected the mode, the
settings available on this screen may change, depending
IP range  Enter the range of IP addresses. The default is on the selection you have made. Follow the instructions
192.168.1.0~254. for the mode you want to use. (Manual mode is available
for VPN tunnels only, not group VPNs.)
Remote Client Setup
IKE with Preshared Key
Remote Client
IKE is an Internet Key Exchange protocol used to negotiate
Select the type you want to use: Domain Name(FQDN), key material for Security Association (SA). IKE uses the
E-mail Addr.(USER FQDN), or Microsoft XP/2000 VPN Preshared Key to authenticate the remote IKE peer.
Client. Follow the instructions for the type you want to
use. Phase 1 DH Group  Phase 1 is used to create the SA. DH
(Diffie-Hellman) is a key exchange protocol used during
Phase 1 of the authentication process to establish pre-

10/100 16-Port VPN Router 47


Chapter 4 Advanced Configuration

shared keys. There are three groups of different prime it is more secure. Both ends of the VPN tunnel must use
key lengths. Group 1 is 768 bits, and Group 2 is 1,024 bits. the same Phase 2 Authentication setting.
Group 5 is 1,536 bits. If network speed is preferred, select
Phase 2 SA Life Time  Configure the length of time a VPN
Group 1. If network security is preferred, select Group 5.
tunnel is active in Phase 2. The default is 3600 seconds.
Phase 1 Encryption  Select a method of encryption:
Preshared Key  This specifies the pre-shared key used
DES (56-bit), 3DES (168-bit), AES-128 (128-bit), AES-192
to authenticate the remote IKE peer. Enter a key of
(192-bit), or AES-256 (256-bit). The method determines
keyboard and hexadecimal characters, e.g., My_@123
the length of the key used to encrypt or decrypt ESP
or 4d795f40313233. This field allows a maximum of 30
packets. AES-256 is recommended because it is more
characters and/or hexadecimal values. Both ends of
secure. Make sure both ends of the VPN tunnel use the
the VPN tunnel must use the same Preshared Key. It is
same encryption method.
strongly recommended that you change the Preshared
Phase 1 Authentication  Select a method of Key periodically to maximize VPN security.
authentication, MD5 or SHA. The authentication method
determines how the ESP packets are validated. MD5 is Manual
a one-way hashing algorithm that produces a 128-bit If you select Manual, you generate the key yourself, and
digest. SHA is a one-way hashing algorithm that produces no key negotiation is needed. Manual key management is
a 160-bit digest. SHA is recommended because it is more used in small static environments or for troubleshooting
secure. Make sure both ends of the VPN tunnel use the purposes.
same authentication method.
Phase 1 SA Life Time  Configure the length of time a VPN
tunnel is active in Phase 1. The default value is 28800
seconds.
Perfect Forward Secrecy  If the Perfect Forward Secrecy
(PFS) feature is enabled, IKE Phase 2 negotiation will
generate new key material for IP traffic encryption and
authentication, so hackers using brute force to break Keying Mode > Manual (Tunnel Only)
encryption keys will not be able to obtain future IPSec
keys. Incoming and Outgoing SPI (Security Parameter
Index)  SPI is carried in the ESP (Encapsulating Security
Phase 2 DH Group  If the Perfect Forward Secrecy feature
Payload Protocol) header and enables the receiver and
is disabled, then no new keys will be generated, so you do
sender to select the SA, under which a packet should be
not need to set the Phase 2 DH Group (the key for Phase 2
processed. Hexadecimal values is acceptable, and the
will match the key in Phase 1).
valid range is 100~ffffffff. Each tunnel must have a unique
There are three groups of different prime key lengths. Incoming SPI and Outgoing SPI. No two tunnels share the
Group 1 is 768 bits, and Group 2 is 1,024 bits. Group 5 is same SPI. The Incoming SPI here must match the Outgoing
1,536 bits. If network speed is preferred, select Group 1. SPI value at the other end of the tunnel, and vice versa.
If network security is preferred, select Group 5. You do
Encryption  Select a method of encryption, DES or 3DES.
not have to use the same DH Group that you used for
This determines the length of the key used to encrypt or
Phase 1.
decrypt ESP packets. DES is 56-bit encryption and 3DES
Phase 2 Encryption  Phase 2 is used to create one or is 168-bit encryption. 3DES is recommended because it is
more IPSec SAs, which are then used to key IPSec sessions. more secure. Make sure both ends of the VPN tunnel use
Select a method of encryption: NULL, DES (56-bit), 3DES the same encryption method.
(168-bit), AES-128 (128-bit), AES-192 (192-bit), or AES-256
Authentication  Select a method of authentication, MD5
(256-bit). It determines the length of the key used to
or SHA1. The Authentication method determines how
encrypt or decrypt ESP packets. AES-256 is recommended
the ESP packets are validated. MD5 is a one-way hashing
because it is more secure. Both ends of the VPN tunnel
algorithm that produces a 128-bit digest. SHA is a one-way
must use the same Phase 2 Encryption setting.
hashing algorithm that produces a 160-bit digest. SHA1
Phase 2 Authentication  Select a method of is recommended because it is more secure. Make sure
authentication, NULL, MD5, or SHA. The authentication both ends of the VPN tunnel use the same authentication
method determines how the ESP packets are validated. method.
MD5 is a one-way hashing algorithm that produces a
Encryption Key  This field specifies a key used to encrypt
128-bit digest. SHA is a one-way hashing algorithm that
and decrypt IP traffic. Enter a key of hexadecimal values.
produces a 160-bit digest. SHA is recommended because
10/100 16-Port VPN Router 48
Chapter 4 Advanced Configuration

If DES is selected, the Encryption Key is 16-bit, which Router will not implement compression. When the Router
requires 16 hexadecimal values. If you do not enter enough works as a responder, it will always accept compression,
hexadecimal values, then the rest of the Encryption even if compression is not enabled.
Key will be automatically completed with zeroes, so the
Keep-Alive  Keep-Alive helps maintain IPSec VPN tunnel
Encryption Key will be 16-bit. If 3DES is selected, the
connections. If a connection is dropped and detected, it
Encryption Key is 48-bit, which requires 40 hexadecimal
will be re-established immediately. Select this option to
values. If you do not enter enough hexadecimal values,
use this feature.
then the rest of the Encryption Key will be automatically
completed with zeroes, so the Encryption Key will be AH Hash Algorithm  The AH (Authentication Header)
48‑bit. Make sure both ends of the VPN tunnel use the protocol describes the packet format and default
same Encryption Key. standards for packet structure. With the use of AH as the
security protocol, protection is extended forward into the
Authentication Key  This field specifies a key used to
IP header to verify the integrity of the entire packet by use
authenticate IP traffic. Enter a key of hexadecimal values.
of portions of the original IP header in the hashing process.
If MD5 is selected, the Authentication Key is 32-bit, which
Select this option to use this feature. Then select MD5 or
requires 32 hexadecimal values. If you do not enter enough
SHA1. MD5 produces a 128-bit digest to authenticate
hexadecimal values, then the rest of the Authentication Key
packet data. SHA produces a 160-bit digest to authenticate
will be automatically completed with zeroes until it has 32
packet data. Both sides of the tunnel should use the same
hexadecimal values. If SHA is selected, the Authentication
algorithm.
Key is 40-bit, which requires 40 hexadecimal values. If you
do not enter enough hexadecimal values, then the rest of NetBIOS Broadcast  Select this option to allow NetBIOS
the Authentication Key will be automatically completed traffic to pass through the VPN tunnel. By default, the
with zeroes until it has 40 hexadecimal values. Make sure Router blocks this traffic.
both ends of the VPN tunnel use the same Authentication NAT Traversal  Select this option to use this feature.
Key. Both the IPSec initiator and responder must support the
Advanced mechanism for detecting the NAT router in the path and
changing to a new port, as defined in RFC 3947.
For most users, the settings on the VPN page should suffice;
Dead Peer Detection (DPD)  (This option is available for
however, the Router provides advanced IPSec settings for
VPN tunnels only, not group VPNs.) When DPD is enabled,
advanced users using the IKE with Preshared Key mode.
the Router will send periodic HELLO/ACK messages to
Click Advanced to view the Advanced settings.
check the status of the VPN tunnel (this feature can be
used only when both peers or VPN devices of the VPN
tunnel use the DPD mechanism). Once a dead peer has
been detected, the Router will disconnect the tunnel so
the connection can be re-established. Specify the interval
between HELLO/ACK messages (how often you want the
messages to be sent). DPD is enabled by default, and the
default interval is 10 seconds.
Advanced
Click Save Settings to save your changes, or click Cancel
Aggressive Mode  There are two types of Phase 1 Changes to undo them.
exchanges, Main Mode and Aggressive Mode.
Aggressive Mode requires half of the main mode messages
VPN > VPN Client Access
to be exchanged in Phase 1 of the SA exchange. If network The VPN Client Access screen allows you to manage access
security is preferred, leave the Aggressive Mode check box for Linksys QuickVPN clients. (The Router supports up to
unchecked (Main Mode will be used). If network speed is 50 Linksys QuickVPN clients free of charge. If the Router
preferred, select Aggressive Mode. If you select one of you have only supports up to ten clients, then upgrade
the Dynamic IP types for the Remote Security Gateway its firmware. Refer to “Appendix F: Firmware Upgrade” for
Type setting, then Main Mode will be unavailable, so instructions.)
Aggressive Mode will be used.
Compress (Support IP Payload Compression Protocol
(IP Comp))  IP Payload Compression is a protocol that
reduces the size of IP datagrams. Select this option if you
want the Router to propose compression when it initiates a
connection. If the responders reject this proposal, then the
10/100 16-Port VPN Router 49
Chapter 4 Advanced Configuration

Generate Certificate Confirmation

Export Certificate for Administrator  The certificate for


the administrator contains the private key and should be
stored in a safe place as a backup. If you reset the Router
to its factory defaults, then you can import the certificate
and restore it on the Router.
To save the certificate as a file, click Export for
Admin. By default, the certificate file is named
RV016_<MMDD>_<HHMM>.pem, which you can
rename. (MMDD stands for month and day; HHMM stands
for hours and minutes.) Follow the on-screen instructions
VPN > VPN Client Access to select the location where you want to store your
certificate.
VPN Client Access Export Certificate for Client  The certificate for the client
must be placed in the install directory of the QuickVPN
For each QuickVPN client, do the following:
client software.
1. Export a client certificate.
To save the certificate as a file, click Export for Client.
2. Configure a user name and password. Then follow the on-screen instructions. By default, the
certificate file is named RV016_<MMDD>_<HHMM>_
3. Add the QuickVPN client to the list.
Client.pem, which you can rename. (MMDD stands for
VPN Client Users month and day; HHMM stands for hours and minutes.)
Follow the on-screen instructions to save the file in the
User Name  Enter the user name. install directory of the QuickVPN client software.
New Password  Enter the new password. Import Certificate  To specify the location of the
Confirm New Password  Re-enter the new password. administrator certificate, click Browse and follow the
on‑screen instructions. (This is the file you previously
Change Password Allowed  To allow the user to change saved using the Export Certificate for Administrator
his or her password, select Yes. Otherwise, keep the option.) After you have selected the file, click Import.
default, No.
Existing Certificate  The filename of the current certificate
Active  To activate the new user, select Active. is displayed.
To add the new user to the list, click Add to list. Click Save Settings to save your changes, or click Cancel
After a user has been added, you can change the user’s Changes to undo them.
settings. Select the user from the list, and make your When you first save these settings, a message will appear,
changes. Then click Update this user. asking if you would like the Router to automatically change
To delete a user, select the user from the list, and then click the LAN IP address to prevent conflicting IP addresses. To
Delete selected users. change the LAN IP address, click Yes. If an IP conflict occurs,
the QuickVPN client will not connect to the Router.
Certificate Management
Manage the certificate for securing communication
VPN > VPN Pass Through
between the Router and QuickVPN clients. The VPN Pass Through screen allows you to enable or
Generate New Certificate  To generate a new certificate disable passthrough for a variety of VPN methods.
to replace the existing certificate on the Router, click
Generate. After clicking the button, a confirmation screen NOTE: VPN passthrough is enabled so that VPN
appears. Click OK to continue. clients on the LAN of the Router can reach the
VPN server on the Internet.

10/100 16-Port VPN Router 50


Chapter 4 Advanced Configuration

PPTP Server
Enable PPTP Server  Select this option to allow PPTP VPN
tunnels.

IP Address Range
Range Start  Enter the starting LAN IP address of
the range allotted to PPTP VPN clients. The default is
192.168.1.200.
Range End  Enter the ending LAN IP address of the
range allotted to PPTP VPN clients. The default is
VPN > VPN Pass Through
192.168.1.209.

VPN Pass Through NOTE: The LAN IP address range for PPTP VPN
IPSec Pass Through  Internet Protocol Security (IPSec) is clients should be outside of the normal DHCP
a suite of protocols used to implement secure exchange range of the Router.
of packets at the IP layer. IPSec Pass Through is enabled by
default to allow IPSec tunnels to pass through the Router.
Users Setting
PPTP Pass Through  Point-to-Point Tunneling Protocol
(PPTP) allows the Point-to-Point Protocol (PPP) to be The Router uses this information to identify authorized
tunneled through an IP network. PPTP Pass Through is PPTP VPN clients.
enabled by default. User Name  Enter a name for the PPTP VPN client.
L2TP Pass Through  Layer 2 Tunneling Protocol is the New Password  Enter a password for the PPTP VPN
method used to enable Point-to-Point sessions via the client.
Internet on the Layer 2 level. L2TP Pass Through is enabled
Confirm New Password  Re-enter the password.
by default.
Click Add to List, and configure as many entries as you
Click Save Settings to save your changes, or click Cancel
would like, up to a maximum of five. To delete an entry,
Changes to undo them.
select it and click Delete selected users.

VPN > PPTP Server Connection List


The PPTP Server screen allows you to enable up to ten PPTP The PPTP VPN tunnels are displayed.
VPN tunnels between the Router and PPTP VPN clients.
These PPTP VPN clients must be computers running PPTP User Name  It shows the name of the PPTP VPN client.
client software and Windows XP or 2000. Remote Address  This shows the WAN IP address of the
PPTP VPN client.
PPTP IP Address  This shows the PPTP IP address of the
PPTP VPN client. When the PPTP VPN client connects to the
PPTP server, it is assigned a PPTP IP address by the PPTP
server, which has a pool of pre-configured IP addresses
available. (With its PPTP IP address, the PPTP VPN client
acts like it belongs to the LAN of the PPTP server.)
Click Refresh to update the on-screen information. Click
Save Settings to save your changes, or click Cancel
Changes to undo them.

Log > System Log


Configure the Router’s log settings, so you can specify
how you want its activity logs handled.

VPN > PPTP Server

10/100 16-Port VPN Router 51


Chapter 4 Advanced Configuration

your changes, and then restart the Router for the changes
to take effect.

E-mail
You may want logs or alert messages to be e-mailed to
you. If so, then configure the E-mail settings.
Enable E-Mail Alert  Select this option to enable the
Router’s E-Mail Alert feature.
Mail Server  If you want any log or alert information
e-mailed to you, then enter the name or numerical IP
address of your SMTP server. Your ISP can provide you
with this information.
Send E-mail to  Enter the e-mail address that will
receive your log files. If you do not want copies of the log
information e-mailed to you, then leave this field blank.
Log > System Log Log Queue Length  You can designate the length of the
log that will be e-mailed to you. The default is 50 entries,
so unless you change this setting, the Router will e-mail
the log to you when there are more than 50 log entries.
Log Time Threshold  You can designate how often the
log will be e-mailed to you. The default is 10 minutes, so
unless you change this setting, the Router will e-mail the
log to you every 10 minutes.
The Router will e-mail the log every time the Log Queue
Length or Log Time Threshold is reached.
Click E-mail Log Now to immediately send the log to the
address in the Send E-mail to field.

Log Setting
Alert Log
Syn Flooding  Select this option if you want Syn Flooding
events to trigger an alert.
Log > System Log (ProtectLink Enabled)
IP Spoofing  Select this option if you want IP Spoofing
events to trigger an alert.
System Log
Win Nuke  Select this option if you want Win Nuke events
Syslog to trigger an alert.

Syslog is a standard protocol used to capture information Ping of Death  Select this option if you want Ping of
about network activity. The Router supports this protocol Death events to trigger an alert.
and can send its activity logs to an external server. Unauthorized Login Attempt  If this option is enabled,
Enable Syslog  Select this option to enable the Router’s Unauthorized Login Attempt events trigger an alert. This
Syslog feature. option is enabled by default.

Syslog Server  In addition to the standard event log, Output Blocking Event  (This option is available only if
the Router can send a detailed log to an external Syslog the Trend Micro ProtectLink service is enabled.) Select this
server. The Router’s Syslog captures all log activities and option if you want website blocking events to trigger an
includes this information about all data transmissions: alert.
every connection source and destination IP address, IP
service, and number of bytes transferred. Enter the Syslog
server name or IP address. Click Save Settings to save

10/100 16-Port VPN Router 52


Chapter 4 Advanced Configuration

General Log
System Error Messages  If this option is enabled, system
error messages are included. This option is enabled by
default. Outgoing Log Table
Deny Policies  Select this option if you do not want to
include log events from Deny rules on the Firewall > Access Time  The time of each log event is displayed. You can sort
Rule screen. Log events from Deny rules will be logged each log by time sequence.
separately from Deny Policies if the option, log packets Event-Type  The type of log event is displayed.
match this rule, is selected.
Message  The message associated with each log event is
Allow Policies  Select this option if you want to include displayed.
log events from Allow rules on the Firewall > Access Rule
To update the on-screen, click Refresh. To exit the
screen. Log events from Allow rules will be logged whether
Outgoing Log Table screen and return to the Log > System
or not the option, log packets match this rule, is selected.
Log screen, click Close.
Configuration Changes  If this option is enabled,
configuration changes are included. This option is enabled Incoming Log Table
by default. To view the incoming log information, click this option.
Authorized Login  If this option is enabled, authorized
login events are included. This option is enabled by
default.

View System Log


Incoming Log Table
To view logs, click this option. The System Log screen
appears. Time  The time of each log event is displayed. You can sort
each log by time sequence.
Event-Type  The type of log event is displayed.
Message  The message associated with each log event is
displayed.
System Log
To update the on-screen, click Refresh. To exit the Incoming
Current Time  The time of the Router is displayed. Log Table screen and return to the Log > System Log screen,
click Close.
Select the log you wish to view: ALL, System Log, Access
Log, Firewall Log, or VPN Log. The All log displays a log Clear Log Now
of all activities. The System Log displays a list of cold and
To clear your log without e-mailing it, click this option.
warm starts, web login successes and failures, and packet
Only use this option if you are willing to lose your log
filtering policies. The Access Log displays all logins. The
information.
Firewall Log displays all activities regarding the Router’s
firewall. The VPN Log shows information about VPN tunnel Click Save Settings to save your changes, or click Cancel
activity. Changes to undo them.
Time  The time of each log event is displayed. You can sort
each log by time sequence. Log > System Statistics
Event-Type  The type of log event is displayed. This screen displays statistics about all of the Router’s
ports (LAN and WAN ports). For each port, the following
Message  The message associated with each log event is statistics are listed: Device Name, Status, IP Address, MAC
displayed. Address, Subnet Mask, Default Gateway, DNS, Network
To update a log, click Refresh. To clear a log, click Clear. To Service Detection status, number of Received Packets,
exit the System Log screen and return to the Log > System number of Sent Packets, number of Total Packets, number
Log screen, click Close. of Received Bytes, number of Sent Bytes, number of
Total Bytes, number of Error Packets Received, number
Outgoing Log Table of Dropped Packets Received, percentage of Upstream
To view the outgoing log information, click this option.

10/100 16-Port VPN Router 53


Chapter 4 Advanced Configuration

Bandwidth Usage, and percentage of Downstream


Bandwidth Usage.

Set Total Number of WAN Ports

Log > System Statistics 3. Select the number of WAN ports you
want to use, up to a maximum of 7.
Click Refresh to update the statistics.
Click Next.
Wizard
Use this tab to access two Setup Wizards, the Basic Setup
Wizard and the Access Rule Setup Wizard. Run the Basic
Setup Wizard to change the number of WAN ports or set
up the Router for your Internet connection(s). Run the
Access Rule Setup Wizard to set up the security policy for
the Router.

Select Number of WAN Ports

Wizard

Basic Setup
To change the number of WAN ports, proceed to the
“Change Number of WAN Ports” section. To change the
Router’s Internet connection settings, proceed to the “Edit
Network Settings” section.

Change Number of WAN Ports


1. Click Launch Now to run the Basic Setup Wizard.
2. To change the number of WAN ports, select
Set the total nuer of WAN ports.

Click Next.
10/100 16-Port VPN Router 54
Chapter 4 Advanced Configuration

4. If you want to save your change, click Save Settings. you want to return to the previous screen. Click Exit if
Click Previous if you want to return to the previous you want to exit the Setup Wizard.
screen. Click Exit if you want to exit the Setup Wizard.

Host and Domain Name


Save Settings
4. Select the WAN (or Internet) Connection Type for the
5. A screen appears to notify you that the settings have WAN port. Select the appropriate connection type:
been saved. To proceed to the Wizard screen, click Obtain an IP automatically, Static IP, or PPPoE. Click
OK. To proceed to the System > Network screen, click Next to continue. Click Previous if you want to return
Cancel. to the previous screen. Click Exit if you want to exit the
Setup Wizard.
Edit Network Settings
1. Click Launch Now to run the Basic Setup Wizard.
2. To set up the Router for your Internet
connection(s), select Edit Network Settings.

Click Next.

WAN Connection Type

Edit Network Settings

3. Your Internet Service Provider (ISP) may require you


to use a host and domain name for your Internet
connection. If your ISP requires them, complete the
Host Name and Domain Name fields; otherwise leave
these blank. Click Next to continue. Click Previous if

10/100 16-Port VPN Router 55


Chapter 4 Advanced Configuration

5. Depending on which connection type you have Static IP


selected, the appropriate screen will appear. Follow
the instructions for the appropriate connection type: Complete the Static IP, Subnet Mask, and Default
Gateway fields with the settings provided by your ISP.
Obtain an IP automatically Click Next to continue. Click Previous if you want to
If you want to use the ISP’s DNS server, select Use return to the previous screen. Click Exit if you want to
DNS Server provided by ISP (default). If you want to exit the Setup Wizard.
designate a specific DNS server IP address, select Use
the Following DNS Server Addresses, and enter the
DNS server IP addresses you want to use (you must
enter at least one).
Click Next to continue, and proceed to step 6. Click
Previous if you want to return to the previous screen.
Click Exit if you want to exit the Setup Wizard.

Static IP

On the DNS Servers screen, enter the DNS server IP


addresses you want to use (you must enter at least
one).
Click Next to continue, and proceed to step 6. Click
Previous if you want to return to the previous screen.
Click Exit if you want to exit the Setup Wizard.
Obtain an IP Automatically

DNS Servers

10/100 16-Port VPN Router 56


Chapter 4 Advanced Configuration

PPPoE
Complete the User Name and Password fields with the
information provided by your ISP.
Click Next to continue. Click Previous if you want to
return to the previous screen. Click Exit if you want to
exit the Setup Wizard.

Connect on Demand or Keep Alive

6. To set up additional WAN ports, repeat step 5.


7. For the DMZ port, complete the DMZ IP and Subnet Mask
fields with the information provided by your ISP.

Click Next to continue, and proceed to step 8. Click


Previous if you want to return to the previous screen.
PPPoE Click Exit if you want to exit the Setup Wizard.
Select Connect on demand or Keep alive. If you select
the Connect on demand option, the connection will
be disconnected after a specified period of inactivity
(Max Idle Time). If you have been disconnected due
to inactivity, Connect on Demand enables the Router
to automatically re-establish your connection as soon
as you attempt to access the Internet again. Enter
the number of minutes you want to have elapsed
before your Internet access disconnects. The default is
5 minutes.
If you select the Keep alive option, the Router will keep
the connection alive by sending out a few data packets
periodically, so your ISP thinks that the connection is
still active. This option keeps your connection active
indefinitely, even when it sits idle. The default Redial
DMZ
Period is 30 seconds. The default Keepalive Interval
is 30 seconds. The default Keepalive Retry Times is
5 times.
Click Next to continue, and proceed to step 6. Click
Previous if you want to return to the previous screen.
Click Exit if you want to exit the Setup Wizard.

10/100 16-Port VPN Router 57


Chapter 4 Advanced Configuration

8. If you want to save your changes, click Save Settings. 3. From the drop-down menu, select Allow or Deny
Click Previous if you want to return to the previous depending on the intent of the Access Rule.
screen. Click Exit if you want to exit the Setup Wizard.
Click Next to continue. Click Previous if you want to
return to the previous screen. Click Exit if you want to
exit the Setup Wizard.

Save Settings

9. A screen appears to notify you that the settings have


been saved. To proceed to the Wizard screen, click Select the Action
OK. To proceed to the System > Network screen, click
4. Select the service you want from the Service pull-down
Cancel.
menu.
Access Rule Setup Click Next to continue. Click Previous if you want to
return to the previous screen. Click Exit if you want to
1. Click Launch Now to run the Access Rule Setup exit the Setup Wizard.
Wizard.
2. This screen explains the Access Rules, including the
Router’s Default Rules. Click Next to continue. Click
Exit if you want to exit the Setup Wizard.

Select the Service

Access Rules Policy

10/100 16-Port VPN Router 58


Chapter 4 Advanced Configuration

5. For this service, you can select whether or not you want 7. Select the Destination IP address(es) for this Access
the Router to keep a log tracking this type of activity. Rule. If it can be any IP address, select Any. If it is one
To keep a log, select Log packets match this rule. If IP address, select Single and enter the IP address. If it
you do not want a log, select Not log. is a range of IP addresses, select Range, and enter the
range of IP addresses.
Click Next to continue. Click Previous if you want to
return to the previous screen. Click Exit if you want to Click Next to continue. Click Previous if you want to
exit the Setup Wizard. return to the previous screen. Click Exit if you want to
exit the Setup Wizard.

Select the Log Rule


Select the Destination
6. Select the Source Interface: LAN, WAN (number varies
depending on the number of WAN ports), DMZ, or 8. Decide when you want this Access Rule to be enforced.
Any from the Interface pull-down menu. Select Always if you want the Access Rule to be always
enforced, or select Scheduling if you want to specify
Select the Source IP address(es) for this Access Rule. If it when the Access Rule should be in effect.
can be any IP address, select Any. If it is one IP address,
select Single and enter the IP address. If it is a range
of IP addresses, select Range, and enter the range of
IP addresses.
Click Next to continue. Click Previous if you want to
return to the previous screen. Click Exit if you want to
exit the Setup Wizard.

When It Works

If you selected Always, click Next to continue. Click


Previous if you want to return to the previous
screen. Click Exit if you want to exit the Setup Wizard.

If you selected Scheduling, click Next to continue. A


new screen appears. Decide what times and which
Select the Source
days of the week the Access Rule should be enforced.
Then enter the hours and minutes in 24-hour format,

10/100 16-Port VPN Router 59


Chapter 4 Advanced Configuration

and select the appropriate days of the week. Click


Next to continue. Click Previous if you want to return
to the previous screen. Click Exit if you want to exit the
Setup Wizard.

Support

Manual
If you want the latest version of this User Guide, click On
Line Manual. The Support page of the Linksys website
appears.
Follow the on-screen instructions to access the Downloads
When It Works page for the 10/100 16-Port VPN Router (model number:
RV016).
9. If you want to save your changes, click Save Settings.
After downloading the user guide to your computer, open
Click Previous if you want to return to the previous
it using Adobe Reader.
screen. Click Exit if you want to exit the Setup Wizard.
Linksys Web Site
Click Linksys Web Site, and the Support page of the
Linksys website appears.

Logout
The Logout tab is located on the upper right-hand corner
of the screen. Click this tab to exit the web-based utility.
(If you exit the web-based utility, you will need to re-enter
your User Name and Password to log in and then manage
the Router.)

Save Settings

10. A screen appears to notify you that the settings have


been saved. If you want to add another Access Rule,
click OK, and the first screen of the Access Rule Setup
Wizard will appear. If you want to exit the Access Rule
Setup Wizard, click Cancel, and the Firewall > Access
Rules screen will appear.

Support
Access a variety of resources on the Support page of the
Linksys website, www.linksys.com. You must have an
active Internet connection before you can visit the Linksys
website.

10/100 16-Port VPN Router 60


Appendix A Troubleshooting

Appendix A: The Router does not have a coaxial port for the cable
connection.
Troubleshooting The Router does not replace your modem. You still need
your cable modem in order to use the Router. Connect your
cable connection to the cable modem, insert the setup
The firmware upgrade has failed.
CD into your computer, and then follow the on‑screen
A firmware upgrade takes approximately ten minutes. An instructions.
error may occur if you powered off the Router, pressed the
Reset button, closed the System Management > Firmware WEB: If your questions are not addressed here,
Upgrade screen, or disconnected the computer from the refer to the Linksys website, www.linksys.com.
Router during the firmware upgrade.
If the firmware upgrade failed, repeat the firmware
upgrade procedure using the System Management >
Firmware Upgrade screen of the web-based utility. Refer to
“Appendix F: Firmware Upgrade” for details.
If the Diag LED continues to flash, the firmware image is
damaged. Use the TFTP utility to upgrade the firmware.
You can download the TFTP utility at www.linksys.com.

Your computer cannot connect to the Internet.


Follow these instructions until your computer can connect
to the Internet:
•• Make sure that the Router is powered on. The System
LED should be green and not flashing.
•• If the System LED is flashing, then power off all of
your network devices, including the modem, Router,
and computers. Then power on each device in the
following order:
1. Cable or DSL modem
2. Router
3. Computer
•• Check the cable connections. The computer should
be connected to one of the ports numbered 1-4 on
the Router, and the modem must be connected to the
Internet port on the Router.

The DSL telephone line does not fit into the Router’s
Internet port.
The Router does not replace your modem. You still need
your DSL modem in order to use the Router. Connect
the telephone line to the DSL modem, insert the setup
CD into your computer, and then follow the on‑screen
instructions.

10/100 16-Port VPN Router 61


Appendix B Linksys QuickVPN for Windows 2000, XP, or Vista

Appendix B: Linksys QuickVPN Instructions

Linksys QuickVPN for This appendix has two sections. The first section explains
how to do the following for each QuickVPN client, using

Windows 2000, XP, or Vista the Router’s web-based utility:


1. Export a client certificate.
2. Configure a user name and password.
Introduction
3. Add the QuickVPN client to the list.
The 10/100 16-Port VPN Router (model number: RV016)
supports IPSec VPN client software, including the Linksys The second section explains how to install and use Linksys
QuickVPN software (also known as the Linksys VPN QuickVPN, which works on computers running Windows
client). 2000, XP, or Vista. (Computers using other operating systems
will have to use third-party VPN software.) For Windows
The Router supports up to 50 Linksys QuickVPN clients Vista, QuickVPN version 1.2.5 or later is required.
free of charge. If the Router you have only supports
up to ten clients, then upgrade its firmware. Refer to
“Appendix F: Firmware Upgrade” for instructions.
Router Configuration
Computer (using VPN client software) to Export a Client Certificate from the Router
VPN Router 1. For local access of the Router’s web-based utility,
launch your web browser, and enter the Router’s
You can create a VPN tunnel between a computer using default IP address, 192.168.1.1, in the Address field.
VPN client software and a VPN router. The following is Press the Enter key.
an example of a computer-to-VPN Router VPN. In her
hotel room, a traveling businesswoman connects to her
Internet Service Provider (ISP). Her notebook computer
has VPN client software that is configured with her Address Bar
office’s VPN settings. She accesses the VPN client software
and connects to the VPN Router at the central office. As
VPNs use the Internet, distance is not a factor. Using the NOTE: If the Remote Management feature on
VPN, the businesswoman now has a secure connection the Firewall > General screen has been enabled,
to the central office’s network, as if she were physically then users with administrative privileges can
connected. remotely access the web-based utility. Use
http://<WAN IP address of the Router>, or
use https://<WAN IP address of the Router> if
Off-Site you have enabled the HTTPS feature.

Internet 2. A login screen prompts you for your User name and
Password. Enter admin in the User name field, and
enter admin in the Password field. (You can change
the Password on the Setup > Password screen.) Then
click OK.
Notebook with VPN
Client Software

VPN Central Office


Router

Computer to VPN Router

Login Screen

10/100 16-Port VPN Router 62


Appendix B Linksys QuickVPN for Windows 2000, XP, or Vista

3. In the Router’s web-based utility, click the VPN tab. 3. For the Change Password Allowed setting, select
Yes to allow the user to change his or her password.
4. Click the VPN Client Access tab.
Otherwise, keep the default, No.
5. Click Generate to generate a new certificate (if
4. To activate the new user, select Active.
needed).
5. Click Add to list.
6. Click Save Settings.

NOTE: If the Router’s LAN IP address is the


default, 192.168.1.1, then a pop-up window
will appear when you first save these settings.
You will be asked if you want the Router to
automatically change its LAN IP address to
prevent conflicting IP addresses. To allow the
Router to change its LAN IP address, click Yes.

If there is an IP address conflict, the QuickVPN


client will not be able to connect to the Router.

Linksys QuickVPN Client Installation and


VPN Client Access Screen
Configuration
For each QuickVPN client, do the following:
6. To export a client certificate, click Export for Client
and save the certificate as a .pem file. 1. Install Linksys QuickVPN. (Use the appropriate
installation procedure, “Install from the CD” or
7. Distribute the certificate to all QuickVPN users.
“Download from the Internet”.)
Add VPN Client Users 2. Install the client certificate.
For each QuickVPN client, repeat steps 1-6. Install from the CD-ROM
1. Insert the RV016 CD-ROM into your CD-ROM drive.
Click Start and then click Run. In the field provided,
enter D:\VPN_Client.exe (if “D” is the letter of your
CD-ROM drive).
2. The License Agreement screen appears. Read the
agreement. Click Yes to accept the terms and
conditions, and then the appropriate files are copied
to the computer. Clicking the Back or No button will
close the window, and the software will not be installed
on the computer.

VPN Client Access Screen

1. On the VPN Client Access screen, enter the user name in


the User Name field. License Agreement
2. Enter the password in the New Password field, and
enter it again in the Confirm New Password field.

10/100 16-Port VPN Router 63


Appendix B Linksys QuickVPN for Windows 2000, XP, or Vista

Copying Files Copying Files

Installation Complete Installation Complete

3. Click Finish to complete the installation. Proceed to 10. Click Finish to complete the installation. Proceed to
the section, “Install the Client Certificate”. the section, “Install the Client Certificate”.

Download from the Internet Install the Client Certificate


1. Go to www.linksys.com and select Products. For each QuickVPN client, save the client certificate to
the directory where the QuickVPN program is installed.
2. Click Business.
Example: C:\Program Files\Linksys\QuickVPN Client\
3. Click Router/VPN Solutions.
4. Click RV016. NOTE: The certificate for the client must be
placed in the install directory of the QuickVPN
5. Click Linksys QuickVPN Utility in the More Information client software.
section.
6. Select the version number of the Router. Proceed to the section, “Use of the Linksys QuickVPN
7. Save the zip file to your computer, and extract the .exe Software”.
file.
8. Double-click the .exe file.
Use of the Linksys QuickVPN Software
For each QuickVPN client, follow the instructions in the
9. The License Agreement screen appears. Read the
section, “Linksys QuickVPN Connection”.
agreement. Click Yes to accept the terms and
conditions, and then the appropriate files are copied
to the computer. Clicking the Back or No button will
Linksys QuickVPN Connection
close the window, and the software will not be installed 1. Double-click the Linksys QuickVPN software icon on
on the computer. your desktop or in the system tray.

QuickVPN Desktop Icon QuickVPN Tray Icon—


No Connection

2. The QuickVPN Login screen appears. Enter the


following:
•• Profile Name  Enter a name for your profile.
License Agreement •• User Name  Enter the User Name assigned to you.

10/100 16-Port VPN Router 64


Appendix B Linksys QuickVPN for Windows 2000, XP, or Vista

•• Password  Enter the Password assigned to you. To terminate the VPN tunnel, click Disconnect. To
change your password, click Change Password. For
•• Server Address  Enter the IP address or domain name
information, click Help.
of the Linksys 10/100 16-Port VPN Router.
If you clicked Change Password and have permission
•• Port for QuickVPN  Enter the port number that the
to change your own password, the Connect Virtual
QuickVPN client will use to communicate with the
Private Connection screen appears.
remote VPN router, or keep the default, Auto.
•• Old Password  Enter your password.
•• New Password  Enter your new password.
•• Confirm New Password  Re-enter your new
password.

Connect Virtual Private Connection


QuickVPN Login
Click OK to save your new password. Click Cancel to
To save this profile, click Save. (If there are multiple
cancel your change. For information, click Help.
sites to which you will need to create a tunnel, you can
create multiple profiles, but note that only one tunnel
can be active at a time.) To delete this profile, click NOTE: You can change your password only if
Delete. For information, click Help. you have been granted that privilege by your
system administrator.
3. To begin your QuickVPN connection, click Connect.
The connection’s progress is displayed in this order:
Connecting, Provisioning, Activating Policy, and Verifying Version Number of Linksys QuickVPN
Network. To display the version number of Linksys QuickVPN:
4. When your QuickVPN connection is established, the 1. Right-click the QuickVPN tray icon, and select About.
QuickVPN tray icon turns green, and the QuickVPN
Status screen appears. The screen displays the IP 2. The About screen displays the QuickVPN version
address of the remote end of the VPN tunnel, the time number.
and date the VPN tunnel began, and the total length of
time the VPN tunnel has been active.

QuickVPN Tray Icon—


Connection
QuickVPN Version Number

3. Click OK to close the About screen.

QuickVPN Status

10/100 16-Port VPN Router 65


Appendix C Gateway-to-Gateway VPN Tunnel

Appendix C: Configuration of the RVL200

Gateway-to-Gateway VPN Follow these instructions for the first VPN Router,
designated RVL200. The other VPN Router is designated

Tunnel the RV016.


1. Launch the web browser for a networked computer,
designated PC 1.
Overview 2. Access the web-based utility of the RVL200. (Refer to
This appendix explains how to configure an IPSec VPN the User Guide of the RVL200 for details.)
tunnel between two VPN Routers, using an example. Two 3. Click the IPSec VPN tab.
computers are used to test the liveliness of the tunnel.
4. Click the Gateway to Gateway tab.
Before You Begin 5. Enter a name in the Tunnel Name field.

The following is a list of equipment you need: 6. For the VPN Tunnel setting, select Enable.
7. For the Local Security Gateway Type, select IP Only.
•• Two Windows desktop computers (each computer will
The WAN IP address (A.A.A.A) of the RVL200 will be
be connected to a VPN Router)
automatically detected.
•• Two VPN Routers that are both connected to the
For the Local Security Group Type, select Subnet. Enter
Internet
the RVL200’s local network settings in the IP Address
Any VPN Routers can be deployed; however, this example and Subnet Mask fields.
uses the 4-Port SSL/IPSec VPN Router (model number:
RVL200) and the 10/100 16-Port VPN Router (model
number: RV016).

Configuration when the Remote Gateway


Uses a Static IP Address
This example assumes the Remote Gateway is using a
static IP address. If the Remote Gateway uses a dynamic
IP address, refer to “Configuration when the Remote
Gateway Uses a Dynamic IP Address.”
RVL200 IPSec VPN Settings

8. For the Remote Security Gateway Type, select IP Only.


Enter the RV016’s WAN IP address in the IP Address
RV016 RVL200
field.
WAN: B.B.B.B WAN: A.A.A.A
LAN: 192.168.1.1 LAN: 192.168.5.1 9. For the Remote Security Group Type, select Subnet.
Enter the RV016’s local network settings in the IP
Address and Subnet Mask fields.
10. In the IPSec Setup section, select the appropriate
encryption, authentication, and other key management
settings.
Gateway-to-Gateway IPSec VPN Tunnel - Remote Gateway Using
Static IP

NOTE: Each computer must have a network


adapter installed.

10/100 16-Port VPN Router 66


Appendix C Gateway-to-Gateway VPN Tunnel

11. In the Preshared Key field, enter a string for this key, for 9. For the Remote Security Gateway Type, select IP Only.
example, 13572468. Enter the RVL200’s WAN IP address in the IP Address
field.
10. For the Remote Security Group Type, select Subnet.
Enter the RVL200’s local network settings in the IP
Address and Subnet Mask fields.
11. In the IPSec Setup section, select the appropriate
encryption, authentication, and other key management
settings. (These should match the settings of the
RVL200.)
12. In the Preshared Key field, enter a string for this key, for
example, 13572468.
RVL200 IPSec Setup Settings

12. If you need more detailed settings, click Advanced


Settings. Otherwise, click Save Settings and proceed
to the next section, “Configuration of the RV016.”

Configuration of the RV016


Follow similar instructions for the RV016.
1. Launch the web browser for a networked computer,
designated PC 2.
2. Access the web-based utility of the RV016. (Refer to RV016 IPSec Setup Settings
“Chapter 4: Advanced Configuration” for details.)
13. If you need more detailed settings, click Advanced.
3. Click the VPN tab. Otherwise, click Save Settings.
4. Click the Gateway to Gateway tab.
5. Enter a name in the Tunnel Name field.
Configuration of PC 1 and PC 2
6. Select the appropriate Interface, WAN1 or WAN2. Verify that PC 1 and PC 2 can ping each other (refer to
Windows Help for more information). If they can ping
7. Select Enable. each other, then the VPN tunnel is configured correctly.
8. For the Local Security Gateway Type, select IP Only.
The WAN IP address (B.B.B.B) of the RV016 will be
automatically detected.
For the Local Security Group Type, select Subnet. Enter
the RV016’s local network settings in the IP Address and
Subnet Mask fields.

RV016 VPN Settings

10/100 16-Port VPN Router 67


Appendix C Gateway-to-Gateway VPN Tunnel

Configuration when the Remote Gateway


Uses a Dynamic IP Address
This example assumes the Remote Gateway is using a
dynamic IP address. If the Remote Gateway uses a static
IP address, refer to “Configuration when the Remote
Gateway Uses a Static IP Address.”

RVL200 IPSec VPN Settings


RV016 RVL200
Dynamic IP: B.B.B.B with WAN: A.A.A.A 8. For the Remote Security Gateway Type, select IP Only.
Domain Name: www.abc.com
LAN: 192.168.1.1
LAN: 192.168.5.1 Then select IP by DNS Resolved. Enter the RV016’s
domain name in the field provided.
9. For the Remote Security Group Type, select Subnet.
Enter the RV016’s local network settings in the IP
Address and Subnet Mask fields.
10. In the IPSec Setup section, select the appropriate
Gateway-to-Gateway IPSec VPN Tunnel - Remote Gateway Using encryption, authentication, and other key management
Dynamic IP
settings.
11. In the Preshared Key field, enter a string for this key, for
NOTE: Each computer must have a network example, 13572468.
adapter installed.

Configuration of the RVL200


Follow these instructions for the first VPN Router,
designated RVL200. The other VPN Router is designated
the RV016.
1. Launch the web browser for a networked computer,
designated PC 1.
2. Access the web-based utility of the RVL200. (Refer to
the User Guide of the RVL200 for details.) RVL200 IPSec Setup Settings
3. Click the IPSec VPN tab.
12. If you need more detailed settings, click Advanced
4. Click the Gateway to Gateway tab. Settings. Otherwise, click Save Settings and proceed
5. Enter a name in the Tunnel Name field. to the next section, “Configuration of the RV016.”

6. For the VPN Tunnel setting, select Enable. Configuration of the RV016
7. For the Local Security Gateway Type, select IP Only. Follow similar instructions for the RV016.
The WAN IP address (A.A.A.A) of the RVL200 will be
automatically detected. 1. Launch the web browser for a networked computer,
designated PC 2.
For the Local Security Group Type, select Subnet. Enter
the RVL200’s local network settings in the IP Address 2. Access the web-based utility of the RV016. (Refer to
and Subnet Mask fields. “Chapter 4: Advanced Configuration” for details.)
3. Click the VPN tab.
4. Click the Gateway to Gateway tab.
5. Enter a name in the Tunnel Name field.
6. Select the appropriate Interface, WAN1 or WAN2.

10/100 16-Port VPN Router 68


Appendix C Gateway-to-Gateway VPN Tunnel

7. Select Enable. Configuration when Both Gateways Use


8. For the Local Security Gateway Type, select IP Only.
The WAN IP address (B.B.B.B) of the RV016 will be
Dynamic IP Addresses
automatically detected. This example assumes both Gateways are using dynamic IP
For the Local Security Group Type, select Subnet. Enter addresses. If the Remote Gateway uses a static IP address,
the RV016’s local network settings in the IP Address and refer to “Configuration when the Remote Gateway Uses
Subnet Mask fields. a Static IP Address.” If only the Remote Gateway uses a
dynamic IP address, refer to “Configuration when the
Remote Gateway Uses a Dynamic IP Address.”

RV016 RVL200
Dynamic IP: B.B.B.B with Dynamic IP: A.A.A.A with
Domain Name: www.abc.com Domain Name: www.xyz.com
LAN: 192.168.1.1 LAN: 192.168.5.1

RV016 VPN Settings


Gateway-to-Gateway IPSec VPN Tunnel - Both Gateways Using
9. For the Remote Security Gateway Type, select IP Only. Dynamic IP
Enter the RVL200’s WAN IP address in the IP Address
field.
NOTE: Each computer must have a network
10. For the Remote Security Group Type, select Subnet. adapter installed.
Enter the RVL200’s local network settings in the IP
Address and Subnet Mask fields.
11. In the IPSec Setup section, select the appropriate Configuration of the RVL200
encryption, authentication, and other key management
Follow these instructions for the first VPN Router,
settings. (These should match the settings of the
designated RVL200. The other VPN Router is designated
RVL200.)
the RV016.
12. In the Preshared Key field, enter a string for this key, for
1. Launch the web browser for a networked computer,
example, 13572468.
designated PC 1.
2. Access the web-based utility of the RVL200. (Refer to
the User Guide of the RVL200 for details.)
3. Click the IPSec VPN tab.
4. Click the Gateway to Gateway tab.
5. Enter a name in the Tunnel Name field.
6. For the VPN Tunnel setting, select Enable.
7. For the Local Security Gateway Type, select IP Only.
The WAN IP address (A.A.A.A) of the RVL200 will be
automatically detected.
RV016 IPSec Setup Settings
For the Local Security Group Type, select Subnet. Enter
13. If you need more detailed settings, click Advanced the RVL200’s local network settings in the IP Address
Settings. Otherwise, click Save Settings. and Subnet Mask fields.

Configuration of PC 1 and PC 2
Verify that PC 1 and PC 2 can ping each other (refer to
Windows Help for more information). If they can ping
each other, then the VPN tunnel is configured correctly.
10/100 16-Port VPN Router 69
Appendix C Gateway-to-Gateway VPN Tunnel

7. Select Enable.
8. For the Local Security Gateway Type, select IP Only.
The WAN IP address (B.B.B.B) of the RV016 will be
automatically detected.
For the Local Security Group Type, select Subnet. Enter
the RV016’s local network settings in the IP Address and
Subnet Mask fields.

RVL200 IPSec VPN Settings

8. For the Remote Security Gateway Type, select IP Only.


Then select IP by DNS Resolved. Enter the RV016’s
domain name in the field provided.
9. For the Remote Security Group Type, select Subnet.
Enter the RV016’s local network settings in the IP
Address and Subnet Mask fields.
10. In the IPSec Setup section, select the appropriate
RV016 VPN Settings
encryption, authentication, and other key management
settings. 9. For the Remote Security Gateway Type, select IP Only.
11. In the Preshared Key field, enter a string for this key, for Then select IP by DNS Resolved. Enter the RVL200’s
example, 13572468. domain name in the field provided.
10. For the Remote Security Group Type, select Subnet.
Enter the RVL200’s local network settings in the IP
Address and Subnet Mask fields.
11. In the IPSec Setup section, select the appropriate
encryption, authentication, and other key management
settings. (These should match the settings of the
RVL200.)
12. In the Preshared Key field, enter a string for this key, for
example, 13572468.

RVL200 IPSec Setup Settings

12. If you need more detailed settings, click Advanced


Settings. Otherwise, click Save Settings and proceed
to the next section, “Configuration of the RV016.”

Configuration of the RV016


Follow similar instructions for the RV016.
1. Launch the web browser for a networked computer,
designated PC 2.
RV016 IPSec Setup Settings
2. Access the web-based utility of the RV016. (Refer to
“Chapter 4: Advanced Configuration” for details.) 13. If you need more detailed settings, click Advanced
Settings. Otherwise, click Save Settings.
3. Click the VPN tab.
4. Click the Gateway to Gateway tab. Configuration of PC 1 and PC 2
5. Enter a name in the Tunnel Name field. Verify that PC 1 and PC 2 can ping each other (refer to
6. Select the appropriate Interface, WAN1 or WAN2. Windows Help for more information). If they can ping
each other, then the VPN tunnel is configured correctly.
10/100 16-Port VPN Router 70
Appendix D IPSec NAT Traversal

Appendix D: Configuration of Scenario 1


IPSec NAT Traversal In this scenario, Router A is the RVL200 Initiator, while
Router B is the RVL200 Responder.

Overview
Network Address Translation (NAT) traversal is a technique
developed so that data protected by IPSec can pass
through a NAT. (See NAT 1 and NAT 2 in the diagram.)
Since IPSec provides integrity for the entire IP datagram, WAN: 192.168.99.11
NAT 2 - RV016 WAN: 192.168.99.22
any changes to the IP addressing will invalidate the data. Router B - RVL200
LAN: 192.168.111.1
To resolve this issue, NAT traversal appends a new IP and Responder
UDP header to the incoming datagram, ensuring that no LAN: 192.168.2.0/24
changes are made to the incoming datagram stream.
This chapter discusses two scenarios. In the first scenario,
Router A initiates IKE negotiation, while in the second WAN: 192.168.111.101
scenario, Router B initiates IKE negotiation. In the second NAT 1 - RV016
scenario, since the IKE responder is behind a NAT device, a LAN: 192.168.11.1
one-to-one NAT rule is required on the NAT device.
192.168.2.100

Before You Begin


WAN: 192.168.11.101
The following is a list of equipment you need:
Router A - RVL200 Initiator
LAN: 192.168.1.0/24
•• Two 4-Port SSL/IPSec VPN Routers (model number:
RVL200), one of which is connected to the Internet
•• Two 10/100 16-Port VPN Routers (model number:
RV016), one of which is connected to the Internet

192.168.1.101

Traffic in Scenario 1

NOTE: Both the IPSec initiator and responder


must support the mechanism for detecting the
NAT router in the path and changing to a new
port, as defined in RFC 3947.

Configuration of Router A
Follow these instructions for Router A.
1. Launch the web browser for a networked computer,
designated PC 1.
2. Access the web-based utility of Router A. (Refer to the
User Guide of the RVL200 for details.)
3. Click the IPSec VPN tab.
4. Click the Gateway to Gateway tab.
5. Enter a name in the Tunnel Name field.
6. For the VPN Tunnel setting, select Enable.

10/100 16-Port VPN Router 71


Appendix D IPSec NAT Traversal

7. For the Local Security Gateway Type, select IP Only. For the Local Security Group Type, select Subnet. Enter
The WAN IP address of Router A will be automatically Router B’s local network settings in the IP Address and
detected. Subnet Mask fields.
For the Local Security Group Type, select Subnet. Enter
Router A’s local network settings in the IP Address and
Subnet Mask fields.

Router B’s IPSec VPN Settings

8. For the Remote Security Gateway Type, select IP Only.


Enter the WAN IP address of NAT 2 - RV016 in the IP
Router A’s IPSec VPN Settings Address field.
8. For the Remote Security Gateway Type, select IP Only. 9. For the Remote Security Group Type, select Subnet.
Enter Router B’s WAN IP address in the IP Address field. Enter Router A’s local network settings in the IP Address
and Subnet Mask fields.
9. For the Remote Security Group Type, select Subnet.
Enter Router B’s local network settings in the IP Address 10. In the IPSec Setup section, select the appropriate
and Subnet Mask fields. encryption, authentication, and other key management
settings.
10. In the IPSec Setup section, select the appropriate
encryption, authentication, and other key management 11. In the Preshared Key field, enter a string for this key, for
settings. example, 13572468.
11. In the Preshared Key field, enter a string for this key, for 12. If you need more detailed settings, click Advanced
example, 13572468. Settings. Otherwise, click Save Settings.
12. If you need more detailed settings, click Advanced
Settings. Otherwise, click Save Settings and proceed
to the next section, “Configuration of Router B.”

Configuration of Router B
Follow these instructions for Router B.
1. Launch the web browser for a networked computer,
designated PC 2.
2. Access the web-based utility of Router B. (Refer to the
User Guide of the RVL200 for details.)
3. Click the IPSec VPN tab.
4. Click the Gateway to Gateway tab.
5. Enter a name in the Tunnel Name field.
6. For the VPN Tunnel setting, select Enable.
7. For the Local Security Gateway Type, select IP Only.
The WAN IP address of Router B will be automatically
detected.

10/100 16-Port VPN Router 72


Appendix D IPSec NAT Traversal

Configuration of Scenario 2 Configuration of the One-to-One NAT Rules


In this scenario, Router B is the RVL200 Initiator, while The one-to-one NAT rules must be configured on
Router A is the RVL200 Responder. Router B will have NAT 2 - RV016 and NAT 1 - RV016.
the Remote Security Gateway IP address set to a public
IP address that is associated with the WAN IP address of One-to-One NAT Rule on NAT 2 - RV016
Router A, which is behind the NAT. Hence the public IP 192.168.99.1 => 192.168.111.11
address (192.168.99.1) must be mapped to the WAN IP
address (192.168.11.101, a private IP address) of Router A Follow these instructions for the one-to-one NAT rule on
through the two one-to-one NAT rules: NAT 2 - RV016.
1. Launch the web browser for a networked computer.
•• 192.168.99.1 => 192.168.111.11 (on NAT 2)
2. Access the web-based utility of NAT 2 - RV016. (Refer to
•• 192.168.111.11 => 192.168.11.101 (on NAT 1)
“Chapter 4: Advanced Configuration” for details.)
3. Click the Setup tab.
4. Click the One-to-One NAT tab.
5. For the One-to-One NAT setting, select Enable.

WAN: 192.168.99.11
NAT 2 - RV016 WAN: 192.168.99.22
LAN: 192.168.111.1 Router B - RVL200
Initiator
LAN: 192.168.2.0/24

WAN: 192.168.111.101
NAT 1 - RV016
LAN: 192.168.11.1

192.168.2.100

Setup > One-to-One NAT


WAN: 192.168.11.101
Router A - RVL200 Responder 6. In the Private Range Begin field, enter 99.1.
LAN: 192.168.1.0/24
7. In the Public Range Begin field, enter 111.11.
8. In the Range Length field, enter an appropriate value.
The range length cannot exceed the number of valid
IP addresses. To map a single address, enter 1.
9. Click Add to List.
192.168.1.101 10. Click Save Settings.
Traffic in Scenario 2 Refer to “Chapter 4: Advanced Configuration” for more
details about one-to-one NAT rules.
NOTE: Both the IPSec initiator and responder
One-to-One NAT Rule on NAT 1 - RV016
must support the mechanism for detecting the
NAT router in the path and changing to a new 192.168.111.11 => 192.168.11.101
port, as defined in RFC 3947.
Follow these instructions for the one-to-one NAT rule on
NAT 1 - RV016.
1. Launch the web browser for a networked computer.
2. Access the web-based utility of NAT 1 - RV016. (Refer to
“Chapter 4: Advanced Configuration” for details.)
3. Click the Setup tab.

10/100 16-Port VPN Router 73


Appendix D IPSec NAT Traversal

4. Click the One-to-One NAT tab. 9. For the Remote Security Group Type, select Subnet.
Enter Router A’s local network settings in the IP Address
5. For the One-to-One NAT setting, select Enable.
and Subnet Mask fields.
6. In the Private Range Begin field, enter 111.11.
10. In the IPSec Setup section, select the appropriate
7. In the Public Range Begin field, enter 11.101. encryption, authentication, and other key management
8. In the Range Length field, enter an appropriate value. settings.
The range length cannot exceed the number of valid 11. In the Preshared Key field, enter a string for this key, for
IP addresses. To map a single address, enter 1. example, 13572468.
9. Click Add to List. 12. If you need more detailed settings, click Advanced
10. Click Save Settings. Settings. Otherwise, click Save Settings and proceed
to the next section, “Configuration of Router A.”
Refer to “Chapter 4: Advanced Configuration” for more
details about one-to-one NAT rules. Configuration of Router A
Configuration of Router B Follow these instructions for Router A.

Set the Remote Security Gateway to IP address: 1. Launch the web browser for a networked computer,
192.168.99.1, which is the one-to-one NAT IP address designated PC 1.
used by NAT 2 - RV016. 2. Access the web-based utility of Router A. (Refer to the
Follow these instructions for Router B. User Guide of the RVL200 for details.)

1. Launch the web browser for a networked computer, 3. Click the IPSec VPN tab.
designated PC 2. 4. Click the Gateway to Gateway tab.
2. Access the web-based utility of Router B. (Refer to the 5. Enter a name in the Tunnel Name field.
User Guide of the RVL200 for details.)
6. For the VPN Tunnel setting, select Enable.
3. Click the IPSec VPN tab.
7. For the Local Security Gateway Type, select IP Only.
4. Click the Gateway to Gateway tab. The WAN IP address of Router A will be automatically
5. Enter a name in the Tunnel Name field. detected.

6. For the VPN Tunnel setting, select Enable. For the Local Security Group Type, select Subnet. Enter
Router A’s local network settings in the IP Address and
7. For the Local Security Gateway Type, select IP Only. Subnet Mask fields.
The WAN IP address of Router B will be automatically
detected.
For the Local Security Group Type, select Subnet. Enter
Router B’s local network settings in the IP Address and
Subnet Mask fields.
8. For the Remote Security Gateway Type, select IP Only.
Enter 192.168.99.1 in the IP Address field.

Router A’s IPSec VPN Settings

NOTE: This configuration is the same as the


configuration of Router A in scenario 1.

8. For the Remote Security Gateway Type, select IP Only.


Enter Router B’s WAN IP address in the IP Address field.
Router B’s IPSec VPN Settings

10/100 16-Port VPN Router 74


Appendix D IPSec NAT Traversal

9. For the Remote Security Group Type, select Subnet.


Enter Router B’s local network settings in the IP Address
and Subnet Mask fields.
10. In the IPSec Setup section, select the appropriate
encryption, authentication, and other key management
settings.
11. In the Preshared Key field, enter a string for this key, for
example, 13572468.
12. If you need more detailed settings, click Advanced
Settings. Otherwise, click Save Settings.

10/100 16-Port VPN Router 75


Appendix E Bandwidth Management

Appendix E:
Bandwidth Management
Overview
This appendix explains how to ensure Quality of Service
(QoS) on Vonage Voice over Internet Protocol (VoIP)
phone service. This example uses Vonage; however, similar
instructions will apply to other VoIP services.

Creation of New Services


Create two new services, Vonage VoIP and
Vonage 2.
Add Vonage VoIP Service
1. Visit Vonage’s website at http://www.vonage.com.
Find out the ports used for Vonage VoIP service. 6. From the Protocol drop-down menu, select the
protocol the VoIP service uses. For example, some VoIP
2. Access the Router’s web-based utility. (Refer to devices use UDP.
“Chapter 4: Advanced Configuration” for details.)
7. Enter its SIP port range in the Port Range fields. For
3. Click the System Management tab. example, you can set the Port Range to 5060 to 5070
4. On the Bandwidth Management screen, click Service to make sure that all active ports are covered.
Management. 8. Click Add to List.
9. Add a second service. Enter a name, such as Vonage 2,
in the Service Name field.

Add Vonage 2 Service


System Management > Bandwidth Management
10. From the Protocol drop-down menu, select UDP.
5. On the Service Management screen, enter a name, such 11. Enter the RTP port range in the Port Range fields. These
as Vonage VoIP, in the Service Name field. are required for both incoming and outgoing traffic.
For example, you can set the Port Range to 10000 to
25000 to make sure that all active ports are covered.
12. Click Add to List.
13. Click Apply to save your changes.

10/100 16-Port VPN Router 76


Appendix E Bandwidth Management

Creation of New Bandwidth Management 13. Select Enable to enable this rule.
14. After you have set up the rule, click Add to list.
Rules
15. Set up a rule for Vonage 2. Select Vonage 2 from the
Create four new rules: Vonage VoIP (Upstream), Vonage Service drop-down menu.
VoIP (Downstream), Vonage 2 (Upstream), and Vonage 2
(Downstream). 16. Enter the IP address or range you need to control. To
include all internal IP addresses, keep the default, 0.
1. On the Bandwidth Management screen, select Vonage
VoIP from the Service drop-down menu. 17. From the Direction drop-down menu, select Upstream
for outbound traffic.
2. Enter the IP address or range you need to control. To
include all internal IP addresses, keep the default, 0. 18. In the Min. Rate field, enter the minimum rate for the
guaranteed bandwidth. For example, you can set a
3. From the Direction drop-down menu, select Upstream minimum rate of 40 kbit/sec.
for outbound traffic.
19. In the Max. Rate field, enter the maximum rate for
4. In the Min. Rate field, enter the minimum rate for the the maximum bandwidth. For example, you can set a
guaranteed bandwidth. For example, you can set a maximum rate of 80 kbit/sec.
minimum rate of 40 kbit/sec.
20. Select Enable to enable this rule.
5. In the Max. Rate field, enter the maximum rate for
the maximum bandwidth. For example, you can set a 21. After you have set up the rule, click Add to list.
maximum rate of 80 kbit/sec. 22. Set up a second rule for Vonage 2 (Downstream). Select
6. Select Enable to enable this rule. Vonage 2 from the Service drop-down menu.

7. After you have set up the rule, click Add to list. 23. Enter the IP address or range you need to control. To
include all internal IP addresses, keep the default, 0.
24. From the Direction drop-down menu, select
Downstream for inbound traffic.
25. In the Min. Rate field, enter the minimum rate for the
guaranteed bandwidth. For example, you can set a
minimum rate of 40 kbit/sec.
26. In the Max. Rate field, enter the maximum rate for
the maximum bandwidth. For example, you can set a
maximum rate of 80 kbit/sec.
27. Select Enable to enable this rule.
28. After you have set up the rule, click Add to list.

Create Vonage VoIP Rule

8. Set up a second rule for Vonage VoIP, this time for the
Downstream direction.
Select Vonage VoIP from the Service drop-down
menu.
9. Enter the IP address or range you need to control. To
include all internal IP addresses, keep the default, 0.
10. From the Direction drop-down menu, select
Downstream for inbound traffic.
11. In the Min. Rate field, enter the minimum rate for the
guaranteed bandwidth. For example, you can set a
Create Vonage 2 Rule
minimum rate of 40 kbit/sec.
12. In the Max. Rate field, enter the maximum rate for 29. Click Save Settings.
the maximum bandwidth. For example, you can set a
maximum rate of 80 kbit/sec.
10/100 16-Port VPN Router 77
Appendix F Firmware Upgrade

Appendix F: 3. In the Firmware Download section, click Firmware


Download from Linksys Web Site.
Firmware Upgrade
Overview
This appendix explains how to upgrade the firmware of
the Router.

How to Access the Web-Based Utility


1. For local access of the Router’s web-based utility,
launch your web browser, and enter the Router’s
default IP address, 192.168.1.1, in the Address field. System Management > Firmware Upgrade
Press the Enter key.
4. The Support page of the Linksys website appears.
Follow the on-screen instructions to access the
Downloads page for the 10/100 16-Port VPN Router
Address Bar (model number: RV016).
5. Download the firmware upgrade file.
NOTE: If the Remote Management feature on 6. Extract the file on your computer.
the Firewall > General screen has been enabled,
7. In the Firmware Upgrade section of the Firmware
then users with administrative privileges can
Upgrade screen, click the Browse button to locate the
remotely access the web-based utility. Use
extracted file.
http://<WAN IP address of the Router>, or
use https://<WAN IP address of the Router> if 8. After you have selected the extracted file, click
you have enabled the HTTPS feature. Firmware Upgrade Right Now.

2. A login screen prompts you for your User name and NOTE: The Router will take approximately ten
Password. Enter admin in the User name field, and minutes to upgrade its firmware. During this
enter admin in the Password field. (You can change process, do not power off the Router or press
the Password on the Setup > Password screen.) Then the Reset button.
click OK.

Alternative Firmware Upgrade Option


If the web-based upgrade method fails, use the TFTP
utility. Follow these instructions:
1. Use a computer on the local network of the Router.
Set the computer to a static IP address. (For example, if
the Router uses 192.168.1.1, then set the computer to
192.168.1.100.)
2. Go to www.linksys.com/downloads.
3. Select your region, and then select your country.

Login Screen 4. In the Enter Model Number field, enter RV016. Then
click Go.

Upgrade the Firmware 5. In the Please select version drop-down menu, select the
version number of the RV016. (For more information
1. In the Router’s web-based utility, click the System about how to find the version number, click the
Management tab. image of the RV016’s bottom panel with the sticker
2. Click the Firmware Upgrade tab. displayed.)
6. In the Firmware section, click TFTP Utility.
10/100 16-Port VPN Router 78
Appendix F Firmware Upgrade

7. The utility zip file will automatically open. Extract .exe


file to an appropriate location on your computer.
8. Double-click the .exe file.
9. In the Router IP field, enter the IP address of the
Router.

Firmware Upgrade Utility Login

10. In the Password field, enter the password for access to


the Router.
11. Click Next, and then follow the on-screen
instructions.

10/100 16-Port VPN Router 79


Appendix G Trend Micro ProtectLink Gateway Service

Appendix G: How to Purchase, Register, or Activate the


Trend Micro ProtectLink Service
You can purchase, register, or activate the service using
Gateway Service the System Summary or ProtectLink screen.

System Summary
Overview
The optional Trend Micro ProtectLink Gateway service
provides security for your network. It checks e-mail
messages, filters website addresses (URLs), and blocks
potentially malicious websites. (To purchase a license for
this service, contact your Linksys reseller.)
This appendix explains how to use this service.

How to Access the Web-Based Utility


1. For local access of the Router’s web-based utility,
launch your web browser, and enter the Router’s
default IP address, 192.168.1.1, in the Address field.
Press the Enter key.

Address Bar

NOTE: If the Remote Management feature on


the Firewall > General screen has been enabled,
then users with administrative privileges can
remotely access the web-based utility. Use
http://<WAN IP address of the Router>, or
use https://<WAN IP address of the Router> if System Summary (ProtectLink Available)
you have enabled the HTTPS feature.
Follow the instructions for the appropriate option:
2. A login screen prompts you for your User name and •• Go buy
Password. Enter admin in the User name field, and
enter admin in the Password field. (You can change •• Register
the Password on the Setup > Password screen.) Then •• Activate
click OK.
Trend Micro ProtectLink Gateway

NOTE: If the Trend Micro ProtectLink Gateway


options are not displayed on the System
Summary screen, upgrade the Router’s firmware.
Refer to “Appendix F: Firmware Upgrade” for
instructions.

Go buy  To purchase a license to use this service, click Go


buy. You will be redirected to a list of Linksys resellers on the
Linksys website. Then follow the on-screen instructions.
Login Screen Register  If you already have a license, click Register. You
will be redirected to the Trend Micro ProtectLink Gateway
website. Then follow the on-screen instructions.
10/100 16-Port VPN Router 80
Appendix G Trend Micro ProtectLink Gateway Service

NOTE: To have your e-mail checked, you will


need to provide the domain name and IP
address of your e-mail server. If you do not
know this information, contact your ISP.

Activate  If you have registered, click Activate. A wizard


begins. Follow the on-screen instructions.

When the wizard is complete, the System Summary screen


will indicate that the service has been activated.

ProtectLink

Follow the instructions for the appropriate option:


•• I want to buy Trend Micro ProtectLink.
•• I want to register online.
•• I want to activate Trend Micro ProtectLink.
I want to buy Trend Micro ProtectLink Gateway.  To
purchase a license to use this service, click this link. You
will be redirected to a list of Linksys resellers on the Linksys
website. Then follow the on-screen instructions.
I have purchased ProtectLink Gateway and want to
register it.  If you already have a license, click this link. You
will be redirected to the Trend Micro ProtectLink Gateway
website. Then follow the on-screen instructions.

NOTE: To have your e-mail checked, you will


need to provide the domain name and IP
address of your e-mail server. If you do not
know this information, contact your ISP.

I have my Activation Code (AC) and want to activate


System Summary (ProtectLink Activated) ProtectLink Gateway.  If you have registered, click this
link. A wizard begins. Follow the on‑screen instructions.
ProtectLink When the wizard is complete, the Web Protection, Email
Protection, and License tabs will appear.
Click the ProtectLink tab to display this screen.
NOTE: If you replace the Router with a new
NOTE: If the ProtectLink tab is not displayed,
router that supports this service, click I have my
upgrade the Router’s firmware. Refer
Activation Code (AC) and want to activate
to “Appendix F: Firmware Upgrade” for
ProtectLink Gateway. Then use your current
instructions.
activation code to transfer your license for the
ProtectLink service to the new router.

How to Use the Service


Configure the service to protect your network.

10/100 16-Port VPN Router 81


Appendix G Trend Micro ProtectLink Gateway Service

ProtectLink > Web Protection the sub-categories for each category. Then select the
appropriate Filtering option:
The Web Protection features are provided by the Router.
Configure the website filtering settings on this screen. Business Hours  To filter this URL category during the
business hours you have specified, select this option.
Leisure Hours  To filter this URL category during
non‑business hours, select this option.
Instances Blocked  The number of attempted visits is
displayed.

Business Hour Setting


Business Days  Select the appropriate days. The default
days are Mon. through Fri.
Business Times  To specify entire days, keep the default,
All day (24 hours). To specify hours, select Specify
business hours. For morning hours, select Morning,
and then select the appropriate From and To times. For
afternoon hours, select Afternoon, and then select the
appropriate From and To times.

Web Reputation
Select the appropriate security level:
High  This level blocks a higher number of potentially
malicious websites but also increases the risk of false
positives. (A false positive is a website that can be trusted
but seems potentially malicious.)
Medium  This level blocks most potentially malicious
websites and does not create too many false positives. The
default is Medium and is the recommended setting.
Low  This level blocks fewer potentially malicious websites
and reduces the risk of false positives.

Approved URLs
You can designate up to 20 trusted URLs that will always
be accessible.
ProtectLink > Web Protection
Enable Approved URL list  To set up a list of always
accessible URLs, select this option.
Web Protection
URL(s) to approve  Enter the trusted URL(s). Separate
Enable URL Filtering  To filter website addresses (URLs), multiple URLs with semicolons (“;”).
select this option.
Add  To add the URLs, click Add.
Enable Web Reputation  To block potentially malicious
websites, select this option. Approved URLs list  The trusted URLs are displayed. To
delete a URL, click its trash can icon.
URL Filtering
Approved Clients
Reset Counter  The Router counts the number of
attempted visits to a restricted URL. To reset the counter You can designate up to 20 trusted clients (local IP
to zero, click Reset Counter. addresses) that will always have access to filtered URLs.

For each URL category, select the appropriate Filtering Enable Approved Client list  To set up a list of trusted
option. If you want to filter a sub-category, click + to view clients, select this option.

10/100 16-Port VPN Router 82


Appendix G Trend Micro ProtectLink Gateway Service

IP addresses/range  Enter the appropriate IP addresses https://us.imhs.trendmicro.com/linksys  To set up


or ranges. Separate multiple URLs with semicolons (“;”). e‑mail protection, click this link. You will be redirected to
For a range of IP addresses, use a hyphen (“-”). Example: the Trend Micro ProtectLink Gateway website. Then follow
10.1.1.0-10.1.1.10. the on-screen instructions.
Add  To add the IP addresses or ranges, click Add.
ProtectLink > License
Approved Clients list  The IP addresses or range of
trusted clients are displayed. To delete an IP address or The license for the Trend Micro ProtectLink Gateway
range, click its trash can icon. service (Email Protection and Web Protection) is valid
for one year from the time the activation code for
URL Overflow Control Web Protection is generated. If you do not provide the
necessary information to activate Email Protection during
Specify the behavior you want if there are more URL registration, please provide that information as soon as
requests than the service can handle. possible because Email Protection and Web Protection
Temporarily block URL requests (This is the will expire at the same time.
recommended setting)  If there are too many URL
requests, the overflow will be held back until they can be NOTE: For example, if you provide the
processed. This is the default setting. information needed for Email Protection one
Temporarily bypass Trend Micro URL verification for month after receiving the activation code for
requested URLs  If there are too many URL requests, the Web Protection, then you will receive only
overflow will be allowed without verification. 11 months of Email Protection.

Click Save Settings to save your changes, or click Cancel On the License screen, license information is displayed.
Changes to undo them. Use this screen to renew your license, add seats, or view
license information online.
ProtectLink > Email Protection
The Email Protection features are provided by an
online service called IMHS, which stands for InterScan™
Messaging Hosted Security. It checks your e-mail messages
so spam, viruses, and inappropriate content are filtered
out. After you have configured the IMHS settings, your e-
mail messages will be checked online before appropriate
messages are forwarded to your network.

ProtectLink > License

License
ProtectLink > Email Protection
Update Information  To refresh the license information
Email Protection displayed on-screen, click Update Information.

License Information
NOTE: To have your e-mail checked, you will
need to provide the domain name and IP View detailed license online  To view license information
address of your e-mail server. If you do not online, click this link.
know this information, contact your ISP. Status  The status of your license, Activated or Expired, is
displayed.

10/100 16-Port VPN Router 83


Appendix G Trend Micro ProtectLink Gateway Service

Platform  The platform type, Gateway Service, is


automatically displayed.
License expires on  The date and time your license
expires are displayed.
Renew  To renew your license, click Renew. Then follow
the on-screen instructions.
Add Seats  Each seat allows an e-mail account to use
Email Protection. To add seats to your license, click Add
Seats. Then follow the on-screen instructions.

10/100 16-Port VPN Router 84


Appendix H Specifications

Appendix H: Routing Static and RIP v1, v2


QoS
Specifications Port-based QoS Configurable per LAN Port
Service based QoS Supports Rate Control or Priority
Specifications
Rate Control Upstream/Downstream Bandwidth
Model RV016 10/100 16-Port VPN Router can be Configured per Service
Standards IEEE 802.3, 802.3u Priority Each Service can be Mapped to
Ports 16 10/100 RJ-45 Ports, including One of the 3 Priority Levels
2 Internet Ports, 1 DMZ Port,
VPN
8 LAN Ports, and 5 Configurable
Internet/LAN Ports IPSec 100 IPSec Tunnels for Branch Office
Connectivity
Button Reset
QuickVPN 50 QuickVPN Users for Remote
Cabling Type Category 5 Ethernet
Client Access
LEDs Diag, System, LAN/Act 1-13,
PPTP Built-in PPTP Server Supporting
Internet/Act 1-7, DMZ
10 PPTP Clients
UPnP able/cert Cert
Encryption DES, 3DES, AES-128, AES-192,
Operating System Linux AES-256
Performance Authentication MD5, SHA1
NAT Throughput 200 Mbps IKE Support Internet Key Exchange
IPSec Throughput 97 Mbps IPSec NAT-T Supported for Gateway-to-Gateway
and Client-to-Gateway Tunnels
Security
Dead Peer Detection Support for DPD
Firewall SPI Firewall
VPN Passthrough PPTP, L2TP, IPSec
DoS Prevention Blocks Various Denial of Service
Attacks Management
Access Rules Up to 50 Entries Web-Based HTTPS
Port Forwarding Up to 30 Entries SNMP Supports SNMP v1 and v2c
Port Triggering Up to 30 Entries Log Syslog, Email Alert, VPN Tunnels
URL Filtering Static List by Domain or Keywords Status Monitor
(included), Dynamic Filtering Environmental
through Linksys/Trend Micro
Dimensions 11.00" x 1.75" x 9.50"
ProtectLink Gateway Services
W x H x D (279.4 x 44.45 x 241.3 mm)
(optional)
Unit Weight 3.25 lb (1.475 kg)
Network
Power AC 100~240V, 50-60 Hz
Multi-WANs Support up to 7 WAN Ports with
Certifications FCC Class B, CE Class B
Load Balancing, Where Certain
WAN Ports can be Dedicated to Operating Temp. 0 to 40ºC (32 to 104ºF)
Specified IP Ranges and Services Storage Temp. 0 to 70ºC (32 to 158ºF)
WAN Type DHCP,Static IP, PPPoE, PPTP, Operating Humidity 10 to 85% Noncondensing
Telstra BigPond, Dynamic DNS
Storage Humidity 5 to 90% Noncondensing
Protocol Binding Protocols can be Bound to
Particular WAN Port
Specifications are subject to change without notice.
DHCP DHCP Server, DHCP Client
DNS DNS Proxy, Dynamic DNS (DynDNS,
3322, PeanutHull)
NAT Many-to-One, One-to-One
DMZ DMZ Port, DMZ Host

10/100 16-Port VPN Router 85


Appendix I Warranty Information

Appendix I: service offerings. This limited warranty shall not apply to


such third party software or service offerings. This limited
Warranty Information warranty does not guarantee any continued availability
of a third party’s service for which this product’s use or
operation may require.
Linksys warrants this Linksys hardware product against
defects in materials and workmanship under normal TO THE EXTENT NOT PROHIBITED BY LAW, ALL IMPLIED
use for the Warranty Period, which begins on the WARRANTIES AND CONDITIONS OF MERCHANTABILITY,
date of purchase by the original end-user purchaser SATISFACTORY QUALITY OR FITNESS FOR A PARTICULAR
and lasts for the period specified for this product at PURPOSE ARE LIMITED TO THE DURATION OF THE
www.linksys.com/warranty. The internet URL address WARRANTY PERIOD. ALL OTHER EXPRESS OR IMPLIED
and the web pages referred to herein may be updated by CONDITIONS, REPRESENTATIONS AND WARRANTIES,
Linksys from time to time; the version in effect at the date INCLUDING, BUT NOT LIMITED TO, ANY IMPLIED
of purchase shall apply. WARRANTY OF NON-INFRINGEMENT, ARE DISCLAIMED.
Some jurisdictions do not allow limitations on how long
This limited warranty is non-transferable and extends only an implied warranty lasts, so the above limitation may not
to the original end-user purchaser. Your exclusive remedy apply to you. This limited warranty gives you specific legal
and Linksys’ entire liability under this limited warranty rights, and you may also have other rights which vary by
will be for Linksys, at its option, to (a) repair the product jurisdiction.
with new or refurbished parts, (b) replace the product
with a reasonably available equivalent new or refurbished TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT
Linksys product, or (c) refund the purchase price of the WILL LINKSYS BE LIABLE FOR ANY LOST DATA, REVENUE
product less any rebates. Any repaired or replacement OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL,
products will be warranted for the remainder of the INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF THE
original Warranty Period or thirty (30) days, whichever is THEORY OF LIABILITY (INCLUDING NEGLIGENCE), ARISING
longer. All products and parts that are replaced become OUT OF OR RELATED TO THE USE OF OR INABILITY TO
the property of Linksys. USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN
IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF
Exclusions and Limitations SUCH DAMAGES. IN NO EVENT WILL LINKSYS’ LIABILITY
EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT.
This limited warranty does not apply if: (a) the product The foregoing limitations will apply even if any warranty
assembly seal has been removed or damaged, (b) the or remedy provided under this limited warranty fails of
product has been altered or modified, except by Linksys, (c) its essential purpose. Some jurisdictions do not allow
the product damage was caused by use with non‑Linksys the exclusion or limitation of incidental or consequential
products, (d) the product has not been installed, operated, damages, so the above limitation or exclusion may not
repaired, or maintained in accordance with instructions apply to you.
supplied by Linksys, (e) the product has been subjected to
abnormal physical or electrical stress, misuse, negligence, Obtaining Warranty Service
or accident, (f ) the serial number on the Product has been
altered, defaced, or removed, or (g) the product is supplied If you have a question about your product or experience a
or licensed for beta, evaluation, testing or demonstration problem with it, please go to www.linksys.com/support
purposes for which Linksys does not charge a purchase where you will find a variety of online support tools and
price or license fee. information to assist you with your product. If the product
proves defective during the Warranty Period, contact the
ALL SOFTWARE PROVIDED BY LINKSYS WITH THE Value Added Reseller (VAR) from whom you purchased
PRODUCT, WHETHER FACTORY LOADED ON THE the product or Linksys Technical Support for instructions
PRODUCT OR CONTAINED ON MEDIA ACCOMPANYING on how to obtain warranty service. The telephone number
THE PRODUCT, IS PROVIDED “AS IS” WITHOUT WARRANTY for Linksys Technical Support in your area can be found
OF ANY KIND. Without limiting the foregoing, Linksys does in the product User Guide and at www.linksys.com.
not warrant that the operation of the product or software Have your product serial number and proof of purchase
will be uninterrupted or error free. Also, due to the on hand when calling. A DATED PROOF OF ORIGINAL
continual development of new techniques for intruding PURCHASE IS REQUIRED TO PROCESS WARRANTY CLAIMS.
upon and attacking networks, Linksys does not warrant If you are requested to return your product, you will be
that the product, software or any equipment, system or given a Return Materials Authorization (RMA) number. You
network on which the product or software is used will be are responsible for properly packaging and shipping your
free of vulnerability to intrusion or attack. The product product to Linksys at your cost and risk. You must include
may include or be bundled with third party software or the RMA number and a copy of your dated proof of
10/100 16-Port VPN Router 86
Appendix I Warranty Information

original purchase when returning your product. Products


received without a RMA number and dated proof of
original purchase will be rejected. Do not include any
other items with the product you are returning to Linksys.
Defective product covered by this limited warranty will be
repaired or replaced and returned to you without charge.
Customers outside of the United States of America and
Canada are responsible for all shipping and handling
charges, custom duties, VAT and other associated taxes
and charges. Repairs or replacements not covered under
this limited warranty will be subject to charge at Linksys’
then-current rates.

Technical Support
This limited warranty is neither a service nor a support
contract. Information about Linksys’ current technical
support offerings and policies (including any fees for
support services) can be found at:
www.linksys.com/support.
This limited warranty is governed by the laws of the
jurisdiction in which the Product was purchased by you.
Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine,
CA 92623.

10/100 16-Port VPN Router 87


Appendix J Software License Agreement

Appendix J: Schedule 1
Software License Linksys Software License Agreement
Agreement THIS LICENSE AGREEMENT IS BETWEEN YOU AND
CISCO-LINKSYS LLC OR ONE OF ITS AFFILIATES CISCO
SYSTEMS-LINKSYS (ASIA) PTE LTD. OR CISCO-LINKSYS
Software in Linksys Products K.K. (“LINKSYS”) LICENSING THE SOFTWARE INSTEAD OF
CISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLING
This product from Cisco-Linksys LLC or from one of its THE SOFTWARE, OR USING THE PRODUCT CONTAINING
affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco- THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY
Linksys K.K. (“Linksys”) contains software (including THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THESE
firmware) originating from Linksys and its suppliers TERMS, THEN YOU MAY NOT DOWNLOAD, INSTALL OR USE
and may also contain software from the open source THE SOFTWARE. YOU MAY RETURN UNUSED SOFTWARE
community. Any software originating from Linksys and its (OR, IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER
suppliers is licensed under the Linksys Software License PRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUND
Agreement contained at Schedule 1 below. You may also UP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO
be prompted to review and accept that Linksys Software THE RETURN PROCESS AND POLICIES OF THE PARTY FROM
License Agreement upon installation of the software. WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE.
Any software from the open source community is licensed License. Subject to the terms and conditions of this
under the specific license terms applicable to that software Agreement, Linksys grants the original end user purchaser
made available by Linksys at www.linksys.com/gpl or as of the Linksys product containing the Software (“You”)
provided for in Schedules 2, 3 and 4 below. a nonexclusive license to use the Software solely as
Where such specific license terms entitle you to the source embedded in or (where authorized in the applicable
code of such software, that source code is upon request documentation) for communication with such product.
available at cost from Linksys for at least three years This license may not be sublicensed, and is not transferable
from the purchase date of this product and may also be except to a person or entity to which you transfer
available for download from www.linksys.com/gpl. For ownership of the complete Linksys product containing
detailed license terms and additional information on the Software, provided you permanently transfer all rights
open source software in Linksys products please look at under this Agreement and do not retain any full or partial
the Linksys public web site at: www.linksys.com/gpl/ or copies of the Software, and the recipient agrees to the
Schedules 2, 3 or 4 below as applicable. terms of this Agreement.
BY DOWNLOADING OR INSTALLING THE SOFTWARE, “Software” includes, and this Agreement will apply to (a)
OR USING THE PRODUCT CONTAINING THE SOFTWARE, the software of Linksys or its suppliers provided in or with
YOU ARE CONSENTING TO BE BOUND BY THE SOFTWARE the applicable Linksys product, excluding technology
LICENSE AGREEMENTS BELOW. IF YOU DO NOT AGREE TO from the open source community, and (b) any upgrades,
ALL OF THESE TERMS, THEN YOU MAY NOT DOWNLOAD, updates, bug fixes or modified versions (“Upgrades”) or
INSTALL OR USE THE SOFTWARE. YOU MAY RETURN backup copies of the Software supplied to You by Linksys
UNUSED SOFTWARE (OR, IF THE SOFTWARE IS SUPPLIED or an authorized reseller, provided you already hold a
AS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT) valid license to the original software and have paid any
FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL applicable fee for the Upgrade.
PURCHASE, SUBJECT TO THE RETURN PROCESS AND Protection of Information. The Software and
POLICIES OF THE PARTY FROM WHICH YOU PURCHASED documentation contain trade secrets and/or copyrighted
SUCH PRODUCT OR SOFTWARE. materials of Linksys or its suppliers. You will not copy
or modify the Software or decompile, decrypt, reverse
Software Licenses engineer or disassemble the Software (except to the
extent expressly permitted by law notwithstanding this
The software Licenses applicable to software from Linksys
provision), and You will not disclose or make available
are made available at the Linksys public web site at:
such trade secrets or copyrighted material in any form to
www.linksys.com. For your convenience of reference,
any third party. Title to and ownership of the Software
a copy of the Linksys Software License Agreement and
and documentation and any portion thereof, will remain
the main open source code licenses used by Linksys in its
solely with Linksys or its suppliers.
products are contained in the Schedules below.

10/100 16-Port VPN Router 88


Appendix J Software License Agreement

Collection and Processing of Information. You agree that Limited Warranty. The warranty terms and period
Linksys and/or its affiliates may, from time to time, collect specified in the applicable Linksys Product User Guide
and process information about your Linksys product and/ shall also apply to the Software.
or the Software and/or your use of either in order (i) to
Disclaimer of Liabilities. IN NO EVENT WILL LINKSYS OR
enable Linksys to offer you Upgrades; (ii) to ensure that
ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA, REVENUE
your Linksys product and/or the Software is being used in
OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL,
accordance with the terms of this Agreement; (iii) to provide
INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF
improvements to the way Linksys delivers technology to
CAUSE (INCLUDING NEGLIGENCE), ARISING OUT OF
you and to other Linksys customers; (iv) to enable Linksys
OR RELATED TO THE USE OF OR INABILITY TO USE THE
to comply with the terms of any agreements it has with
SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF THE
any third parties regarding your Linksys product and/or
POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILL
Software and/or (v) to enable Linksys to comply with all
LINKSYS’ LIABILITY EXCEED THE AMOUNT PAID BY YOU
applicable laws and/or regulations, or the requirements
FOR THE PRODUCT. The foregoing limitations will apply
of any regulatory authority or government agency.
even if any warranty or remedy under this Agreement fails
Linksys and/ or its affiliates may collect and process
of its essential purpose. Some jurisdictions do not allow
this information provided that it does not identify you
the exclusion or limitation of incidental or consequential
personally. Your use of your Linksys product and/or the
damages, so the above limitation or exclusion may not
Software constitutes this consent by you to Linksys and/
apply to You.
or its affiliates’ collection and use of such information and,
for EEA customers, to the transfer of such information to a Export. Software, including technical data, may be subject
location outside the EEA. to U.S. export control laws and regulations and/or export
or import regulations in other countries. You agree to
Software Upgrades etc. If the Software enables you to
comply strictly with all such laws and regulations.
receive Upgrades, you may elect at any time to receive
these Upgrades either automatically or manually. If you U.S. Government Users. The Software and documentation
elect to receive Upgrades manually or you otherwise qualify as “commercial items” as defined at 48 C.F.R. 2.101
elect not to receive or be notified of any Upgrades, you and 48 C.F.R. 12.212. All Government users acquire the
may expose your Linksys product and/or the Software Software and documentation with only those rights
to serious security threats and/or some features within herein that apply to non-governmental customers.
your Linksys product and/or Software may become General Terms. This Agreement will be governed by and
inaccessible. There may be circumstances where we construed in accordance with the laws of the State of
apply an Upgrade automatically in order to comply with California, without reference to conflict of laws principles.
changes in legislation, legal or regulatory requirements The United Nations Convention on Contracts for the
or as a result of requirements to comply with the terms International Sale of Goods will not apply. If any portion
of any agreements Linksys has with any third parties of this Agreement is found to be void or unenforceable,
regarding your Linksys product and/or the Software. You the remaining provisions will remain in full force and
will always be notified of any Upgrades being delivered effect. This Agreement constitutes the entire agreement
to you. The terms of this license will apply to any such between the parties with respect to the Software and
Upgrade unless the Upgrade in question is accompanied supersedes any conflicting or additional terms contained
by a separate license, in which event the terms of that in any purchase order or elsewhere.
license will apply.
Open Source Software. The GPL or other open source END OF SCHEDULE 1
code incorporated into the Software and the open source
license for such source code are available for free download
at http://www.linksys.com/gpl. If You would like a copy
Schedule 2
of the GPL or other open source code in this Software on a If this Linksys product contains open source software
CD, Linksys will mail to You a CD with such code for $9.99 licensed under Version 2 of the “GNU General Public
plus the cost of shipping, upon request. License” then the license terms below in this Schedule 2
Term and Termination. You may terminate this License will apply to that open source software. The license terms
at any time by destroying all copies of the Software below in this Schedule 2 are from the public web site at
and documentation. Your rights under this License will http://www.gnu.org/copyleft/gpl.html
terminate immediately without notice from Linksys if You
fail to comply with any provision of this Agreement. GNU GENERAL PUBLIC LICENSE
Version 2, June 1991

10/100 16-Port VPN Router 89


Appendix J Software License Agreement

Copyright (C) 1989, 1991 Free Software Foundation, Inc. To prevent this, we have made it clear that any patent must
be licensed for everyone’s free use or not licensed at all.
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301,
USA The precise terms and conditions for copying, distribution
and modification follow.
Everyone is permitted to copy and distribute verbatim
copies of this license document, but changing it is not TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND
allowed.
MODIFICATION
Preamble 0. This License applies to any program or other work
The licenses for most software are designed to take away which contains a notice placed by the copyright
your freedom to share and change it. By contrast, the holder saying it may be distributed under the terms
GNU General Public License is intended to guarantee your of this General Public License. The “Program”, below,
freedom to share and change free software—to make refers to any such program or work, and a “work based
sure the software is free for all its users. This General Public on the Program” means either the Program or any
License applies to most of the Free Software Foundation’s derivative work under copyright law: that is to say, a
software and to any other program whose authors work containing the Program or a portion of it, either
commit to using it. (Some other Free Software Foundation verbatim or with modifications and/or translated into
software is covered by the GNU Lesser General Public another language. (Hereinafter, translation is included
License instead.) You can apply it to your programs, too. without limitation in the term “modification”.) Each
licensee is addressed as “you”.
When we speak of free software, we are referring to
freedom, not price. Our General Public Licenses are Activities other than copying, distribution and
designed to make sure that you have the freedom to modification are not covered by this License; they
distribute copies of free software (and charge for this are outside its scope. The act of running the Program
service if you wish), that you receive source code or can is not restricted, and the output from the Program is
get it if you want it, that you can change the software or covered only if its contents constitute a work based on
use pieces of it in new free programs; and that you know the Program (independent of having been made by
you can do these things. running the Program). Whether that is true depends
on what the Program does.
To protect your rights, we need to make restrictions that
forbid anyone to deny you these rights or to ask you to 1. You may copy and distribute verbatim copies of the
surrender the rights. These restrictions translate to certain Program’s source code as you receive it, in any medium,
responsibilities for you if you distribute copies of the provided that you conspicuously and appropriately
software, or if you modify it. publish on each copy an appropriate copyright notice
and disclaimer of warranty; keep intact all the notices
For example, if you distribute copies of such a program, that refer to this License and to the absence of any
whether gratis or for a fee, you must give the recipients warranty; and give any other recipients of the Program
all the rights that you have. You must make sure that they, a copy of this License along with the Program.
too, receive or can get the source code. And you must
show them these terms so they know their rights. You may charge a fee for the physical act of transferring
a copy, and you may at your option offer warranty
We protect your rights with two steps: (1) copyright the protection in exchange for a fee.
software, and (2) offer you this license which gives you
legal permission to copy, distribute and/or modify the 2. You may modify your copy or copies of the Program
software. or any portion of it, thus forming a work based on the
Program, and copy and distribute such modifications
Also, for each author’s protection and ours, we want to or work under the terms of Section 1 above, provided
make certain that everyone understands that there is no that you also meet all of these conditions:
warranty for this free software. If the software is modified
by someone else and passed on, we want its recipients a. You must cause the modified files to carry
to know that what they have is not the original, so that prominent notices stating that you changed the
any problems introduced by others will not reflect on the files and the date of any change.
original authors’ reputations. b. You must cause any work that you distribute or
Finally, any free program is threatened constantly by publish, that in whole or in part contains or is
software patents. We wish to avoid the danger that derived from the Program or any part thereof, to be
redistributors of a free program will individually obtain licensed as a whole at no charge to all third parties
patent licenses, in effect making the program proprietary. under the terms of this License.

10/100 16-Port VPN Router 90


Appendix J Software License Agreement

c. If the modified program normally reads commands c. Accompany it with the information you received as
interactively when run, you must cause it, when to the offer to distribute corresponding source code.
started running for such interactive use in the most (This alternative is allowed only for noncommercial
ordinary way, to print or display an announcement distribution and only if you received the program
including an appropriate copyright notice and in object code or executable form with such an
a notice that there is no warranty (or else, saying offer, in accord with Subsection b above.)
that you provide a warranty) and that users may
The source code for a work means the preferred form
redistribute the program under these conditions,
of the work for making modifications to it. For an
and telling the user how to view a copy of
executable work, complete source code means all
this License. (Exception: if the Program itself is
the source code for all modules it contains, plus any
interactive but does not normally print such an
associated interface definition files, plus the scripts
announcement, your work based on the Program
used to control compilation and installation of the
is not required to print an announcement.)
executable. However, as a special exception, the source
These requirements apply to the modified work as code distributed need not include anything that is
a whole. If identifiable sections of that work are not normally distributed (in either source or binary form)
derived from the Program, and can be reasonably with the major components (compiler, kernel, and so
considered independent and separate works in on) of the operating system on which the executable
themselves, then this License, and its terms, do not runs, unless that component itself accompanies the
apply to those sections when you distribute them as executable.
separate works. But when you distribute the same
If distribution of executable or object code is made
sections as part of a whole which is a work based on
by offering access to copy from a designated place,
the Program, the distribution of the whole must be on
then offering equivalent access to copy the source
the terms of this License, whose permissions for other
code from the same place counts as distribution of
licensees extend to the entire whole, and thus to each
the source code, even though third parties are not
and every part regardless of who wrote it.
compelled to copy the source along with the object
Thus, it is not the intent of this section to claim rights code.
or contest your rights to work written entirely by you;
4. You may not copy, modify, sublicense, or distribute
rather, the intent is to exercise the right to control the
the Program except as expressly provided under
distribution of derivative or collective works based on
this License. Any attempt otherwise to copy, modify,
the Program.
sublicense or distribute the Program is void, and will
In addition, mere aggregation of another work not automatically terminate your rights under this License.
based on the Program with the Program (or with a However, parties who have received copies, or rights,
work based on the Program) on a volume of a storage from you under this License will not have their licenses
or distribution medium does not bring the other work terminated so long as such parties remain in full
under the scope of this License. compliance.
3. You may copy and distribute the Program (or a 5. You are not required to accept this License, since you
work based on it, under Section 2) in object code or have not signed it. However, nothing else grants you
executable form under the terms of Sections 1 and 2 permission to modify or distribute the Program or its
above provided that you also do one of the following: derivative works. These actions are prohibited by law if
you do not accept this License. Therefore, by modifying
a. Accompany it with the complete corresponding
or distributing the Program (or any work based on the
machine-readable source code, which must be
Program), you indicate your acceptance of this License
distributed under the terms of Sections 1 and 2
to do so, and all its terms and conditions for copying,
above on a medium customarily used for software
distributing or modifying the Program or works based
interchange; or,
on it.
b. Accompany it with a written offer, valid for at least
6. Each time you redistribute the Program (or any work
three years, to give any third party, for a charge
based on the Program), the recipient automatically
no more than your cost of physically performing
receives a license from the original licensor to copy,
source distribution, a complete machine-readable
distribute or modify the Program subject to these
copy of the corresponding source code, to be
terms and conditions. You may not impose any further
distributed under the terms of Sections 1 and 2
restrictions on the recipients’ exercise of the rights
above on a medium customarily used for software
granted herein. You are not responsible for enforcing
interchange; or,
compliance by third parties to this License.

10/100 16-Port VPN Router 91


Appendix J Software License Agreement

7. If, as a consequence of a court judgment or allegation either of that version or of any later version published
of patent infringement or for any other reason (not by the Free Software Foundation. If the Program does
limited to patent issues), conditions are imposed on not specify a version number of this License, you
you (whether by court order, agreement or otherwise) may choose any version ever published by the Free
that contradict the conditions of this License, they do Software Foundation.
not excuse you from the conditions of this License. If
10. If you wish to incorporate parts of the Program into
you cannot distribute so as to satisfy simultaneously
other free programs whose distribution conditions are
your obligations under this License and any other
different, write to the author to ask for permission. For
pertinent obligations, then as a consequence you
software which is copyrighted by the Free Software
may not distribute the Program at all. For example,
Foundation, write to the Free Software Foundation; we
if a patent license would not permit royalty-free
sometimes make exceptions for this. Our decision will
redistribution of the Program by all those who receive
be guided by the two goals of preserving the free status
copies directly or indirectly through you, then the only
of all derivatives of our free software and of promoting
way you could satisfy both it and this License would be
the sharing and reuse of software generally.
to refrain entirely from distribution of the Program.
If any portion of this section is held invalid or NO WARRANTY
unenforceable under any particular circumstance, 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE,
the balance of the section is intended to apply and THERE IS NO WARRANTY FOR THE PROGRAM, TO THE
the section as a whole is intended to apply in other EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT
circumstances. WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
It is not the purpose of this section to induce you to HOLDERS AND/OR OTHER PARTIES PROVIDE THE
infringe any patents or other property right claims or PROGRAM “AS IS” WITHOUT WARRANTY OF ANY
to contest validity of any such claims; this section has KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,
the sole purpose of protecting the integrity of the free BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
software distribution system, which is implemented MERCHANTABILITY AND FITNESS FOR A PARTICULAR
by public license practices. Many people have PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND
made generous contributions to the wide range of PERFORMANCE OF THE PROGRAM IS WITH YOU.
software distributed through that system in reliance SHOULD THE PROGRAM PROVE DEFECTIVE, YOU
on consistent application of that system; it is up to ASSUME THE COST OF ALL NECESSARY SERVICING,
the author/donor to decide if he or she is willing to REPAIR OR CORRECTION.
distribute software through any other system and a 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW
licensee cannot impose that choice. OR AGREED TO IN WRITING WILL ANY COPYRIGHT
This section is intended to make thoroughly clear HOLDER, OR ANY OTHER PARTY WHO MAY
what is believed to be a consequence of the rest of this MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS
License. PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
8. If the distribution and/or use of the Program is CONSEQUENTIAL DAMAGES ARISING OUT OF THE
restricted in certain countries either by patents or by USE OR INABILITY TO USE THE PROGRAM (INCLUDING
copyrighted interfaces, the original copyright holder BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING
who places the Program under this License may add an RENDERED INACCURATE OR LOSSES SUSTAINED BY
explicit geographical distribution limitation excluding YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM
those countries, so that distribution is permitted only TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF
in or among countries not thus excluded. In such case, SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED
this License incorporates the limitation as if written in OF THE POSSIBILITY OF SUCH DAMAGES.
the body of this License.
9. The Free Software Foundation may publish revised END OF TERMS AND CONDITIONS
and/or new versions of the General Public License
from time to time. Such new versions will be similar in END OF SCHEDULE 2
spirit to the present version, but may differ in detail to
address new problems or concerns.
Schedule 3
Each version is given a distinguishing version number.
If the Program specifies a version number of this If this Linksys product contains open source software
License which applies to it and “any later version”, you licensed under Version 2.1 of the“GNU Lesser General Public
have the option of following the terms and conditions License” then the license terms below in this Schedule 3

10/100 16-Port VPN Router 92


Appendix J Software License Agreement

will apply to that open source software. The license terms recompiling it. And you must show them these terms so
below in this Schedule 3 are from the public web site at they know their rights.
http:// .gnu.org/licenses/old-licenses/lgpl-2.1.html
We protect your rights with a two-step method: (1) we
copyright the library, and (2) we offer you this license,
GNU LESSER GENERAL PUBLIC LICENSE which gives you legal permission to copy, distribute and/
Version 2.1, February 1999 or modify the library.
Copyright (C) 1991, 1999 Free Software Foundation, Inc. To protect each distributor, we want to make it very clear
that there is no warranty for the free library. Also, if the
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 library is modified by someone else and passed on, the
USA recipients should know that what they have is not the
Everyone is permitted to copy and distribute verbatim original version, so that the original author’s reputation
copies of this license document, but changing it is not will not be affected by problems that might be introduced
allowed. by others.
[This is the first released version of the Lesser GPL. It also Finally, software patents pose a constant threat to the
counts as the successor of the GNU Library Public License, existence of any free program. We wish to make sure
version 2, hence the version number 2.1.] that a company cannot effectively restrict the users of
a free program by obtaining a restrictive license from a
Preamble patent holder. Therefore, we insist that any patent license
obtained for a version of the library must be consistent
The licenses for most software are designed to take away
with the full freedom of use specified in this license.
your freedom to share and change it. By contrast, the GNU
General Public Licenses are intended to guarantee your Most GNU software, including some libraries, is covered
freedom to share and change free software—to make by the ordinary GNU General Public License. This license,
sure the software is free for all its users. the GNU Lesser General Public License, applies to certain
designated libraries, and is quite different from the
This license, the Lesser General Public License, applies to
ordinary General Public License. We use this license for
some specially designated software packages—typically
certain libraries in order to permit linking those libraries
libraries—of the Free Software Foundation and other
into non-free programs.
authors who decide to use it. You can use it too, but we
suggest you first think carefully about whether this license When a program is linked with a library, whether statically or
or the ordinary General Public License is the better strategy using a shared library, the combination of the two is legally
to use in any particular case, based on the explanations speaking a combined work, a derivative of the original
below. library. The ordinary General Public License therefore
permits such linking only if the entire combination fits
When we speak of free software, we are referring to
its criteria of freedom. The Lesser General Public License
freedom of use, not price. Our General Public Licenses
permits more lax criteria for linking other code with the
are designed to make sure that you have the freedom
library.
to distribute copies of free software (and charge for this
service if you wish); that you receive source code or can We call this license the “Lesser” General Public License
get it if you want it; that you can change the software and because it does Less to protect the user’s freedom than
use pieces of it in new free programs; and that you are the ordinary General Public License. It also provides
informed that you can do these things. other free software developers Less of an advantage over
competing non-free programs. These disadvantages are
To protect your rights, we need to make restrictions that
the reason we use the ordinary General Public License
forbid distributors to deny you these rights or to ask you
for many libraries. However, the Lesser license provides
to surrender these rights. These restrictions translate to
advantages in certain special circumstances.
certain responsibilities for you if you distribute copies of
the library or if you modify it. For example, on rare occasions, there may be a special
need to encourage the widest possible use of a certain
For example, if you distribute copies of the library,
library, so that it becomes a de-facto standard. To achieve
whether gratis or for a fee, you must give the recipients
this, non-free programs must be allowed to use the library.
all the rights that we gave you. You must make sure that
A more frequent case is that a free library does the same
they, too, receive or can get the source code. If you link
job as widely used non-free libraries. In this case, there is
other code with the library, you must provide complete
little to gain by limiting the free library to free software
object files to the recipients, so that they can relink them
only, so we use the Lesser General Public License.
with the library after making changes to the library and

10/100 16-Port VPN Router 93


Appendix J Software License Agreement

In other cases, permission to use a particular library in non- work based on the Library (independent of the use
free programs enables a greater number of people to use of the Library in a tool for writing it). Whether that is
a large body of free software. For example, permission to true depends on what the Library does and what the
use the GNU C Library in non-free programs enables many program that uses the Library does.
more people to use the whole GNU operating system, as
1. You may copy and distribute verbatim copies of the
well as its variant, the GNU/Linux operating system.
Library’s complete source code as you receive it, in
Although the Lesser General Public License is Less any medium, provided that you conspicuously and
protective of the users’ freedom, it does ensure that the appropriately publish on each copy an appropriate
user of a program that is linked with the Library has the copyright notice and disclaimer of warranty; keep
freedom and the wherewithal to run that program using a intact all the notices that refer to this License and to
modified version of the Library. the absence of any warranty; and distribute a copy of
this License along with the Library.
The precise terms and conditions for copying, distribution
and modification follow. Pay close attention to the You may charge a fee for the physical act of transferring
difference between a “work based on the library” and a a copy, and you may at your option offer warranty
“work that uses the library”. The former contains code protection in exchange for a fee.
derived from the library, whereas the latter must be
2. You may modify your copy or copies of the Library or
combined with the library in order to run.
any portion of it, thus forming a work based on the
GNU LESSER GENERAL PUBLIC LICENSE Library, and copy and distribute such modifications
or work under the terms of Section 1 above, provided
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND that you also meet all of these conditions:
MODIFICATION a. The modified work must itself be a software
library.
0. This License Agreement applies to any software library
or other program which contains a notice placed by b. You must cause the files modified to carry
the copyright holder or other authorized party saying prominent notices stating that you changed the
it may be distributed under the terms of this Lesser files and the date of any change.
General Public License (also called “this License”). Each c. You must cause the whole of the work to be
licensee is addressed as “you”. licensed at no charge to all third parties under the
A “library” means a collection of software functions terms of this License.
and/or data prepared so as to be conveniently linked d. If a facility in the modified Library refers to a function
with application programs (which use some of those or a table of data to be supplied by an application
functions and data) to form executables. program that uses the facility, other than as an
The “Library”, below, refers to any such software library argument passed when the facility is invoked, then
or work which has been distributed under these terms. you must make a good faith effort to ensure that,
A “work based on the Library” means either the Library in the event an application does not supply such
or any derivative work under copyright law: that is to function or table, the facility still operates, and
say, a work containing the Library or a portion of it, performs whatever part of its purpose remains
either verbatim or with modifications and/or translated meaningful.
straightforwardly into another language. (Hereinafter, (For example, a function in a library to compute square
translation is included without limitation in the term roots has a purpose that is entirely well-defined
“modification”.) independent of the application. Therefore, Subsection
“Source code” for a work means the preferred form of 2d requires that any application-supplied function or
the work for making modifications to it. For a library, table used by this function must be optional: if the
complete source code means all the source code for application does not supply it, the square root function
all modules it contains, plus any associated interface must still compute square roots.)
definition files, plus the scripts used to control These requirements apply to the modified work as
compilation and installation of the library. a whole. If identifiable sections of that work are not
Activities other than copying, distribution and derived from the Library, and can be reasonably
modification are not covered by this License; they are considered independent and separate works in
outside its scope. The act of running a program using themselves, then this License, and its terms, do not
the Library is not restricted, and output from such a apply to those sections when you distribute them as
program is covered only if its contents constitute a separate works. But when you distribute the same

10/100 16-Port VPN Router 94


Appendix J Software License Agreement

sections as part of a whole which is a work based on However, linking a “work that uses the Library” with
the Library, the distribution of the whole must be on the Library creates an executable that is a derivative
the terms of this License, whose permissions for other of the Library (because it contains portions of the
licensees extend to the entire whole, and thus to each Library), rather than a “work that uses the library”. The
and every part regardless of who wrote it. executable is therefore covered by this License. Section
6 states terms for distribution of such executables.
Thus, it is not the intent of this section to claim rights
or contest your rights to work written entirely by you; When a “work that uses the Library” uses material from
rather, the intent is to exercise the right to control the a header file that is part of the Library, the object code
distribution of derivative or collective works based on for the work may be a derivative work of the Library
the Library. even though the source code is not. Whether this is
true is especially significant if the work can be linked
In addition, mere aggregation of another work not
without the Library, or if the work is itself a library. The
based on the Library with the Library (or with a work
threshold for this to be true is not precisely defined by
based on the Library) on a volume of a storage or
law.
distribution medium does not bring the other work
under the scope of this License. If such an object file uses only numerical parameters,
data structure layouts and accessors, and small macros
3. You may opt to apply the terms of the ordinary GNU
and small inline functions (ten lines or less in length),
General Public License instead of this License to a
then the use of the object file is unrestricted, regardless
given copy of the Library. To do this, you must alter all
of whether it is legally a derivative work. (Executables
the notices that refer to this License, so that they refer
containing this object code plus portions of the Library
to the ordinary GNU General Public License, version
will still fall under Section 6.)
2, instead of to this License. (If a newer version than
version 2 of the ordinary GNU General Public License Otherwise, if the work is a derivative of the Library, you
has appeared, then you can specify that version may distribute the object code for the work under the
instead if you wish.) Do not make any other change terms of Section 6. Any executables containing that
in these notices. work also fall under Section 6, whether or not they are
linked directly with the Library itself.
Once this change is made in a given copy, it is
irreversible for that copy, so the ordinary GNU General 6. As an exception to the Sections above, you may also
Public License applies to all subsequent copies and combine or link a “work that uses the Library” with the
derivative works made from that copy. Library to produce a work containing portions of the
Library, and distribute that work under terms of your
This option is useful when you wish to copy part of the
choice, provided that the terms permit modification
code of the Library into a program that is not a library.
of the work for the customer’s own use and reverse
4. You may copy and distribute the Library (or a portion engineering for debugging such modifications.
or derivative of it, under Section 2) in object code or
You must give prominent notice with each copy of
executable form under the terms of Sections 1 and
the work that the Library is used in it and that the
2 above provided that you accompany it with the
Library and its use are covered by this License. You
complete corresponding machine-readable source
must supply a copy of this License. If the work during
code, which must be distributed under the terms of
execution displays copyright notices, you must include
Sections 1 and 2 above on a medium customarily used
the copyright notice for the Library among them, as
for software interchange.
well as a reference directing the user to the copy of this
If distribution of object code is made by offering License. Also, you must do one of these things:
access to copy from a designated place, then offering
a. Accompany the work with the complete
equivalent access to copy the source code from the
corresponding machine-readable source code
same place satisfies the requirement to distribute
for the Library including whatever changes were
the source code, even though third parties are not
used in the work (which must be distributed
compelled to copy the source along with the object
under Sections 1 and 2 above); and, if the work
code.
is an executable linked with the Library, with the
5. A program that contains no derivative of any portion complete machine-readable “work that uses the
of the Library, but is designed to work with the Library Library”, as object code and/or source code, so that
by being compiled or linked with it, is called a “work the user can modify the Library and then relink
that uses the Library”. Such a work, in isolation, is not to produce a modified executable containing the
a derivative work of the Library, and therefore falls modified Library. (It is understood that the user
outside the scope of this License. who changes the contents of definitions files in the
10/100 16-Port VPN Router 95
Appendix J Software License Agreement

Library will not necessarily be able to recompile the b. Give prominent notice with the combined library of
application to use the modified definitions.) the fact that part of it is a work based on the Library,
and explaining where to find the accompanying
b. Use a suitable shared library mechanism for linking
uncombined form of the same work.
with the Library. A suitable mechanism is one that
(1) uses at run time a copy of the library already 8. You may not copy, modify, sublicense, link with, or
present on the user’s computer system, rather than distribute the Library except as expressly provided
copying library functions into the executable, and under this License. Any attempt otherwise to copy,
(2) will operate properly with a modified version of modify, sublicense, link with, or distribute the Library
the library, if the user installs one, as long as the is void, and will automatically terminate your rights
modified version is interface-compatible with the under this License. However, parties who have
version that the work was made with. received copies, or rights, from you under this License
will not have their licenses terminated so long as such
c. Accompany the work with a written offer, valid
parties remain in full compliance.
for at least three years, to give the same user the
materials specified in Subsection 6a, above, for a 9. You are not required to accept this License, since you
charge no more than the cost of performing this have not signed it. However, nothing else grants
distribution. you permission to modify or distribute the Library
or its derivative works. These actions are prohibited
d. If distribution of the work is made by offering access
by law if you do not accept this License. Therefore,
to copy from a designated place, offer equivalent
by modifying or distributing the Library (or any work
access to copy the above specified materials from
based on the Library), you indicate your acceptance of
the same place.
this License to do so, and all its terms and conditions
e. Verify that the user has already received a copy of for copying, distributing or modifying the Library or
these materials or that you have already sent this works based on it.
user a copy.
10. Each time you redistribute the Library (or any work
For an executable, the required form of the “work that based on the Library), the recipient automatically
uses the Library” must include any data and utility receives a license from the original licensor to copy,
programs needed for reproducing the executable from distribute, link with or modify the Library subject
it. However, as a special exception, the materials to be to these terms and conditions. You may not impose
distributed need not include anything that is normally any further restrictions on the recipients’ exercise of
distributed (in either source or binary form) with the the rights granted herein. You are not responsible
major components (compiler, kernel, and so on) of the for enforcing compliance by third parties with this
operating system on which the executable runs, unless License.
that component itself accompanies the executable.
11. If, as a consequence of a court judgment or allegation
It may happen that this requirement contradicts the of patent infringement or for any other reason (not
license restrictions of other proprietary libraries that limited to patent issues), conditions are imposed on
do not normally accompany the operating system. you (whether by court order, agreement or otherwise)
Such a contradiction means you cannot use both that contradict the conditions of this License, they do
them and the Library together in an executable that not excuse you from the conditions of this License. If
you distribute. you cannot distribute so as to satisfy simultaneously
7. You may place library facilities that are a work based your obligations under this License and any other
on the Library side-by-side in a single library together pertinent obligations, then as a consequence you may
with other library facilities not covered by this License, not distribute the Library at all. For example, if a patent
and distribute such a combined library, provided that license would not permit royalty-free redistribution of
the separate distribution of the work based on the the Library by all those who receive copies directly or
Library and of the other library facilities is otherwise indirectly through you, then the only way you could
permitted, and provided that you do these two satisfy both it and this License would be to refrain
things: entirely from distribution of the Library.

a. Accompany the combined library with a copy of the If any portion of this section is held invalid or
same work based on the Library, uncombined with unenforceable under any particular circumstance,
any other library facilities. This must be distributed the balance of the section is intended to apply, and
under the terms of the Sections above. the section as a whole is intended to apply in other
circumstances.

10/100 16-Port VPN Router 96


Appendix J Software License Agreement

It is not the purpose of this section to induce you to HOLDERS AND/OR OTHER PARTIES PROVIDE THE
infringe any patents or other property right claims or LIBRARY “AS IS” WITHOUT WARRANTY OF ANY KIND,
to contest validity of any such claims; this section has EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT
the sole purpose of protecting the integrity of the free NOT LIMITED TO, THE IMPLIED WARRANTIES OF
software distribution system which is implemented MERCHANTABILITY AND FITNESS FOR A PARTICULAR
by public license practices. Many people have PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND
made generous contributions to the wide range of PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD
software distributed through that system in reliance THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE
on consistent application of that system; it is up to COST OF ALL NECESSARY SERVICING, REPAIR OR
the author/donor to decide if he or she is willing to CORRECTION.
distribute software through any other system and a
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW
licensee cannot impose that choice.
OR AGREED TO IN WRITING WILL ANY COPYRIGHT
This section is intended to make thoroughly clear HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY
what is believed to be a consequence of the rest of this AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED
License. ABOVE, BE LIABLE TO YOU FOR DAMAGES,
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
12. If the distribution and/or use of the Library is restricted
CONSEQUENTIAL DAMAGES ARISING OUT OF THE
in certain countries either by patents or by copyrighted
USE OR INABILITY TO USE THE LIBRARY (INCLUDING
interfaces, the original copyright holder who places
BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING
the Library under this License may add an explicit
RENDERED INACCURATE OR LOSSES SUSTAINED BY
geographical distribution limitation excluding those
YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY
countries, so that distribution is permitted only in or
TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF
among countries not thus excluded. In such case, this
SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED
License incorporates the limitation as if written in the
OF THE POSSIBILITY OF SUCH DAMAGES.
body of this License.
13. The Free Software Foundation may publish revised END OF TERMS AND CONDITIONS
and/or new versions of the Lesser General Public
License from time to time. Such new versions will be END OF SCHEDULE 3
similar in spirit to the present version, but may differ in
detail to address new problems or concerns.
Schedule 4
Each version is given a distinguishing version number.
If the Library specifies a version number of this License If this Linksys product contains open source software
which applies to it and “any later version”, you have the licensed under the OpenSSL license:
option of following the terms and conditions either of This product includes software developed by the
that version or of any later version published by the Free OpenSSL Project for use in the OpenSSL Toolkit.
Software Foundation. If the Library does not specify a (http://www.openssl.org/).
license version number, you may choose any version
ever published by the Free Software Foundation. This product includes cryptographic software written by
Eric Young ([email protected]).
14. If you wish to incorporate parts of the Library into
other free programs whose distribution conditions are This product includes software written by Tim Hudson
incompatible with these, write to the author to ask for ([email protected]).
permission. For software which is copyrighted by the In addition, if this Linksys product contains open
Free Software Foundation, write to the Free Software source software licensed under the OpenSSL license
Foundation; we sometimes make exceptions for then the license terms below in this Schedule 3 will
this. Our decision will be guided by the two goals of apply to that open source software. The license terms
preserving the free status of all derivatives of our free below in this Schedule 3 are from the public web site at
software and of promoting the sharing and reuse of http://www.openssl.org/source/license.html.
software generally.
The OpenSSL toolkit stays under a dual license, i.e. both
NO WARRANTY the conditions of the OpenSSL License and the original
SSLeay license apply to the toolkit. See below for the
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, actual license texts. Actually both licenses are BSD-style
THERE IS NO WARRANTY FOR THE LIBRARY, TO THE Open Source licenses. In case of any license issues related
EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT to OpenSSL please contact [email protected].
WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT

10/100 16-Port VPN Router 97


Appendix J Software License Agreement

OpenSSL License Original SSLeay License


Copyright (c) 1998-2007 The OpenSSL Project. All rights Copyright (C) 1995-1998 Eric Young ([email protected])
reserved. All rights reserved.
Redistribution and use in source and binary forms, with This package is an SSL implementation written by Eric
or without modification, are permitted provided that the Young ([email protected]).
following conditions are met:
The implementation was written so as to conform with
1. Redistributions of source code must retain the above Netscape’s SSL.
copyright notice, this list of conditions and the
This library is free for commercial and non-commercial
following disclaimer.
use as long as the following conditions are adhered to.
2. Redistributions in binary form must reproduce the The following conditions apply to all code found in this
above copyright notice, this list of conditions and the distribution, be it the RC4, RSA, lhash, DES, etc., code; not
following disclaimer in the documentation and/or just the SSL code. The SSL documentation included with
other materials provided with the distribution. this distribution is covered by the same copyright terms
except that the holder is Tim Hudson (tjh@cryptsoft.
3. All advertising materials mentioning features or
com).
use of this software must display the following
acknowledgment: “This product includes software Copyright remains Eric Young’s, and as such any Copyright
developed by the OpenSSL Project for use in the notices in the code are not to be removed.
OpenSSL Toolkit. (http://www.openssl.org/)”
If this package is used in a product, Eric Young should be
4. The names “OpenSSL Toolkit” and “OpenSSL Project” given attribution as the author of the parts of the library
must not be used to endorse or promote products used. This can be in the form of a textual message at
derived from this software without prior written program startup or in documentation (online or textual)
permission. For written permission, please contact provided with the package.
[email protected].
Redistribution and use in source and binary forms, with
5. Products derived from this software may not be called or without modification, are permitted provided that the
“OpenSSL” nor may “OpenSSL” appear in their names following conditions are met:
without prior written permission of the OpenSSL
1. Redistributions of source code must retain the
Project.
copyright notice, this list of conditions and the
6. Redistributions of any form whatsoever must retain the following disclaimer.
following acknowledgment: “This product includes
2. Redistributions in binary form must reproduce the
software developed by the OpenSSL Project for use in
above copyright notice, this list of conditions and the
the OpenSSL Toolkit (http://www.openssl.org/)”
following disclaimer in the documentation and/or
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT other materials provided with the distribution.
``AS IS’’ AND ANY EXPRESSED OR IMPLIED WARRANTIES,
3. All advertising materials mentioning features or
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
use of this software must display the following
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
acknowledgement:
A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE “This product includes cryptographic software written
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, by Eric Young ([email protected])”
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, The word ‘cryptographic’ can be left out if the routines
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE from the library being used are not cryptographic
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; related.
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 4. If you include any Windows specific code (or a derivative
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR thereof ) from the apps directory (application code)
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF you must include an acknowledgement: “This product
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF includes software written by Tim Hudson (tjh@
SUCH DAMAGE. cryptsoft.com)”
This product includes cryptographic software written by THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS’’
Eric Young ([email protected]). This product includes AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
software written by Tim Hudson ([email protected]). BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR
10/100 16-Port VPN Router 98
Appendix J Software License Agreement

PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL


THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The license and distribution terms for any publicly available
version or derivative of this code cannot be changed. i.e.
this code cannot simply be copied and put under another
distribution license [including the GNU Public License.]

END OF SCHEDULE 4

10/100 16-Port VPN Router 99


Appendix K Regulatory Information

Appendix K: Battery Recycling Statement


Regulatory Information This product may contain a battery. Recycle or dispose of
batteries in accordance with the battery manufacturer’s
instructions and local/national disposal and recycling
FCC Statement regulations.

This product has been tested and complies with the 廢電池請回收
specifications for a Class B digital device, pursuant to Part
15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in
a residential installation. This equipment generates, Industry Canada Statement
uses, and can radiate radio frequency energy and, if not This Class B digital apparatus complies with Canadian
installed and used according to the instructions, may ICES-003.
cause harmful interference to radio communications.
However, there is no guarantee that interference will not Operation is subject to the following two conditions:
occur in a particular installation. If this equipment does 1. This device may not cause interference and
cause harmful interference to radio or television reception,
which is found by turning the equipment off and on, the 2. This device must accept any interference, including
user is encouraged to try to correct the interference by interference that may cause undesired operation of
one or more of the following measures: the device.

•• Reorient or relocate the receiving antenna Avis d’Industrie Canada


•• Increase the separation between the equipment or
Cet appareil numérique de la classe B est conforme à la
devices
norme NMB-003 du Canada.
•• Connect the equipment to an outlet other than the
Le fonctionnement est soumis aux conditions suivantes :
receiver’s
1. Ce périphérique ne doit pas causer d’interférences;
•• Consult a dealer or an experienced radio/TV technician
for assistance 2. Ce périphérique doit accepter toutes les interférences
reçues, y compris celles qui risquent d’entraîner un
Safety Notices fonctionnement indésirable.

•• Caution: To reduce the risk of fire, use only No.26 AWG


or larger telecommunication line cord.
•• Do not use this product near water, for example, in a
wet basement or near a swimming pool.
•• Avoid using this product during an electrical storm.
There may be a remote risk of electric shock from
lightning.

WARNING: This product contains lead, known


to the State of California to cause cancer, and
birth defects or other reproductive harm. Wash
hands after handling.

10/100 16-Port VPN Router 100


Appendix K Regulatory Information

User Information for Consumer Products Ceština (Czech) - Informace o ochraně životního
prostředí pro zákazníky v zemích Evropské unie
Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené
tímto symbolem na produktu anebo na obalu bylo likvidováno
Waste Electric and Electronic Equipment s netříděným komunálním odpadem. Tento symbol udává,
(WEEE) že daný produkt musí být likvidován odděleně od běžného
komunálního odpadu. Odpovídáte za likvidaci tohoto produktu
This document contains important information for users a dalších elektrických a elektronických zařízení prostřednictvím
with regards to the proper disposal and recycling of určených sběrných míst stanovených vládou nebo místními
úřady. Správná likvidace a recyklace pomáhá předcházet
Linksys products. Consumers are required to comply with
potenciálním negativním dopadům na životní prostředí a lidské
this notice for all electronic products bearing the following zdraví. Podrobnější informace o likvidaci starého vybavení si
symbol: laskavě vyžádejte od místních úřadů, podniku zabývajícího se
likvidací komunálních odpadů nebo obchodu, kde jste produkt
zakoupili.

Dansk (Danish) - Miljøinformation for kunder i EU


EU-direktiv 2002/96/EF kræver, at udstyr der bærer dette symbol
på produktet og/eller emballagen ikke må bortskaffes som
usorteret kommunalt affald. Symbolet betyder, at dette produkt
skal bortskaffes adskilt fra det almindelige husholdningsaffald.
Det er dit ansvar at bortskaffe dette og andet elektrisk og
English - Environmental Information for Customers in elektronisk udstyr via bestemte indsamlingssteder udpeget
the European Union af staten eller de lokale myndigheder. Korrekt bortskaffelse
European Directive 2002/96/EC requires that the equipment og genvinding vil hjælpe med til at undgå mulige skader for
bearing this symbol on the product and/or its packaging must miljøet og menneskers sundhed. Kontakt venligst de lokale
not be disposed of with unsorted municipal waste. The symbol myndigheder, renovationstjenesten eller den butik, hvor du
indicates that this product should be disposed of separately har købt produktet, angående mere detaljeret information om
from regular household waste streams. It is your responsibility to bortskaffelse af dit gamle udstyr.
dispose of this and other electric and electronic equipment via
designated collection facilities appointed by the government or
local authorities. Correct disposal and recycling will help prevent Deutsch (German) - Umweltinformation für Kunden
potential negative consequences to the environment and innerhalb der Europäischen Union
human health. For more detailed information about the disposal Die Europäische Richtlinie 2002/96/EC verlangt, dass technische
of your old equipment, please contact your local authorities, Ausrüstung, die direkt am Gerät und/oder an der Verpackung mit
waste disposal service, or the shop where you purchased the diesem Symbol versehen ist , nicht zusammen mit unsortiertem
product. Gemeindeabfall entsorgt werden darf. Das Symbol weist darauf
hin, dass das Produkt von regulärem Haushaltmüll getrennt
entsorgt werden sollte. Es liegt in Ihrer Verantwortung, dieses
Български (Bulgarian) - Информация относно Gerät und andere elektrische und elektronische Geräte über
опазването на околната среда за потребители в die dafür zuständigen und von der Regierung oder örtlichen
Европейския съюз Behörden dazu bestimmten Sammelstellen zu entsorgen.
Европейска директива 2002/96/EC изисква уредите, носещи Ordnungsgemäßes Entsorgen und Recyceln trägt dazu bei,
този символ върху изделието и/или опаковката му, да не potentielle negative Folgen für Umwelt und die menschliche
се изхвърля т с несортирани битови отпадъци. Символът Gesundheit zu vermeiden. Wenn Sie weitere Informationen zur
обозначава, че изделието трябва да се изхвърля отделно от Entsorgung Ihrer Altgeräte benötigen, wenden Sie sich bitte an
сметосъбирането на обикновените битови отпадъци. Ваша die örtlichen Behörden oder städtischen Entsorgungsdienste
е отговорността този и другите електрически и електронни oder an den Händler, bei dem Sie das Produkt erworben haben.
уреди да се изхвърлят в предварително определени от
държавните или общински органи специализирани пунктове
за събиране. Правилното изхвърляне и рециклиране
ще спомогнат да се предотвратят евентуални вредни за
околната среда и здравето на населението последствия. За
по-подробна информация относно изхвърлянето на вашите
стари уреди се обърнете към местните власти, службите за
сметосъбиране или магазина, от който сте закупили уреда.

10/100 16-Port VPN Router 101


Appendix K Regulatory Information

Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales


Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne
Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement
seadmeid, millel on tootel või pakendil käesolev sümbol , sur lequel est apposé ce symbole sur le produit et/ou son
keelatud kõrvaldada koos sorteerimata olmejäätmetega. See emballage ne soit pas jeté avec les autres ordures ménagères. Ce
sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest symbole indique que le produit doit être éliminé dans un circuit
olmejäätmevoogudest. Olete kohustatud kõrvaldama käesoleva distinct de celui pour les déchets des ménages. Il est de votre
ja ka muud elektri- ja elektroonikaseadmed riigi või kohalike responsabilité de jeter ce matériel ainsi que tout autre matériel
ametiasutuste poolt ette nähtud kogumispunktide kaudu. électrique ou électronique par les moyens de collecte indiqués
Seadmete korrektne kõrvaldamine ja ringlussevõtt aitab vältida par le gouvernement et les pouvoirs publics des collectivités
võimalikke negatiivseid tagajärgi keskkonnale ning inimeste territoriales. L’élimination et le recyclage en bonne et due forme
tervisele. Vanade seadmete kõrvaldamise kohta täpsema ont pour but de lutter contre l’impact néfaste potentiel de ce
informatsiooni saamiseks võtke palun ühendust kohalike type de produits sur l’environnement et la santé publique. Pour
ametiasutustega, jäätmekäitlusfirmaga või kauplusega, kust te plus d’informations sur le mode d’élimination de votre ancien
toote ostsite. équipement, veuillez prendre contact avec les pouvoirs publics
locaux, le service de traitement des déchets, ou l’endroit où vous
avez acheté le produit.
Español (Spanish) - Información medioambiental para
clientes de la Unión Europea
La Directiva 2002/96/CE de la UE exige que los equipos que Italiano (Italian) - Informazioni relative all’ambiente
lleven este símbolo en el propio aparato y/o en su embalaje per i clienti residenti nell’Unione Europea
no deben eliminarse junto con otros residuos urbanos no La direttiva europea 2002/96/EC richiede che le apparecchiature
seleccionados. El símbolo indica que el producto en cuestión contrassegnate con questo simbolo sul prodotto e/o
debe separarse de los residuos domésticos convencionales con sull’imballaggio non siano smaltite insieme ai rifiuti urbani
vistas a su eliminación. Es responsabilidad suya desechar este y non differenziati. Il simbolo indica che questo prodotto non
cualesquiera otros aparatos eléctricos y electrónicos a través de deve essere smaltito insieme ai normali rifiuti domestici. È
los puntos de recogida que ponen a su disposición el gobierno y responsabilità del proprietario smaltire sia questi prodotti sia
las autoridades locales. Al desechar y reciclar correctamente estos le altre apparecchiature elettriche ed elettroniche mediante
aparatos estará contribuyendo a evitar posibles consecuencias le specifiche strutture di raccolta indicate dal governo o dagli
negativas para el medio ambiente y la salud de las personas. Si enti pubblici locali. Il corretto smaltimento ed il riciclaggio
desea obtener información más detallada sobre la eliminación aiuteranno a prevenire conseguenze potenzialmente negative
segura de su aparato usado, consulte a las autoridades locales, per l’ambiente e per la salute dell’essere umano. Per ricevere
al servicio de recogida y eliminación de residuos de su zona o informazioni più dettagliate circa lo smaltimento delle vecchie
pregunte en la tienda donde adquirió el producto. apparecchiature in Vostro possesso, Vi invitiamo a contattare gli
enti pubblici di competenza, il servizio di smaltimento rifiuti o il
negozio nel quale avete acquistato il prodotto.
ξλληνικά (Greek) - Στοιχεία περιβαλλοντικής
προστασίας για πελάτες εντός της Ευρωπαϊκής
Ένωσης Latviešu valoda (Latvian) - Ekoloģiska informācija
Η Κοινοτική Οδηγία 2002/96/EC απαιτεί ότι ο εξοπλισμός ο οποίος klientiem Eiropas Savienības jurisdikcijā
φέρει αυτό το σύμβολο στο προϊόν και/ή στη συσκευασία Direktīvā 2002/96/EK ir prasība, ka aprīkojumu, kam pievienota
του δεν πρέπει να απορρίπτεται μαζί με τα μικτά κοινοτικά zīme uz paša izstrādājuma vai uz tā iesaiņojuma, nedrīkst
απορρίμματα. Το σύμβολο υποδεικνύει ότι αυτό το προϊόν θα izmest nešķirotā veidā kopā ar komunālajiem atkritumiem
πρέπει να απορρίπτεται ξεχωριστά από τα συνήθη οικιακά (tiem, ko rada vietēji iedzīvotāji un uzņēmumi). Šī zīme nozīmē
απορρίμματα. Είστε υπεύθυνος για την απόρριψη του παρόντος to, ka šī ierīce ir jāizmet atkritumos tā, lai tā nenonāktu kopā ar
και άλλου ηλεκτρικού και ηλεκτρονικού εξοπλισμού μέσω των parastiem mājsaimniecības atkritumiem. Jūsu pienākums ir šo
καθορισμένων εγκαταστάσεων συγκέντρωσης απορριμμάτων οι un citas elektriskas un elektroniskas ierīces izmest atkritumos,
οποίες παρέχονται από το κράτος ή τις αρμόδιες τοπικές αρχές. izmantojot īpašus atkritumu savākšanas veidus un līdzekļus, ko
Η σωστή απόρριψη και ανακύκλωση συμβάλλει στην πρόληψη nodrošina valsts un pašvaldību iestādes. Ja izmešana atkritumos
πιθανών αρνητικών συνεπειών για το περιβάλλον και την υγεία. un pārstrāde tiek veikta pareizi, tad mazinās iespējamais
Για περισσότερες πληροφορίες σχετικά με την απόρριψη του kaitējums dabai un cilvēku veselībai. Sīkākas ziņas par
παλιού σας εξοπλισμού, παρακαλώ επικοινωνήστε με τις τοπικές novecojuša aprīkojuma izmešanu atkritumos jūs varat saņemt
αρχές, τις υπηρεσίες απόρριψης ή το κατάστημα από το οποίο vietējā pašvaldībā, atkritumu savākšanas dienestā, kā arī veikalā,
αγοράσατε το προϊόν. kur iegādājāties šo izstrādājumu.

10/100 16-Port VPN Router 102


Appendix K Regulatory Information

Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten


skirta Europos Sąjungos vartotojams in de Europese Unie
Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die
kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), is voorzien van dit symbool op het product of de verpakking,
negalima šalinti kartu su nerūšiuotomis komunalinėmis niet mag worden ingezameld met niet-gescheiden huishoudelijk
atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai afval. Dit symbool geeft aan dat het product apart moet worden
nuo bendro buitinių atliekų srauto. Jūs privalote užtikrinti, kad ingezameld. U bent zelf verantwoordelijk voor de vernietiging
ši ir kita elektros ar elektroninė įranga būtų šalinama per tam van deze en andere elektrische en elektronische apparatuur via de
tikras nacionalinės ar vietinės valdžios nustatytas atliekų rinkimo daarvoor door de landelijke of plaatselijke overheid aangewezen
sistemas. Tinkamai šalinant ir perdirbant atliekas, bus išvengta inzamelingskanalen. De juiste vernietiging en recycling van
galimos žalos aplinkai ir žmonių sveikatai. Daugiau informacijos deze apparatuur voorkomt mogelijke negatieve gevolgen voor
apie jūsų senos įrangos šalinimą gali pateikti vietinės valdžios het milieu en de gezondheid. Voor meer informatie over het
institucijos, atliekų šalinimo tarnybos arba parduotuvės, kuriose vernietigen van uw oude apparatuur neemt u contact op met
įsigijote tą gaminį. de plaatselijke autoriteiten of afvalverwerkingsdienst, of met de
winkel waar u het product hebt aangeschaft.

Malti (Maltese) - Informazzjoni Ambjentali għal Klijenti


fl-Unjoni Ewropea Norsk (Norwegian) - Miljøinformasjon for kunder i EU
Id-Direttiva Ewropea 2002/96/KE titlob li t-tagħmir li jkun fih is- EU-direktiv 2002/96/EF krever at utstyr med følgende symbol
simbolu fuq il-prodott u/jew fuq l-ippakkjar ma jistax jintrema avbildet på produktet og/eller pakningen, ikke må kastes
ma’ skart muniċipali li ma ġiex isseparat. Is-simbolu jindika sammen med usortert avfall. Symbolet indikerer at dette
li dan il-prodott għandu jintrema separatament minn ma’ l- produktet skal håndteres atskilt fra ordinær avfallsinnsamling
iskart domestiku regolari. Hija responsabbiltà tiegħek li tarmi for husholdningsavfall. Det er ditt ansvar å kvitte deg med
dan it-tagħmir u kull tagħmir ieħor ta’ l-elettriku u elettroniku dette produktet og annet elektrisk og elektronisk avfall via egne
permezz ta’ faċilitajiet ta’ ġbir appuntati apposta mill-gvern jew innsamlingsordninger slik myndighetene eller kommunene
mill-awtoritajiet lokali. Ir-rimi b’mod korrett u r-riċiklaġġ jgħin bestemmer. Korrekt avfallshåndtering og gjenvinning vil
jipprevjeni konsegwenzi negattivi potenzjali għall-ambjent u være med på å forhindre mulige negative konsekvenser for
għas-saħħa tal-bniedem. Għal aktar informazzjoni dettaljata miljø og helse. For nærmere informasjon om håndtering av
dwar ir-rimi tat-tagħmir antik tiegħek, jekk jogħġbok ikkuntattja det kasserte utstyret ditt, kan du ta kontakt med kommunen,
lill-awtoritajiet lokali tiegħek, is-servizzi għar-rimi ta’ l-iskart, jew en innsamlingsstasjon for avfall eller butikken der du kjøpte
il-ħanut minn fejn xtrajt il-prodott. produktet.

Magyar (Hungarian) - Környezetvédelmi információ az Polski (Polish) - Informacja dla klientów w Unii
európai uniós vásárlók számára Europejskiej o przepisach dotyczących ochrony
A 2002/96/EC számú európai uniós irányelv megkívánja, hogy środowiska
azokat a termékeket, amelyeken, és/vagy amelyek csomagolásán Dyrektywa Europejska 2002/96/EC wymaga, aby sprzęt
az alábbi címke megjelenik, tilos a többi szelektálatlan lakossági oznaczony symbolem znajdującym się na produkcie i/lub jego
hulladékkal együtt kidobni. A címke azt jelöli, hogy az adott opakowaniu nie był wyrzucany razem z innymi niesortowanymi
termék kidobásakor a szokványos háztartási hulladékelszállítási odpadami komunalnymi. Symbol ten wskazuje, że produkt
rendszerektõl elkülönített eljárást kell alkalmazni. Az Ön nie powinien być usuwany razem ze zwykłymi odpadami z
felelõssége, hogy ezt, és más elektromos és elektronikus gospodarstw domowych. Na Państwu spoczywa obowiązek
berendezéseit a kormányzati vagy a helyi hatóságok által wyrzucania tego i innych urządzeń elektrycznych oraz
kijelölt gyűjtõredszereken keresztül számolja fel. A megfelelõ elektronicznych w punktach odbioru wyznaczonych przez władze
hulladékfeldolgozás segít a környezetre és az emberi egészségre krajowe lub lokalne. Pozbywanie się sprzętu we właściwy sposób
potenciálisan ártalmas negatív hatások megelõzésében. Ha i jego recykling pomogą zapobiec potencjalnie negatywnym
elavult berendezéseinek felszámolásához további részletes konsekwencjom dla środowiska i zdrowia ludzkiego. W celu
információra van szüksége, kérjük, lépjen kapcsolatba a helyi uzyskania szczegółowych informacji o usuwaniu starego sprzętu,
hatóságokkal, a hulladékfeldolgozási szolgálattal, vagy azzal prosimy zwrócić się do lokalnych władz, służb oczyszczania
üzlettel, ahol a terméket vásárolta. miasta lub sklepu, w którym produkt został nabyty.

10/100 16-Port VPN Router 103


Appendix K Regulatory Information

Português (Portuguese) - Informação ambiental para Slovenčina (Slovene) - Okoljske informacije za stranke
clientes da União Europeia v Evropski uniji
A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/EC prepoveduje odlaganje opreme,
que exibe este símbolo no produto e/ou na sua embalagem označene s tem simbolom – na izdelku in/ali na embalaži – med
não seja eliminado junto com os resíduos municipais não običajne, nerazvrščene odpadke. Ta simbol opozarja, da je treba
separados. O símbolo indica que este produto deve ser izdelek odvreči ločeno od preostalih gospodinjskih odpadkov.
eliminado separadamente dos resíduos domésticos regulares. Vaša odgovornost je, da to in preostalo električno in elektronsko
É da sua responsabilidade eliminar este e qualquer outro opremo odnesete na posebna zbirališča, ki jih določijo
equipamento eléctrico e electrónico através das instalações državne ustanove ali lokalna uprava. S pravilnim odlaganjem
de recolha designadas pelas autoridades governamentais ou in recikliranjem boste preprečili morebitne škodljive vplive na
locais. A eliminação e reciclagem correctas ajudarão a prevenir okolje in zdravje ljudi. Če želite izvedeti več o odlaganju stare
as consequências negativas para o ambiente e para a saúde opreme, se obrnite na lokalno upravo, odpad ali trgovino, kjer
humana. Para obter informações mais detalhadas sobre a ste izdelek kupili.
forma de eliminar o seu equipamento antigo, contacte as
autoridades locais, os serviços de eliminação de resíduos ou o
estabelecimento comercial onde adquiriu o produto. Suomi (Finnish) - Ympäristöä koskevia tietoja EU-
alueen asiakkaille
EU-direktiivi 2002/96/EY edellyttää, että jos laitteistossa on tämä
Română (Romanian) - Informaţii de mediu pentru symboli itse tuotteessa ja/tai sen pakkauksessa, laitteistoa
clienţii din Uniunea Europeană ei saa hävittää lajittelemattoman yhdyskuntajätteen mukana.
Directiva europeană 2002/96/CE impune ca echipamentele care Symboli merkitsee sitä, että tämä tuote on hävitettävä erillään
prezintă acest simbol pe produs şi/sau pe ambalajul acestuia să tavallisesta kotitalousjätteestä. Sinun vastuullasi on hävittää
nu fie casate împreună cu gunoiul menajer municipal. Simbolul tämä elektroniikkatuote ja muut vastaavat elektroniikkatuotteet
indică faptul că acest produs trebuie să fie casat separat de viemällä tuote tai tuotteet viranomaisten määräämään
gunoiul menajer obişnuit. Este responsabilitatea dvs. să casaţi keräyspisteeseen. Laitteiston oikea hävittäminen estää
acest produs şi alte echipamente electrice şi electronice prin mahdolliset kielteiset vaikutukset ympäristöön ja ihmisten
intermediul unităţilor de colectare special desemnate de guvern terveyteen. Lisätietoja vanhan laitteiston oikeasta hävitystavasta
sau de autorităţile locale. Casarea şi reciclarea corecte vor ajuta saa paikallisilta viranomaisilta, jätteenhävityspalvelusta tai siitä
la prevenirea potenţialelor consecinţe negative asupra sănătăţii myymälästä, josta ostit tuotteen.
mediului şi a oamenilor. Pentru mai multe informaţii detaliate
cu privire la casarea acestui echipament vechi, contactaţi
autorităţile locale, serviciul de salubrizare sau magazinul de la Svenska (Swedish) - Miljöinformation för kunder i
care aţi achiziţionat produsul. Europeiska unionen
Det europeiska direktivet 2002/96/EC kräver att utrustning med
denna symbol på produkten och/eller förpackningen inte får
Slovenčina (Slovak) - Informácie o ochrane životného kastas med osorterat kommunalt avfall. Symbolen visar att denna
prostredia pre zákazníkov v Európskej únii produkt bör kastas efter att den avskiljts från vanligt hushållsavfall.
Podľa európskej smernice 2002/96/ES zariadenie s týmto Det faller på ditt ansvar att kasta denna och annan elektrisk och
symbolom na produkte a/alebo jeho balení nesmie byť elektronisk utrustning på fastställda insamlingsplatser utsedda
likvidované spolu s netriedeným komunálnym odpadom. av regeringen eller lokala myndigheter. Korrekt kassering och
Symbol znamená, že produkt by sa mal likvidovať oddelene återvinning skyddar mot eventuella negativa konsekvenser
od bežného odpadu z domácností. Je vašou povinnosťou för miljön och personhälsa. För mer detaljerad information om
likvidovať toto i ostatné elektrické a elektronické zariadenia kassering av din gamla utrustning kontaktar du dina lokala
prostredníctvom špecializovaných zberných zariadení určených myndigheter, avfallshanteringen eller butiken där du köpte
vládou alebo miestnymi orgánmi. Správna likvidácia a recyklácia produkten.
pomôže zabrániť prípadným negatívnym dopadom na životné
prostredie a zdravie ľudí. Ak máte záujem o podrobnejšie
informácie o likvidácii starého zariadenia, obráťte sa, prosím, na WEB: For additional information, please visit
miestne orgány, organizácie zaoberajúce sa likvidáciou odpadov www.linksys.com
alebo obchod, v ktorom ste si produkt zakúpili.

10/100 16-Port VPN Router 104


Appendix L Contact Information

Appendix L:
Contact Information
Linksys Contact Information

Website http://www.linksys.com

Support Site http://www.linksys.com/support

FTP Site ftp.linksys.com

Advice Line 800-546-5797 (LINKSYS)

Support 800-326-7114

RMA (Return Merchandise


http://www.linksys.com/warranty
Authorization)

NOTE: Details on warranty and RMA issues can


be found in the Warranty section of this Guide.

8062520NC-JL

10/100 16-Port VPN Router 105

You might also like