rv120w Admin
rv120w Admin
GUIDE
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found
at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (1005R)
Chapter 1: Introduction 1
Product Overview 1
LAN Ethernet Interfaces 2
Wireless Access Point 2
Firewall and VPN Client Access 2
Wireless Distribution System 2
Virtual Networks 2
Security 3
Quality of Service 3
Configuration and Administration 3
Getting to Know the Cisco RV120W 4
Front Panel 4
Back Panel 5
Mounting the Cisco RV120W 6
Installation Guidelines 6
Wall Mounting 6
Connecting the Equipment 8
Setting Up the Cisco RV120W Using the Setup Wizard 12
Using the Getting Started Page 13
Initial Settings 14
Quick Access 14
Device Status 15
Other Resources 15
Navigating through the Pages 15
Saving Your Changes 17
Viewing the Help Files 18
Connecting Devices to Your Wireless Network 18
18
Configuring IPv6 42
Configuring the IP Mode 42
Configuring IPv6 WAN Settings 42
Configuring DHCPv6 42
Configuring a Static IP Address 43
Configuring IPv6 LAN Properties 43
Configuring IPv6 Address Pools 45
Configuring IPv6 Routing 45
Configuring Dynamic Routing 45
Configuring Static Routing 46
Configuring Tunneling 47
Viewing IPv6 Tunnel Information 47
Configuring Intra-Site Automatic Tunnel Addressing
Protocol (ISATAP) Tunnels 48
Configuring Router Advertisement 49
Configuring Router Advertisement Prefixes 50
Appendix A: Using Cisco QuickVPN for Windows 7, 2000, XP, or Vista 150
Overview 150
Before You Begin 150
Installing the Cisco QuickVPN Software 151
Installing from the CD-ROM 151
Downloading and Installing from the Internet 151
Using the Cisco QuickVPN Software 152
This chapter describes the features of the Cisco RV120W, guides you through the
installation process, and gets you started using the Device Manager, a browser-
based utility for configuring the Cisco RV120W.
Product Overview
Thank you for choosing the Cisco Small Business RV120W Wireless-N VPN
Firewall.
The Cisco RV120W provides a Wireless-N access point, combined with support
for Virtual Private Networks (VPNs) to make your network more secure. Its 10/100
Ethernet WAN interface connects directly to your broadband DSL or Cable
modem.
You can also use the VPN capability to allow users on your small office network to
securely connect out to a corporate network
Virtual Networks
The access point also supports multiple SSIDs for the use of virtual networks (up
to 4 separate virtual networks), with 802.1Q-based VLAN support for traffic
separation.
Quality of Service
The Cisco RV120W supports Wi-Fi Multimedia (WMM) and Wi-Fi Multimedia
Power Save (WMM-PS) for wireless Quality of Service (QoS). It supports 802.1p,
Differentiated Services Code Point (DSCP), and Type of Service (ToS) for wired
QoS, which can improve the quality of your network when using delay-sensitive
Voice over IP (VoIP) applications and bandwidth-intensive video streaming
applications.
Front Panel
POWER—The Power LED lights up green to indicate the device is powered on.
Flashes green when the power is coming on or software is being upgraded.
WAN LED—The WAN (Internet) LED lights up green when the device is connected
to your cable or DSL modem. The LED flashes green when the device is sending
or receiving data over the WAN port.
LAN—These four LEDs correspond to the four LAN (Ethernet) ports of the Cisco
RV120W. If the LED is continuously lit green, the Cisco RV120W is connected to a
device through the corresponding port (1, 2, 3, or 4). The LED for a port flashes
green when the Cisco RV120W is actively sending or receiving data over that port.
• If you are experiencing extreme problems with the Cisco RV120W and have
tried all other troubleshooting measures, press and hold in the RESET
button for 10 seconds. This will restore the factory defaults and clear all of
the Cisco RV120W settings.
WAN Port—The WAN port is connected to your Internet device, such as a cable or
DSL modem.
ON/OFF Power Switch—Press this button to turn the Cisco RV120W on and off.
When the button is pushed in, power is on.
Power Port—The power port is where you connect the AC power cable.
Installation Guidelines
• Ambient Temperature—To prevent the device from overheating, do not
operate it in an area that exceeds an ambient temperature of
104°F (40°C).
• Air Flow—Be sure that there is adequate air flow around the device.
• Mechanical Loading—Be sure that the device is level and stable to avoid
any hazardous conditions.
For desktop placement, place the Cisco RV120W device horizontally on a flat
surface so that it sits on its four rubber feet.
Wall Mounting
STEP 1 Determine where you want to mount the device and install two screws (not
supplied) that are 2-7/16 in. apart (approximately 61 mm). Mounting screws should
have a head that is approximately 5.5 mm in diameter and 2 mm deep, with a shaft
that is at least15.5 mm long and approximately 3.5 mm wide. (Your wall may
require shorter or longer screws, or drywall anchors.)
Do not mount the screw heads flush with the wall; the screw heads must fit inside
the back of the device.
STEP 2 With the back panel pointing up (if installing vertically), line up the device so that
the wall-mount slots on the bottom of the device line up with the two screws.
2-7/16
Wall
mount
195114
slots
Required
Optional
STEP 1 Power off all equipment, including the cable or DSL modem, the PC you will use to
connect to the RV120W, and the RV120W.
STEP 2 Use an Ethernet cable to connect the WAN port of the Cisco RV120W to your
cable or DSL modem.
STEP 4 Power on the cable or DSL modem and wait until the connection is active.
!
CAUTION Use only the power adapter that is supplied with the device. Using a different
power adapter could damage the device.
STEP 6 Plug the other end of the adapter into an electrical outlet. You may need to use a
specific plug (supplied) for your country.
The power light on the front panel is green when the power adapter is connected
properly and the unit is turned on.
Your computer becomes a DHCP client of the RV120W and receives an IP address
in the 192.168.1.xxx range.
STEP 2 Launch a web browser and enter 192.168.1.1 in the Address field.
STEP 3 When the login page appears, enter the user name and password.
The default user name is admin. The default password is admin. The password is
case sensitive.
STEP 5 Follow the Setup Wizard’s on-screen instructions to set up the RV120W.
The Setup Wizard tries to automatically detect and configure your connection. If it
cannot, the Setup Wizard asks you for information about your Internet connection.
If you don not have it, contact your Internet Service Provider (ISP) to obtain this
information.
During the setup process, the Setup Wizard asks you to enter a new password. To
protect your firewall from unauthorized access, create a new password that is
hard to figure out by others. While you are entering the password, the Setup
Wizard provides you with instant feedback regarding the strength of the
password.
After the Setup Wizard is done configuring the RV120W, the Getting Started
page appears. See Using the Getting Started Page, page 13 for more
information.
By default, this page appears when you start the Device Manager. However, you
can change this behavior by checking Don’t show this on start up at the bottom
of the page.
Run Setup Wizard Click this link to launch the Setup Wizard.
Configure WAN Click this link to open the Internet Setup page.
(Internet) Settings
See Configuring the IPv4 WAN (Internet),
page 20.
Configure LAN Click this link to open the LAN Configuration page.
(Local Network)
Settings See Configuring IPv4 LAN (Local Network)
Settings, page 27.
Configure Wireless Click this link to open the Basic Settings page.
Settings
See Configuring Basic Wireless Settings,
page 54.
Add VPN Clients See Configuring VPN Users, page 105.
Quick Access
Other Resources
The networking page allows you to configure networking settings. This chapter
contains the following sections:
NOTE Cisco recommends you use the Setup Wizard to configure basic networking on the
Cisco RV120W. You can then make changes and provision advanced features using
the Device Manager.
STEP 1 Choose Networking > WAN (Internet) > IPV4 WAN (Internet).
STEP 2 Choose the type of Internet connection you have. The type of connection you have
determines the rest of the information you need to enter. See the sections below
for more information:
STEP 1 Choose Networking > WAN (Internet) > IPv4 WAN (Internet).
STEP 3 Enter MTU information. (See Configuring MTU Settings, page 24.)
STEP 4 Enter MAC Address information. (See Configuring the MAC Address, page 24.)
STEP 1 Choose Networking > WAN (Internet) > IPv4 WAN (Internet).
STEP 2 From the Internet Connection Type drop-down menu, choose Static IP.
STEP 4 Enter MTU information. (See Configuring MTU Settings, page 24.)
STEP 5 Enter MAC Address information. (See Configuring the MAC Address, page 24.)
Configuring PPPoE
If you have a Point-to-Point Protocol over Ethernet (PPPoE) connection to the
Internet:
STEP 1 Choose Networking > WAN (Internet) > IPv4 WAN (Internet).
STEP 2 From the Internet Connection Type drop-down menu, choose PPPoE.
STEP 3 From the PPPoE Profile Name drop-down menu, choose a PPPoE profile.
STEP 4 Enter MTU information. (See Configuring MTU Settings, page 24.)
Configuring PPTP
If you have a Point-to-Point Tunneling Protocol (PPTP) connection to the Internet:
STEP 1 Choose Networking > WAN (Internet) > IPv4 WAN (Internet).
STEP 2 From the Internet Connection Type drop-down menu, choose PPTP.
STEP 4 Enter MTU information. (See Configuring MTU Settings, page 24.)
Configuring L2TP
If you have a Layer 2 Tunneling Protocol (L2TP) connection to the Internet:
STEP 2 From the Internet Connection Type drop-down menu, choose L2TP.
STEP 4 Enter MTU information. (See Configuring MTU Settings, page 24.)
STEP 1 Choose Networking > Choose Networking > WAN (Internet) > IPv4 WAN
(Internet).
• Custom—If your ISP requires a custom MTU setting, choose Custom and
enter the MTU size in the MTU Size field.
STEP 1 Choose Networking > WAN (Internet) > IPv4 WAN (Internet).
STEP 2 From the Router MAC Address drop-down menu, choose one of these options:
• Use This MAC—Choose this option if you want to use the MAC address of
the PC on which you are connecting to the Device Manager.
STEP 3 Enter the following information (you may need to contact your ISP to obtain your
PPPoE login information):
To edit a PPPoE profile listed in the Profile Table, select the profile and click Edit.
To delete selected profiles, click Delete.
STEP 1 Choose Networking > LAN (Local Network) > IPv4 LAN (Local Network).
STEP 2 In the Host Name field, enter the host name of the Cisco RV120W. You can use
only alpha-numeric characters and the hyphen.
The default hostname (for example, “router9BA120”) consists of the word “router”
followed by the last 3 bytes of firewall’s LAN MAC address (in Hex-decimal form).
This format allows the FindIT application to use Bonjour to identify Cisco Small
Business devices on the LAN.
STEP 1 Choose Networking > LAN (Local Network) > IPv4 LAN (Local Network).
• If DHCP is configured on the Cisco RV120W, release and renew your PC’s IP
address.
STEP 5 Open a new browser window and enter the new IP address of the Cisco RV120W
to reconnect.
Configuring DHCP
By default, the Cisco RV120W functions as a DHCP server to the hosts on the
Wireless LAN (WLAN) or LAN network and assigns IP and DNS server addresses.
With DHCP enabled, the firewall's IP address serves as the gateway address to
your LAN. The PCs in the LAN are assigned IP addresses from a pool of
addresses. Each address is tested before it is assigned to avoid duplicate
addresses on the LAN.
STEP 1 Choose Networking > LAN (Local Network) > IPv4 LAN (Local Network).
STEP 2 From the DHCP Mode drop-down menu, choose one of these options:
• None—Choose this option if the Cisco RV120W is not going to act as a DHCP
server.
- Domain Name— (Optional) Enter the domain name for your network.
- Lease time—Enter the duration (in hours) for which IP addresses are
leased to clients
STEP 1 Choose Networking > LAN (Local Network) > IPv4 LAN (Local Network).
STEP 2 In the DNS Proxy field, check to enable the Cisco RV120W to act as a proxy for all
DNS requests and communicate with the ISP's DNS servers.
Enabling VLANs
STEP 1 Choose Networking > LAN (Local Network) > VLAN Membership.
Underneath the Enable VLAN field, The VLAN Membership Table is shown. This
shows available VLANs, including the VLAN ID, description, ports, and whether
inter-VLAN routing is enabled or not for each configured VLAN.
Creating a VLAN
You can create up to four VLANs on the Cisco RV120W.
STEP 1 Choose Networking > LAN (Local Network) > VLAN Membership.
STEP 3 Enter a numerical VLAN ID that will be assigned to endpoints in the VLAN
membership. The VLAN ID can range from 2 to 4094. VLAN ID 1 is reserved for the
default VLAN, which is used for untagged frames received on the interface, and
VLAN ID 4092 is reserved and cannot be used.
STEP 5 To enable routing between this and other VLANS, check the Inter VLAN Routing
box.
STEP 6 To enable device management, check the Device Management box. This allows
you to access the Device Manager from that VLAN. For example, if you created a
VLAN with the VLAN ID of 2 and enabled device management, you can access the
Device Manager by using the first IP address on the created VLAN (for example,
192.168.2.1).
STEP 7 Under each of the ports for the VLAN, choose one of the following:
To edit a VLAN:
STEP 1 Choose Networking > LAN > Multiple VLAN Subnets. The list of subnets appears.
STEP 2 Check the box next to the VLAN you want to edit and click Edit.
c. Click Save. If you are connected to the Cisco RV120W by the LAN port that is a
member of this VLAN, you might have to release and renew the IP address on
the PC connected to the LAN port, or manually assign an IP address to your PC
that is in the same subnet as the VLAN. Open a new browser window and re-
connect to the Cisco RV120W.
a. In the DHCP Section, in the DHCP Mode field, choose one of the following:
• DHCP Server—Choose this to allow the VLAN to act as the DHCP server in
the network. Enter the following information:
- Lease time—Enter the duration (in hours) for which IP addresses are
leased to clients.
• DHCP Relay—Choose this if you are using a DHCP relay gateway. The relay
gateway transmits DHCP messages between multiple subnets. Enter the
address of the relay gateway in the Relay Gateway field.
In the LAN Proxy section, to enable the VLAN to act as a proxy for all DNS requests
and communicate with the ISP's DNS servers, check the Enable box.
STEP 1 Choose Networking > LAN (Local Network) > Static DHCP (LAN).
NOTE The IP Address assigned should be outside the pool of the DHCP addresses
configured. The DHCP pool is treated as generic pool and all reserved IPs should
be outside this pool. The DHCP server will then serve the reserved IP address
when the device using the corresponding MAC address requests an IP address.
STEP 1 Choose Networking > LAN (Local Network) > Advanced DHCP Configuration.
• Host Name—Enter the host name of the TFTP server in the TFTP server host
name field.
• MAC Address
• Configuration Filename
Click Add to add a new DHCP Client MAC address to configuration filename
mapping. Click Edit to edit the MAC address or boot filename for a particular entry.
Click Delete to delete a particular entry.
STEP 1 Choose Networking > LAN > DHCP Leased Clients (LAN).
STEP 2 The list of endpoints is displayed; you cannot edit this list.
Configuring Routing
NOTE If you have already configured DMZ or firewall settings on your firewall in gateway
(NAT) mode, selecting “router” changes those settings back to the default.
- UP—Route is up.
- Host—Target is a host.
- A—Installed by addrconf.
- C—Cache entry.
- !—Reject route.
• Use—Count of lookups for the route. Depending on the use of -F and -C, this
is either route cache misses (-F) or hits (-C).
- UP—Route is up.
- Host—Target is a host.
- Gateway—Use gateway.
- A—Installed by addrconf.
- C—Cache entry.
- !—Reject route.
• Use—Count of lookups for the route. Depending on the use of -F and -C, this
is either route cache misses (-F) or hits (-C).
STEP 3 In the Route Name field, enter the name of the route.
STEP 4 If a route is to be immediately active, check the Active check box. When a route is
added in an inactive state, it will be listed in the routing table, but will not be used
by the firewall. The route can be enabled later. This feature is useful if the network
that the route connects to is not available when you added the route. When the
network becomes available, the route can be enabled.
STEP 5 Check the Private check box to mark this route as private, which means that it will
not be shared in a Routing Information Protocol (RIP) broadcast or multicast.
Uncheck this box if the route can be shared with other firewalls when RIP is
enabled.
STEP 6 In the Destination IP Address field, enter the IP address of the destination host or
network to which the route leads. For a standard Class C IP domain, the network
address is the first three fields of the Destination LAN IP; the last field should be
zero.
STEP 8 From the Interface drop-down menu, choose the physical network interface
through which this route is accessible (WAN or LAN).
STEP 9 In the Gateway IP Address field, enter the IP Address of the gateway through
which the destination host or network can be reached. If this firewall is used to
connect your network to the Internet, then your gateway IP is the firewall's IP
address. If you have another router handling your network's Internet connection,
enter the IP address of that router instead.
STEP 10 In the Metric field, enter a value between 2 and 15 to define the priority of the
route. If multiple routes to the same destination exist, the route with the lowest
metric is chosen.
STEP 2 To configure how the firewall sends and receives RIP packets, choose the RIP
direction:
• None—The firewall neither broadcasts its route table nor does it accept any
RIP packets from other routers. This option disables RIP.
• In Only—The firewall accepts RIP information from other router, but does
not broadcast its routing table.
• Both—The firewall both broadcasts its routing table and also processes RIP
information received from other routers.
• Disabled.
STEP 4 RIP v2 authentication forces authentication of RIP packets before routes are
exchanged with other routers. It acts as a security feature because routes are
exchanged only with trusted routers in the network. RIP authentication is disabled
by default. You can enter two key parameters so that routes can be exchanged
with multiple routers present in the network. The second key also acts as a failsafe
when authorization with first key fails.
To enable authentication for RIP-2B or RIP-2M, check the Enable box. (You must
also choose the direction as explained in Step 2.)
If you enabled RIP v2 authentication, enter the following first and second key
parameters:
• MD5 Key ID—Input the unique MD-5 key ID used to create the
Authentication Data for this RIP v2 message.
• MD5 Auth Key—Input the auth key for this MD5 key, the auth key that is
encrypted and sent along with the RIP-V2 message.
• Not Valid Before—Enter the start date when the auth key is valid for
authentication.
• Not Valid After—Enter the end date when the auth key is valid for
authentication.
STEP 2 In the Port Management Setting Table, to enable a port, check the Enable box. To
disable the port, uncheck the Enable box. By default, all ports are enabled.
STEP 3 Check the Auto Negotiation box to let the firewall and network determine the
optimal port settings. By default, automatic mode is enabled. This setting is
available only when the Enable box is checked.
STEP 5 (Optional) Choose either half- or full-duplex based on the port support. The default
is full-duplex for all ports. This setting is available only when the Auto check box is
unchecked.
STEP 6 (Optional) Select one of the following port speeds: 10 Mbps or 100 Mbps. The
default setting is 100 Mbps for all ports. This setting is available only when the
Auto check box is unchecked. You can change the port speed if a network is
designed to run at a particular speed, such as 10 Mbps mode. In this case, the
endpoint also uses 10 Mbps mode either by auto-negotiation or manual setting.
The firewall will notify dynamic DNS servers of changes in the WAN IP address, so
that any public services on your network can be accessed by using the domain
name.
STEP 2 Select the Dynamic DNS Service you are using. Selecting None disables this
service.
a. Specify the complete Host Name and Domain Name for the DDNS service.
d. Check the Use Wildcards box to enable the wildcards feature, which allows all
subdomains of your DynDNS Host Name to share the same public IP as the
Host Name. This option can be enabled here if not done on the DynDNS Web
site.
e. In the Update Period field, enter the number of hours before the Cisco RV120W
updates the host information on DynDNS.com.
a. Specify the complete Host Name and Domain Name for the DDNS service.
d. In the Update Period field, enter the number of hours before the Cisco RV120W
updates the host information on TZO.com.
The Cisco RV120W can be configured to be a DHCPv6 client of the ISP for this
WAN or a static IPv6 address provided by the ISP can be assigned.
Configuring DHCPv6
When the ISP allows you to obtain the WAN IP settings via DHCP, you need to
provide details for the DHCPv6 client configuration.
STEP 3 Choose if the DHCPv6 client on the gateway is stateless or stateful. If a stateful
client is selected, the gateway connects to the ISP's DHCPv6 server for a leased
address. For stateless DHCP, it is not necessary to have a DHCPv6 server
available at the ISP. Instead, an ICMPv6 discover message will originate from the
Cisco RV120W and is used for auto-configuration.
STEP 2 In the WAN (Internet) Address (IPv6) field, choose Static IPv6.
STEP 4 Enter the IPv6 prefix length defined by the ISP. The IPv6 network (subnet) is
identified by the initial bits of the address which are called the prefix (for example,
in the IP address 2001:0DB8:AC10:FE01::, 2001 is the prefix). All hosts in the
network have identical initial bits for their IPv6 address; the number of common
initial bits in the network’s addresses is set in this field.
STEP 5 Enter the default IPv6 gateway address, or the IP address of the server at the ISP
that this firewall will connect to for accessing the internet.
STEP 6 Enter the primary and secondary DNS server IP addresses on the ISP's IPv6
network. DNS servers map Internet domain names (for example, www.cisco.com)
to IP addresses.
STEP 1 Choose Networking > IPv6 > IPv6 LAN (Local Area Network).
STEP 2 Under LAN TCP/IP Setup, in the IPv6 Address field, enter the IP address of the
Cisco RV120W. The default IPv6 address for the gateway is fec0::1. You can
change this 128 bit IPv6 address based on your network requirements.
STEP 3 Enter the IPv6 prefix length. The IPv6 network (subnet) is identified by the initial
bits of the address called the prefix. By default, the prefix is 64 bits long. All hosts
STEP 4 In the DHCPv6 field, choose to disable or enable the DHCPv6 server. If enabled,
the Cisco RV120W assigns an IP address within the specified range plus
additional specified information to any LAN endpoint that requests DHCP-served
addresses.
STEP 5 Choose the DHCP mode. If stateless is selected, an external IPv6 DHCP server is
not required as the IPv6 LAN hosts are auto-configured by the Cisco RV120W. In
this case, the router advertisement daemon (RADVD) must be configured on this
device and ICMPv6 router discovery messages are used by the host for auto-
configuration. There are no managed addresses to serve the LAN nodes.
If stateful is selected, the IPv6 LAN host will rely on an external DHCPv6 server to
provide required configuration settings.
STEP 7 Enter the server preference. This field is used to indicate the preference level of
this DHCP server. DHCP advertise messages with the highest server preference
value to a LAN host are preferred over other DHCP server advertise messages.
The default is 255.
• Use DNS Proxy—Check this box to enable DNS proxy on this LAN, or
uncheck this box to disable this proxy. When this feature is enabled, the
firewall acts as a proxy for all DNS requests and communicate with the ISP’s
DNS servers (as configured in the WAN settings page).
• Use DNS from ISP—This option allows the ISP to define the DNS servers
(primary/secondary) for the LAN DHCP client.
STEP 9 Enter the lease/rebind time. Enter the duration (in seconds) for which IP addresses
will be leased to endpoints on the LAN.
STEP 1 Choose Networking > IPv6 > IPv6 LAN (Local Area Network).
STEP 3 Enter the starting IP address and ending IP address of the pool.
STEP 4 Enter the prefix length. The number of common initial bits in the network’s
addresses is set by the prefix length field.
STEP 4 If a route is to be immediately active, check the Active box. When a route is added
in an inactive state, it will be listed in the routing table, but will not be used by the
firewall. The route can be enabled later. This feature is useful if the network that the
route connects to is not available when you added the route. When the network
becomes available, the route can be enabled.
STEP 5 In the IPv6 destination field, enter the IPv6 address of the destination host or
network for this route.
STEP 6 In the IPv6 prefix length field, enter the number of prefix bits in the IPv6 address
that define the destination subnet.
STEP 7 Choose the physical network interface through which this route is accessible:
STEP 8 Enter the IP Address of the gateway through which the destination host or network
can be reached.
STEP 9 In the metric field, specify the priority of the route by choosing a value between 2
and 15. If multiple routes to the same destination exist, the route with the lowest
metric is used.
Configuring Tunneling
The Cisco RV120W provides several IPv6 tunneling methods. 6to4 tunneling
allows IPv6 packets to be transmitted over an IPv4 network. 6to4 tunneling is
typically used when a site or end user wants to connect to the IPv6 Internet using
the existing IPv4 network.
NOTE You must use static routes when tunneling. See Configuring Static Routing,
page 46.
The IPv6 Tunnel Status table shows the name of tunnel and the IPv6 address that
is created on the device.
STEP 4 Choose the local endpoint address, or the endpoint address for the tunnel that
starts with the Cisco RV120W. The endpoint can be the LAN interface (if the LAN
is configured as an IPv4 network), or another LAN IPv4 address.
STEP 5 If you chose Other IP in Step 4, enter the IPv4 address of the endpoint.
STEP 6 Enter the ISATAP subnet prefix. This is the 64-bit subnet prefix that is assigned to
the logical ISATAP subnet for this intranet. This can be obtained from your ISP or
internet registry, or derived from RFC 4193.
STEP 2 Check the check boxes for the tunnels you want to modify.
STEP 2 Check the check boxes for the tunnels you want to delete.
STEP 4 If you chose Unsolicited Multicast in Step 3, enter the advertise interval. The
advertise interval is a random value between the Minimum Router Advertisement
Interval and Maximum Router Advertisement Interval. (MinRtrAdvInterval = 0.33 *
MaxRtrAdvInterval.) The default is 30 seconds.
STEP 5 Under RA Flags, check Managed to use the administered/stateful protocol for
address auto configuration. Check Other to use the administered/stateful protocol
of other, non-address information auto configuration.
STEP 6 Under router preference, choose Low, Medium, or High. The router preference
provides a preference metric for default routers. The low, medium and high values
are signaled in unused bits in Router Advertisement messages. This extension is
backward compatible, both for routers (setting the router preference value) and
hosts (interpreting the router preference value). These values are ignored by hosts
STEP 7 Enter the MTU size. The MTU is the size of the largest packet that can be sent over
the network. The MTU is used in RAs to ensure all nodes on the network use the
same MTU value when the LAN MTU is not well-known. The default is 1500 bytes.
STEP 8 Enter the router lifetime value, or the time in seconds that the advertisement
messages will exist on the route. The default is 3600 seconds.
STEP 4 If you chose 6to4 in Step 3, enter the Site-level aggregation identifier (SLA ID.) The
SLA ID in the 6to4 address prefix is set to the interface ID of the interface on which
the advertisements are sent.
If you chose Global/Local/ISATAP in Step 3, enter the IPv6 prefix and prefix length.
The IPv6 prefix specifies the IPv6 network address. The prefix length variable is a
decimal value that indicates the number of contiguous, higher-order bits of the
address that make up the network portion of the address.
STEP 5 Enter the prefix lifetime, or the length of time over which the requesting router is
allowed to use the prefix.
This chapter describes how to configure your wireless network and includes the
following sections:
For wireless products such as access points, routers, and gateways, you
will be asked for a password when you want to change their settings. These
devices have a default password set by the factory. The default password
is often admin. Hackers know these defaults and may try to use them to
access your wireless device and change your network settings. To thwart
any unauthorized changes, customize the device’s password so it will be
hard to guess.
Cisco routers and gateways give you the ability to enable Media Access
Control (MAC) address filtering. The MAC address is a unique series of
numbers and letters assigned to every networking device. With MAC
address filtering enabled, wireless network access is provided solely for
wireless devices with specific MAC addresses. For example, you can
specify the MAC address of each computer in your network so that only
those computers can access your wireless network.
WEP is an older encryption standard and may be the only option available
on some older devices that do not support WPA.
• Keep wireless routers, access points, or gateways away from exterior walls
and windows.
• Turn wireless routers, access points, or gateways off when they are not
being used (at night, during vacations).
• Disable file sharing (peer-to-peer). Some applications may open file sharing
without your consent and/or knowledge.
STEP 2 In the Radio field, choose Enable to enable wireless functionality for the
Cisco RV120W. Choosing Disable turns off wireless functionality for the firewall.
STEP 3 In the Wireless Network Mode field, choose the type of wireless network based
on the devices you have that will connect to the network:
• B/G Mixed—Select this mode if you have devices in the network that
support 802.11b and 802.11g.
• B/G/N Mixed—Select this mode if you have devices in the network that
support 802.11b, 802.11g and 802.11n.
STEP 4 Select the channel bandwidth. Available choices depend on the wireless network
mode chosen in Step 3.
STEP 5 The Control Side Band field defines the sideband which is used for the secondary
or extension channel when the AP is operating in 40 Mhz channel width. Choose
lower or upper. This field is only available when channel spacing is set to auto. The
STEP 6 The channel field specifies the frequency that the radio uses to transmit wireless
frames. Select a channel from the list of channels or choose auto to let the Cisco
RV120W determine the best channel to use based on the environment noise levels
for the available channels.
STEP 7 In the U-APSD field, choose Enable to enable the Unscheduled Automatic Power
Save Delivery (also referred to as WMM Power Save) feature that allows the radio
to conserve power. This feature is disabled by default.
You can configure wireless security and other settings for each wireless network.
To configure wireless settings:
STEP 2 In the Wireless Basic Settings Table, check the box on the left of the wireless
network you want to configure.
a. Enter the SSID name, or the unique name for this wireless network. Include up
to 32 characters, using any of the characters on the keyboard. For added
security, you should change the default value to a unique name.
b. Check the Broadcast SSID box if you want to allow all wireless clients within
range to be able to detect this wireless network when they are scanning the
local area for available networks. Disable this feature if you do not want to make
the SSID known. When this feature is disabled, wireless users can connect to
your wireless network only if they know the SSID (and provide the required
security credentials).
c. Enter the VLAN, or network for this wireless network. (See Chapter 2,
Configuring Networking, for more information on VLANs.) Devices connecting
to this network are assigned addresses on this VLAN. The default VLAN is 1
and if all the devices are on the same network, this can be left unchanged.
e. In the Max Associated Clients field, enter the maximum number of endpoints
that can connect to this network. The default value is 8. You can change this
number if you want to restrict traffic on the network to prevent it from being
overloaded, for example. The number of clients connected across all four
virtual access points cannot exceed 100.
f. Click Save.
Configuring Security
STEP 2 In the Wireless Basic Settings Table, check the box on the left of the wireless
network you want to configure.
STEP 5 Click Enable under Wireless Isolation within SSID to separate this network from
the other three wireless networks on the Cisco RV120W. When this feature is
enabled, the network can communicate with the Cisco RV120W, but not with any
of the other three networks.
STEP 6 In the Security field, select the type of security. All devices on this network must
use the same security mode and settings to work correctly. Cisco recommends
using the highest level of security that is supported by the devices in your
network.
The Encryption Type appears based on the type of network you chose in Step 3:
a. In the Authentication field, choose Open System or Shared Key. If you choose
Open System, a wireless client doesn't need to provide a shared key in order to
access the wireless network. Any client can associate to the router. If you
choose Shared Key, a wireless client must provide the correct shared key
(password) in order to access the wireless network.
b. Select the Encryption Type (64- or 128-bit WEP). The larger size keys provide
stronger encryption, making the key more difficult to crack (for example, 64-bit
WEP has a 40-bit key which is less secure than the 128-bit WEP, which has a
104-bit key).
d. Select one of the four keys to use as the shared key that devices must have in
order to use the wireless network. If you did not generate a key in Step 7c,
enter a key directly into the WEP Key field. The length of the key should be 5
ASCII characters (or 10 hexadecimal characters) for 64-bit WEP and 13 ASCII
a. Enter the WPA Key, or password/phrase that will secure the network. Devices
connecting to the network must use this phrase for authentication.
b. If you want to see the password as you are entering it, check the Unmask
Password box.
c. In the Key Renewal field, enter the number of seconds after which the Cisco
RV120W will generate a new key. These keys are internal keys exchanged
between the Cisco RV120W and connected devices. The default value (3600
seconds) is usually adequate unless you are experiencing network problems.
If you chose WPA2 Enterprise, you can check the Pre-Authentication box
(optional). Pre-authentication allows wireless clients to quickly switch between
connected wireless networks sharing the same security configuration. When a
wireless client disconnects from a wireless network, a notification is sent to the
network, which then sends the pre-authentication info to other wireless networks.
STEP 2 In the Wireless Basic Settings Table, check the box on the left of the wireless
network you want to configure.
STEP 6 Enter the MAC addresses of the endpoints to allow or deny. To see a list of
currently-connected clients, click Wireless Clients List.
To configure WMM:
STEP 2 In the Wireless Basic Settings Table, check the box on the left of the wireless
network you want to configure.
STEP 4 In the SSID field, select SSID that clients use to connect to the AP.
STEP 5 Check the WMM Enable box to enable WMM based on the IEEE 802.11e standard
for this profile. WMM helps in prioritizing wireless traffic according to four access
categories:
STEP 6 In the DSCP to Queue table, for each ingress DSCP, you can choose the output
queue for the traffic. The Differentiated Services Code Point (DSCP) field identifies
• Voice (4) or Video (3)—High priority queue, minimum delay. Typically used
to send time-sensitive data such as video and other streaming media.
• Best Effort (2)—Medium priority queue, medium throughput and delay. Most
traditional IP data is sent to this queue.
If you want to change the output queue for packets marked with a particular DSCP,
select the new output queue from the drop-down list.
STEP 2 In the Wireless Basic Settings Table, check the box on the left of the wireless
network you want to configure.
STEP 4 Select the wireless network for which you want to create a schedule.
STEP 5 Check the Enable box to allow you to create a schedule to make the network
active during certain times.
STEP 6 Enter the start and stop times for the network to be active.
STEP 2 In the Beacon Interval field, enter the time in milliseconds between beacon
transmissions. The default interval is 100 milliseconds.
STEP 3 In the DTIM Interval field, enter the interval at which the delivery traffic indication
message should be sent. A DTIM field is a countdown field informing clients of the
next window for listening to broadcast and multicast messages. When the Cisco
RV120W has buffered broadcast or multicast messages for associated clients, it
sends the next DTIM with a DTIM Interval value. Its clients hear the beacons and
awaken to receive the broadcast and multicast messages.The default interval is 2
beacon intervals.
STEP 4 The Request to Send (RTS) Threshold is the packet size, in bytes, that requires the
AP to check the transmitting frames to determine if an RTS/Clear to Send (CTS)
handshake is required with the receiving client. Using a small value causes RTS
packets to be sent more often, consuming more of the available bandwidth,
reducing the apparent throughput of the network packets. The default value is
2346, which effectively disables RTS.
STEP 5 The Fragmentation Threshold is the maximum length of the frame, in bytes,
beyond which packets must be fragmented into two or more frames. Collisions
occur more often for long frames because while sending them, they occupy the
channel for a longer time. The default value is 2346, which effectively disables
fragmentation. If you experience a high packet error rate, you can slightly increase
the fragmentation threshold; setting the fragmentation threshold too low may
result in poor network performance. Only minor reduction of the default value is
recommended.
STEP 6 Choose the Preamble Mode. The 802.11b standard requires that a preamble be
appended to every frame before it is transmitted through the air. The preamble
may be either the traditional “long” preamble, which requires 192 μs for
transmission, or it may be an optional “short” preamble that requires only 96 μs. A
long preamble is needed for compatibility with the legacy 802.11 systems
operating at 1 and 2 Mbps. The default selection is long.
STEP 7 Choose the Protection Mode. Select none (the default) to turn off CTS. The CTS-
to-Self Protection option enables the CTS-to-Self protection mechanism, which is
used to minimize collisions among stations in a mixed 802.11b and 802.11g
STEP 8 The Short Retry Limit and Long Retry Limit fields determine the number of times
the Cisco RV120W will reattempt a frame transmission that fails. The limit applies
to both long and short frames of a size less than or equal to the RTS threshold.
STEP 2 In the VAP field, select the wireless network on which you want to enable WPS.
The network must use WPA, WPA2, or WPA+WPA2 security.
NOTE You can enable WPS on only one of the four networks, or virtual access points.
STEP 3 Under WPS Status, choose Enable to allow WPS configuration. By default, WPS is
disabled.
• Setup Using a PIN—In the WPS Setup Method section, in the Station PIN
field, enter the personal identification number (PIN) of the device you want
to connect to the network. You must log in to that device to obtain its WPS
PIN. Then click Configure via PIN. After clicking this button on the Cisco
RV120W, on the WPS-enabled device, select the necessary option to begin
WPS. The device should begin communication with the Cisco RV120W.
• Setup Using a WPS Button—If the device you want to connect has a WPS
button, push the button on the device. Then, on the Cisco RV120W, click
Configure via PBC (push button configuration).
WDS peers are other access points in the network connected in the WDS. All
base stations in a WDS must be configured to use the same radio channel, method
of encryption (none, WEP, or WPA) and encryption keys.
To configure a WDS:
STEP 2 Check the Enable box to enable WDS in the Cisco RV120W.
STEP 2 Enter the MAC (hardware) address of the WDS peer and click Save.
This chapter contains information about configuring the firewall properties of the
Cisco RV120W and includes the following sections:
• Rules for outbound (from your LAN to the Internet) or inbound (from the
Internet to your LAN) traffic.
• Keywords (in a domain name or on a URL of a web page) that the router
should allow or block.
• Port triggers that signal the router to allow or block access to specified
services as defined by port number.
• Reports and alerts that you want the router to send to you.
Inbound (Internet to LAN) rules restrict access to traffic entering your network,
selectively allowing only specific outside users to access specific local resources.
By default, all access from the insecure WAN side is blocked from accessing the
secure LAN, except in response to requests from the LAN or DMZ. To allow
outside devices to access services on the secure LAN, you must create a firewall
rule for each service.
If you want to allow incoming traffic, you must make the router's WAN port IP
address known to the public. This is called “exposing your host.” How you make
your address known depends on how the WAN ports are configured; for the
Cisco RV120W, you may use the IP address if a static address is assigned to the
WAN port, or if your WAN address is dynamic, a DDNS (Dynamic DNS) name can
be used.
Outbound (LAN to Internet) rules restrict access to traffic leaving your network,
selectively allowing only specific local users to access specific outside resources.
The default outbound rule is to allow access from the secure zone (LAN) to the
insecure WAN. To block hosts on the secure LAN from accessing services on the
outside (insecure WAN), you must create a firewall rule for each service.
STEP 2 Under Default Outbound Policy, choose Allow or Block. Allow permits traffic from
your LAN to the Internet. Block does not permit traffic from your LAN to the
Internet.
STEP 3 Under Connection Type, choose the destination of traffic covered by this rule:
STEP 5 Choose the service to allow or block for this rule. Choose Any Traffic to allow the
rule to apply to all applications and services, or you can choose a single
application to block:
• FINGER
• ICQ (chat)
• NEWS
• RCMD (command)
• REAL-AUDIO
• STRMWORKS
• TELNET (command)
• IKE
• IDENT protocol
• SIP-TCP or SIP-UDP
• Any—The rule applies to traffic originating from any IP address in the local
network.
b. The router supports multi-NAT, so your Internet Destination IP address does not
have to be the address of your WAN. On a single WAN interface, multiple public
IP addresses are supported. If your ISP assigns you more than one public IP
address, one of these can be used as your primary IP address on the WAN
port, and the others can be assigned to servers on the LAN. In this way, the
LAN can be accessed from the internet by its aliased public IP address. Check
the Enable box and enter the IP address you want to use.
c. Under Rule Status, choose Enabled or Disabled. You may want to configure a
rule and choose Disabled if you want to enable it at a later time.
a. In the Destination IP field, configure the IP address to which the firewall rule
applies:
b. You can configure Secure Network Address Translation (SNAT) to map a public
IP address (your Dedicated WAN address, Optional WAN address, or another
address) to an IP address on your private network. Under Use This SNAT IP
Address, check Enable and enter the SNAT IP Address.
• Stealth Mode—If Stealth Mode is enabled, the router will not respond to
port scans from the WAN. This feature makes the network less susceptible
to discovery and attacks. Enabled by default.
• Flood— If this option is enabled, the router will drop all invalid TCP packets.
This feature protects the network from a SYN flood attack. Enabled by
default.
• Block UDP Flood—If this option is enabled, the router will not accept more
than 25 simultaneous, active UDP connections from a single computer on
the LAN. Enabled by default.
STEP 2 With content filtering enabled, under Web Components, select the check box for
each component you wish to block:
• Java—Blocks java applets from being downloaded from pages that contain
them. Java applets are small programs embedded in web pages that
enable dynamic functionality of the page. A malicious applet can be used to
compromise or infect computers. Enabling this setting blocks Java applets
from being downloaded.
NOTE Many websites require that cookies be accepted in order for the site to be
accessed properly. Blocking cookies can cause many websites to not function
properly.
NOTE Before adding trusted domains, you must enable content filtering. See Enabling
Content Filtering, page 72.
STEP 1 Choose Firewall > Content Filtering. The Trusted Domain Table displays a list of
currently configured trusted domains.
STEP 2 Click Add and enter the name of the trusted domain.
STEP 1 Choose Firewall > URL Blocking. The table displays currently blocked keywords.
STEP 3 Under Status, check the box to enable blocking for the new keyword.
STEP 4 Select the group to which to apply the keyword blocking. If you need to configure
a new group, click Configure LAN Groups. (See Configuring LAN (Local
Network) Groups, page 86.)
Port triggering opens an incoming port for a specific type of traffic on a defined
outgoing port.
Port triggering is more flexible than static port forwarding (available when
configuring firewall rules) because a rule does not have to reference a specific
LAN IP or IP range. Ports are also not left open when not in use, thereby providing
a level of security that port forwarding does not offer.
NOTE Port triggering is not appropriate for servers on the LAN, since there is a
dependency on the LAN device making an outgoing connection before incoming
ports are opened.
Some applications require that, when external devices connect to them, they
receive data on a specific port or range of ports in order to function properly. The
router must send all incoming data for that application only on the required port or
range of ports. The gateway has a list of common applications and games with
corresponding outbound and inbound ports to open. You can also specify a port
triggering rule by defining the type of traffic (TCP or UDP) and the range of
incoming and outgoing ports to open when enabled.
STEP 5 Select whether the port uses TCP, UDP, or both protocols.
STEP 6 In the Outgoing (Trigger) Port Range section, specify the port number or range of
port numbers that will trigger this rule when a connection request from outgoing
STEP 7 In the Incoming (Response) Port Range section, specify the port number or range
of port numbers used by the remote system to respond to the request it receives.
If the incoming connection uses only one port, then specify the same port number
in the Start Port and End Port fields.
The Port Forwarding Rule Table lists all the available port forwarding rules for this
device and allows you to configure port forwarding rules. The table contains the
following information:
• Status—A port forwarding rule can be disabled if not in use and enabled
when needed. The port forwarding rule is disabled if the status is disabled
and it is enabled if the status is enabled. Disabling a port forwarding rule
does not delete the configuration.
• Source IP—The source IP address for traffic from which traffic is forwarded
(Any, Single Address or Address Range).
STEP 4 Under Service, select one of the common or custom services defined for this
device:
• FINGER
• ICQ (chat)
• PING
• RCMD (command)
• REAL-AUDIO
• STRMWORKS
• TELNET (command)
• IKE
• IDENT protocol
• SIP-TCP or SIP-UDP
• Any—Specifies that the rule being created is for traffic from the given
endpoint.
STEP 6 If you chose Single Address in Step 6, enter the IP address in the Start field.
If you chose Address Range in Step 6, enter the starting IP address of the range in
the Start field and the ending IP address of the range in the Finish field.
STEP 7 If you chose Always Allow, Block by Schedule, or Allow by Schedule in Step 3:
a. Enter the Destination IP address, or the address where traffic meeting the rule
should be sent.
b. In the Forward from Port field, choose Same as Incoming Port if the traffic
should be forwarded from the same port number on the outgoing server.
Otherwise, choose Specify Port and enter the port number in the Port Number
field.
c. In the Forward to Port field, Choose Same as Incoming Port if the traffic should
be sent to the same port on the receiving server. Otherwise, choose Specify
Port and enter the port number in the Port Number field.
You must configure a fixed (static) IP address for the endpoint that will be
designated as the DMZ host. The DMZ host should be given an IP address in the
same subnet as the router's LAN IP address but it cannot be identical to the IP
address given to the LAN interface of this gateway.
STEP 3 Enter the IP address for the endpoint that will receive the redirected packets. This
is the DMZ host.
STEP 4 Click Save. You must then configure firewall rules for the zone. See Creating
Custom Services, page 83.
To configure one-to-one NAT, choose Firewall > Advanced Settings > One-to-One
NAT. The One-to-One-NAT Rules Table lists the available One-To-One NAT rules
that have been configured. It displays the following fields:
STEP 2 Check the Enable box to enable MAC Address Filtering for this device. Uncheck
the box to disable this feature.
If you enable MAC filtering, in the Policy for MAC Address listed below field,
choose one of the following options:
• Block and Allow the Rest—Choose this option to block the traffic from the
specified MAC addresses and to allow traffic from all other addresses.
• Allow and Block the Rest—Choose this option to allow the traffic from the
specified MAC addresses and to block traffic from all other machines on
the LAN side of the router.
For example, two computers are on the LAN with MAC addresses of
00:01:02:03:04:05 (host1), and 00:01:02:03:04:11 (host2). If the host1 MAC address
is added to the MAC filtering list and the “block and allow the rest” policy is
chosen, when this computer tries to connect to a website, the router will not allow
it to connect. However, host2 is able to connect because its MAC address is not in
the list. If the policy is “allow and block the rest,” then host1 is able to connect to a
website, but host2 is blocked because its URL is not in the list. The MAC filtering
policy does not override a firewall rule that directs incoming traffic to a host.
STEP 4 Enter the MAC address and description to add to the table and click Save. Repeat
for each address to allow or block.
STEP 1 Choose Firewall > Advanced Settings > IP/MAC Binding. The table lists all the
currently defined IP/MAC binding rules and allows several operations on the rules.
STEP 3 In the name field, enter the name for this rule.
STEP 4 In the MAC Addresses field, enter the MAC Addresses (the physical address of
the piece of hardware) for this rule.
STEP 5 In the IP Addresses field, enter the IP Addresses to assign to the piece of
hardware.
STEP 4 Enter the service type, or layer 4 protocol that the service uses (TCP, UDP, ICMP,
ICMPv6, or other).
If you chose ICMP or ICMPv6 as the service type, enter the ICMP type. This is a
numeric value from 0 through 40 for ICMP and from 0 through 255 for ICMPv6.
STEP 5 If you chose TCP or UDP, in the Start Port field, enter the first TCP or UDP port of
the range that the service uses. In the Finish Port field, enter the last TCP or UDP
port of the range that the service uses.
To create a schedule:
STEP 3 Enter a unique name to identify the schedule. This name is then available when you
create access or port forwarding rules.
STEP 4 Under Time, check All Day if you want the schedule to apply to the entire day.
Leave the box unchecked if you want it to only apply to certain hours of the day,
and enter the specific start and end times, selecting a.m. or p.m.
STEP 5 Under Repeat, check Everyday to apply the schedule to all the days of the week.
Leave the box unchecked if you want it to only apply to certain days, and check
the boxes next to the days you want to include in the schedule.
Configuring Sessions
You can limit the maximum number of unidentified sessions and half-open
sessions on the Cisco RV120W. You can also introduce timeouts for TCP and UDP
sessions to ensure Internet traffic is not deviating from expectations in your private
network.
STEP 2 In the Maximum Unidentified Sessions field, enter the maximum number of
unidentified sessions for the ALG identification process. This value can range from
2 through 128. The default is 32 sessions.
STEP 3 In the Maximum Half Open Sessions field, enter the maximum number of half-open
sessions. A half-open session is the session state between receipt of a SYN
packet and the SYN/ACK packet. Under normal circumstances, a session is
allowed to remain in the half-open state for 10 seconds. The maximum value
ranges from 0 through 3,000. The default is 128 sessions.
STEP 4 In the TCP Session Timeout Duration field, enter the time, in seconds, after which
inactive TCP sessions are removed from the session table. Most TCP sessions
terminate normally when the RST or FIN flags are detected. This value ranges from
0 through 4,294,967 seconds. The default is 1,800 seconds (30 minutes).
STEP 5 In the UDP Session Timeout Duration field, enter the time, in seconds, after which
inactive UDP sessions are removed from the session table. This value ranges from
0 through 4,294,967 seconds. The default is 120 seconds (2 minutes).
STEP 6 In the Other Session Timeout Duration (seconds) field, enter the time, in seconds,
after which inactive non-TCP/UDP sessions are removed from the session table.
This value ranges from 0 through 4,294,967 seconds. The default is 60 seconds.
STEP 7 In the TCP Session Cleanup Latency (seconds) field, enter the maximum time for a
session to remain in the session table after detecting both FIN flags. This value
ranges from 0 through 4,294,967 seconds. The default is 10 seconds.
STEP 2 Check the Enable box to allow IGMP communication between the router and other
nodes in the network.
STEP 3 Choose the Upstream Interface (WAN or LAN). Select the interface (LAN or WAN)
on which the IGMP proxy acts as a normal multicast client.
The Allowed Networks table lists all the allowed networks configured for the
device and allows several operations on the allowed networks:
NOTE By default the device will forward multicast packets which are originating from its
immediate WAN network.
STEP 1 Choose Firewall > Advanced Settings > LAN (Local Network) Groups.
STEP 3 Enter the group name; spaces and quotes are not supported. Click Save.
If the group consists of a single IP address, enter the address in the Start Address
field. If the group consists of a range of IP addresses, enter the address in the
Finish Address field.
STEP 2 Check the Enable box to enable SIP ALG support. If disabled, the router will not
allow incoming calls to the UAC (User Agent Client) behind the Cisco RV120W.
In this example, you host a public web server on your local DMZ network. You
want to allow inbound HTTP requests from any outside IP address to the IP
address of your web server at any time of day.
Parameter Value
Service HTTP
Source IP Any
Parameter Value
Service CU-SEEME:UDP
Start 132.177.88.2
Finish 134.177.88.254
Create an inbound rule that configures the firewall to host an additional public IP
address. Associate this address with a web server on the DMZ. If you arrange with
your ISP to have more than one public IP address for your use, you can use the
additional public IP addresses to map to servers on your LAN. One of these public
IP addresses is used as the primary IP address of the router. This address is used
to provide Internet access to your LAN PCs through NAT. The other addresses are
available to map to your DMZ servers.
Parameter Value
Service HTTP
Start 10.1.0.52
Send to Local Server (DNAT IP) 192.168.1.2 (local IP address of your web server)
In this example, you want to block all HTTP traffic on the weekends if the request
originates from a specific group of machines in the LAN having a known range of
IP addresses, and anyone coming in through the Network from the WAN (i.e. all
remote users).
STEP 1 Setup a schedule. Choose Firewall > Advanced Settings > Schedules.
Parameter Value
Schedule Weekend
Service HTTP
Destination IP Any
Parameter Value
Schedule Weekend
Source IP Any
It also describes how to configure router security, beginning with the “Configuring
Security” section on page 107.
Configuring VPNs
A VPN provides a secure communication channel (“tunnel”) between two gateway
routers or a remote PC client and a gateway router. The following types of tunnels
can be created:
STEP 1 Enable remote management. See Configuring Remote Management, page 119.
STEP 2 Create QuickVPN users. See Configuring VPN Users, page 105. After a user
account is created, the credentials can be used by the QuickVPN client.
For more information on installing and using Cisco QuickVPN, see Appendix A,
“Using Cisco QuickVPN for Windows 7, 2000, XP, or Vista.”
STEP 3 Enter a name for the connection. The connection name is used for management.
STEP 4 Enter a pre-shared key. The VPN client or gateway will need to enter this key to
establish the VPN connection.
STEP 5 Choose the type of address for the remote gateway, or the gateway to which the
Cisco RV120W will connect:
STEP 7 If you chose gateway in Step 2, enter the IP address and subnet mask of the
remote LAN. The remote gateway to which the Cisco RV120W will connect is
located on that LAN.
NOTE The IP address range used on the remote LAN must be different from the IP
address range used on the local LAN.
STEP 2 Click View Default Settings. Settings cannot be changed from this page, but can
be configured through the Basic VPN Setup or Advanced VPN Setup menus.
STEP 1 Choose VPN > IPsec > Advanced VPN Setup. In the IKE Policy table, click Add.
STEP 2 Under Policy Name, enter a unique name for the policy for identification and
management purposes.
• Main—This mode negotiates the tunnel with higher security, but is slower.
NOTE If either the Local or Remote identifier type is not an IP address, then
negotiation is only possible in Aggressive Mode. If FQDN, User FQDN or DER
ASN1 DN is selected, the router disables Main mode and sets the default to
Aggressive mode.
STEP 5 In the Local section, under Identifier Type, choose the Internet Security
Association and Key Management Protocol (ISAKMP) identifier for this router:
• FQDN
• User-FQDN
• DER ASN1 DN
STEP 7 In the Remote section, under Identifier Type, choose the ISAKMP identifier for this
router:
• FQDN
• User FQDN
• DER ASN1 DN
STEP 8 If you chose FQDN, User-FQDN, or DER ASN1 DN as the identifier type, enter the IP
address or domain name in the Identifier field.
IKE SA Parameters
The Security Association (SA) parameters define the strength and mode for
negotiating the SA.
STEP 1 Choose the encryption algorithm, or the algorithm used to negotiate the SA:
• DES
• 3DES
• AES-128
• AES-192
• AES-256
• MD5
• SHA-1
• SHA2-256
• SHA2-384
• SHA2-512
• Select Pre-Shared Key for a simple password based key that is shared with
the IKE peer.
• Select RSA-Signature to disable the pre-shared key text field and use the
Active Self Certificate uploaded in the Certificates page. A certificate must
be configured in order for RSA-Signature to work.
NOTE The double quote character (“) is not supported in the pre-shared key.
STEP 4 Choose the Diffie-Hellman (DH) Group algorithm, which is used when exchanging
keys. The DH Group sets the strength of the algorithm in bits.
NOTE Ensure that the DH Group is configured identically on both sides of the IKE
policy.
STEP 5 In the SA Lifetime field, enter the interval, in seconds, after which the Security
Association becomes invalid.
STEP 6 To enable dead peer detection, check the Enable box. Dead Peer Detection is
used to detect whether the peer is alive or not. If peer is detected as dead, the
router deletes the IPsec and IKE Security Association.
STEP 7 In the Detection Period field, enter the interval, in seconds, between consecutive
DPD R-U-THERE messages. DPD R-U-THERE messages are sent only when the
IPsec traffic is idle.
STEP 8 In the Reconnect after Failure Count field, enter the maximum number of DPD
failures allowed before tearing down the connection.
Rather than configuring a unique VPN policy for each user, you can enable the VPN
gateway router to authenticate users from a stored list of user accounts or with an
external authentication server such as a RADIUS server. When connecting many
VPN clients to a VPN gateway router, Extended Authentication (XAUTH) allows
authentication of users with methods in addition to the authentication method
mentioned in the IKE SA parameters. XAUTH can be configured in the following
modes:
• None—Disables XAUTH.
STEP 2 If you selected IPsec Host, enter the username and password for the host.
• Manual Policy—All settings (including the keys) for the VPN tunnel are
manually input for each end point. No third-party server or organization is
involved.
To create an Auto VPN Policy, you need to first create an IKE policy and then add
the corresponding Auto Policy for that IKE Policy. (See Auto Policy Parameters,
page 102.)
STEP 5 In the Remote Endpoint field, select the type of identifier that you want to provide
for the gateway at the remote endpoint: IP Address or FQDN (Fully Qualified
Domain Name).
STEP 6 In the NetBIOS field, check the Enable box to allow NetBIOS broadcasts to travel
over the VPN tunnel, or uncheck this box to disable NetBIOS broadcasts over the
VPN tunnel. For client policies, the NetBIOS feature is available by default.
• Local/Remote IP—Select the type of identifier that you want to provide for
the endpoint:
- Any—Specifies that the policy is for traffic from the given end point
(local or remote). Note that selecting Any for both local and remote end
points is not valid.
- Single—Limits the policy to one host. Enter the IP address of the host
that will be part of the VPN in Start IP Address field.
STEP 2 In the Start Address field, enter the first IP address in the range. If you selected
Single, enter the single IP address in this field and leave the End IP Address field
blank.
STEP 4 If you chose Subnet as the type, enter the Subnet Mask of the network.
Split DNS
Split DNS allows the Cisco RV120W to find the DNS server of the remote router
without going through the ISP (Internet).
STEP 2 In the Domain Name Server 1 field, specify a Domain Name server IP address,
which is used only to resolve the domain configured in the Domain Name 1 field.
STEP 3 In the Domain Name Server 2 field, specify a Domain Name server IP address,
which is used only to resolve the domain configured in the Domain Name 2 field.
STEP 4 In the Domain Name 1 field, specify a domain name, which will be queried only
using the DNS server configured in the Domain Name Server 1 field.
STEP 5 In the Domain Name 2 field, specify a domain name, which will be queried only
using the DNS server configured in the Domain Name Server 2 field.
NOTE Make sure that you avoid using overlapping subnets for remote or local traffic
selectors. Using these subnets would require adding static routes on the router and
the hosts to be used.
If you chose manual as the policy type in Step 4, configure the manual policy
parameters. The Manual Policy creates an SA (Security Association) based on the
following static inputs:
• Key-In—Enter the encryption key of the inbound policy. The length of the
key depends on the algorithm chosen:
- DES—8 characters
- 3DES—24 characters
- AES-128—16 characters
- AES-192—24 characters
- AES-256—32 characters
- AES-CCM—16 characters
- AES-GCM—20 characters
• Key-Out—Enter the encryption key of the outbound policy. The length of the
key depends on the algorithm chosen, as shown above.
Integrity Algorithm—Select the algorithm used to verify the integrity of the data.
• Key-In—Enter the integrity key (for ESP with Integrity-mode) for the inbound
policy. The length of the key depends on the algorithm chosen:
- MD5—16 characters
- SHA-1— 20 characters
- SHA2-256—32 characters
- SHA2-384— 48 characters
- SHA2-512—64 characters
• Key-Out—Enter the integrity key (for ESP with Integrity-mode) for the
outbound policy. The length of the key depends on the algorithm chosen, as
shown above.
If you chose auto as the policy type in Step 4, configure the following:
STEP 1 SA Lifetime—Enter the duration of the Security Association and choose the unit
from the drop-down list:
STEP 3 Select the algorithm used to verify the integrity of the data.
STEP 4 Under PFS Key Group, check the Enable box to enable Perfect Forward Secrecy
(PFS) to improve security. While slower, this protocol helps to prevent
eavesdroppers by ensuring that a Diffie-Hellman exchange is performed for every
phase-2 negotiation.
STEP 5 Choose the IKE policy that will define the characteristics of phase 1 of the
negotiation. (For information on creating these policies, see Configuring IKE
Policies, page 95.)
VPN client software is required to establish a VPN tunnel between the router and
remote endpoint. Open source software (such as OpenVPN or Openswan) as well
as Microsoft IPsec VPN software can be configured with the required IKE policy
parameters to establish an IPsec VPN tunnel. Refer to the client software guide for
detailed instructions on setup as well as the router’s online help.
• Choose VPN > IPsec > Advanced VPN Setup and click IPsec VPN
Connection Status.
Here the active IPsec SAs (security associations) are listed along with the traffic
details and tunnel state. The traffic is a cumulative measure of transmitted/
received packets since the tunnel was established.
If a VPN policy state is “not connected”, it can be enabled from the List of VPN
Policies in the VPN > IPsec > Advanced VPN Setup page.
Field Description
STEP 4 In the Starting IP Address field, enter the starting IP address of the range of IPs to
assign to connecting users.
STEP 5 In the Ending IP Address field, enter the ending IP address of the range of IPs to
assign to connecting users.
NOTE The starting IP of the PPTP client IP range is used as the PPTP server IP of the Cisco
RV120W and the remaining PPTP client IP address range is used to assign IP
addresses to PPTP clients.
STEP 5 Enter the password. If you want the user to be able to change the password, check
the Enabled box.
STEP 2 Choose the type of traffic to allow to pass through the router:
Configuring Security
The Cisco RV120W provides several security methods, including certificate
authentication, RADIUS server support, and 802.1x port-based authentication.
STEP 5 Enter the subject of the certificate request. The Subject field populates the CN
(Common Name) entry of the generated certificate. Subject names are usually
defined in the following format: CN=, OU=, O=, L=, ST=, C=. For example,
CN=router1, OU=my_company, O=mydept, L=SFO, C=US.
STEP 6 Choose the Hash Algorithm: MD5 or SHA-1. The algorithm used to sign the
certificate (RSA) is shown.
STEP 7 Enter the signature key length, or the length of the signature (512,1024, or 2048).
STEP 10 (Optional) Enter the e-mail address of the company contact that is used when
generating the self certificate request.
• Timeout—The timeout interval (in seconds) after which the Cisco RV120W
re-authenticates with the RADIUS server.
STEP 2 In the Authentication Server IP Address field, enter the IP address of the
authenticating RADIUS Server.
STEP 3 In the Authentication Port field, enter the port number on which the RADIUS server
sends traffic.
STEP 4 In the Secret field, enter the shared key that allows the Cisco RV120W to
authenticate with the RADIUS server. This key must match the key configured on
the RADIUS server. The single quote, double quote, and space characters are not
allowed in this field.
STEP 5 In the Timeout field, enter the timeout interval after which the Cisco RV120W re-
authenticates with the RADIUS server.
STEP 6 In the Retries field, enter the number of retries for the Cisco RV120W to re-
authenticate with the RADIUS server.
STEP 3 Select the LAN port that should be configured as an 802.1x supplicant.
The Cisco RV120W lets you configure the following Quality of Service (QoS)
features:
You can configure WAN QoS profiles to control the rate at which the RV120W
transmits data. For example, limiting the outbound traffic helps you prevent the
LAN users from consuming all of the bandwidth of the Internet link.
b. Set the WAN QoS mode by clicking the Priority or Rate Limit radio button.
The Priority option lets you allocate bandwidth based on a priority level.
The Rate Limit option lets you specify the total WAN bandwidth (1–100 Mbps).
STEP 3 When prompted to reset the previous priority or rate limit configuration, click OK.
Each one of these values specifies the percentage of the total bandwidth
(100 Mbps) allocated to these priority levels.
If the WAN QoS mode is set to Rate Limit, enter this information:
Total WAN (Internet) Enter the total WAN bandwidth (1–100 Mbps).
Bandwidth
Maximum Bandwidth If the WAN QoS mode is set to Rate Limit, enter the
Rate maximum bandwidth rate (100–1000000 Kbps).
STEP 5 To bind the profile to a traffic selector, see Configuring Profile Binding, page 114.
To create a profile, click Configure Profile. See Configuring WAN QoS Profiles,
page 112 for more information.
STEP 3 From the Service drop-down menu, choose the service the profile applies to.
If the service you are looking for is not in the drop-down menu, you can configure a
custom service in the Firewall page (see Creating Custom Services, page 83.)
STEP 4 From the Traffic Selector Match Type drop-down menu, choose the traffic selector
to use to bind traffic to the profile.
STEP 3 For each CoS priority level in the CoS to Traffic Forwarding Queue Mapping
Table, choose a priority value from the Traffic Forwarding Queue drop-down
menu.
These values mark traffic types with higher or lower traffic priority depending on
the type of traffic.
NOTE Before you can map CoS settings to DSCP values, you must first enable the CoS to
Queue option. See Configuring CoS Settings, page 115 for more information.
STEP 3 For each CoS priority level, enter the corresponding DSCP value (0–63).
To restore the default CoS to DSCP mappings, click Restore Default and, when
prompted, click OK. Then, click Save.
This chapter describes the administration features of the Cisco RV120W, including
creating users, configuring network management, diagnostics and logging, date
and time, and other settings. It contains the following sections:
STEP 3 In the Individual Rule Settings field, enter the rules you want the Cisco RV120W to
enforce for passwords:
• If you want the new password to be different than the old password, check
Enable.
• If you want to expire passwords, in the Password Aging field, check Enable
and enter the Password Aging Time, or the number of days for the
password to be active before it expires and the Cisco RV120W forces the
user to choose a new password.
NOTE Passwords cannot be the same as the username, which is “admin” by default.
STEP 2 In the LAN section, under HTTPS Web Access on LAN Interface, check Enable.
STEP 4 If you chose IP Address Range, enter the start and end of the IP address number
range. If you chose Single IP Address, enter the IP address.
STEP 5 Enter the port number if you want to restrict access to only come from a specified
port on the machine that is connecting remotely.
STEP 6 You can enable Simple Network Management Protocol (SNMP), which allows you
to monitor and manage your router from an SNMP manager. SNMP provides a
STEP 2 In the Administrator Inactivity Timeout field, enter the number, in minutes, before an
administrator login session times out due to inactivity.
Configuring SNMP
To configure SNMP:
STEP 1 In the SNMPv3 User Table, check the box for the user to edit and click Edit.
STEP 3 If you chose AuthNoPriv or AuthPriv, choose the type of authentication algorithm
(MD5 or SHA) and enter the authentication password.
STEP 3 Enter the SNMP trap port of the IP address to which the trap messages will be
sent.
STEP 5 Enter the community string to which the agent belongs. Most agents are
configured to listen for traps in the Public community.
STEP 2 Enter the IP Address of the specific SNMP manager or trap agent on which to
create an access rule.
STEP 3 Enter the subnet mask used to determine the list of allowed SNMP managers.
STEP 4 Enter the community string to which the agent belongs. Most agents are
configured to listen for traps in the Public community.
STEP 1 Choose Administration > Network Management > SNMP System Information.
• SysContact—Enter the name of the contact person for this router. Examples:
admin, John Doe.
STEP 2 Under WAN Traffic Meter, to enable the display of WAN traffic statistics, check
Enable.
• Download Only—Only display traffic coming to the Cisco RV120W from the
Internet.
STEP 4 If you want to limit traffic to or from the router, you can specify a size limit. When
that size limit is reached, traffic is prevented from entering or exiting the router.
Enter a number, in megabytes, in the Monthly Limit field.
STEP 5 To increase the monthly limit for that month, check Increase this Month’s Limit by:
and enter the additional megabytes for that month.
STEP 2 Under Traffic Counter, select Restart Now, or Specific Time, and enter the time you
want the traffic counter to restart.
STEP 3 (Optional) Check the box to send an email report containing the traffic meter
statistics before the counter is reset.
To configure what the Cisco RV120W does when the traffic limit is reached:
• Block All Traffic—All traffic to and from the Cisco RV120W is blocked.
• Block All Traffic Except E-Mail—Only email is allowed to and from the
Cisco RV120W.
To viewing traffic statistics, choose Administration > WAN Traffic Meter. Under
WAN (Internet) Traffic Statistics, information is displayed about WAN traffic to and
from the Cisco RV120W.
Using PING
PING can be used to test connectivity between this router and another device on
the network connected to this router. To use PING:
STEP 2 Under Ping or Trace an IP Address, enter an IP address or domain name and click
Ping. A popup window appears, indicating the ICMP echo request status.
STEP 3 (Optional) Check the box if you want to allow PING traffic to pass through VPN
tunnels.
Using Traceroute
Traceroute displays all the routers present between the destination IP address
and this router. Up to 30 “hops” (intermediate routers) between this router and the
destination will be displayed. To use traceroute:
STEP 2 Under Ping or Trace an IP Address, enter an IP address or domain name and click
Traceroute. A popup window appears with the hop information.
STEP 2 Enter the WAN (Internet) Name in the text box and click Lookup. If the host or
domain entry exists, you will see a response with the IP address. A message
stating “Unknown Host” indicates that the specified Internet Name does not exist.
STEP 3 Select the interface whose packets you want to trace and click Start. To stop the
packet capture, click Stop. You can click Download to save a copy of the packet
capture.
NOTE The packet trace is limited to 1MB of data per capture session. When the capture
file size exceeds 1MB, it will be deleted automatically and a new capture file will be
created.
Configuring Logging
NOTE Enabling logging options may generate a significant volume of log messages and
is recommended for debugging purposes only.
STEP 2 The Logging Policy Table shows the types of logging that are configured on the
system. To add a new type of logging, click Add.
STEP 5 In the table, select the type of logs to capture for each severity. For example, you
might want to log all types of events that have a severity level of “Emergency,” so
you would check System, Kernel, and Wireless under “Emergency.”
STEP 2 Under the type of routing logs, check the box to choose one or both of the
following for each type:
• Dropped Packets—Check this box to log packets that were blocked from
being transferred through the segment. This option is useful when the
Default Outbound Policy is “Allow” (see Configuring the Default Outbound
Policy, page 67). For example, if Dropped Packets is checked for LAN to
WAN and there is a firewall rule to block ssh traffic from LAN, then
whenever a LAN machine tries to make an ssh connection, those packets
STEP 3 Under the type of system logs, select the type of system events to be logged. The
following system events can be recorded:
• All Unicast Traffic—Check this box to log all unicast packets directed to the
router.
STEP 4 Under “other events logs,” select the type of event to be logged. The following
events can be recorded:
• Source MAC Filter—Check this box to log packets matched due to source
MAC filtering. Uncheck this box to disable source MAC filtering logs.
STEP 2 In the Remote Log Identifier field, enter a prefix to add to every logged message
for easier identification of the source of the message. The log identifier will be
added to both e-mail and Syslog messages.
STEP 2 Select the check box to enable e-mail logs. Then enter the following:
• Return E-mail Address—Enter the e-mail address where the replies from
the SMTP server are to be sent (required for failure messages).
• Send To E-mail Address(1)—Enter the e-mail address where the logs and
alerts are to be sent.
• Send To E-mail Address(2)—Enter the e-mail address where the logs and
alerts are to be sent.
• Send To E-mail Address(3)—Enter the e-mail address where the logs and
alerts are to be sent.
STEP 3 To confirm that the e-mail logs function is configured correctly, press Test.
• Unit—Select the period of time that you need to send the log: Hourly, Daily,
or Weekly. To disable sending of logs, select Never. This option is useful
when you do not want to receive logs by e-mail, but want to keep e-mail
options configured so that you can use the Send Log function from the
Status > View Logs pages.
• Day—If logs are to be sent on a weekly basis, choose the day of the week.
STEP 6 If you want the router to send logs to a Syslog server, check the box next to a
syslog server field and enter the IP address or Internet Name of the Syslog server
in the Syslog Server field. Choose the logging policy for each syslog server. You
can configure up to 8 syslog servers.
Configuring Bonjour
To configure Bonjour:
STEP 2 Check the Enable box to enable Bonjour on the router. Unchecking this will disable
Bonjour.
STEP 3 In the Bonjour Interface Control Table, you can see on which VLANs Bonjour is
enabled. For example, Bonjour is by default enabled on the default VLAN ID 1. That
means that the Cisco RV120W advertises itself to all devices connected to it on
VLAN 1, and devices joining the network can connect to the Cisco RV120W. If you
have other VLANs created on your network, you can enable Bonjour on those
VLANs too. (See Configuring Virtual LAN (VLAN) Membership, page 30 for
more information.)
STEP 3 In the Advertisement Period field, enter the number of seconds to specify how
often this router will broadcast its UPnP information to all devices within range.
STEP 4 In the Advertisement Time to Live field, enter the number of seconds for the
advertisement to be active.
In the UPnP Interface Control Table, you can see on which VLANs UPnP is enabled.
For example, UPnP is by default enabled on the default VLAN ID 1. That means that
the Cisco RV120W advertises itself to plug and play devices connected to it on
VLAN 1, and plug and play devices joining the network can connect to the Cisco
RV120W. If you have other VLANs created on your network, you can enable UPnP
on those VLANs too. (See Configuring Virtual LAN (VLAN) Membership,
page 30 for more information.)
The UPnP Portmap Table shows IP addresses and other settings of UPnP devices
that have accessed the Cisco RV120W:
• Protocol—The network protocol (i.e. TCP, UDP, etc) that the device is using
to connect to the Cisco RV120W.
• Internal Port—Indicates which, if any, internal ports are opened by the UPnP
device.
STEP 2 Select your time zone, relative to Greenwich Mean Time (GMT).
STEP 3 If supported for your region, check the Adjust for Daylight Savings Time box. In the
“From” and “To” fields, enter the month and day for which Daylight Saving Time will
be active. In the Daylight Saving Offset field, choose the amount of time, in
minutes, that the clock will be offset during daylight saving time.
STEP 4 Select whether to use a Network Time Protocol (NTP) server, or set the time and
date manually.
STEP 5 If you chose NTP, choose to use either a default NTP server, or a custom NTP
server.
STEP 6 If you chose to use a default NTP server, choose the server you want to use from
the list. If you chose to use a custom NTP server, enter the server addresses or
fully-qualified domain name.
STEP 7 If you chose to set the date and time manually, enter the date and time.
When the router is working as configured, you can back up the configuration for
restoring later. During backup, your settings are saved as a file on your PC. You can
restore the router's settings from this file.
• To restore your saved settings from a backup file, click Browse, locate and
select the file, and click Restore. An alert page displays the status of the
restore operation. After the restore, the router restarts automatically with
the restored settings.
The mirror image is the last working configuration. The startup configuration
is the configuration that the device used to boot up. The startup and mirror
configurations can differ. For example, if you made changes to the current
configuration but forgot to save it, after 24 hours, the device automatically
saves the currently-running configuration as the “mirror” image. But if the
device crashed during the 24 hour window, then the device will use the
startup configuration to boot up.
• To copy the mirror configuration file to the startup configuration file, click
Copy Mirror to Startup. This replaces the startup configuration file with the
mirror configuration file. You may want to do this if the device crashed and
you had to reset the device to factory defaults. After you perform the
factory reset, the mirror image is not erased, and you can copy it to the
startup configuration to allow the device to use the configuration to boot up.
!
CAUTION During a firmware upgrade, do not try to go online, turn off the device, shut down
the PC, or interrupt the process in any way until the operation is complete. This
process takes about a minute, including the reboot process. Interrupting the
upgrade process at specific points when the flash is being written to may corrupt
the flash memory and render the router unusable.
You can upgrade to a newer firmware version from the Administration > Firmware
Upgrade page. To upgrade:
STEP 1 Click Browse, locate and select the downloaded firmware, and click Upload.
STEP 2 (Optional) Check the box to reset all configuration and settings to the default
values. Do not check this box if you want to keep any settings you have changed
on the router!
STEP 3 Click Start Firmware Upgrade. After the new firmware image is validated, the new
image is written to flash, and the router is automatically rebooted with the new
firmware. Choose Status > System Summary to make sure the router installed the
new firmware version.
!
CAUTION During a restore operation, do not try to go online, turn off the router, shut down the
PC, or do anything else to the router until the operation is complete. This should
take about a minute. When the test light turns off, wait a few more seconds before
doing anything with the router.
STEP 4 To restore factory defaults to the router, choose Administration > Restore Factory
Defaults. Click Default.
!
CAUTION Do not perform this procedure unless you want to erase all configuration you have
performed on the router.
This chapter describes how to view real-time statistics and other information
about the Cisco RV120W.
STEP 2 To display an interactive view of the router’s back panel, click Show Panel View.
Device Information
Resource Utilization
Syslog Summary
• Emergency
• Alert
• Critical
• Error
• Warning
To manage logs, click manage logging. For more information see Configuring
Logging, page 126.
To view the LAN settings, click details. For more information see Viewing Port
Statistics, page 148.
To view the WAN settings, click details. For more information see Viewing Port
Statistics, page 148.
Wireless Networks
To view the router’s wireless settings, click details. For more information see
Viewing the Wireless Statistics, page 142.
STEP 3 If applicable, to change a system setting, click its corresponding Edit link.
System Information
Connection Time The time duration for which the connection is up.
Connection Type Shows weather the WAN IPv6 address is obtained
dynamically through a DHCP server, assigned
statically by the user, or obtained through a PPPoE/
PPTP/L2TP ISP connection.
Connection State Shows weather the WAN port is connected to the
ISP.
IP Address The IP address of the WAN port.
Gateway The gateway IP address of the WAN port.
DNS Server DNS server IP address of the WAN port.
Channel
STEP 3 In the Poll Interval field, enter the number of seconds the router waits before
updating the information on this page.
STEP 4 Click Start to restart automatic refresh at the specified poll interval.
STEP 3 In the Poll Interval field, enter the number of seconds the router waits before
updating the information on this page.
STEP 4 Click Start to restart automatic refresh at the specified poll interval.
Policy Name The name of the IKE or VPN policy associated with
this SA.
Endpoint Displays the IP address of the remote VPN
gateway or client.
Kbytes The data transmitted (in KB) over this SA.
Packets The number of IP packets transmitted over this SA.
State The current status of the SA for IKE policies. The
status can be IPsec SA Established or IPsec SA
Not Established.
Action Click Connect to establish an inactive SA
connection.
STEP 3 In the Poll Interval field, enter the number of seconds the router waits before
updating the information on this page.
STEP 4 Click Start to restart automatic refresh at the specified poll interval.
Viewing Logs
The View Logs page allows you to view the Cisco RV120W logs.
STEP 3 To specify the types of logs to display, choose an option from the Logging Policy
drop-down menu.
To email all log messages from the router, click Send Logs.
STEP 2 From the Filter drop-down menu, choose the interface type.
The Available LAN (Local Network) Hosts page displays the following fields:
The Port Triggering Status window provides information on the ports that have
been opened per the port triggering configuration rules. The ports are opened
dynamically whenever traffic that matches the port triggering rules flows through
them.
LAN (Local Network) Displays the LAN IP address of the device which
IP Address caused the ports to be opened.
Open Ports Displays the ports that have been opened so that
traffic from WAN destined to the LAN IP address
can flow through the router.
Time Remaining This field displays the time for which the port will
Seconds remain open when there is no activity on that port.
The time is reset when there is activity on the port.
Click Refresh to refresh the current page and obtain the latest statistics.
STEP 2 In the Poll Interval field, enter the auto-refresh time interval in seconds.
This page displays the latest port statistics based on the value you enter in the
Poll Interval field. For example, if you enter a poll interval value of 5, the router
refreshes the information on this page every 5 seconds.
This table displays the data transfer statistics for the Dedicated WAN, LAN, and
WLAN ports, including the duration for which they were enabled.
Proto The protocol (TCP, UDP, and raw) used by the port.
Recv-Q The number of bytes not copied by the program
connected to this port.
Send-Q The number of bytes not acknowledged by the
program connected to this port.
Local Address The address and port number of the local end of
this socket.
Foreign Address The address and port number of the remote end of
this socket.
State The state of the port.
PID/Program name The process ID (PID) and name of the program
using the port (for example, 1654/thttpd, where
1654 is the PID and thttpd is the program’s name).
Overview
This appendix explains how to install and use the Cisco QuickVPN software that
can be downloaded from www.cisco.com. QuickVPN works with computers
running Windows 7, 2000, XP, or Vista. (Computers using other operating systems
will have to use third-party VPN software.)
STEP 1 Enable remote management. See Configuring Remote Management, page 119.
STEP 2 Create Quick VPN user accounts. See Configuring VPN Users, page 105. After a
user account is created, the credentials can be used by the Quick VPN client.
STEP 1 Insert the Cisco RV120W CD-ROM into your CD-ROM drive. After the Setup
Wizard begins, click the Install QuickVPN link.
http://tools.cisco.com/support/downloads
STEP 2 Enter RV120W in the search box and find the QuickVPN software.
STEP 3 Save the zip file to your PC, and extract the .exe file.
STEP 4 Double-click the .exe file, and follow the on-screen instructions.
STEP 1 Double-click the Cisco QuickVPN software icon on your desktop or in the system
tray.
STEP 2 The QuickVPN Login window will appear. In the Profile Name field, enter a name
for your profile. In the User Name and Password fields, enter the User Name and
Password that were created in Configuring VPN Users, page 105. In the Server
Address field, enter the IP address or domain name of the Cisco RV120W. In the
Port For QuickVPN field, enter the port number that the QuickVPN client will use to
communicate with the remote VPN router, or keep the default setting, Auto.
To save this profile, click Save. (If there are multiple sites to which you will need to
create a tunnel, you can create multiple profiles, but note that only one tunnel can
be active at a time.) To delete this profile, click Delete. For information, click Help.
STEP 3 To begin your QuickVPN connection, click Connect. The connection’s progress is
displayed: Connecting, Provisioning, Activating Policy, and Verifying Network.
STEP 4 When your QuickVPN connection is established, the QuickVPN tray icon turns
green, and the QuickVPN Status window appears. The window displays the IP
address of the remote end of the VPN tunnel, the time and date the VPN tunnel
began, and the total length of time the VPN tunnel has been active.
STEP 6 If you clicked Change Password and have permission to change your own
password, you will see the Connect Virtual Private Connection window. Enter your
password in the Old Password field. Enter your new password in the New
Password field. Then enter the new password again in the Confirm New Password
field. Click OK to save your new password. Click Cancel to cancel your change.
For information, click Help.
NOTE You can change your password only if the Allow User to Change Password
box has been checked for that username. See Configuring VPN Users,
page 105.
Cisco provides a wide range of resources to help you obtain the full benefits of the
Cisco RV120W.
Product Resources
Support
Cisco Small Business www.cisco.com/go/smallbizsupport
Support Community
Cisco Small Business www.cisco.com/go/smallbizhelp
Support and Resources
Phone Support Contacts www.cisco.com/en/US/support/
tsd_cisco_small_business
_support_center_contacts.html
Cisco Small Business www.cisco.com/go/software
Firmware Downloads
Select a link to download firmware for Cisco Small
Business Products. No login is required.
Cisco Small Business Open www.cisco.com/go/smallbiz_opensource_request
Source Requests
Product Documentation
Cisco RV120W www.cisco.com/go/smallbizrouters
Cisco Small Business
Cisco Partner Central for www.cisco.com/web/partners/sell/smb
Small Business (Partner
Login Required)
Cisco Small Business www.cisco.com/smb
Home