Linksys QuickVPN - PC User Manual

Business series 10/100 8-port vpn router
Hide thumbs Also See for QuickVPN - PC:
Table of Contents

Advertisement

Quick Links

USER GUIDE
BUSINESS SERIES
10/100 8-Port
VPN Router
RV082
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Linksys QuickVPN - PC

  • Page 1 USER GUIDE BUSINESS SERIES 10/100 8-Port VPN Router RV082 Model:...
  • Page 2: Icon Descriptions

    About This Guide About This Guide Copyright and Trademarks Linksys, Cisco and the Cisco Logo Icon Descriptions registered trademarks trademarks of Cisco Systems, Inc. While reading through the User Guide you may see and/or its affiliates in the U.S. and various icons that call attention to specific items.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Introduction Introduction to the Router........1 Introduction to VPNs .
  • Page 4 Table of Contents One-to-One NAT ......... . .18 Setup >...
  • Page 5 Install the Client Certificate ........63 Use of the Linksys QuickVPN Software ....... .63 Linksys QuickVPN Connection .
  • Page 6 Table of Contents Configuration of PC 1 and PC 2 ........66 Configuration when the Remote Gateway Uses a Dynamic IP Address .
  • Page 7 Software in Linksys Products ........
  • Page 8: Chapter 1: Introduction

    VPN client software Introduction to the Router applications that support IPSec to be installed. Thank you for choosing the Linksys 10/100 8-Port VPN NOTE: The 10/100 8-Port VPN Router supports Router. The Router lets multiple computers in your office IPSec VPN client software, including the Linksys share an Internet connection.
  • Page 9: Computer (Using Vpn Client Software) To Vpn Router

    Off-Site Internet Notebook with VPN Client Software Central Office Router Computer to VPN Router For additional information and instructions about creating your own VPN, visit the Linksys website at www.linksys.com. 10/100 8-Port VPN Router...
  • Page 10: Chapter 2: Product Overview

    Chapter 2 Product Overview Chapter 2: Reset The Reset button can be used for a warm reset or a reset to factory defaults. Product Overview Warm Reset If the Router is having • problems connecting to the Internet, press and hold in the Reset button for a Front Panel second using the tip of a pen.
  • Page 11: Chapter 3: Installation

    The Router has four rubber feet on its bottom panel. Set true to scale. the Router on a flat surface near an electrical outlet. NOTE: Linksys is not responsible for damages WARNING: Do not place excessive weight incurred by insecure wall-mounting hardware.
  • Page 12: Rack-Mount Placement

    Chapter 3 Installation Place the wall-mount slots over the screws and slide Repeat step 2 to attach the other bracket to the the Router down until the screws fit snugly into the opposite side. wall-mount slots. After the brackets are attached to the Router, use suitable screws to securely attach the brackets to any Rack-Mount Placement standard 19-inch rack.
  • Page 13 Chapter 3 Installation Connect your cable or DSL modem’s Ethernet cable to the Router’s Internet port. If you are using the DMZ/Internet port, then connect an Ethernet cable to the DMZ/Internet port. Connect the other end to a network device, such as a modem or public server.
  • Page 14: Chapter 4: Advanced Configuration

    Chapter 4 Advanced Configuration Chapter 4: System Summary Advanced Configuration The first screen that appears is the System Summary screen, which displays the Router’s current status and settings. This information is read-only. Underlined text Overview is hyperlinked to related setup pages, so if you click a hyperlink, the related setup screen will appear.
  • Page 15: System Information

    Upgrade” for instructions. Go buy To purchase a license to use this service, click Go buy. You will be redirected to a list of Linksys resellers on the Linksys website. Then follow the on-screen instructions. Register If you already have a license, click Register. You will be redirected to the Trend Micro ProtectLink Gateway System Summary (ProtectLink™...
  • Page 16: Network Setting Status

    Chapter 4 Advanced Configuration DDNS It shows the DDNS settings of the Router’s WAN port(s) and hyperlinks to the Setup > DDNS screen. DMZ Host It shows the DMZ private IP address and hyperlinks to the Setup > DMZ Host screen. The default is Disabled.
  • Page 17: Setup > Network

    Chapter 4 Advanced Configuration be sent out, probably use incorrect settings, ” will be displayed. Setup > Network The Network screen shows all of the Router’s basic setup functions. The Router can be used in most network setups without changing any of the default values; however, you may need to enter additional information in order to connect to the Internet through an ISP (Internet Service Provider) or broadband (DSL or cable) carrier.
  • Page 18 Chapter 4 Advanced Configuration If you want to delete a subnet you have created, select it the Router. On the System Management > Dual-WAN screen, and click Delete selected subnet. Click Save Settings you can specify using one as a primary connection, with to save your changes, or click Cancel Changes to undo Smart Link Backup or using both connections in concert, them.
  • Page 19 Chapter 4 Advanced Configuration Static IP Specify WAN IP Address Enter the external IP address of the Router. Subnet Mask Enter the subnet mask of the Router. PPPoE Default Gateway Address Enter the IP address of the default gateway. User Name and Password Enter your account’s User DNS Server (Required) 1/2 Name and Password.
  • Page 20 Chapter 4 Advanced Configuration Click Save Settings to save your changes, or click Cancel Click Save Settings to save your changes, or click Cancel Changes to undo them. Changes to undo them. PPTP (Point-to-Point Tunneling Protocol) Transparent Bridge Point to Point Tunneling Protocol (PPTP) is a service used To connect two network segments, select Transparent Bridge.
  • Page 21: Setup > Password

    The Router’s default User Name and Password is admin, The Maximum Transmission Unit (MTU) setting and Linksys strongly recommends that you change the specifies the largest packet size permitted for network Router’s password from the default to a unique password.
  • Page 22: Setup > Time

    Chapter 4 Advanced Configuration Click Save Settings to save your change, or click Cancel Click Save Settings to save your changes, or click Cancel Changes to undo it. Changes to undo them. Setup > Time Setup > DMZ Host The Router uses the time settings to time stamp log events, The DMZ (Demilitarized Zone) Host feature allows one automatically apply the Access Rules and Content Filter, local user to be exposed to the Internet for use of a...
  • Page 23: Forwarding

    Chapter 4 Advanced Configuration Service Management Service Name Enter a name. Protocol Select the protocol it uses. Setup > Forwarding Port Range Enter its range. Forwarding Click Add to List. Click Save Settings to save your changes, or click Cancel Changes to undo them. Click Exit to return Port Range Forwarding to the Forwarding screen.
  • Page 24: Setup > Upnp

    Chapter 4 Advanced Configuration Incoming Port Range UPnP Enter the starting and ending port numbers of the incoming port range. UPnP Function Select Yes to enable the UPnP function. Click Add to List, and configure as many entries as you Otherwise, keep the default, No.
  • Page 25: Setup > One-To-One Nat

    Chapter 4 Advanced Configuration One-to-One NAT One-to-One NAT Select Enable to use the One-to-One NAT function. UPnP Forwarding Table List Add Range Click Refresh to update the on-screen information. Click Private Range Begin Enter the starting IP address of the Close to exit this screen and return to the UPnP screen.
  • Page 26: Mac Clone

    Chapter 4 Advanced Configuration MAC Clone DynDNS.org WAN1/2 If you have enabled the Dual WAN feature, then you will have two ports, WAN1 and WAN2, available for MAC address assignment or cloning. User Defined WAN MAC Address To manually clone a MAC address, select User Defined WAN MAC Address, and then enter the 12 digits of your adapter’s MAC address.
  • Page 27: Setup > Advanced Routing

    Chapter 4 Advanced Configuration Password 3322.org Enter your PeanutHull account information. Host Name Enter your host name in the three Host Name fields. For example, if your host name were myhouse. oray.net, then myhouse would go into the first field, oray would go into the second field, and net would go into the last field.
  • Page 28: Dhcp > Setup

    Chapter 4 Advanced Configuration Working Mode Select Gateway mode if the Router passes through before reaching its destination. A node is is hosting your network’s connection to the Internet. any device on the network, such as a computer or router. Select Router mode if the Router exists on a network Interface Select the appropriate interface.
  • Page 29: Setup

    Chapter 4 Advanced Configuration Setup Enable DHCP Server To use the Router as your network’s DHCP server, select Enable DHCP Server. If you already have a DHCP server on your network, remove the check mark. Then configure the Dynamic IP settings. Dynamic IP Client Lease Time The Client Lease Time is the amount...
  • Page 30: Dhcp > Status

    Chapter 4 Advanced Configuration To update the on-screen information, click Refresh. To exit NOTE: support NetBIOS DHCP this screen and return to the Setup screen, click Close. clients, the Router uses two methods. Static IP Address Enter the static IP address. You can First, when the DHCP clients receive dynamic enter 0.0.0.0 if you want the Router to assign a static IP IP addresses from the Router, it automatically...
  • Page 31: Status

    Chapter 4 Advanced Configuration Dual-WAN Smart Link Backup/Load Balance If you want to use one of the WAN ports as the primary port and the other WAN port as backup, then select Smart Link Backup. If you want the Router to automatically manage the Internet connection through both WAN ports, then select Load Balance.
  • Page 32 Chapter 4 Advanced Configuration Generate the Error Condition in the System Retry Count Enter the number of times the Router will • Failover will not occur; only an error condition try to reconnect if the connection fails. will be logged. Retry Timeout Enter the number of times the Router will Network Service Detection can test a WAN port’s network...
  • Page 33: System Management > Bandwidth Management

    Chapter 4 Advanced Configuration Service Name Enter a name. For IP Binding only, select All. Protocol Select the protocol it uses. Port Range Enter its range. Click Add to List. Click Save Settings to save your changes, or click Cancel Changes to undo them. Click Exit to return to the Dual-WAN screen.
  • Page 34 Chapter 4 Advanced Configuration Summary (Rate Control Selected) To change a rule, click Edit. To update the list, click Refresh. To return to the Bandwidth Management screen, click Close. On the Bandwidth Management screen, click Save Settings to save your changes, or click Cancel Changes to undo them.
  • Page 35: System Management > Snmp

    Chapter 4 Advanced Configuration To change a rule, click Edit. To update the list, click Refresh. To return to the Bandwidth Management screen, click Close. On the Bandwidth Management screen, click Save Settings to save your changes, or click Cancel Changes to undo them.
  • Page 36: System Management > Diagnostic

    The Internet has a service called the Domain Name Service (DNS), which allows users to enter an easily remembered host name, such as www.linksys.com, instead of numerical TCP/IP addresses to access Internet resources. The DNS Name Lookup tool will return the numerical TCP/IP address of a host name.
  • Page 37: Factory Default

    Factory Default Setting if you want to restore the Router to its factory default settings. After clicking the button, a If you need to restart the Router, Linksys recommends that confirmation screen appears. Click OK to continue. you use the Restart tool on this screen. When you restart from the Restart screen, then the Router will send out your log file before it is reset.
  • Page 38: Import Configuration File

    Chapter 4 Advanced Configuration System Management > Setting Backup Port Management > Port Setup Import Configuration File Basic Per Port Config. To import a configuration file, first specify where your The Basic Per Port Config. table displays the following: backup preferences file is located. Click Browse, and then Port ID The port number or name is displayed.
  • Page 39: Port Status

    Chapter 4 Advanced Configuration To update the on-screen information, click Refresh. Firewall > General Enable or disable a variety of firewall, security, and web features. Port Management > Port Status Port ID To see the status information and settings for a specific port, select its ID number or name.
  • Page 40: Firewall > Access Rules

    NOTE: If you disable the HTTPS feature, then you also disable the Linksys QuickVPN service The Router has the following default rules: on the Router. All traffic from the LAN to the WAN is allowed.
  • Page 41: Access Rules

    Chapter 4 Advanced Configuration Access Rules Add a New Access Rule Except for the default rules, all configured access rules are listed in the Access Rules table, and you can set the priority for each custom rule. If the Access Rules table has multiple pages, select a different page to view from the Jump to drop-down menu.
  • Page 42: Firewall > Content Filter

    Chapter 4 Advanced Configuration Firewall > Content Filter Settings to save your changes, or click Cancel Changes to undo them. Click Exit to return to the Add a New Access Rule screen. Use this screen to block specific domains during the designated days and times for specific devices.
  • Page 43: Protectlink

    Chapter 4 Advanced Configuration Click Save Settings to save your changes, or click Cancel For each VPN tunnel, the No., Name, Status, Phase 2 Enc/ Changes to undo them. Auth/Grp, Local Group, Remote Group, and Remote Gateway will be displayed. NOTE: The content filter rules will be For each group VPN, the Group Name, number of...
  • Page 44: Vpn > Gateway To Gateway

    Chapter 4 Advanced Configuration Name Remote Clients Status Click Detail List to display the It shows the Tunnel Name that you gave the VPN tunnel. Group Name, IP address and Connection Time of this group VPN. Click Refresh to update the on-screen information. Status This indicates the status of the VPN tunnel.
  • Page 45: Add A New Tunnel

    Chapter 4 Advanced Configuration IP Only The default is IP Only. Only the device with a specific IP address will be able to access the tunnel. Local Security Gateway Type > IP Only IP address The WAN (or Internet) IP address of the Router automatically appears.
  • Page 46 Chapter 4 Advanced Configuration Local Security Group Type > Subnet IP address Enter the IP address. The default is Local Security Gateway Type > Dynamic IP + Domain Name(FQDN) Authentication 192.168.1.0. Domain Name Enter the domain name for authentication. Subnet Mask Enter the subnet mask.
  • Page 47 Chapter 4 Advanced Configuration IP address Select this option if you know the static IP Dynamic IP + Domain Name(FQDN) Authentication address of the remote VPN device at the other end of the The Local Security Gateway will be a dynamic IP address, tunnel, and then enter the IP address.
  • Page 48: Ipsec Setup

    Chapter 4 Advanced Configuration Phase 1 Encryption Select a method of encryption: DES (56-bit), 3DES (168-bit), AES-128 (128-bit), AES-192 (192-bit), or AES-256 (256-bit). The method determines Remote Security Group Type > IP the length of the key used to encrypt or decrypt ESP IP address Enter the appropriate IP address.
  • Page 49 Chapter 4 Advanced Configuration Preshared Key This specifies the pre-shared key used Encryption Key is 48-bit, which requires 40 hexadecimal to authenticate the remote IKE peer. Enter a key of values. If you do not enter enough hexadecimal values, keyboard and hexadecimal characters, e.g., My_@123 then the rest of the Encryption Key will be automatically or 4d795f40313233.
  • Page 50: Vpn > Client To Gateway

    Chapter 4 Advanced Configuration VPN Tunnel Backup Idle Time want the Router to propose compression when it initiates a After the specified • connection. If the responders reject this proposal, then the length of idle time, the Router will check the VPN tunnel Router will not implement compression.
  • Page 51: Add A New Tunnel

    IPSec client software, including the Linksys QuickVPN software. To manage access for Linksys QuickVPN Local Security Gateway Type > IP Only clients, click the VPN Client Access tab. (For IP address The WAN (or Internet) IP address of the Router more information about QuickVPN, refer to automatically appears.
  • Page 52 Chapter 4 Advanced Configuration Local Security Group Type > Subnet IP address Enter the IP address. The default is Local Security Gateway Type > Dynamic IP + Domain Name(FQDN) Authentication 192.168.1.0. Subnet Mask Enter the subnet mask. The default is Domain Name Enter the domain name for authentication.
  • Page 53 Chapter 4 Advanced Configuration the remote computer requests to create a tunnel with the Router, the Router will work as a responder. Remote Client > IP + Domain Name(FQDN) Authentication IP address Select this option if you know the static IP Remote Client >...
  • Page 54: Ipsec Setup

    Chapter 4 Advanced Configuration (The Microsoft VPN client software does not support Aggressive mode and FQDN or User FQDN ID options.) Local Security Group Type > Subnet Remote Client > Microsoft XP/2000 VPN Client IP address Enter the IP address. The default is 192.168.1.0.
  • Page 55 Chapter 4 Advanced Configuration Perfect Forward Secrecy If the Perfect Forward Secrecy (PFS) feature is enabled, IKE Phase 2 negotiation will generate new key material for IP traffic encryption and authentication, so hackers using brute force to break encryption keys will not be able to obtain future IPSec keys.
  • Page 56: Vpn > Vpn Client Access

    Linksys QuickVPN clients. (The Router supports up to unchecked (Main Mode will be used). If network speed is 50 Linksys QuickVPN clients free of charge. If the Router preferred, select Aggressive Mode. If you select one of you have only supports up to ten clients, then upgrade the Dynamic IP types for the Remote Security Gateway its firmware.
  • Page 57: Vpn > Vpn Pass Through

    Chapter 4 Advanced Configuration Add the QuickVPN client to the list. month and day; HHMM stands for hours and minutes.) Follow the on-screen instructions to save the file in the VPN Client Users install directory of the QuickVPN client software. User Name Enter the user name.
  • Page 58: Vpn > Pptp Server

    Chapter 4 Advanced Configuration User Name Enter a name for the PPTP VPN client. L2TP Pass Through Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the New Password Enter a password for the PPTP VPN Internet on the Layer 2 level.
  • Page 59: System Log

    Chapter 4 Advanced Configuration so unless you change this setting, the Router will e-mail the log to you when there are more than 50 log entries. Log Time Threshold You can designate how often the log will be e-mailed to you. The default is 10 minutes, so unless you change this setting, the Router will e-mail the log to you every 10 minutes.
  • Page 60: Log > System Statistics

    Chapter 4 Advanced Configuration View System Log To view logs, click this option. The System Log screen appears. Incoming Log Table Time The time of each log event is displayed. You can sort each log by time sequence. Event-Type The type of log event is displayed. System Log Message The message associated with each log event is...
  • Page 61: Basic Setup

    Chapter 4 Advanced Configuration connection(s). Run the Access Rule Setup Wizard to set up Your Internet Service Provider (ISP) may require you the security policy for the Router. to use a host and domain name for your Internet connection. If your ISP requires them, complete the Host Name and Domain Name fields;...
  • Page 62 Chapter 4 Advanced Configuration Depending on which connection type you have Static IP selected, the appropriate screen will appear. Follow Complete the Static IP, Subnet Mask, and Default the instructions for the appropriate connection type: Gateway fields with the settings provided by your ISP. Obtain an IP automatically Click Next to continue.
  • Page 63 Chapter 4 Advanced Configuration PPPoE Complete the User Name and Password fields with the information provided by your ISP. Click Next to continue. Click Previous if you want to return to the previous screen. Click Exit if you want to exit the Setup Wizard.
  • Page 64: Access Rule Setup

    Chapter 4 Advanced Configuration Save Settings. Allow or Deny If you want to save your changes, click From the drop-down menu, select Click Previous if you want to return to the previous depending on the intent of the Access Rule. screen.
  • Page 65 Chapter 4 Advanced Configuration LAN, WAN1, WAN2, or Select the Source Interface: Select the Destination IP address(es) for this Access Any from the Interface pull-down menu. Rule. If it can be any IP address, select Any. If it is one IP address, select Single and enter the IP address.
  • Page 66: Support

    Adobe Reader. screen. Click Exit if you want to exit the Setup Wizard. Linksys Web Site Click Linksys Web Site, and the Support page of the Linksys website appears. Logout The Logout tab is located on the upper right-hand corner of the screen.
  • Page 67: Appendix A: Troubleshooting

    If the Diag LED continues to flash, the firmware image is damaged. Use the TFTP utility to upgrade the firmware. You can download the TFTP utility at www.linksys.com. Your computer cannot connect to the Internet. Follow these instructions until your computer can connect to the Internet: Make sure that the Router is powered on.
  • Page 68: Appendix B: Linksys Quickvpn For Windows 2000, Xp, Or Vista

    Add the QuickVPN client to the list. The 10/100 8-Port VPN Router (model number: RV082) The second section explains how to install and use Linksys supports IPSec VPN client software, including the Linksys QuickVPN, which works on computers running Windows QuickVPN software (also known as the Linksys VPN 2000, XP, or Vista.
  • Page 69: Add Vpn Client Users

    Appendix B Linksys QuickVPN for Windows 2000, XP, or Vista VPN tab. In the Router’s web-based utility, click the For the Change Password Allowed setting, select Yes to allow the user to change his or her password. Click the VPN Client Access tab.
  • Page 70: Download From The Internet

    Linksys QuickVPN Utility in the More Information Click client software. section. Select the version number of the Router. Proceed to the section, “Use of the Linksys QuickVPN Software”. Save the zip file to your computer, and extract the .exe file. Use of the Linksys QuickVPN Software Double-click the .exe file.
  • Page 71: Version Number Of Linksys Quickvpn

    Appendix B Linksys QuickVPN for Windows 2000, XP, or Vista Password To terminate the VPN tunnel, click Disconnect. To Enter the Password assigned to you. • change your password, click Change Password. For Server Address Enter the IP address or domain name •...
  • Page 72: Appendix C: Gateway-To-Gateway Vpn Tunnel

    Appendix C Gateway-to-Gateway VPN Tunnel Appendix C: Configuration of the RVL200 Gateway-to-Gateway VPN Follow these instructions for the first VPN Router, designated RVL200. The other VPN Router is designated Tunnel the RV082. Launch the web browser for a networked computer, designated PC 1.
  • Page 73: Configuration Of The Rv082

    Appendix C Gateway-to-Gateway VPN Tunnel IP Only. In the Preshared Key field, enter a string for this key, for For the Remote Security Gateway Type, select example, 13572468. Enter the RVL200’s WAN IP address in the IP Address field. For the Remote Security Group Type, select Subnet.
  • Page 74: Configuration When The Remote Gateway Uses A Dynamic Ip Address

    Appendix C Gateway-to-Gateway VPN Tunnel Configuration when the Remote Gateway Uses a Dynamic IP Address This example assumes the Remote Gateway is using a dynamic IP address. If the Remote Gateway uses a static IP address, refer to “Configuration when the Remote Gateway Uses a Static IP Address.
  • Page 75: Configuration Of Pc 1 And Pc 2

    Appendix C Gateway-to-Gateway VPN Tunnel Configuration when Both Gateways Use Enable. Select For the Local Security Gateway Type, select IP Only. Dynamic IP Addresses The WAN IP address (B.B.B.B) of the RV082 will be automatically detected. This example assumes both Gateways are using dynamic IP addresses.
  • Page 76: Configuration Of The Rv082

    Appendix C Gateway-to-Gateway VPN Tunnel Enable. Select For the Local Security Gateway Type, select IP Only. The WAN IP address (B.B.B.B) of the RV082 will be automatically detected. For the Local Security Group Type, select Subnet. Enter the RV082’s local network settings in the IP Address and Subnet Mask fields.
  • Page 77: Appendix D: Ipsec Nat Traversal

    Appendix D IPSec NAT Traversal Appendix D: Configuration of Scenario 1 IPSec NAT Traversal In this scenario, Router A is the RVL200 Initiator, while Router B is the RVL200 Responder. Overview Network Address Translation (NAT) traversal is a technique developed so that data protected by IPSec can pass through a NAT.
  • Page 78: Configuration Of Router B

    Appendix D IPSec NAT Traversal IP Only. For the Local Security Group Type, select Subnet. Enter For the Local Security Gateway Type, select The WAN IP address of Router A will be automatically Router B’s local network settings in the IP Address and detected.
  • Page 79: Configuration Of Scenario 2

    Appendix D IPSec NAT Traversal Configuration of the One-to-One NAT Rules Configuration of Scenario 2 The one-to-one NAT rules must be configured on In this scenario, Router B is the RVL200 Initiator, while NAT 2 - RV082 and NAT 1 - RV082. Router A is the RVL200 Responder.
  • Page 80: Configuration Of Router B

    Appendix D IPSec NAT Traversal One-to-One NAT tab. Subnet. Click the For the Remote Security Group Type, select Enter Router A’s local network settings in the IP Address For the One-to-One NAT setting, select Enable. and Subnet Mask fields. In the Private Range Begin field, enter 111.11.
  • Page 81 Appendix D IPSec NAT Traversal Subnet. For the Remote Security Group Type, select Enter Router B’s local network settings in the IP Address and Subnet Mask fields. In the IPSec Setup section, select the appropriate encryption, authentication, and other key management settings.
  • Page 82: Appendix E: Bandwidth Management

    Appendix E Bandwidth Management Appendix E: Bandwidth Management Overview This appendix explains how to ensure Quality of Service (QoS) on Vonage Voice over Internet Protocol (VoIP) phone service. This example uses Vonage; however, similar instructions will apply to other VoIP services. Creation of New Services Create services,...
  • Page 83: Creation Of New Bandwidth Management Rules

    Appendix E Bandwidth Management Creation of New Bandwidth Management Enable to enable this rule. Select After you have set up the rule, click Add to list. Rules Set up a rule for Vonage 2. Select Vonage 2 from the Create four new rules: Vonage VoIP (Upstream), Vonage Service drop-down menu.
  • Page 84: Appendix F: Firmware Upgrade

    IP address, 192.168.1.1, in the Address field. System Management > Firmware Upgrade Press the Enter key. The Support page of the Linksys website appears. Follow the on-screen instructions to access the Downloads page for the 10/100 8-Port VPN Router (model number: RV082).
  • Page 85 Appendix F Firmware Upgrade The utility zip file will automatically open. Extract .exe file to an appropriate location on your computer. .exe file. Double-click the In the Router IP field, enter the IP address of the Router. Firmware Upgrade Utility Login In the Password field, enter the password for access to the Router.
  • Page 86: Appendix G: Trend Micro Protectlink Gateway Service

    Go buy To purchase a license to use this service, click Go buy. You will be redirected to a list of Linksys resellers on the Linksys website. Then follow the on-screen instructions. Register If you already have a license, click Register. You will be redirected to the Trend Micro ProtectLink Gateway website.
  • Page 87: Protectlink

    I want to buy Trend Micro ProtectLink Gateway. purchase a license to use this service, click this link. You will be redirected to a list of Linksys resellers on the Linksys website. Then follow the on-screen instructions. I have purchased ProtectLink Gateway and want to register it.
  • Page 88: Protectlink > Web Protection

    Appendix G Trend Micro ProtectLink Gateway Service ProtectLink > Web Protection Business Hours To filter this URL category during the business hours you have specified, select this option. The Web Protection features are provided by the Router. Leisure Hours To filter this URL category during Configure the website filtering settings on this screen.
  • Page 89: Protectlink > Email Protection

    If you do not Status The status of your license, Activated or Expired, is know this information, contact your ISP. displayed. https://us.imhs.trendmicro.com/linksys Platform The platform type, Gateway Service, is e-mail protection, click this link. You will be redirected to automatically displayed.
  • Page 90 Appendix G Trend Micro ProtectLink Gateway Service Renew To renew your license, click Renew. Then follow the on-screen instructions. Add Seats Each seat allows an e-mail account to use Email Protection. To add seats to your license, click Add Seats. Then follow the on-screen instructions. 10/100 8-Port VPN Router...
  • Page 91: Appendix H: Specifications

    Java, Cookies, ActiveX, HTTP Proxy Status Monitor URL Filtering Static List by Domain or Keywords Environmental (included), Dynamic Filtering through Linksys/Trend Micro Dimensions 11.00" x 1.75" x 9.50" ProtectLink Gateway Services W x H x D (279.4 x 44.45 x 241.3 mm)
  • Page 92: Appendix I: Warranty Information

    CONDITIONS, REPRESENTATIONS AND WARRANTIES, and the web pages referred to herein may be updated by INCLUDING, BUT NOT LIMITED TO, ANY IMPLIED Linksys from time to time; the version in effect at the date WARRANTY OF NON-INFRINGEMENT, ARE DISCLAIMED. of purchase shall apply.
  • Page 93: Technical Support

    RMA number and dated proof of original purchase will be rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge.
  • Page 94: Appendix J: Software License Agreement

    Schedules 2, 3 or 4 below as applicable. “Software” includes, and this Agreement will apply to (a) BY DOWNLOADING OR INSTALLING THE SOFTWARE, the software of Linksys or its suppliers provided in or with OR USING THE PRODUCT CONTAINING THE SOFTWARE, the applicable Linksys product, excluding technology...
  • Page 95: End Of Schedule 1

    GPL or other open source code in this Software on a If this Linksys product contains open source software CD, Linksys will mail to You a CD with such code for $9.99 licensed under Version 2 of the “GNU General Public plus the cost of shipping, upon request.
  • Page 96 Appendix J Software License Agreement Copyright (C) 1989, 1991 Free Software Foundation, Inc. To prevent this, we have made it clear that any patent must be licensed for everyone’s free use or not licensed at all. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, The precise terms and conditions for copying, distribution and modification follow.
  • Page 97 Appendix J Software License Agreement If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
  • Page 98: End Of Schedule 2

    Each version is given a distinguishing version number. If this Linksys product contains open source software If the Program specifies a version number of this licensed under Version 2.1 of the “GNU Lesser General Public License which applies to it and “any later version”, you...
  • Page 99: Gnu Lesser General Public License

    Appendix J Software License Agreement will apply to that open source software. The license terms recompiling it. And you must show them these terms so below in this Schedule 3 are from the public web site at they know their rights. http:// .gnu.org/licenses/old-licenses/lgpl-2.1.html We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license,...
  • Page 100 Appendix J Software License Agreement In other cases, permission to use a particular library in non- work based on the Library (independent of the use free programs enables a greater number of people to use of the Library in a tool for writing it). Whether that is a large body of free software.
  • Page 101 Appendix J Software License Agreement sections as part of a whole which is a work based on However, linking a “work that uses the Library” with the Library, the distribution of the whole must be on the Library creates an executable that is a derivative the terms of this License, whose permissions for other of the Library (because it contains portions of the licensees extend to the entire whole, and thus to each...
  • Page 102 Appendix J Software License Agreement Library will not necessarily be able to recompile the Give prominent notice with the combined library of application to use the modified definitions.) the fact that part of it is a work based on the Library, and explaining where to find the accompanying Use a suitable shared library mechanism for linking uncombined form of the same work.
  • Page 103: End Of Schedule 3

    Schedule 4 Each version is given a distinguishing version number. If this Linksys product contains open source software If the Library specifies a version number of this License licensed under the OpenSSL license: which applies to it and “any later version”, you have the...
  • Page 104: Openssl License

    Appendix J Software License Agreement OpenSSL License Original SSLeay License Copyright (c) 1998-2007 The OpenSSL Project. All rights Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) reserved. All rights reserved. Redistribution and use in source and binary forms, with This package is an SSL implementation written by Eric or without modification, are permitted provided that the Young (eay@cryptsoft.com).
  • Page 105: End Of Schedule 4

    Appendix J Software License Agreement PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  • Page 106: Appendix K: Regulatory Information

    Appendix K Regulatory Information Appendix K: Battery Recycling Statement Regulatory Information This product may contain a battery. Recycle or dispose of batteries in accordance with the battery manufacturer’s instructions and local/national disposal and recycling FCC Statement regulations. This product has been tested and complies with the 廢電池請回收...
  • Page 107: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    úřady. Správná likvidace a recyklace pomáhá předcházet Linksys products. Consumers are required to comply with potenciálním negativním dopadům na životní prostředí a lidské this notice for all electronic products bearing the following zdraví.
  • Page 108 Appendix K Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 109 Appendix K Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 110 ľudí. Ak máte záujem o podrobnejšie WEB: For additional information, please visit informácie o likvidácii starého zariadenia, obráťte sa, prosím, na www.linksys.com miestne orgány, organizácie zaoberajúce sa likvidáciou odpadov alebo obchod, v ktorom ste si produkt zakúpili. 10/100 8-Port VPN Router...
  • Page 111: Appendix L: Contact Information

    Appendix L Contact Information Appendix L: Contact Information Linksys Contact Information Website http://www.linksys.com Support Site http://www.linksys.com/support FTP Site ftp.linksys.com Advice Line 800-546-5797 (LINKSYS) Support 800-326-7114 RMA (Return Merchandise http://www.linksys.com/warranty Authorization) NOTE: Details on warranty and RMA issues can be found in the Warranty section of this Guide.

This manual is also suitable for:

Rv082

Table of Contents