Rv32x Administration Guide
Rv32x Administration Guide
Admin
Bab 1: Pendahuluan 5
Using the Getting Started Window 5
Features of the User Interface 6
Chapter 4: Setup 15
Setup Network 15
IP Mode 15
WAN Setting 16
USB1 or USB2 Port Settings 25
Password 28
Time 30
DMZ Host 30
(Port) Forwarding 31
Port Address Translation 33
Adding or Editing a Service Name 34
Setting Up One-to-One NAT 35
MAC Address Cloning 36
Dynamic DNS 36
Advanced Routing 37
Configuring Dynamic Routing 38
Configuring Static Routing 39
Inbound Load Balance 40
USB Device Update 41
41
Chapter 5: DHCP 43
DHCP Setup 44
DHCP Status 46
Option 82 47
IP and MAC Binding 47
DNS Local Database 49
Router Advertisement (IPv6) 50
Chapter 8: Firewall 72
General 72
Session Timeout 74
Access Rules 74
Content Filter 76
Chapter 9: VPN 78
Summary 78
Gateway to Gateway 80
Add a New Tunnel 81
Local Group Setup 81
Advanced Settings for IKE with Preshared Key and IKE with Certificate 85
Client to Gateway 88
Advanced Settings for IKE 93
FlexVPN (Spoke) 95
VPN Passthrough 99
PPTP Server 99
Thank you for choosing the Cisco RV32x router. This chapter includes information
to help you get started using your device.
STEP 3 In the address bar, enter the default IP address of the device, 192.168.1.1. The
browser might issue a warning that the web site is untrusted. Continue to the web
site.
STEP 4 When the login page appears, enter the default user name cisco and the default
password cisco (lowercase).
STEP 5 Click Login. The System Summary page appears. Check the Port Activity to see
if a WAN connection is enabled. If not, continue to the next step.
STEP 6 To use the setup wizard to configure your Internet connection, click Setup Wizard
on the System Summary page. Or click Wizard in the navigation tree and in the
Basic Setup section, click Launch Now. Follow the on-screen instructions.
If your web browser displays a warning message about the pop-up window, allow
the blocked content.
STEP 7 To configure other settings, use the links in the navigation tree.
Troubleshooting Tips
If you have trouble connecting to the Internet or the web-based web interface:
• Check the local area network connection settings for your Ethernet adapter.
The PC should obtain an IP address through DHCP. Alternatively, the PC can
have a static IP address in the 192.168.1.x range with the default gateway
set to 192.168.1.1 (the default IP address of the device).
• Verify that you entered the correct settings in the Wizard to set up your
Internet connection.
• Reset the modem and the device by powering off both devices. Next,
power on the modem and let it sit idle for about 2 minutes. Then power on
the device. You should now receive a WAN IP address.
• If you have a DSL modem, ask your ISP to put the DSL modem into bridge
mode.
Navigation
The major modules of the web interface are represented by buttons in the left
navigation pane. Click a button to view more options. Click an option to open a
page.
Pop-Up Windows
Some links and buttons launch pop-up windows that display more information or
related configuration pages. If your web browser displays a warning message
about the pop-up window, allow the blocked content.
Help
To view information about the selected configuration page, click Help near the top
right corner of the web interface. If your web browser displays a warning
message about the pop-up window, allow the blocked content.
To exit the web interface, click Logout near the top right corner of the web
interface. The Login page appears.
The Setup wizard guides you through the process of configuring the device. The
Access Rule wizard guides you through the process of configuring the network
security policy.
Basic Setup
Basic Setup
Use the Basic Setup Wizard to change the number of WAN ports or to configure
the Internet connection.
Click Launch Now to run the Basic Setup Wizard. Follow the on-screen
instructions to proceed. Refer to the information from your ISP to enter the
required settings for your connection.
Use the Access Rule Setup Wizard to create firewall access rules. Click Launch
Now to run the Access Rule Setup Wizard. The wizard provides information about
the default rules for this device. Follow the on-screen instructions to proceed.
The System Summary displays information about the current status of the device
connections, status, settings, and logs.
System Information
System information descriptions:
Configuration (Wizard)
To access the Internet connection setup wizard and be prompted through the
process, click Setup Wizard to launch the Setup Wizard.
Port Activity
Port Activity identifies the port interfaces and indicates the status of each port:
WAN Information
• Block WAN Request—Makes it difficult for outside users to work their way
into your network by hiding the network ports from Internet devices and
preventing the network from being pinged or detected by other Internet
users. The status is On (green) or Off (red). Block WAN Request
To display detailed information about the security feature, click the label for the
feature.
The Setup page displays the configuration settings on the router. Use the Setup >
Network page to set up your LAN, WAN (Internet), DMZ, and so forth.
Setup Network
To open the Network page, click Setup > Network.
Some ISPs require that you assign a hostname and domain name to identify your
device. Default values are provided, but they can be changed as needed:
IP Mode
In the IP Mode table, choose the type of addressing to use on the networks:
STEP 1 Click the IPv4 tab to display the Multiple Subnet table.
STEP 2 To add a subnetwork, click Add. IP Address and Subnet Mask fields display in the
columns. After you click Save, you can edit the subnetwork to be part of a VLAN,
manage IP addresses through the DHCP server, or set TFTP server parameters.
STEP 4 Click Save to save your changes or click Cancel to undo them.
To edit a subnetwork, select the IPv4 subnetwork to be modified and click Edit.
The DHCP Setup section describes the process for modifying the subnetwork
parameters.
If you enabled Dual-Stack IP for the IP Mode, you can configure the IPv6 prefix.
To configure the IPv6 prefix, click the IPv6 tab, select the IPv6 prefix, and click
Edit. The default IP address is fc00::1, and the default prefix length is 7. The IPv6
tab is available only if Dual-Stack IP is enabled in the IP Mode table. The DHCP
Setup window appears.
WAN Setting
The WAN Setting table displays the interface, such as USB1, WAN1, or WAN2, and
connection type. The settings for the interfaces can be modified.
NOTE If you are running IPv6, select the IPv6 tab before selecting the WAN interface to
configure. Otherwise, the IPv6 parameters are not displayed in the WAN
Connections Settings window.
Obtain an IP Automatically
Choose this option if your ISP dynamically assigns an IP address to the device.
(Most cable modem subscribers use this connection type.) The ISP assigns the
device IP address for this port, including the DNS server IP addresses.
To specify a DNS server, check Use the Following DNS Server Addresses and
enter the IP address of DNS Server 1. Optionally, you can enter a second DNS
server. The first available DNS server is used. If the box is not checked, does the
device rely on DHCP for the DNS addresses?
To set the maximum transmission unit (MTU) size automatically, select Auto.
Otherwise, to set the MTU size manually, select Manual and enter the MTU size.
(The size in bytes of the largest protocol data unit that the layer can pass.)
To configure the IPv6 parameters, check Enable. The DHCPv6 client process and
requests for prefix delegation through the selected interface are enabled. Use this
option when your ISP is capable of sending LAN prefixes by using DHCPv6. If your
ISP does not support this option, manually configure a LAN prefix:
NOTE When DHCP-PD is enabled, manual LAN IPv6 addressing is disabled. When DHCP-
PD is disabled, manual LAN IPv6 addressing is enabled.
• LAN IPv6 Address—Global IPv6 prefix that was assigned by your ISP for
your LAN devices, if applicable. (Check with your ISP for more information.)
Static IP
Choose this option if your ISP assigned a permanent IP address to your account.
Enter the settings provided by your ISP:
To specify a DNS server, enter the IP address of DNS Server 1. Optionally, you can
enter a second DNS server. The first available DNS server is used.
To set the maximum transmission unit (MTU) size automatically, select Auto.
Otherwise, to set the MTU size manually, select Manual and enter the MTU size.
(The size in bytes of the largest protocol data unit that the layer can pass.)
• LAN IPv6 Address—Global IPv6 prefix that was assigned by your ISP for
your LAN devices, if applicable. (Check with your ISP for more information.)
Choose this option if your ISP uses PPPoE (Point-to-Point Protocol over Ethernet)
to establish Internet connections (typical for DSL lines). Then enter the settings
provided by your ISP:
• DNS Server 1 and DNS Server 2—IP address of the DNS servers.
Optionally, you can enter a second DNS server. The first available DNS
server is used.
• MTU—Maximum transmission unit (MTU) size. Select Auto to set the size
automatically. Otherwise, to set the MTU size manually, select Manual and
enter the MTU size. (The size in bytes of the largest protocol data unit that
the layer can pass.)
To configure the IPv6 parameters, check Enable. The DHCPv6 client process and
requests for prefix delegation through the selected interface are enabled. Use this
option when your ISP is capable of sending LAN prefixes by using DHCPv6. If your
ISP does not support this option, manually configure a LAN prefix:
NOTE When DHCP-PD is enabled, manual LAN IPv6 addressing is disabled. When DHCP-
PD is disabled, manual LAN IPv6 addressing is enabled.
• LAN IPv6 Address—Global IPv6 prefix that was assigned by your ISP for
your LAN devices, if applicable. (Check with your ISP for more information.)
PPTP (IPv4)
Choose this option if required by your ISP. Point-to-Point Tunneling Protocol (PPTP)
is a service used in Europe and Israel.
• MTU—Maximum transmission unit (MTU) size. Select Auto to set the size
automatically. Otherwise, to set the MTU size manually, select Manual and
enter the MTU size. (The size in bytes of the largest protocol data unit that
the layer can pass.)
Choose this option if you are using this router to connect two network segments.
Only one WAN interface can be set as transparent bridge.
• DNS Server 1 and DNS Server 2—IP addresses of the DNS servers.
Optionally, you can enter a second DNS server. The first available DNS
server is used.
• MTU—Maximum transmission unit (MTU) size. Select Auto to set the size
automatically. Otherwise, to set the MTU size manually, select Manual and
enter the MTU size. (The size in bytes of the largest protocol data unit that
the layer can pass.)
Choose this option if your ISP uses IPv6 Router Solicitations and Router
Advertisements, hosts on the network learn which network they are connected to,
and once they do, they can automatically configure a host ID on that network.
To specify a DNS server, enter the IP address of DNS Server 1. Optionally, you can
enter a second DNS server. The first available DNS server is used.
To set the maximum transmission unit (MTU) size automatically, select Auto.
Otherwise, to set the MTU size manually, select Manual and enter the MTU size.
(The size in bytes of the largest protocol data unit that the layer can pass.)
• LAN IPv6 Address—Global IPv6 prefix that was assigned by your ISP for
your LAN devices, if applicable. (Check with your ISP for more information.)
Choose this option if your ISP uses IPv6 in IPv4 Tunnel to establish Internet
connections.
You must enter an IPv4 Static IP address. Then enter the settings provided by
your ISP:
• DNS Server 1 and DNS Server 2—IP addresses of the DNS servers.
Optionally, you can enter a second DNS server. The first available DNS
server is used.
Choose this option to establish an auto-tunnel in an IPv4 network (or real IPv4
Internet connection) across two independent IPv6 networks. Enter the following
parameters:
Relay IPv4 Address—Allows a 6to4 host to communicate with the native IPv6
Internet. It must have a IPv6 default gateway set to a 6to4 address that contains
the IPv4 address of a 6to4 relay router. To avoid the need for users to set this up
manually, the anycast address of 192.88.99.1 has been allocated for sending
packets to a 6to4 relay router.
• DNS Server 1 and DNS Server 2—IP addresses of the DNS servers.
Optionally, you can enter a second DNS server. The first available DNS
server is used.
• LAN IPv6 Address—Global IPv6 prefix that was assigned by your ISP for
your LAN devices, if applicable. (Check with your ISP for more information.)
Choose this option if your ISP uses 6rd Tunnel (IPv6 Rapid Deployment) to
establish Internet connections. Enter the settings provided by your ISP.
- Manual—Manually set 6rd Prefix, Relay IPv4 Address, and IPv4 Mask
Length as provided by your ISP.
- Auto (DHCP)—Use DHCP (option 212) to obtain 6rd Prefix, Relay IPv4
Address, and IPv4 Mask Length.
• IPv4 Mask Length—6rd IPv4 subnet mask length for your ISP account.
(Usually this value is 0.)
• DNS Server 1 and DNS Server 2—IP addresses of the DNS servers.
Optionally, you can enter a second DNS server. The first available DNS
server is used.
• LAN IPv6 Address—Global IPv6 prefix that was assigned by your ISP for
your LAN devices, if applicable. (Check with your ISP for more information.)
3G/4G Connection
To establish a 3G or 4G connection, enter the following:
• Pin Code and Confirm Pin Code—PIN code associated with your SIM
card. This field is only displayed for GSM SIM cards.
• MTU—Maximum transmission unit (MTU) size. Select Auto to set the size
automatically. Otherwise, to set the MTU size manually, select Manual and
enter the MTU size. (The size in bytes of the largest protocol data unit that
the layer can pass.)
STEP 1 To display the Failover & Recovery window, click Setup > Network.
STEP 2 Select a USB port and click Edit. The Network window appears.
STEP 3 Click the USB Failover tab, and enter the following:
STEP 4 To prevent data overages, select a Charge Count. Traffic (KB) tracks data volume
in kilobytes sent or received over the USB link. Time (min) counts the minutes 3G/
4G connection is active.
• Restart count—Check and enter the day of the month to enable the
counters to be reset on that day. If the value is greater than the number of
days in the month (for example, a value of 31 in a 30-day month), the counters
are restarted on the last day of the month.
• Self-test daily—Check and enter the time-of-day (24-hour clock) to test the
connection. A self-test is considered successful if the device can get an IP
address from the service provider. Failures are sent to the log.
• Log self-test—Check to log all self-test activity. (All test results are sent to
the log.)
DMZ Enable
To configure DMZ:
STEP 1 Choose Setup > Network and check Enable DMZ. A message appears.
STEP 3 Select the DMZ interface in the DMZ Settings table and click Edit. The Edit DMZ
Connection window appears.
STEP 4 Select Subnet to identify a subnetwork for DMZ services and enter the DMZ IP
Address and Subnet Mask. Or select Range to reserve a group of IP addresses
on the same subnetwork for DMZ services and enter the IP address range.
Password
The username and password allow administrative access to the device. The
default username is cisco. The default password is cisco. The username and
password can be changed. We strongly recommend changing the default
password to a strong password.
!
CAUTION The password cannot be recovered if it is lost or forgotten. If the password is lost
or forgotten, the device must be reset to the factory default settings, removing all
configuration changes. If you are accessing the device remotely and reset the
device to factory defaults, you cannot log into the device until you have established
a local, wired link on the same subnetwork.
After changing the username or password, you are logged out. Log into the device
with your new credentials.
STEP 2 In the Username field, enter the new username. To keep the current username,
leave this field blank.
STEP 3 In the Old Password field, enter the current password. This is required if you are
changing the username, but keeping the current password.
STEP 4 In the New Password field, enter the new password for the device. Use a
combination of alphanumeric characters and symbols. The password must not
include spaces. Enter the new password again, in the Confirm New Password
field. Ensure that both passwords match.
• Uppercase letters
• Lowercase letters
• Numbers
The new password must be Check Enable if the new password must
different than the current one be different from the current password.
Password aging enforcement Enter the number of days after which the
password expires (1–365). By default,
aging time is 180 days.
STEP 3 In the Session Timeout field, enter the number of minutes after which the session
must expire. Save your changes.
Time
Time is critical to a network device, so it correctly timestamps the system log and
error messages, and synchronizes data transfer with other network devices.
You can configure the time zone, whether or not to adjust for daylight savings time,
and with which Network Time Protocol (NTP) server to synchronize the date and
time. The router then gets its date and time information from the NTP server.
• Set Date and Time—Auto enables the NTP server. If you chose Auto, enter
the fully qualified NTP Server name or IP address. Manual enables setting
the date and time locally, and uses the device clock to maintain the time. If
you chose Manual, enter the Date and Time.
DMZ Host
DMZ Host allows one host in the LAN to be exposed to the Internet to use services
such as Internet gaming and video conferencing. Access to the DMZ Host from the
Internet can be restricted by using firewall access rules.
To open the DMZ Host page, click Setup > DMZ Host.
To configure a DMZ host, enter a DMZ Private IP Address and click Save.
When users make requests for services on your network, the device forwards
those requests to your servers based on the port forwarding parameters. Any
services not specified are denied access. For example, when port number 80
(HTTP) is forwarded to the IP address 192.168.1.2, all HTTP requests on the
interface are forwarded to 192.168.1.2. All other traffic is denied, unless
specifically allowed by another entry.
Use this function to establish a web server or FTP server. Make sure that you enter
a valid IP address. (To run an Internet server, it might be necessary to use a static
IP address.) For added security, outside users are able to communicate with the
server, but they are not allowed to connect to network devices.
STEP 1 To add a service, click Add in the Port Range Forwarding table.
• Select a Service from the drop-down menu. (If a service is not listed, you can
modify the list by following the instructions in the Adding or Editing a
Service Name section.)
• Select the Status. Check the box to enable the service. Uncheck the box to
disable the service.
STEP 1 Click Service Management. If the web browser displays a warning about the
pop-up window, allow the blocked content.
The fields are open for modification. If the web browser displays a warning about
the pop-up window, allow the blocked content.
Port triggering allows the device to monitor outgoing data for specific port
numbers. The IP address of the client that sent the matching data is remembered
by the device. When the requested data returns through the device, the data is
transmitted to the proper client by using IP addressing and port mapping rules.
STEP 2 To add an application name, click Add in the Port Range Forwarding table.
If the web browser displays a warning about the pop-up window, allow the
blocked content.
• Trigger Port Range—Starting and ending port numbers of the trigger port
range. Refer to the documentation for the application for additional
information.
To delete an entry from a table, click the entry or entries that you want to delete
and click Delete.
PAT is similar to port forwarding except that an incoming packet with destination
port (external port) is translated to a packet different destination port (an internal
port). The Internet Service Provider (ISP) assigns a single IP address to the edge
device. When a computer logs on to the Internet, this device assigns the client a
port number that is appended to the internal IP address, giving the computer a
unique IP address.
If another computer logs on the Internet, this device assigns it the same public IP
address, but a different port number. Although both computers are sharing the
same public IP address, this device knows which computer to send its packets,
because the device uses the port numbers to assign the packets the unique
internal IP address of the computers.
STEP 1 To add a service, click Add in the Port Address Translation table.
To edit a service, select the row and click Edit. The fields are open for
modification.
If the web browser displays a warning about the pop-up window, allow the
blocked content.
STEP 2 Select the Service from the drop-down menu. You can have up to 30 services. (If a
service is not listed, you can modify the list by following the instructions in the
Adding or Editing a Service Name section.)
STEP 3 Enter the IP address or the name of the network device where the service resides.
STEP 1 Click Service Management. If the web browser displays a warning about the
pop-up window, allow the blocked content.
To edit a service, select the row and click Edit. The fields are open for
modification.
If the web browser displays a warning about the pop-up window, allow the
blocked content.
For best results, reserve IP addresses for the internal resources that you want to
reach through one-to-one NAT.
To open this page, select Setup > One-to-One NAT in the navigation pane.
To add an entry to the list, click Add and enter the following information:
To modify an entry, check the entry that you want to modify and click Edit. The
information appears in the text fields. Make the changes and click Save.
NOTE When MAC Address Clone is enabled, port mirroring does not work.
To open this page, select Setup > MAC Address Clone in the navigation pane.
STEP 2 Click Edit to display the Edit MAC Address Clone page.
• User Defined WAN MAC Address—Click the radio button and enter the 12
digits of the MAC address that you registered with your ISP.
• MAC Address from this PC—Click to use the MAC address of your
computer as the clone MAC address for the device.
Dynamic DNS
Dynamic Domain Name System (DDNS) service assigns a fixed domain name to a
dynamic WAN IP address, so you can host your own web, FTP, or another type of
TCP/IP server on your LAN. Select this feature to configure the WAN interfaces
with your DDNS information.
Before configuring Dynamic DNS on the router, we recommend that you visit
www.dyndns.org and register a domain name. (The service is provided by
DynDNS.org). For users in China, visit www.3322.org to register.
To open this page, select Setup > Dynamic DNS in the navigation pane.
The Edit Dynamic DNS Setup page appears after you select an interface and click
Edit.
• Host Name—Hostname that you registered with your DDNS provider. For
example, if your hostname is myhouse.dyndns.org, then enter myhouse in
the first field, dyndns in the second field, and org in the last field.
• Update Period—Input the value of hours when dynamic DNS setup updates.
It is 360 hours by default.
Advanced Routing
This feature enables dynamic routing and adds static routes to the routing table for
IPv4 and IPv6.
To view the routing table, click View Routing Table. Click Refresh to update the
data. Click Close to close the pop-up window.
STEP 2 Enable RIP to allow this device to exchange its routing information automatically
with other routers, and to dynamically adjust its routing tables as network changes
occur. The default setting is Disabled. If you enable this feature, also configure the
following settings:
• Receive RIP versions—Select the RIP protocol for receiving network data:
None, RIPv1, RIPv2, or Both RIP v1 and v2.
The IPv6 tab is available if you enabled Dual-Stack IP on the Setup > Network
page.
To configure a static route, click Add or select an entry and click Edit:
To delete an entry from the list, click the entry that you want to delete, and then
click Delete.
To view current data, click View Routing Table. The Routing Table Entry List
appears. You can click Refresh to update the data, or click Close to close the
pop-up window.
STEP 4 Enter the hostname that provides services, such as the mail server or FTP server
in the Host (Record) Name field and select the WAN IP interface to where inbound
traffic is distributed.
STEP 5 Enter the Alias that assigns several names to one computer host that might
provide several services and the Target, an existing A Record domain name.
STEP 6 Click SPF Settings to add SPF text. SPF (Sender Policy Framework) is an email
validation system that prevents email spam by detecting email spoofing (a
common vulnerability) by verifying sender IP addresses. (Configuring this field is
not required. More information can be found at
http://www.openspf.org/Tools#wizard?mydomain=&x=35&y=6.)
• Weight—Order of the mail hosts. The lower number has the highest priority.
To upgrade a USB device attached to a USB port, browse the file to be uploaded
from a PC to the USB device and click Update.
The DHCP server and DHCP client must be connected to the same network link. In
larger networks, each network link contains one or more DHCP relay agents.
These DHCP relay agents receive messages from DHCP clients and forward them
to DHCP servers. DHCP servers send responses back to the relay agent, and the
relay agent then sends these responses to the DHCP client on the local network
link.
DHCP servers typically grant IP addresses to clients for a limited interval called a
lease. DHCP clients are responsible for renewing their IP address before that
interval has expired, and must stop using the address once the interval has
expired, if they have not been able to renew it.
DHCP is used for IPv4 and IPv6. While both versions serve the same purpose, the
details of the protocol for IPv4 and IPv6 are sufficiently different that they should
be considered separate protocols.
DHCP Option 150 is Cisco proprietary. The IEEE standard that similar to this
requirement is Option 66. Like Option 150, Option 66 is used to specify the Name
of the TFTP server. Option 67 provides the boot file name.
Option 82 (DHCP relay agent information option) enables a DHCP relay agent to
include information about itself when forwarding client-originated DHCP packets
to a DHCP server. The DHCP server can use this information to implement IP
addressing or other parameter-assignment policies.
To set up DHCP IPv4, click the IPv4 tab. To set up DHCP IPv6, click the IPv6 tab.
STEP 2 If you choose Option 82, add circuit IDs by using DHCP > Option 82. Those circuit
IDs are then listed in the Circuit ID drop-down menu.
If you choose VLAN, select the VLAN from the VLAN ID menu and enter:
• Range Start and Range End—Starting and ending IP addresses that create
a range of IP addresses that can be assigned dynamically. The range can be
up to the maximum number of IP addresses that the server can assign
without overlapping features such as PPTP and SSL VPN . Do not include this
device LAN IP address in this dynamic IP range. For example, if the router
uses the default LAN IP address, 192.168.1.1, the starting value must be
192.168.1.2 or greater.
DHCP Status
DHCP Status displays the status of the DHCP server and its clients.
To view DHCP status and clients, click the IPv4 tab or the IPv6 tab. For IPv4, select
VLAN or Option 82. For IPv6, select the Prefix.
To release an IPv4 client IP address, select the Client Host Name and click Delete.
Option 82
Option 82 (DHCP relay agent information option) enables a DHCP relay agent to
include information about itself when forwarding client-originated DHCP packets
to a DHCP server. The DHCP server can use this information to implement IP
addressing or other parameter-assignment policies.
To open this page, select DHCP > Option 82 in the navigation tree.
To add a Circuit ID, click Add. A new row is added to the table. Select the Type
from the drop-down list and enter a Circuit ID, Bitmask and Description.
To edit a Circuit ID, select the row and click Edit. The row is opened for
modification.
To open this page, select DHCP > IP & MAC Binding in the navigation tree.
STEP 1 Click Show Unknown MAC Addresses. The IP & MAC Binding Table appears. If
the web browser displays a message about the pop-up window, allow the
blocked content.
The devices are listed by the IP address and the MAC address. If needed, click
Refresh to update the data.
STEP 3 Check the Enable box. Alternatively, select all devices in the list by clicking the
check box at the top of the Enable column.
STEP 4 Click Save to add the devices to the Static IP list, or click Close to close the pop-
up window without adding the selected devices.
To add a new binding to the list, click Add and enter the following information:
• Static IPv4 Address—Static IPv4 address. You can enter 0.0.0.0 if you
want the router to assign a static IP address to this device.
To Edit the settings, select an entry in the list and click Edit. The information
appears in the text fields. Make the changes, and click Save.
To Delete an entry from the list, select the entry to delete, and click Delete. To
select a block of entries, click the first entry, hold down the Shift key, and click the
final entry in the block. To select individual entries, press the Ctrl key while
clicking each entry. To de-select an entry, press the Ctrl key while clicking the
entry.
To block access by devices that are not on the list or do not have the correct IP
address:
• Block MAC address on the list with wrong IP address—Check this box to
prevent a device from accessing your network if its IP address has been
changed. For example, if you assigned a static IP address of 192.168.1.100
and someone configures the device to use 192.168.149, the device is not
allowed to connect to your network. This discourages users from changing
their device IP addresses without your permission. Uncheck the box to
allow access regardless of the current IP address assignment.
• Block MAC address not on the list—Check this box to block access from
devices that are not included in the Static IP list. This prevents unknown
devices from accessing your network. Uncheck the box to allow access by
any device that is configured with an IP address in the correct range.
If you enable this feature, you also must configure the client devices to use the
device as the DNS server. By default, Windows computers are set to obtain a DNS
server address automatically from the default gateway.
To add a new entry, click Add and enter the following information:
To Edit the settings, select an entry in the list. The information appears in the text
fields. Make the changes, and click Save.
To Delete an entry from the list, select the entry to delete, and click Delete. To
select a block of entries, click the first entry, hold down the Shift key, and click the
final entry in the block. To select individual entries, press the Ctrl key while
clicking each entry. To de-select an entry, press the Ctrl key while clicking the
entry.
This page is available if you enabled Dual-Stack IP on the Setup Network page. If
you did not do so, a message appears when you try to open this page.
To open this page, select DHCP > Router Advertisement in the navigation tree.
To Enable Router Advertisement, check the box and complete the other fields:
• MTU—Size of the largest packet that can be sent over the network. The
MTU (Maximum Transmission Unit) is used in Router Advertisement
messages to ensure that all nodes on the network use the same MTU value
when the LAN MTU is not well-known. The default setting is1500 bytes,
which is the standard value for Ethernet networks. For PPPoE connections,
the standard is 1492 bytes. Unless your ISP requires a different setting, this
setting should not be changed.
To add a new subnet, click Add and enter an IPv6 Address, Prefix Length, and
Lifetime.
To configure the WAN ports, select System Management > Dual WAN in the
navigation tree.
To configure load balancing choose one of the following modes to manage your
WAN connections:
To configure Interface Settings, select the WAN Interface and click Edit. The
settings window for the interface appears. Enter the following parameters:
Enter the maximum bandwidth settings as specified by your ISP. If the bandwidth
exceeds the specified number, the router uses another WAN interface for the next
connection.
Optionally, check the box to allow the device to detect network connectivity by
pinging specified devices and enter the settings as described here:
• Default Gateway, ISP Host, Remote Host, and DNS Lookup Host—
Select the device that you want to ping to determine network connectivity.
For an ISP host or a remote host, enter the IP address. For a DNS Lookup
host, enter a host name or domain name. Uncheck a box if you do not want
to ping this device for network service detection.
Protocol Binding
Protocol Binding requires this interface to be used for specified protocols, source,
and destination addresses. It allows an administrator to bind specific outbound
traffic to a WAN interface. This is commonly used when the two WAN interfaces
have different characteristics, or where certain traffic from LAN to WAN must go
through the same WAN interface.
To add or edit table entries, click Add or Edit and enter the following:
To Edit the settings, select an entry in the list. The information appears in the text
fields. Make the changes, and click Save.
To Delete an entry from the list, select the entry to delete, and click Delete. To
select a block of entries, click the first entry, hold down the Shift key, and click the
final entry in the block. To select individual entries, press the Ctrl key while
clicking each entry. To de-select an entry, press the Ctrl key while clicking the
entry.
To add a new entry to the Service list or to change an entry, click Service
Management. You can have up to 30 services in the list. If the web browser
displays a warning about the pop-up window, allow the blocked content.
To add a service to the list, click Add and enter the following information:
To Edit the settings, select an entry in the list and click Edit. The information
appears in the text fields. Make the changes, and click Save.
To Delete an entry from the list, select the entry to delete, and click Delete. To
select a block of entries, click the first entry, hold down the Shift key, and click the
final entry in the block. To select individual entries, press the Ctrl key while
clicking each entry. To de-select an entry, press the Ctrl key while clicking the
entry.
Bandwidth Management
Bandwidth Management adjusts the bandwidth settings for upstream and
downstream traffic and configures Quality of Service (QoS) settings for various
types of traffic, such as voice services.
NOTE If you do not add any rule of QoS, then the total WAN bandwidth is not limited to the
configured Maximum bandwidth value.
Rate Control
To add an interface that is subject to bandwidth management, click Add and enter
the settings:
Configure Priority
To add an interface that is subject to bandwidth management, click Add and enter
the settings:
• Priority—Choose the priority for this service: High or Low. Default priority
level is Medium, which is implied and not shown in the web interface.
To Edit the settings, select an entry in the list and click Edit. The information
appears in the text fields. Make the changes, and click Save.
To Delete an entry from the list, select the entry to delete, and click Delete. To
select a block of entries, click the first entry, hold down the Shift key, and click the
final entry in the block. To select individual entries, press the Ctrl key while
clicking each entry. To de-select an entry, press the Ctrl key while clicking the
entry.
SNMP
Simple Network Management Protocol (SNMP) allows network administrators to
manage, monitor, and receive notifications of critical events as they occur on the
network. The device supports SNMP v1/v2c and SNMP v3. The device supports
standard Management Information Bases (MIBs) such as MIBII, as well as private
MIBs.
The device acts as an SNMP agent that replies to SNMP commands from SNMP
Network Management Systems. The commands it supports are the standard
SNMP commands get/next/set. It also generates trap messages to notify the
SNMP manager when alarm conditions occur. Examples include reboots, power
cycles, and WAN link events.
To open this page, select System Management > SNMP in the navigation tree.
Configuring SNMP
In the SNMP Global Settings, configure the following:
• Enable SNMPv3—Enables SNMPv3. (Check the box and click Save before
creating SNMP groups and users.) Follow the instructions in Configuring
SNMPv3.
- SNMPv3 Trap Receiver User—Username for the server where you are
running your SNMP management software.
Configuring SNMPv3
You can create SNMPv3 groups to manage SNMP MIB access and identify the
users that have access to each group.
STEP 1 Click Add or select a group and click Edit in the Group Table.
STEP 3 Select the Security Level from the drop-down menu. Selecting Authentication or
Privacy forces users to authenticate by using passwords. When No
Authentication, No Privacy is selected, none of the users in this group are
required to set an authentication password or a privacy password. The default is
No Authentication, No Privacy. Authentication and Privacy passwords require at
least 8 characters.
STEP 1 Click Add or select a user and click Edit in the User Table.
STEP 4 Select the Authentication Method and enter the Authentication Password.
STEP 5 Select the Privacy Method and enter the Privacy Password.
SMTP
Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail
(email) transmission. To configure the SMTP, please provide the SMTP settings
that will be used to send the Log or OpenVPN config file.
To configure SMTP, select System Management > SMTP, enter the following
settings and click Save.
Password—email password.
Discovery-Bonjour
Bonjour is a service discovery protocol that locates network devices such as
computers and servers on your LAN. When this feature is enabled, the device
periodically multicasts Bonjour service records to the LAN to advertise its
existence.
NOTE For discovery of Cisco Small Business products, Cisco provides a utility that works
through a simple toolbar on the web browser called FindIt. This utility discovers
Cisco devices in the network and display basic information, such as serial numbers
and IP addresses. For more information and to download the utility, visit
www.cisco.com/go/findit.
To enable Bonjour for a VLAN, check the box in the Enable Bonjour column. It is
enabled by default.
LLDP Properties
Link Layer Discovery Protocol (LLDP) is a vendor-neutral protocol in the Internet
Protocol Suite used by network devices for advertising their identity, capabilities,
and neighbors on an IEEE 802 local area network, principally wired Ethernet. LLDP
information is sent by devices from each of their interfaces at a fixed interval, in the
form of an Ethernet frame. Each frame contains one LLDP Data Unit (LLDPDU). Each
LLDPDU is a sequence of type-length-value (TLV) structures.
To enable LLDP Properties, check the Enable box. (It is enabled by default.)
Diagnostics
The Diagnostic page accesses two built-in tools, DNS Name Lookup and Ping. If
you suspect a problem with connectivity, you can use these tools to investigate
the cause.
To use DNS to learn an IP address, choose DNS Lookup, enter the Lookup
Domain Name, such as www.cisco.com, and click Go. The IP address is
displayed.
Factory Default
To open this page, select System Management > Factory Default.
To reboot the device and return all parameters to factory default values, click
Factory Default.
To restore the device to factory default, including the default certificates, click
Factory Default Including Certificates.
Firmware Upgrade
This feature downloads the firmware for your device from a PC or a USB Flash
drive and installs it. The window displays the Firmware Version currently running
on the device.
NOTE If you choose an earlier version of the firmware, the device might reset to factory
default values. We recommend that you backup your configuration by using the
Backup and Restore procedure before updating the firmware.
Do not turn off the power, press the reset button, close the browser, or disconnect
the link during this process.
To upload firmware from a PC, select Firmware Upgrade from PC and browse the
file.
To upload firmware from a USB Flash drive, select Firmware Upgrade from USB
and select the file.
For firmware versions after 1.0.2.03, use the Language Selection page to choose a
language.
• On the Login page, choose a language from the Language drop-down list.
• On all configuration pages, choose a language from the drop-down list at the
top right-hand corner.
For firmware versions 1.0.2.03 or earlier, use the Language Setup page to choose a
new language by uploading a language pack to your device.
STEP 4 Browse the Language File Name, to upload the new language file.
STEP 6 After the language pack is uploaded, choose a language from the drop-down list
at the top right-hand corner on the Language Setup or other configuration pages.
Restart
When you restart from the Restart page, the router sends out your log file (if
logging is enabled) before the device is reset. The device parameters are
retained.
To open this page, select System Management > Restart in the navigation tree.
If the Startup configuration file is corrupted or fails for any reason, the mirror
configuration file is used. The router automatically copies the startup configuration
to the mirror configuration after 24 hours of running in stable condition (no reboots
and no configuration changes within the 24-hour period).
STEP 1 In the Restore Startup Configuration File section, select Restore Startup
Configuration File from PC and click Browse. Or select Restore Startup
Configuration File from USB and click Refresh.
STEP 3 Click Restore. This process might take up to a minute. If the configuration file
contains a different password than the current device management password, you
are asked to enter this password before the configuration file is restored.
Alternatively, press the Reset button on the device for one second and then
release it to restart the router.
To save your startup and mirror configuration files to your computer or a USB Flash
drive:
STEP 2 Click Backup Startup Configuration or Backup Mirror Configuration. The File
Download window appears.
STEP 3 Click Save and choose a file location. Optionally, enter a filename and click Save.
TIP The default filenames are Startup.config and Mirror.config. The .config extension is
required. For easier identification, it might be helpful to enter a filename that
includes the current date and time.
You can manually copy the device startup configuration file to the mirror
configuration file.
You can use this process to back up a known good configuration before you make
changes to the startup configuration:
• When you save changes to the device parameters, the time counter resets
and the next automatic copy occurs 24 hours later, unless you manually
force the startup file to be saved as the mirror file.
To copy the startup file to the mirror file, click Copy Mirror to Startup. The copy
operation is performed immediately, with no option to cancel. When the operation
is finished, the page refreshes.
Sanitizing the configuration deletes the mirror file and the startup configuration file.
To delete the mirror file and the startup configuration file, click Sanitize
Configuration.
!
CAUTION The mirror configuration is deleted immediately, with no option to cancel the
operation. The device is reset to use default settings, and is restarted.
To back up the firmware to a Flash drive on the USB port, select the port from the
drop-down menu and click Backup. The device saves the firmware image as
image.bin.
Use Port Management to enable port mirroring, configure the port settings, and
view the status and traffic statistics of the port. Also, you can configure the VLAN,
802.1x, map the DSCP to a queue, and map the CoS to the DSCP.
Port Setup
You can enable or disable port mirroring, manage LAN/WAN port settings -
including administratively shutting down the port; and enable or disable the EEE,
port priority and port negotiation mode.
To enable port mirroring, select Port Management > Port Setup and check
Mirror All WAN and LAN Traffic to Port 1. All incoming and outgoing packets on
WAN and LAN ports are copied to LAN1.
NOTE When MAC address Cloning is enabled, the port mirroring will not capture WAN
traffic.
• Disable—Check this box to disable a port. By default, all ports are enabled.
Port Status
Port status displays a summary of the port states. Click Refresh to update the
data.
To view the Port Status, select Port Management > Port Status.
• Type—Port type.
Traffic Statistics
The Traffic Statistics allows you to track data traffic for the various devices
connected to your Local Area Network (LAN). To view this page, select Port
Management > Traffic Statistics in the navigation tree.
For the selected port, the Statistics table displays the following:
VLAN Membership
All LAN ports are on VLAN 1 by default. To view this page, select Port
Management > VLAN Membership.
• For RV320, LAN 1 through LAN 4—A port can be tagged, untagged, or
excluded from the VLAN.
• For RV325, LAN 1 through LAN 14—A port can be tagged, untagged, or
excluded from the VLAN.
To configure the service queues, select the Queue priority (4 is the highest and 1 is
the lowest) from the drop-down menu.
To set the Differential Services Code Point (DSCP), select the Queue from the
drop-down menus.
To configure the service queues, click Edit and set the Cos/802.1p and enter the
status and priority.
802.1X Configuration
Port-based network access control uses the physical access characteristics of
IEEE 802 LAN infrastructures to provide a means of authenticating and authorizing
devices attached to a LAN port that has point-to-point connection characteristics,
and of preventing access to that port in cases which the authentication and
authorization fails. A port in this context is a single point of attachment to the LAN
infrastructure.
To view this page, select Port Management > 802.1X Configuration. To configure
port-based authentication:
STEP 5 Select the Administration State in the Port table from the drop-down menu:
The primary objective of a firewall is to control the incoming and outgoing network
traffic by analyzing the data packets and determining whether it should be
allowed through or not, based on a predetermined rule set. A network firewall
builds a bridge between an internal network that is assumed to be secure and
trusted and another network, usually an external (inter)network such as the
Internet that is assumed not to be secure and untrusted.
General
General firewall controls manage the features typically used by Internet browsers
and applications.
To open this page, select Firewall > General in the navigation tree.
To enable the Firewall, check Enable. The following firewall features can be
enabled or disabled as needed:
To allow only the selected features (Java, Cookies, ActiveX, or Access to HTTP
Proxy Servers) and restrict all others, enable Exception.
To add trusted domains, click Add and enter the Domain Name.
To edit a trusted domain, click Edit and modify the Domain Name.
To open this page, select Firewall > Session Timeout in the navigation tree.
TCP timeout—Input the timeout value of TCP sessions.The default for TCP
timeout is 1800 seconds.
UDP timeout—Input the timeout value of UDP sessions. The default for UDP
timeout is 30 seconds.
Access Rules
Access rules limit access to the subnetwork by allowing or denying access by
specific services or devices identified by their IP address.
To open this page, select Firewall > Access Rules in the navigation tree.
STEP 2 Click Add (or select the row and click Edit).
STEP 3 Select the Action, Allow or Deny, for this rule from the drop-down menu.
STEP 7 Select the Source IP address from the drop-down menu. If you selected Single,
enter the source IP address. If you selected Range, enter the range of source IP
addresses.
STEP 8 Select the Destination IP address from the drop-down menu. If you selected
Single, enter the destination IP address. If you selected Range, enter the range of
destination IP addresses.
STEP 9 Configure the Scheduling for this access rule by selecting the time. Select
Always for the access rule to be in effect 24 hours a day. Select Interval to set a
time, and enter the hours and minutes that the access rule is effective in the From
and To fields. For example, 07:00 to 20:00. The access rule does not allow
setting two time intervals.
STEP 2 Click Add (or select the row and click Edit).
STEP 3 Select the Action, Allow or Deny, for this rule from the drop-down menu.
STEP 7 Select the Source IP Prefix Length from the drop-down menu. If you selected
Single, enter the source IP prefix. If you selected Range, enter the starting IP prefix
and the prefix length.
STEP 8 Select the Destination Prefix Length from the drop-down menu. If you selected
Single, enter the destination IP prefix. If you selected Range, enter the starting IP
prefix and the prefix length.
STEP 2 Check Block Forbidden Domains to block certain web pages or check Accept
Allowed Domains to accept certain web pages.
STEP 3 In the Forbidden Domains section, check Enable to enable the forbidden domains.
STEP 4 In the Forbidden Domain Table, click Add to add the domain name and enter the
name of the domain. Click Edit or Delete to modify an existing domain in the
Forbidden Domain Table.
STEP 5 In the Website Blocking by Keywords section, check Enable to enable the website
blocking.
STEP 6 In the Website Blocking by Keywords table, click Add and enter the keywords to
be blocked.
STEP 7 To specify when the content filtering rules are active, configure the scheduling by
selecting the time from the drop-down list.You can customize the From and To
fields as well as select the day for the content filter to take into effect.
Summary
This feature displays general information about the VPN tunnel settings. The
device supports up to 100 tunnels. The Virtual IP Range is reserved for EasyVPN
users or VPN clients that connect to this device with the Mode Configuration
option (described in Advanced Settings for IKE) enabled.
To open this page, select VPN > Summary in the navigation tree.
To set a range of virtual IP addresses to be used for VPN tunnels, click Edit and
enter the following parameters:
• Domain Name 1 through 4—If this router has a static IP address and a
registered domain name, such as MyServer.MyDomain.com, enter the
Domain Name to use for authentication. A domain name can be used only
for one tunnel connection.
The VPN Tunnel Status displays the number of Tunnels Used, Tunnels Available,
Tunnels Enabled, and Tunnels Defined.
Connection Table
The Connection Table displays the entries created in VPN > Gateway to Gateway
and VPN > Client to Gateway. To add a new entry click Add.
The Connection Table displays entries created in VPN >FlexVPN (Spoke). To add
a new tunnel click Add.
The Connection Table displays the entries created in VPN > Client to Gateway. To
add a new entry click Add.
Gateway to Gateway
In a site-to-site or gateway-to-gateway VPN, the local router at one office connects
to a remote router through a VPN tunnel. Client devices can access network
resources as if they were all at the same site. This model can be used for multiple
users at a remote office.
To open this page, select VPN > Gateway to Gateway in the navigation tree.
The two ends of the tunnel cannot be on the same subnet. For example, if the
Site A LAN uses the 192.168.1.x/24 subnet, Site B can use 192.168.2.x/24.
• Tunnel Name—Name for this VPN tunnel, such as Los Angeles Office,
Chicago Branch, or New York Division. This description is for your reference.
It does not have to match the name used at the other end of the tunnel.
NOTE All the options are documented, but only those options that relate to the selected
parameter display.
- IP—Specify one device that can use this tunnel. Enter the IP Address of
the device.
- Subnet—Allow all devices on a subnet to use the VPN tunnel. Enter the
subnetwork IP Address and Subnet Mask.
Enter the settings for the Remote Group Setup for this router:
- IP Address—Specify one device that can use this tunnel. Enter the IP
Address of the device.
- Subnet—Allow all devices on a subnet to use the VPN tunnel. Enter the
subnetwork IP Address and Subnet Mask.
IPSec Setup
For encryption to be successful, the two ends of a VPN tunnel must agree on the
methods of encryption, decryption, and authentication. Enter exactly the same
settings on both routers.
Enter the settings for Phase 1 and Phase 2. Phase 1 establishes the preshared
keys to create a secure authenticated communication channel. In Phase 2, the IKE
peers use the secure channel to negotiate Security Associations on behalf of
other services such as IPSec. Be sure to enter the same settings when configuring
other router for this tunnel.
TIP Enter a complex preshared key that includes more than eight characters,
upper- and lowercase letters, numbers, and symbols such as -*^+=.
Advanced Settings for IKE with Preshared Key and IKE with
Certificate
For most users, the basic settings should suffice; advanced users can click
Advanced to display the advanced settings. If you change the Advanced settings
on one router, also enter the settings on the other router.
- VPN Tunnel Backup Idle Time—When the router boots up and the
primary tunnel is not connected within the specified period, the backup
tunnel is used. The default idle time is 30 seconds.
• Split DNS—Sends some of the DNS requests to one DNS server and other
DNS requests to another DNS server, based on specified domain names.
When the router receives an address resolution request from client, it
inspects the domain name. If it matches one of the domain names in the
Split DNS settings, it passes the request to the specified DNS server.
Otherwise, the request is passed to the DNS server that is specified in the
WAN interface settings.
DNS Server 1 and DNS Server 2—IP address of the DNS server to use for
the specified domains. Optionally, specify a secondary DNS server in the
DNS Server 2 field.
Domain Name 1 through Domain Name 4—Specify the domain names for
the DNS servers. Requests for these domains are passed to the specified
DNS server(s).
To open this page, select VPN > Client to Gateway in the navigation tree.
Configure a VPN tunnel for one remote user, a group VPN for multiple remote
users, or Easy VPN:
• Easy VPN—Allows remote users to connect this device by using Cisco VPN
Client (also known as Cisco Easy VPN Client) utility (available on https://
software.cisco.com/download/
navigator.html?mdfid=270636499&flowid=4466, VPN Client v5.x or VPN
Client v4.x:
To set it up Easy VPN, configure a group password on this page, and add a
username and password for each Cisco VPN Client users in the User
Management Table in the User Management section. When adding a user,
the Unassigned group should be selected. The other groups are used for
SSL VPN.
• Tunnel Name—Name to describe the tunnel. For a single user, you can
enter the username or location. For a group VPN, you could identify the
group business role or location. This description is for your reference and
does not have to match the name used at the other end of the tunnel.
• Interface—WAN port.
• Local Security Group Type—Specify the LAN resources that can access
this tunnel.
Specify the method for identifying the client to establish the VPN tunnel. The
following options are available for a Single User, or Tunnel type, VPN:
If you know the IP address of the remote VPN client, choose IP Address,
and then enter the address. If you do not know the IP address of the remote
VPN client, select IP by DNS Resolved, and then enter the real domain
name of the client on the Internet. The router will get the IP address of
remote VPN client by DNS Resolved, and the IP address of remote VPN
client will be displayed in the VPN Status section of the Summary page.
If you know the IP address of the remote VPN client, choose IP Address,
and then enter the address. If you do not know the IP address of the remote
VPN client, select IP by DNS Resolved, and then enter the real domain
name of the client on the Internet. The device gets the IP address of a
remote VPN client by DNS Resolved, and the IP address of the remote VPN
device is displayed in the VPN Status section of the Summary page.
Specify the method for identifying the clients to establish the VPN tunnel. The
following options are available for a Group VPN:
IPSec Setup
For encryption to be successful, the two ends of a VPN tunnel must agree on the
methods of encryption, decryption, and authentication. Enter exactly the same
settings on both routers.
Enter the settings for Phase 1 and Phase 2. Phase 1 establishes the preshared
keys to create a secure authenticated communication channel. In Phase 2, the IKE
peers use the secure channel to negotiate Security Associations for other
services such as IPSec. Be sure to enter the same settings when configuring other
routers for this tunnel.
TIP Enter a complex preshared key that includes more than eight characters,
upper- and lowercase letters, numbers, and symbols such as -*^+= (' ' " \ are
not supported).
FlexVPN (Spoke)
FlexVPN relies on open-standards-based IKEv2 as a security technology and
provides a high levels of security. FlexVPN was created to simplify the deployment
of VPNs and address the complexity of multiple solutions. As as a unified
ecosystem, it covers all types of VPN: remote access, teleworker, site to site,
mobility, managed security services, and others.
Spoke Setup
Enter the settings for the Spoke Setup for this router:
The Spoke Network allows all devices on the spoke network to use the FlexVPN
tunnel. To add a new spoke network, click Add and enter the subnetwork IP
Address and Subnet Mask.
Hub Setup
Enter the settings for the Hub Setup for this router:
• Preshared Key—Preshared key to use to authenticate the Hub IKE. You can
enter up to 30 keyboard characters or hexadecimal values, such as
My_@123 or 4d795f40313233 (' ' " \ are not supported). Both ends of the
FlexVPN tunnel must use the same Preshared Key. It is strongly
recommended that you change the Preshared Key periodically to maximize
FlexVPN security.
• Preshared Key Strength Meter—When the Minimum Preshared Key
Complexity is enabled, this meter indicates the preshared key strength. As
you enter a preshared key, colored bars appear. The scale goes from red
(weak) to yellow (acceptable) to green (strong).
IPSec Setup
For encryption to be successful, the two ends of a FlexVPN tunnel must agree on
the methods of encryption, decryption, and authentication. Enter exactly the same
settings on both routers.
Enter the settings for Phase 1 and Phase 2. Phase 1 establishes the preshared
keys to create a secure authenticated communication channel. In Phase 2, the IKE
peers use the secure channel to negotiate Security Associations on behalf of
other services such as IPSec. Be sure to enter the same settings when configuring
other router for this tunnel.
For most users, the basic settings should suffice. If you change the Advanced
settings on one router, also enter the settings on the other router.
VPN Passthrough
VPN Passthrough allows VPN clients to pass through this router and connect to a
VPN endpoint and is enabled by default.
To open this page, select VPN > VPN Passthrough in the navigation tree.
PPTP Server
Up to 10 PPTP (Point-to-Point Tunneling Protocol) VPN tunnels can be enabled for
users who are running PPTP client software. For example, in Windows XP or 2000,
a user opens the Network Connections panel and creates a new connection. In the
wizard, the user selects the option to create a connection to the workplace by
using a Virtual Private Network connection. The user must know the WAN IP
address of this device. For more information, refer to the documentation or help
files for your operating system.
To open this page, select VPN > PPTP Server in the navigation tree.
To enable the PPTP server and allow PPTP VPN tunnels, check the Enable box
and enter the range:
Range Start and Range End—Range of LAN address to assign to the PPTP VPN
clients. The LAN IP address range for PPTP VPN clients should be outside of the
normal DHCP range of the router.
The PPTP Tunnel Status shows the number of Tunnels Used and the number of
Tunnels Available.
OpenVPN is a virtual private network (VPN) techniques for creating secure point-
to-point or site-to-site connections in routed or bridged configurations and remote
access facilities. It uses a custom security protocol that utilizes SSL/TLS for key
exchange.
OpenVPN allows peers to authenticate each other using a username/password, or
certificates. When used in a multiclient-server configuration, it allows the server to
release an authentication certificate for every client, using signature and
Certificate authority.
NOTE RV32x supports maximum up to 5 concurrent OpenVPN connections.
Summary
This feature displays general information about the OpenVPN tunnel settings. The
device supports up to 50 OpenVPN Account. The OpenVPN Tunnel Number
displays the number of Tunnels Used, Tunnels Available, Tunnels Enabled, and
Tunnels Defined.
Server Setting Table
The Server Setting Table displays the entries created in OpenVPN > OpenVPN
Server.
The Account ID Setting Table displays the entries created in OpenVPN >
OpenVPN Account. Click Add to add an Open VPN account.
• Enable—Check this box to enable an existing OpenVPN account, or
uncheck it to disable the OpenVPN account.
OpenVPN Server
OpenVPN Account
Provide managers to add or modify the users of OpenVPN client.
To add OpenVPN Account, enter the following settings and click Save.
• Enable—Check this box to enable the OpenVPN account, or uncheck it to
disable the OpenVPN account.
• Authentication—Password.
• OpenVPN Server—Name or IP address of OpenVPN Server.
• Username—Username of OpenVPN Client.
• Password—Password of OpenVPN Client.
A digital certificate certifies the ownership of a public key by the named subject of
the certificate. This allows others (relying parties) to rely upon signatures or
assertions made by the private key that corresponds to the public key that is
certified. In this model of trust relationships, a CA is a trusted third party that is
trusted by both the subject (owner) of the certificate and the party relying upon
the certificate. CAs are characteristic of many public key infrastructure (PKI)
schemes.
My Certificate
You can add up to 50 certificates by self-signing or third-party authorization. You
can also create certificates by using the Certificate Generator or import
certificates from a PC or USB device.
Self-signed SSL Certificates are not inherently trusted by browsers and while they
can be used for encryption they do cause browsers to display warning messages
informing the user that the certificate has not been issued by an entity the user has
chosen to trust.
A user can also connect without a certificate installed on the PC. The user sees a
security warning when connecting to the VPN tunnel, but can proceed without this
extra security protection.
To identify a certificate as the primary certificate, click the radio button of the
desired certificate and click Select as Primary Certificate.
The client certificate enables the client to connect to the VPN. To export or display
a certificate or private key:
STEP 1 Click the related icon Export Certificate for Client or Export Certificate for
Administrator or Export Private Key. The File Download window appears.
Export Certificate for Client—Client certificate that enables the client to connect
to the VPN.
Export Certificate for Administrator—Contains the private key and a copy can
be exported to serve as a backup file. For example, before you reset the device to
the factory default settings, you can export the certificate. After restarting the
device, import this file to restore the certificate.
STEP 2 Click Open to display the key. Click Save to save the key.
To import a certificate:
To open this page, select Certificate Management > Trusted IPsec Certificate in
the navigation tree.
OpenVPN Certificate
Certificate Generator
The Certificate Request Generator collects information and generates a private
key file and a certificate request. You can choose to generate a a self-signed
certificate or a Certificate Signing Request (CSR) for an external certificate
authority to sign. You can also choose to generate a certificate for OpenVPN
Server or OpenVPN Client. When the configuration is saved, the generated CSR or
self-signed certificate displays under My Certificate, certificate for OpenVPN
Server or OpenVPN Client displays under OpenVPN Certificate.
To open this page, select Certificate Management > Certificate Generator in the
navigation tree.
To generate a certificate:
To sign a certificate:
STEP 2 To select the corresponding private key to authorize and sign the CSR, select the
certificate to associate with the request from the My Certificate drop-down
menu.
The Logs display the system status, either by using traps or periodically.
System Log
Configure Short Message Service (SMS) logs and alerts.
To open this page, select Log > System Log in the navigation tree.
STEP 2 Select USB1 or USB2 to send the log out the USB ports.
STEP 3 Check the Dial Number1 and/or Dial Number2 and enter the phone number to
call.
• Link Up
• Link Down
• Authentication failed.
• System Startup
To enable a Syslog server, click Enable and enter the name of the Syslog Server.
• Email Alert for hacker attack—Alert email sent when access is attempted
by a hacker attempting to use a denial-of-service (DOS) attack. Need more.
• Allow Policies—An authorized user has logged into the network through
the configured policies.
If the web browser displays a warning about the pop-up window, allow the
blocked content. Click Refresh to update the data or click Clear to erase all
displayed information.
• View System Log—View the System Log. To specify a log, select the filter
from the drop-down menu.
Log entries include the date and time of the event, the event type, and a
message.The message specifies the type of policy, such as Access Rule,
the LAN IP address of the source (SRC), and the MAC address.
• Clear Log—Click to clear the log without emailing it, only if you do not want
to view the information in the future.
System Statistics
To open this page, select Log > System Statistics in the navigation tree.
Detailed information about the ports and the devices attached to them are shown
in the System Information Table.
Processes
To open this page, select Log > Processes in the navigation tree.
Detailed information about the running processes is shown in the Processes Table.
User management controls domain and user access, primarily used for PPTP and
Cisco VPN Client.
STEP 2 Choose the Authentication Type and enter the required information:
To add (or modify) a user, click Add (or select an entry and click Edit) and enter the
following information:
• Group— The Unassigned group contains PPTP VPN users and EasyVPN
users. The Administrator group has only one user, the default username of
the Administrator group is cisco.
Web filtering can provide you with the protection against access to the
inappropriate websites based on the following working mechanism.
STEP 1 If the incoming URL is in the Exclusion List and its Web Reputation index value is
not lower than 40, the URL is safe and allowed. Vice versa.
STEP 2 If the incoming URL is not in the Exclusion List, check if it is in the Black List. If it is
in the Black List, the URL is blocked. If it is not in the Black List, check if it is in the
White List.
STEP 3 If the incoming URL is included in the White List, the URL is allowed. If not, check
the web category.
STEP 4 If the URL belongs to the selected items of the category, it is blocked. If not, check
the Web Reputation.
STEP 5 If the reputation index value is not lower than 40, it is allowed. Vice versa.
Web Filtering—To always apply the web filtering, click Always On. To apply the
web filtering according to schedules, click Scheduled. To disable web filtering,
click Always Off and Save.
Exceptions—Click Exceptions, the page of White List, Black List and Exclusion
List opens. Under each list field, select the Type of filtering mechanism from the
drop-down menu and input the Value to add/edit an item. Click Save and Back to
the Web Filter page.
Schedule List—To add and display the schedules of applying web filtering.
In addition to the limitations set forth in the EULA on your access and use of the
Service, you agree to comply at all times with the terms and conditions provided in
this SEULA. ACCESSING AND USING THE SERVICE CONSTITUTES
ACCEPTANCE OF THE TERMS, AND YOU ARE BINDING YOURSELF AND THE
BUSINESS ENTITY THAT YOU REPRESENT (COLLECTIVELY, “END USER”) TO
THE TERMS. END USER MUST CAREFULLY READ AND ACCEPT ALL OF THE
TERMS BEFORE CISCO WILL PROVIDE YOU ACCESS TO THE SERVICE. IF YOU
DO NOT AGREE TO ALL OF THE TERMS, YOU SHOULD CLICK THE “DECLINE”
BUTTON WHERE PROMPTED AND DO NOT ACCESS OR USE THE SERVICE. IF
YOU AGREE TO ALL OF THE TERMS YOU SHOULD CLICK THE “ACCEPT”
BUTTON WHERE PROMPTED.
These Terms are effective on the date of End User’s acceptance. Upon
termination of these Terms, End User shall no longer be eligible to use the Service.
1.1 These Terms describe the terms and conditions of your use of the Service.
1.2 Service Changes. Cisco reserves the right, at its sole discretion and from time
to time, to modify the Service, or parts thereof, including, but not limited to,
terminating the availability of a given feature or functionality. Some material
Service changes may include a requirement that End User agree to the changed
Terms. If End User does not agree with a change in the Service, or a modification
of the Terms reflecting such change to the Services, either party may terminate
these Terms pursuant to Section 3 (Term and Termination) and End User will no
longer have access to the Service.
1.3 Third Party Service. End User understands and agrees that the Service is
being provided by one or more third parties on behalf of Cisco (collectively,
“Service Provider”), and that if Service Provider stops providing the Service for
any reason, End User will no longer have access to the Service. End User may
contact Cisco for more information in such event.
2. THE SERVICE
2.1 Service. Subject to End User’s compliance with the Terms, Cisco shall provide
End User the Service for use on your Cisco device in accordance with the Service
datasheet(s) available at: http://www.cisco.com/c/en/us/products/routers/small-
business-rv-series-routers/datasheet-listing.html
3.1 Cisco may terminate these Terms immediately upon notice: (i) if End User
breaches any provision of these Terms and fails to remedy such breach within
thirty (30) days after written notification by Cisco to End User of such breach; or (ii)
in the event that Cisco determines, at its sole discretion, to discontinue the
Service. Upon termination as specified in these Terms, (a) all rights and licenses of
End User hereunder shall terminate, and (b) End User access to the Service shall
terminate.
3.2 Cisco may at any time terminate these Terms for convenience, for any reason,
or for no reason at all, by providing End User with thirty (30) days prior notice of
termination via posting an end of sale notice at: http://www.cisco.com/c/en/us/
products/routers/small-business-rv-series-routers/eos-eol-notice-listing.html
3.3 End User may terminate these Terms upon thirty (30) days prior written notice
to Cisco if End User does not agree to a change of scope or content made by
Cisco in accordance with Section 1.
4.1 Ownership. End User agrees that Cisco and/or Service Provider own all right,
title and interest, including intellectual property rights in and to the Service.
4.2 License. Subject to the terms and conditions of these Terms, Cisco grants to
End User a limited, non-exclusive, non-transferable license to use the Service on
the Cisco device.
5.1 Collection. The Service may collect and send to the Cisco and/or Service
Provider the following data: (a) your IP address; (b) your Cisco device model and
serial numbers and (c) your Internet search requests (including, but not limited to,
full URLs, Internet domains and destination web server IP addresses) (collectively,
“Your Data”). End User represents and warrants that End User owns or has all
necessary rights to Your Data, and acknowledges that Cisco and Service Provider
do not test or screen Your Data, other than what is necessary to provide the
Service. Cisco and Service Provider take no responsibility and assumes no liability
for Your Data. End User shall be solely responsible and liable for Your Data.
5.2 Transfer. By using the Service, End User agrees and consents to the collection,
use, processing and storage of Your Data and any other personal data according
to the Terms and the Cisco Privacy Statement (available at: http://
www.cisco.com/web/siteassets/legal/privacy.html). To the extent that there is a
conflict between the terms and conditions of the Cisco Privacy Statement and the
Terms, the terms and conditions of the Terms will take precedence. In
performance of the Services, Cisco and/or Service Provider may transfer Your
Data to its locations in the United States and/or other jurisdictions. By agreeing to
the Terms or using the Service, End User agrees to such transfer of Your Data.
Please note that Your Data may not be subject to the same controls as Your
current location. End User consents to the uses described above, including but not
limited to having Your Data transferred to and processed in the United States and
other jurisdictions.
5.3 End User further agrees and consents that Cisco and/or Service Provider may
NEITHER CISCO NOR SERVICE PROVIDER SHALL BE LIABLE FOR ANY FAILURE
TO ACHIEVE ANY SERVICE LEVEL AGREEMENT FOR THE SERVICE.
7. GENERAL
7.1 Indemnification. End User hereby indemnifies and holds Cisco harmless from
any claim, loss, damage, liability and expense, including reasonable court costs
and attorney’s fees, resulting from any claim (i) arising out of the acts of End User,
its employees or its agents or (ii) arising in connection with Your Data. This shall
not limit Cisco’s obligations, subject to these Terms, to provide the Service. All
financial obligations associated with End User’s business are the sole
responsibility of End User.
7.2 Third Party Services. Cisco reserves the right to subcontract the provision of
all or part of the Service to a third party.
7.3 Force Majeure. Cisco shall not be liable for any delay or failure in performance
whatsoever resulting from acts beyond its reasonable control. Such acts shall
include, but not be limited to delays attributed to delays of common carriers, acts
of God, earthquakes, labor disputes, shortages of supplies, actions of
governmental entities, riots, war, acts or threatened acts of terrorism, fire,
epidemics and similar occurrences.
7.4 No Waiver. No waiver of rights under these Terms by either party shall
constitute a subsequent waiver of this or any other right under these Terms.
7.5 Survival. The following sections shall survive the termination of these Terms:
Sections 3 (Term and Termination), 4 (Ownership and License), 5 (Data Usage and
Protection), 6 (Limited Warranty and Disclaimer) and 7 (General).
Support
Product Documentation
Cisco RV320/RV325 Routers www.cisco.com/en/US/products/ps9923/
tsd_products_support_series_home.html
Cisco RV Series Routers www.cisco.com/cisco/web/solutions/
small_business/products/routers_switches/
small_business_routers/index.html-tab-
ForPartners
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list
of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their
respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Copyright © 2015