Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
2Activity

Table Of Contents

Chapter 1: Introduction
Chapter 2: Networking and Security Basics
An Introduction to LANs
The Use of IP Addresses
The Intrusion Prevention System (IPS)
Chapter 3: Planning Your Virtual Private Network (VPN)
Why do I need a VPN?
1) MAC Address Spoofing
3) Man in the middle attacks
What is a VPN?
VPN Router to VPN Router
Computer (using the Linksys VPN client software) to VPN Router
Chapter 4: Product Overview
Front Panel
Back Panel
Chapter 5: Setting Up and Configuring the Router
Setup
Setup > Summary
Setup > WAN
Setup > LAN
Setup > DMZ
Setup > MAC Address Clone
Setup > Advanced Routing
Setup > Time
Setup > IP Mode
Firewall
Firewall > Basic Settings
Firewall > IP Based ACL
Firewall > Internet Access Policy
Firewall > Single Port Forwarding
Firewall > Port Range Forwarding
Firewall > Port Range Triggering
VPN > Summary
VPN > IPSec VPN
Administration > Management
Administration > Log
Administration > Diagnostics
Administration > Backup & Restore
Administration > Factory Default
Administration > Reboot
Administration > Firmware Upgrade
IPS > Configuration
IPS > P2P/IM
IPS > Report
IPS > Information
L2 Switch
L2 > Create VLAN
L2 > VLAN Port Setting
L2 > VLAN Membership
L2 > RADIUS
L2 > Port Setting
L2 > Statistics
L2 > Port Mirroring
L2 > RSTP
Status
Status > Gateway
Status > Local Network
Appendix A: Troubleshooting
Frequently Asked Questions
Overview
Before You Begin
Installing the Linksys QuickVPN Software
Installing from the CD-ROM
Downloading and Installing from the Internet
Using the Linksys QuickVPN Software
Version Number of the QuickVPN Client
Distributing Certificates to QuickVPN Users
Appendix C: Configuring IPSec with a Windows 2000 or XP Computer
Introduction
Environment
How to Establish a Secure IPSec Tunnel
Step 1: Create an IPSec Policy
Step 2: Build Filter Lists
Step 3: Configure Individual Tunnel Rules
Step 4: Assign New IPSec Policy
Step 5: Create a Tunnel Through the Web-Based Utility
Appendix D: Gateway-to-Gateway VPN Tunnel
Configuration when the Remote Gateway Uses a Static IP Address
Configuration of the RVS4000
Configuration of the RV082
Configuration of PC 1 and PC 2
Configuration when the Remote Gateway Uses a Dynamic IP Address
Configuration when Both Gateways Use Dynamic IP Addresses
Appendix E: Trend Micro ProtectLink Gateway Service
How to Access the Web-Based Utility
How to Purchase, Register, or Activate the Service
ProtectLink
How to Use the Service
ProtectLink > Web Protection
ProtectLink > Email Protection
ProtectLink > License
Appendix F: Specifications
Obtaining Warranty Service
Appendix G: Warranty Information
Exclusions and Limitations
Technical Support
Appendix H: Regulatory Information
FCC Statement
Safety Notices
Industry Canada Statement
Avis d’Industrie Canada
Software in Linksys Products:
Software Licenses:
Schedule 1 Linksys Software License Agreement
Schedule 2
Schedule 3
Appendix J: Contact Information
0 of .
Results for:
No results containing your search query
P. 1
RVS4000_V10_UG_B8731-web

RVS4000_V10_UG_B8731-web

Ratings: (0)|Views: 51 |Likes:
Published by alksdhjfakshf

More info:

Published by: alksdhjfakshf on Oct 22, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

07/15/2012

pdf

text

original

You're Reading a Free Preview
Pages 5 to 27 are not shown in this preview.
You're Reading a Free Preview
Pages 32 to 83 are not shown in this preview.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->