Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

Chapter 1: Introduction
Chapter 2: Planning Your Wireless Network
Network Topology
Ad Hoc versus Infrastructure Mode
Network Layout
Chapter 3: Planning Your Virtual Private Network (VPN)
Why do I need a VPN?
1) MAC Address Spoofing
3) Man in the middle attacks
What is a VPN?
VPN Router to VPN Router
Computer (using the Linksys VPN client software) to VPN Router
Chapter 4: Product Overview
Front Panel
Back Panel
Chapter 5: Configuring the Wireless-G VPN Router
How to Access the Web-based Utility
Setup > Basic Settings
Setup > VLAN
Setup > DDNS
Setup > MAC Address Clone
Setup > Advanced Routing
Wireless > Basic Wireless Settings
Wireless > Wireless Security
Wireless > Wireless Network Access
Wireless > Advanced Wireless Settings
Advanced Wireless Settings
Wireless > WDS
Firewall > General
Firewall > Port Forwarding
Firewall > Port Triggering
Firewall > DMZ
Firewall > Access Restriction
Firewall > URL Filtering
VPN > VPN Client Access
VPN > Client Access
VPN > VPN Passthrough
VPN > VPN Summary
QoS > Application-Based QoS
QoS > Port-Based QoS
Administration > Management
Administration > Log
Administration > Diagnostics
Administration > Factory Default
Administration > Firmware Upgrade
Administration > Reboot
Status > Router
Status > Local Network
Status > Wireless
Status > System Performance
Status > VPN Clients
Appendix A: Troubleshooting
Frequently Asked Questions
Appendix B: Wireless Security Checklist
General Network Security Guidelines
Additional Security Tips
Using Linksys QuickVPN for Windows 2000, XP, or Vista
Before You Begin
Installing the Linksys QuickVPN Software
Installing from the CD-ROM
Downloading and Installing from the Internet
Using the Linksys QuickVPN Software
Version Number of the QuickVPN Client
Distributing Certificates to QuickVPN Users
Appendix D: Configuring IPSec with a Windows 2000 or XP Computer
How to Establish a Secure IPSec Tunnel
Step 1: Create an IPSec Policy
Step 2: Build Filter Lists
Step 3: Configure Individual Tunnel Rules
Step 4: Assign New IPSec Policy
Step 5: Create a Tunnel Through the Web-Based Utility
Appendix E: Gateway-to-Gateway VPN Tunnel
Configuration when the Remote Gateway Uses a Static IP Address
Configuration when the Remote Gateway Uses a Dynamic IP Address
Configuration when Both Gateways Use Dynamic IP Addresses
Appendix F: Glossary
Appendix G: Specifications
Obtaining Warranty Service
Appendix H: Warranty Information
Exclusions and Limitations
Technical Support
Appendix I: Regulatory Information
FCC Statement
FCC Radiation Exposure Statement
Safety Notices
Industry Canada Statement
Industry Canada Radiation Exposure Statement:
Avis d’Industrie Canada
Avis d’Industrie Canada concernant l’exposition aux radiofréquences :
Wireless Disclaimer
Avis de non-responsabilité concernant les appareils sans fil
Schedule 2
Schedule 3
Appendix J: Contact Information
0 of .
Results for:
No results containing your search query
P. 1
Cisco Wireless-G VPN Router (WRV200) User Manual

Cisco Wireless-G VPN Router (WRV200) User Manual

|Views: 276|Likes:
Published by T Siva

More info:

Published by: T Siva on Nov 12, 2010
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 5 to 71 are not shown in this preview.
You're Reading a Free Preview
Pages 76 to 81 are not shown in this preview.

Activity (2)

You've already reviewed this. Edit your review.
1 hundred reads
Ruan Sardinha liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->