Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

Chapter 1: Introduction
Chapter 2: Networking and Security Basics
An Introduction to LANs
The Use of IP Addresses
The Intrusion Prevention System (IPS)
Chapter 3: Planning Your Virtual Private Network (VPN)
Why do I need a VPN?
1) MAC Address Spoofing
3) Man in the middle attacks
What is a VPN?
VPN Router to VPN Router
Computer (using the Linksys VPN client software) to VPN Router
Chapter 4: Product Overview
Front Panel
Back Panel
Chapter 5: Setting Up and Configuring the Router
Setup > Summary
Setup > WAN
Setup > LAN
Setup > DMZ
Setup > MAC Address Clone
Setup > Advanced Routing
Setup > Time
Setup > IP Mode
Firewall > Basic Settings
Firewall > IP Based ACL
Firewall > Internet Access Policy
Firewall > Single Port Forwarding
Firewall > Port Range Forwarding
Firewall > Port Range Triggering
VPN > Summary
VPN > VPN Client Accounts
VPN > VPN Passthrough
QoS > Bandwidth Management
QoS > QoS Setup
QoS > DSCP Setup
Administration > Management
Administration > Log
Administration > Diagnostics
Administration > Backup & Restore
Administration > Factory Default
Administration > Reboot
Administration > Firmware Upgrade
IPS > Configuration
IPS > Report
IPS > Information
L2 Switch
L2 > Create VLAN
L2 > VLAN Port Setting
L2 > VLAN Membership
Running the VPN Router Software Wizard
Building Your VPN Connection Remotely
Appendix A: Troubleshooting
Frequently Asked Questions
Installing the Linksys QuickVPN Software
Installing from the CD-ROM
Downloading and Installing from the Internet
Using the Linksys QuickVPN Software
Version Number of the QuickVPN Client
Distributing Certificates to QuickVPN Users
Appendix C: Configuring IPSec with a Windows 2000 or XP Computer
How to Establish a Secure IPSec Tunnel
Step 1: Create an IPSec Policy
Step 2: Build Filter Lists
Step 3: Configure Individual Tunnel Rules
Step 4: Assign New IPSec Policy
Step 5: Create a Tunnel Through the Web-Based Utility
Appendix D: Gateway-to-Gateway VPN Tunnel
Configuration when the Remote Gateway Uses a Static IP Address
Configuration of the RVS4000
Configuration of the RV082
Configuration of PC 1 and PC 2
Configuration when the Remote Gateway Uses a Dynamic IP Address
Configuration when Both Gateways Use Dynamic IP Addresses
Appendix E: Trend Micro ProtectLink Gateway Service
How to Access the Web-Based Utility
How to Purchase, Register, or Activate the Service
How to Use the Service
ProtectLink > Web Protection
ProtectLink > Email Protection
ProtectLink > License
Appendix F: Specifications
Obtaining Warranty Service
Appendix G: Warranty Information
Exclusions and Limitations
Technical Support
Appendix H: Regulatory Information
FCC Statement
Safety Notices
Industry Canada Statement
Avis d’Industrie Canada
Software in Linksys Products:
Software Licenses:
Schedule 1 Linksys Software License Agreement
Schedule 2
Schedule 3
Appendix J: Contact Information
0 of .
Results for:
No results containing your search query
P. 1
Cisco Router RVS4000

Cisco Router RVS4000

Ratings: (0)|Views: 1,224|Likes:
Published by Tom Jerram

More info:

Published by: Tom Jerram on May 27, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 5 to 36 are not shown in this preview.
You're Reading a Free Preview
Pages 41 to 88 are not shown in this preview.

Activity (4)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Luis Salinas liked this
Omar Arias liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->