EasyManua.ls Logo

Cisco WRV210 - Wireless-G VPN Router User Manual

Cisco WRV210 - Wireless-G VPN Router
107 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Cisco Small Business
WRV210 Wireless-G VPN Router with RangeBooster
ADMINISTRATION
GUIDE

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Cisco WRV210 - Wireless-G VPN Router and is the answer not in the manual?

Cisco WRV210 - Wireless-G VPN Router Specifications

General IconGeneral
BrandCisco
ModelWRV210 - Wireless-G VPN Router
CategoryWireless Router
LanguageEnglish

Summary

Chapter 1: Introduction

Product Overview

Provides an overview of the WRV210 router, its features, and physical components.

Initial Installation

Guides users through the initial setup process, including hardware connections and basic network configuration.

Getting Started in the Configuration Utility

Explains how to access and navigate the router's web-based configuration utility and manage settings.

Chapter 2: Setting Up the Network

Configuring the Basic Settings

Details essential network configurations including language, internet connection, local network, and time settings.

Setting Up Virtual LANs

Explains how to create virtual LANs (VLANs) for network segmentation and traffic management.

Using DDNS to Map Domain Names to Your Network

Describes how to use Dynamic Domain Name System (DDNS) services to map domain names to dynamic IP addresses.

Cloning a MAC Address for Your Internet Connection

Explains the process of cloning a MAC address for your Internet connection, useful for ISP registration.

Setting Up Advanced Routing

Details how to configure dynamic and static routing protocols for network traffic management.

Chapter 3: Configuring the Wireless Network

A Note About Wireless Security

Discusses the importance of wireless security and potential vulnerabilities.

Wireless Security Tips

Provides practical tips to enhance wireless network security, including changing default credentials.

General Network Security Guidelines

Outlines general security precautions for the entire network, beyond just wireless.

Enabling Your Wireless Networks

Guides users on configuring wireless network parameters like SSID, mode, channel, and schedules.

Wireless > Wireless Security

Details the configuration of wireless security modes, encryption types, and authentication methods.

Controlling Access to the Wireless Network

Explains how to control access to the wireless network using MAC address filtering policies.

Adjusting the Advanced Wireless Settings

Covers advanced wireless settings such as AP Isolation, transmission rates, and power levels.

Configuring a Wireless Distribution System (WDS)

Describes how to configure WDS to extend wireless network coverage using repeaters.

Chapter 4: Configuring the Firewall

Preventing Attacks

Explains how to configure firewall settings to prevent various network attacks and unauthorized access.

Enabling Port Forwarding to Allow Access to Services

Details how to enable port forwarding to allow external access to internal network resources or services.

Using Port Triggering to Allow Access to Applications

Describes the use of port triggering to manage access for applications that use dynamic ports.

Configuring a DMZ to Allow Access to All Ports of a Server

Guides users on configuring a Demilitarized Zone (DMZ) to expose a specific PC to the Internet while protecting the rest of the network.

Restricting Users’ Access to the Internet

Explains how to restrict user internet access based on specific days and times.

Blocking Web Access with URL Filtering

Details how to block access to specific websites using URL filtering policies.

Chapter 5: Configuring a Virtual Private Network (VPN)

Managing the VPN Users and Certificates

Covers the management of VPN users and the generation/import/export of security certificates.

Configuring VPN Passthrough

Explains how to enable or disable VPN passthrough for IPSec, L2TP, and PPTP protocols.

VPN > IPSec VPN

Details the configuration of IPSec VPN tunnels for secure site-to-site connectivity.

Monitoring the IPSec VPN Tunnels

Describes how to review and monitor the status of configured IPSec VPN tunnels.

Chapter 6: Configuring Quality of Service (QoS)

Configuring QoS Settings for Specified Applications

Explains how to configure QoS for specific applications using priority queuing or bandwidth allocation.

Configuring QoS Settings for Specified Ports

Details how to configure QoS based on specific LAN ports to prioritize network traffic.

Chapter 7: Administration

Managing Access and Configuring Other Management Options

Covers essential administrative tasks like password management, access control, SNMP, UPnP, and configuration backup/restore.

Setting Up Alerts and System Logs

Explains how to configure system logs and email alerts for specified network events.

Performing Diagnostic Tests

Guides users on performing network diagnostic tests like Ping and Traceroute to troubleshoot connectivity issues.

Reverting to the Factory Default Settings

Details the process of restoring the router to its original factory default configuration settings.

Upgrading the Firmware

Provides instructions on how to download and install new firmware for the router.

Rebooting the Router

Explains how to restart the router to apply changes or resolve minor issues without losing settings.

Chapter 8: Monitoring the Status of the Network

Monitoring the Router Status

Displays information about the router's hardware, software version, current time, and MAC address.

Monitoring the LAN

Provides details on the local network status, including IP addresses, subnet masks, and DHCP server information.

Monitoring the Wireless Network

Shows the status of the wireless network, including mode, channel, SSID, and security settings.

Monitoring the System Performance

Displays network traffic statistics for Internet, wireless, and wired connections.

Monitoring the QuickVPN Clients

Shows the status of connected QuickVPN clients, including username, connection time, and duration.

Appendix A: Specifications

Appendix B: Where to Go From Here

Related product manuals