hit counter script
Cisco RV180 Administrator's Manual
Hide thumbs Also See for RV180:
Table of Contents

Advertisement

ADMINISTRATION
GUIDE
Cisco Small Business
RV180 VPN Router
RV180W Wireless-N Multifunction Router

Advertisement

Table of Contents
loading

Summary of Contents for Cisco RV180

  • Page 1 ADMINISTRATION GUIDE Cisco Small Business RV180 VPN Router RV180W Wireless-N Multifunction Router...
  • Page 2 January 2011 Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company.
  • Page 3: Table Of Contents

    Back Panel Mounting the Cisco RV180/RV180W Placement Tips Wall Mounting Connecting the Equipment Setting Up the Cisco RV180/RV180W Using the Setup Wizard Choosing the Device Mode (Cisco RV180W) Using the Getting Started Page Navigating through the Pages Saving Your Changes...
  • Page 4 Viewing DHCP Leased Clients Configuring RSTP (Cisco RV180W) Configuring Jumbo Frames Configuring Routing Choosing the Routing Mode Viewing Routing Information Configuring Static Routes Adding a Static Route Configuring Dynamic Routing Configuring Port Management Configuring Dynamic DNS (DDNS) Cisco RV180/RV180W Administration Guide...
  • Page 5 Chapter 3: Configuring the Wireless Network (Cisco RV180W) A Note About Wireless Security Wireless Security Tips General Network Security Guidelines Understanding the Cisco RV180W’s Wireless Networks Configuring Basic Wireless Settings Configuring Security Configuring MAC Filtering Configuring Wi-Fi Multimedia Configuring Wireless Network (SSID) Scheduling...
  • Page 6 Contents Chapter 4: Configuring the Firewall Cisco RV180/RV180W Firewall Features Configuring Access Rules Creating an Access Rule Configuring Attack Prevention Configuring Content Filtering Configuring URL Blocking Configuring Port Triggering Adding a Port Triggering Rule Configuring Port Forwarding Adding a Port Forwarding Configuration...
  • Page 7 Viewing a Self Certificate Request Exporting a Self Certificate Request Uploading a Self Certificate Exporting the Router’s Current Certificate Using the Cisco RV180/RV180W With a RADIUS Server Adding a RADIUS Server Configuration Configuring Captive Portal Configuring 802.1x Port-Based Authentication Chapter 6: Configuring Quality of Service (QoS)
  • Page 8 Backing Up and Restoring the System Importing CSV Files Upgrading Firmware Rebooting the Cisco RV180/RV180W Restoring the Factory Defaults Chapter 8: Viewing the Cisco RV180/RV180W Status Viewing the Dashboard Viewing the System Summary Viewing the Wireless Statistics (Cisco RV180W) Cisco RV180/RV180W Administration Guide...
  • Page 9 Viewing Logs Viewing Available LAN Hosts Viewing Port Triggering Status Viewing Port Statistics Viewing Open Ports Appendix A: Using Cisco QuickVPN for Windows 7, 2000, XP, or Vista Overview Before You Begin Installing the Cisco QuickVPN Software Installing from the CD-ROM...
  • Page 10: Chapter 1: Introduction

    Introduction This chapter describes the features of the Cisco RV180/RV180W, guides you through the installation process, and gets you started using the Device Manager, a browser-based utility for configuring the Cisco RV180/RV180W. • Product Overview, page 2 • Getting to Know the Cisco RV180, page 4 •...
  • Page 11: Product Overview

    Product Overview Thank you for choosing the Cisco Small Business RV180/RV180W router. The Cisco RV180 & RV180W Wireless-N VPN Router provides simple, affordable, highly secure, business-class connectivity to the Internet for small offices and remote workers. The RV180W features multi-function operation allowing the device to function as a wireless router, bridge, or access point.
  • Page 12: Wireless Distribution System (Cisco Rv180W)

    Device Manager. The Cisco RV180/ RV180W supports Internet Explorer, Firefox, and Safari web browsers. The Cisco RV180/RV180W also provides a setup wizard. The setup wizard allows you to easily configure the Cisco RV180/RV180W’s basic settings.
  • Page 13: Getting To Know The Cisco Rv180

    LAN—These four LEDs correspond to the four LAN (Ethernet) ports of the Cisco RV180. If the LED is continuously lit green, the Cisco RV180 is connected to a device through the corresponding port (1, 2, 3, or 4). The LED for a port flashes green when the Cisco RV180 is actively sending or receiving data over that port.
  • Page 14: Getting To Know The Cisco Rv180W

    WAN Port—The WAN port is connected to your Internet device, such as a cable or DSL modem. ON/OFF Power Switch—Press this button to turn the Cisco RV180 on and off. When the button is pushed in, power is on. Power Port—The power port is where you connect the AC power cable.
  • Page 15: Cisco Rv180/Rv180W Administration Guide

    The LED flashes green when the device is transmitting or receiving data on the wireless module. AP—The AP LED lights up solid green when the Cisco RV180W is in access point mode. See Choosing the Device Mode (Cisco RV180W), page BRIDGE—The BRIDGE LED lights up solid green when the Cisco RV180W is in...
  • Page 16: Back Panel

    WAN Port—The WAN port is connected to your Internet device, such as a cable or DSL modem. ON/OFF Power Switch—Press this button to turn the Cisco RV180W on and off. When the button is pushed in, power is on. Power Port—The power port is where you connect the AC power cable.
  • Page 17: Mounting The Cisco Rv180/Rv180W

    Introduction Mounting the Cisco RV180/RV180W Mounting the Cisco RV180/RV180W You can place your Cisco RV180/RV180W on a desktop or mount it on a wall. Placement Tips • Ambient Temperature—To prevent the device from overheating, do not operate it in an area that exceeds an ambient temperature of 104°F (40°C).
  • Page 18 Introduction Mounting the Cisco RV180/RV180W To mount the firewall to the wall: Determine where you want to mount the firewall. Verify that the surface is smooth, STEP 1 flat, dry, and sturdy. Drill two pilot holes into the surface 2-7/16 inches (61 mm) apart, and with a STEP 2 minimum of 5.
  • Page 19 Introduction Mounting the Cisco RV180/RV180W Place the firewall wall-mount slots over the screws and slide the firewall down until STEP 4 the screws fit snugly into the wall-mount slots. Cisco RV180/RV180W Administration Guide...
  • Page 20: Connecting The Equipment

    STEP 2 device such as a router or PC, disconnect the cable from the device and plug it into the port marked “WAN” on the RV180/RV180W. The cable or DSL modem is now connected to the router. Cisco RV180/RV180W Administration Guide...
  • Page 21 Introduction Connecting the Equipment Using the Ethernet cable included in the Cisco RV180/180W box, connect one end STEP 3 of the cable to one of the LAN ports of the router. (In this example, the LAN 1 port is used.) Connect the other end of the cable to an Ethernet port on the PC that will be used to connect to the Cisco RV180/180W Device Manager.
  • Page 22 Introduction Connecting the Equipment Connect the power adapter to the Cisco RV180/RV180W power port (12VDC). STEP 5 Use only the power adapter that is supplied with the device. Using a different CAUTION power adapter could damage the device. Plug the other end of the adapter into an electrical outlet. You may need to use a STEP 6 specific plug (supplied) for your country.
  • Page 23: Setting Up The Cisco Rv180/Rv180W Using The Setup Wizard

    Start the PC connected to the RV180/RV180W. Your computer becomes a DHCP STEP 1 client of the RV180/RV180W and receives an IP address in the 192. 1 68. 1 .xxx range. Launch a web browser and enter 192.168.1.1 in the Address field. This is the STEP 2 default IP address of the RV180/RV180W.
  • Page 24: Choosing The Device Mode (Cisco Rv180W)

    Connect the PC on which you will be using the Device Manager to the primary STEP 1 wireless host (in this example, called “Router A”). Connect one of the LAN ports on Router A with one of the LAN ports on the Cisco STEP 2 RV180W.
  • Page 25 On the RV180W, enter the Router A’s MAC address of the wireless network STEP 5 (access point). For example, if Router A is a Cisco RV220W, you would find the MAC address of its wireless network under Status > System Summary, in the Available Access Points table.
  • Page 26: Using The Getting Started Page

    Introduction Using the Getting Started Page Using the Getting Started Page The Getting Started page displays the most common Cisco RV180/RV180W configuration tasks. Use the links on this page to jump to the relevant configuration page. By default, this page appears when you start the Device Manager. However, you can change this behavior by checking Don’t show this on start up at the bottom...
  • Page 27: Navigating Through The Pages

    Other Resources Support Click this link to open Cisco’s support page. Forums Click this link to visit Cisco’s online support forums. Navigating through the Pages Use the navigation tree (numbered 1 in Figure 1) located in the in the left pane to open the configuration pages.
  • Page 28: Saving Your Changes

    Figure 1 RV180W Device Manager Saving Your Changes When you finish making changes on a configuration page, click Save (numbered 4 Figure 1) to save the changes, or click Cancel (numbered 5 in Figure 1) to undo your changes. Cisco RV180/RV180W Administration Guide...
  • Page 29: Viewing The Help Files

    136. • (Optional) If you already have a DHCP server on your network, and you do not want the Cisco RV180/RV180W to act as a DHCP server, see “Configuring the LAN (Local Network) Settings” section on page • (Cisco RV180W) Configure your wireless network, especially wireless security.
  • Page 30 Configure your Virtual Private Network (VPN) using QuickVPN. The QuickVPN software is found on the documentation and software CD that shipped with your router. See Appendix A, “Using Cisco QuickVPN for Windows 7, 2000, XP, or Vista.” Cisco RV180/RV180W Administration Guide...
  • Page 31 Introduction Configuration Next Steps Cisco RV180/RV180W Administration Guide...
  • Page 32 Introduction Configuration Next Steps Cisco RV180/RV180W Administration Guide...
  • Page 33: Chapter 2: Configuring Networking

    Configuring Dynamic DNS (DDNS), page 48 • Configuring IPv6, page 50 Cisco recommends you use the Setup Wizard to configure basic networking on the NOTE Cisco RV180/RV180W. You can then make changes and provision advanced features using the Device Manager.
  • Page 34: Configuring The Ipv4 Wan (Internet)

    From the Internet Connection Type drop-down menu, choose STEP 2 Automatic Configuration - DHCP. Enter MTU information. (See Configuring MTU Settings, page 29.) STEP 3 Enter MAC Address information. (See Configuring the MAC Address, page 29.) STEP 4 Click Save. STEP 5 Cisco RV180/RV180W Administration Guide...
  • Page 35: Configuring Static Ip

    From the Internet Connection Type drop-down menu, choose PPPoE. STEP 2 From the PPPoE Profile Name drop-down menu, choose a PPPoE profile. If no STEP 3 profile is listed, click Configure Profile to create a new profile. Cisco RV180/RV180W Administration Guide...
  • Page 36: Configuring Pptp

    You might want to choose this option if your ISP charges based on connection time. Idle Time If you choose Idle Time as the connection type, enter the number of minutes after which the connection terminates. The valid range is 5–999. Cisco RV180/RV180W Administration Guide...
  • Page 37: Configuring L2Tp

    You might want to choose this option if your ISP charges based on connection time. Idle Time If you choose Idle Time as the connection type, enter the number of minutes after which the connection terminates. The valid range is 5–999. Cisco RV180/RV180W Administration Guide...
  • Page 38: Configuring Mtu Settings

    The Cisco RV180/RV180W has a unique 48-bit local Ethernet hardware address. In most cases, the default MAC address is used to identify your Cisco RV180/ RV180W to your ISP. However, you can change this setting if required by your ISP.
  • Page 39: Configuring Pppoe Profiles

    Enter or change the following information (you may need to contact your ISP to STEP 3 obtain your PPPoE login information): Profile Name Enter the name of the profile. Username Enter your username assigned to you by the ISP. Password Enter your password assigned to you by the ISP. Cisco RV180/RV180W Administration Guide...
  • Page 40 Choose the authentication type from the drop-down menu: • Auto-negotiate—The server sends a configuration request specifying the security algorithm set on it. Then, the Cisco RV180/ RV180W sends back authentication credentials with the security type sent earlier by the server. •...
  • Page 41: Configuring The Lan (Local Network) Settings

    To configure the host name of the Cisco RV180/RV180W: Choose Networking > LAN (Local Network) > IPv4 LAN (Local Network). STEP 1 In the Host Name field, enter the host name of the Cisco RV180/RV180W. You can STEP 2 use only alpha-numeric characters and the hyphen.
  • Page 42: Configuring Dhcp

    • If DHCP is not configured on the Cisco RV180/RV180W, manually assign an IP address to your PC. The address must be on the same subnet as the Cisco RV180/RV180W. For example, if you change the Cisco RV180/RV180W’s IP address to 10.0.0. 1 , assign your PC an IP address in the range of 10.0.0.2 to 10.0.0.254.
  • Page 43 From the DHCP Mode drop-down menu, choose one of these options: STEP 2 • None—Choose this option if the Cisco RV180/RV180W is not going to act as a DHCP server. • DHCP Server—Choose this option to configure the Cisco RV180/RV180W to be a DHCP server and enter this information: Domain Name—...
  • Page 44: Configuring The Dns Proxy

    Choose Networking > LAN (Local Network) > IPv4 LAN (Local Network). STEP 1 In the DNS Proxy field, check to enable the Cisco RV180/RV180W to act as a STEP 2 proxy for all DNS requests and communicate with the ISP's DNS servers.
  • Page 45: Configuring Multiple Vlan Subnets

    STEP 2 If you want to edit the IP address of this VLAN: STEP 3 a. In the IP address field, enter the new IP address. b. Enter the Subnet Mask for the new IP address. Cisco RV180/RV180W Administration Guide...
  • Page 46 Configuring Networking Configuring the LAN (Local Network) Settings c. Click Save. If you are connected to the Cisco RV180/RV180W by the LAN port that is a member of this VLAN, you might have to release and renew the IP address on the PC connected to the LAN port, or manually assign an IP address to your PC that is in the same subnet as the VLAN.
  • Page 47: Configuring Static Dhcp

    Click Save. STEP 5 Configuring Advanced DHCP Settings Configuring Automatic Configuration Download You can configure devices that are connected to the Cisco RV180/RV180W to download configuration files from a TFTP server. This can be useful in scenarios like the following: •...
  • Page 48: Adding A Dhcp Client To Configuration File Map

    Adding a DHCP Client to Configuration File Map, page Adding a DHCP Client to Configuration File Map In order to have devices connected to the RV180/RV180W automatically download configuration files, you must add the MAC address of the devices and the filename of the configuration file they need to download.
  • Page 49: Viewing Dhcp Leased Clients

    40960, 45056, 49152, 53248, 57344, and 61440. This value is the priority component of the bridge identifier of the network node. The lower the system priority, the more likely the Cisco RV180W is to become the root in the Spanning Tree. The default is 327688.
  • Page 50 Port Priority The priority assigned tot he bridge port for determining the root port. Edge Status Displays the edge status of the port. Port Cost The cost of using the interface-based connection. Click Save. STEP 5 Cisco RV180/RV180W Administration Guide...
  • Page 51: Configuring Jumbo Frames

    Frames feature allows the switch to send jumbo frames within the LAN containing up to 9,000 bytes of data per frame. You can configure the Cisco RV180/RV180W to support jumbo frames. After support is enabled, devices on the LAN side of the network can exchange traffic that contains jumbo frames.
  • Page 52: Viewing Routing Information

    • Type—Type of routing used (RIP or static). • Flags—For debugging purpose only; possible flags include: UP—Route is up. Host—Target is a host. Gateway—Use gateway. R—Reinstate route for dynamic routing. D—Dynamically installed by daemon or redirect. Cisco RV180/RV180W Administration Guide...
  • Page 53 Use—Count of lookups for the route. Depending on the use of -F and -C, this is either route cache misses (-F) or hits (-C). • Interface—Interface to which packets for this route will be sent. • Type—Type of routing used (RIP or static). Cisco RV180/RV180W Administration Guide...
  • Page 54: Configuring Static Routes

    In the Gateway IP Address field, enter the IP Address of the gateway through STEP 9 which the destination host or network can be reached. If this router is used to connect your network to the Internet, then your gateway IP is the router's IP Cisco RV180/RV180W Administration Guide...
  • Page 55: Configuring Dynamic Routing

    Configuring Dynamic Routing RIP (Routing Information Protocol, RFC 2453) is an Interior Gateway Protocol (IGP) that is commonly used in internal networks. It allows the Cisco RV180/RV180W to exchange its routing information automatically with other routers, and allows it to dynamically adjust its routing tables and adapt to changes in the network.
  • Page 56: Configuring Port Management

    Click Save. STEP 6 Configuring Port Management The Cisco RV180/RV180W has four LAN ports and one WAN port. You can enable or disable ports, configure if the port is half- or full-duplex, and set the port speed. To configure ports: Choose Networking >...
  • Page 57: Configuring Dynamic Dns (Ddns)

    STEP 2 service. If you selected DynDNS.com: STEP 3 a. Specify the complete Host Name and Domain Name for the DDNS service. b. Enter the DynDNS account username. c. Enter the password for the DynDNS account. Cisco RV180/RV180W Administration Guide...
  • Page 58 Enter the user e-mail address for the TZO account. c. Enter the user key for the TZO account. d. In the Update Period field, enter the number of hours before the Cisco RV180/ RV180W updates the host information on TZO.com.
  • Page 59: Configuring Ipv6

    Internet connection you have. See the sections below for detailed instructions. The Cisco RV180/RV180W can be configured to be a DHCPv6 client of the ISP for this WAN or a static IPv6 address provided by the ISP can be assigned.
  • Page 60: Configuring Ipv6 Lan Properties

    Enter the primary and secondary DNS server IP addresses on the ISP's IPv6 STEP 6 network. DNS servers map Internet domain names (for example, www.cisco.com) to IP addresses. Click Save.
  • Page 61 Choose the DHCP mode. If stateless is selected, an external IPv6 DHCP server is STEP 5 not required as the IPv6 LAN hosts are auto-configured by the Cisco RV180/ RV180W. In this case, the router advertisement daemon (RADVD) must be configured on this device and ICMPv6 router discovery messages are used by the host for auto-configuration.
  • Page 62: Configuring Ipv6 Static Routing

    Configuring IPv6 Address Pools This feature allows you to define the IPv6 delegation prefix for a range of IP addresses to be served by the Cisco RV180/RV180W’s DHCPv6 server. Using a delegation prefix, you can automate the process of informing other networking equipment on the LAN of DHCP information specific for the assigned prefix.
  • Page 63: Adding An Ipv6 Static Route

    In the metric field, specify the priority of the route by choosing a value between 2 STEP 9 and 15. If multiple routes to the same destination exist, the route with the lowest metric is used. Click Save. STEP 10 Cisco RV180/RV180W Administration Guide...
  • Page 64: Configuring Tunneling

    Configuring Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Tunnels Intra-site automatic tunnel addressing protocol (ISATAP) is a method to transmit IPv6 packets between dual-stack nodes over an IPv4 network. The Cisco RV180/ RV180W is one endpoint (a node) for the tunnel. You must also set a local endpoint, as well as the ISATAP Subnet Prefix that defines the logical ISATAP subnet to configure a tunnel.
  • Page 65: Configuring Router Advertisement

    Choose the local endpoint address, or the endpoint address for the tunnel that STEP 4 starts with the Cisco RV180/RV180W. The endpoint can be the LAN interface (if the LAN is configured as an IPv4 network), or another LAN IPv4 address.
  • Page 66: Configuring Router Advertisement Prefixes

    The default is 3600 seconds. Click Save. STEP 9 Configuring Router Advertisement Prefixes To configure the RADVD available prefixes: Choose Networking > IPv6 > Advertisement Prefixes. STEP 1 Click Add. STEP 2 Cisco RV180/RV180W Administration Guide...
  • Page 67 Enter the prefix lifetime, or the length of time during which the requesting router is STEP 6 allowed to use the prefix. Click Save. STEP 7 Cisco RV180/RV180W Administration Guide...
  • Page 68 Configuring Networking Configuring IPv6 Cisco RV180/RV180W Administration Guide...
  • Page 69: (Cisco Rv180W)

    Configuring a Wireless Distribution System (WDS), page 73 • Configuring Load Balancing, page 74 This chapter only applies to the Cisco RV180W model. NOTE A Note About Wireless Security Wireless networks are convenient and easy to install, so small businesses with high-speed Internet access are adopting them at a rapid pace.
  • Page 70: Wireless Security Tips

    • Enable MAC address filtering Cisco routers and gateways give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device. With MAC address filtering enabled, wireless network access is provided solely for wireless devices with specific MAC addresses.
  • Page 71: General Network Security Guidelines

    Combine letters and numbers to avoid using standard words that can be found in the dictionary. General Network Security Guidelines Wireless network security is useless if the underlying network is not secure. Cisco recommends that you take the following precautions: •...
  • Page 72: Understanding The Cisco Rv180W's Wireless Networks

    Configuring Basic Wireless Settings The following sections contain information on how to configure basic wireless settings on the Cisco RV180W. These settings apply to all of the wireless networks. Configuring Radio, Mode, and Channel Settings Choose Wireless >...
  • Page 73 STEP 6 wireless frames. Select a channel from the list of channels or choose auto to let the Cisco RV180W determine the best channel to use based on the environment noise levels for the available channels. In the U-APSD field, choose Enable to enable the Unscheduled Automatic Power...
  • Page 74: Configuring Security

    SSID. When this feature is enabled, the wireless client can communicate with the Cisco RV180W, but not with other clients connected wirelessly to that SSID. For example, if the Cisco RV180W has many wireless users, you can prevent users from accessing other parts of the network.
  • Page 75 Configuring the Wireless Network (Cisco RV180W) Configuring Basic Wireless Settings 802. 1 1i standard was being prepared. It supports TKIP/AES encryption. The personal authentication is the preshared key (PSK) that is an alphanumeric passphrase shared with the wireless peer. •...
  • Page 76: Configuring Mac Filtering

    If you want to see the password as you are entering it, check the Unmask Password box. c. In the Key Renewal field, enter the number of seconds after which the Cisco RV180W will generate a new key. These keys are internal keys exchanged between the Cisco RV180W and connected devices.
  • Page 77: Configuring Wi-Fi Multimedia

    Configuring the Wireless Network (Cisco RV180W) Configuring Basic Wireless Settings • Block following MAC addresses from connecting to wireless network— Blocks MAC addresses specified below from connecting to the wireless network. • Allow only following MAC addresses to connect to wireless network—...
  • Page 78: Configuring Wireless Network (Ssid) Scheduling

    Click Save. STEP 7 Configuring Wireless Network (SSID) Scheduling You can configure each of the four available wireless networks on the Cisco RV180W to be active during certain times of the day. To configure the schedule for a wireless network: Choose Wireless >...
  • Page 79: Configuring Advanced Wireless Settings

    STEP 3 message should be sent. A DTIM field is a countdown field informing clients of the next window for listening to broadcast and multicast messages. When the Cisco RV180W has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value.
  • Page 80: Configuring Rogue Access Point Detection

    The Short Retry Limit and Long Retry Limit fields determine the number of times STEP 8 the Cisco RV180W will reattempt a frame transmission that fails. The limit applies to both long and short frames of a size less than or equal to the RTS threshold.
  • Page 81: Adding And Editing Authorized Aps

    Click Save. STEP 4 Configuring Wi-Fi Protected Setup You can configure Wi-Fi Protected Setup (WPS) on the Cisco RV180W to allow WPS-enabled devices to more easily connect to the wireless network. You must configure one AP with WPA/WPA2 to use WPS.
  • Page 82: Configuring A Wireless Distribution System (Wds)

    WDS must be configured to use the same radio channel, method of encryption (none, WEP, or WPA) and encryption keys. You need to configure WDS if you are using the Cisco RV180W in WDS Bridge or WDS Repeater mode. See...
  • Page 83: Configuring Load Balancing

    Configuring Load Balancing Click Save. STEP 4 You can manually add WDS peers that can connect to the Cisco RV180W: In the WDS Peer Table, click Add. STEP 1 Enter the MAC (hardware) address of the WDS peer and click Save.
  • Page 84 Configuring the Wireless Network (Cisco RV180W) Configuring Load Balancing Cisco RV180/RV180W Administration Guide...
  • Page 85 Configuring the Wireless Network (Cisco RV180W) Configuring Load Balancing Cisco RV180/RV180W Administration Guide...
  • Page 86: Chapter 4: Configuring The Firewall

    Cisco RV180/RV180W Firewall Features You can secure your network by creating and applying access rules that the Cisco RV180/RV180W uses to selectively block and allow inbound and outbound Internet traffic. You then specify how and to what devices the rules apply. You can configure the following: •...
  • Page 87 WAN ports are configured; for the Cisco RV180/RV180W, you may use the IP address if a static address is assigned to the WAN port, or if your WAN address is dynamic, a DDNS (Dynamic DNS) name can be used.
  • Page 88: Configuring Access Rules

    Configure access rules to control traffic to and from your network. To configure access rules, choose Firewall > Access Rules. All configured firewall rules on the Cisco RV180/RV180W are displayed in the Access Rule Table. Configuring the Default Outbound Policy...
  • Page 89: Creating An Access Rule

    • BOOTP_CLIENT (Bootstrap Protocol client) • BOOTP_SERVER (Bootstrap Protocol server) • CU-SEEME (videoconferencing) UDP or TCP • DNS (Domain Name System), UDP or TCP • FINGER • FTP (File Transfer Protocol) • HTTP (Hyptertext Transfer Protocol) Cisco RV180/RV180W Administration Guide...
  • Page 90 SNMP (Simple Network Management Protocol) TCP or UDP • SNMP-TRAPS (TCP or UDP) • SQL-NET (Structured Query Language) • SSH (TCP or UDP) • STRMWORKS • TACACS (Terminal Access Controller Access-Control System) • TELNET (command) • TFTP (Trivial File Transfer Protocol) Cisco RV180/RV180W Administration Guide...
  • Page 91 Enable box and enter the IP address you want to use. c. Under Rule Status, choose Enabled or Disabled. You may want to configure a rule and choose Disabled if you want to enable it at a later time. Cisco RV180/RV180W Administration Guide...
  • Page 92: Configuring Attack Prevention

    Configuring Attack Prevention Attacks are malicious security breaches or unintentional network issues that render the Cisco RV180/RV180W unusable. Attack prevention allows you to manage WAN security threats such as continual ping requests and discovery via ARP scans. TCP and UDP flood attack prevention can be enabled to manage extreme usage of WAN resources.
  • Page 93: Configuring Content Filtering

    STEP 2 • WAN (Internet) Security Checks Respond to Ping on WAN (Internet)—To configure the Cisco RV180/ RV180W to allow a response to an Internet Control Message Protocol (ICMP) Echo (ping) request on the WAN interface, check this box. This setting is used as a diagnostic tool for connectivity problems.
  • Page 94 Block ActiveX—Similar to Java applets, ActiveX controls are installed on a Windows computer while running Internet Explorer. A malicious ActiveX control can be used to compromise or infect computers. Enabling this setting blocks ActiveX applets from being downloaded. Cisco RV180/RV180W Administration Guide...
  • Page 95: Configuring Url Blocking

    URL or newsgroup name), the site is blocked. To configure URL blocking: Choose Firewall > URL Blocking. The table displays currently blocked keywords. STEP 1 Click Add Row. STEP 2 Under Status, check the box to enable blocking for the new keyword. STEP 3 Cisco RV180/RV180W Administration Guide...
  • Page 96: Configuring Port Triggering

    You can also specify a port triggering rule by defining the type of traffic (TCP or UDP) and the range of incoming and outgoing ports to open when enabled. Cisco RV180/RV180W Administration Guide...
  • Page 97: Adding A Port Triggering Rule

    The table contains the following information: • Action—Whether to block or allow traffic (always or by schedule) that meets these filter rules, and when the rule is applicable. • Service—Service for which this port forwarding rule is applicable. Cisco RV180/RV180W Administration Guide...
  • Page 98: Adding A Port Forwarding Configuration

    STEP 4 device: • AIM (AOL Instant Messenger) • BGP (Border Gateway Control) • BOOTP_CLIENT (Bootstrap Protocol client) • BOOTP_SERVER (Bootstrap Protocol server) • CU-SEEME (videoconferencing) UDP or TCP • DNS (Domain Name System), UDP or TCP Cisco RV180/RV180W Administration Guide...
  • Page 99 SFTP (Secure Shell File Transfer Protocol) • SMTP (Simple Mail Transfer Protocol) • SNMP (Simple Network Management Protocol) TCP or UDP • SNMP-TRAPS (TCP or UDP) • SQL-NET (Structured Query Language) • SSH (TCP or UDP) • STRMWORKS Cisco RV180/RV180W Administration Guide...
  • Page 100 Enter the Destination IP address, or the address where traffic meeting the rule should be sent. b. In the Internal Port field, enter the port to which traffic should be forwarded. Click Save. STEP 9 Cisco RV180/RV180W Administration Guide...
  • Page 101: Configuring A Dmz Host

    Configuring a DMZ Host Configuring a DMZ Host The Cisco RV180/RV180W supports DMZ options. A DMZ is a sub-network that is open to the public but behind the firewall. DMZ allows you to redirect packets going to your WAN port IP address to a particular IP address in your LAN. It is recommended that hosts that must be exposed to the WAN (such as web or e-mail servers) be placed in the DMZ network.
  • Page 102: Adding A One-To-One Nat Rule

    The router uses the MAC address of a computer or device on the network to identify it and block or permit the access. Traffic coming in from a specified MAC address will be filtered depending upon the policy. Cisco RV180/RV180W Administration Guide...
  • Page 103: Configuring Ip/Mac Address Binding

    IP/MAC Binding allows you to bind IP addresses to MAC address. Some machines are configured with static addresses. To prevent users from changing static IP addresses, IP/MAC Binding should be enabled. If the Cisco RV180/RV180W sees packets with matching IP address but inconsistent MAC addresses, it drops those packets.
  • Page 104: Creating Custom Services

    If you chose TCP or UDP, in the Start Port field, enter the first TCP or UDP port of STEP 5 the range that the service uses. In the Finish Port field, enter the last TCP or UDP port of the range that the service uses. Cisco RV180/RV180W Administration Guide...
  • Page 105: Creating Schedules

    Configuring Session Settings You can limit the maximum number of unidentified sessions and half-open sessions on the Cisco RV180/RV180W. You can also introduce timeouts for TCP and UDP sessions to ensure Internet traffic is not deviating from expectations in your private network.
  • Page 106: Configuring Internet Group Management Protocol (Igmp)

    IGMP. Routers use IGMP periodically to check if the known group members are active. IGMP provides a method called dynamic membership by which a host can join or leave a multicast group at any time. Cisco RV180/RV180W Administration Guide...
  • Page 107: Adding Allowed Networks

    You can create LAN groups, which are groups of endpoints that are identified by their IP address. After creating a group, you can then configure actions, such as blocked keywords in a firewall rule, that apply to the group. (See Configuring URL Blocking, page 86.) Cisco RV180/RV180W Administration Guide...
  • Page 108: Adding A New Lan Group

    Choose Firewall > Advanced Settings > SIP ALG. STEP 1 Check the Enable box to enable SIP ALG support. If disabled, the router will not STEP 2 allow incoming calls to the UAC (User Agent Client) behind the Cisco RV180/ RV180W. Click Save. STEP 3...
  • Page 109: Firewall Configuration Examples

    Create an inbound rule as follows. In the example, CUSeeMe connections are allowed only from a specified range of external IP addresses. Parameter Value Connection Type Inbound Action Always Allow Service CU-SEEME:UDP Source IP Address Range Start 132. 1 77.88.2 Cisco RV180/RV180W Administration Guide...
  • Page 110 Connection Type Inbound Action Always Allow Service HTTP Source IP Single Address Start 10. 1 .0.52 Send to Local Server (DNAT IP) 192. 1 68. 1 .2 (local IP address of your web server) Rule Status Enabled Cisco RV180/RV180W Administration Guide...
  • Page 111 Create an outbound access rule with the following parameters: Parameter Value Connection Type Outbound Action Block by Schedule Schedule Weekend Service HTTP Source IP Address Range Start starting IP address Finish ending IP address Destination IP Rule Status Enabled Cisco RV180/RV180W Administration Guide...
  • Page 112 Configuring the Firewall Firewall Configuration Examples Create an inbound access rule with the following parameters: Parameter Value Connection Type Inbound Action Block by Schedule Schedule Weekend Service All Traffic Source IP Rule Status Enabled Cisco RV180/RV180W Administration Guide...
  • Page 113: Chapter 5: Configuring Virtual Private Networks (Vpns) And Security

    VPN. • Site-to-Site Access with Gateway-to-Gateway VPN, page 105 • Remote Access with an IPsec Client (Client-to-Gateway VPN), page 105 • Remote Access with Cisco QuickVPN, page 106 • Remote access using PPTP, page 106 Cisco RV180/RV180W Administration Guide...
  • Page 114 2. To configure the settings required by the VPN client software, use the Advanced VPN Setup page to edit the IKE Policy and the VPN Policy. For the required settings, refer to the VPN client documentation. See Configuring Advanced VPN Parameters, page 109. Cisco RV180/RV180W Administration Guide...
  • Page 115 See Configuring VPN Users, page 119. 2. Instruct users to obtain the free Cisco QuickVPN software from Cisco.com, and install it on their computers. For more information, see.Appendix A, “Using Cisco QuickVPN for Windows 7, 2000, XP, or Vista.”...
  • Page 116: Configuring A Basic Vpn

    Choose the type of peer that the VPN tunnel will connect: STEP 1 • Gateway—Connects the Cisco RV180W to a gateway, such as another Cisco RV180W at another site. • VPN Client—Connects the Cisco RV180W to remote clients. The remote clients must run VPN client software.
  • Page 117 IP address range used on the local LAN. Click Save to save your settings, or click Cancel to reload the page with the STEP 5 current settings. After you save your settings, the Advanced VPN Setup page appears. Cisco RV180/RV180W Administration Guide...
  • Page 118: Viewing Basic Vpn Default Values

    The Advanced VPN Setup page allows you to configure advanced VPN parameters, such as IKE and other VPN policies. These policies control how the Cisco RV180/RV180W initiates and receives VPN connections with other endpoints. Use the VPN > IPsec > Advanced VPN Setup page to view, add, edit, and delete IKE and VPN policies.
  • Page 119: Configuring Ike Policies

    Policy Name—Enter a unique name for the policy for identification and management purposes. • Direction/Type—Choose one of the following connection methods: Initiator—The router will initiate the connection to the remote end. Responder—The router will wait passively and respond to remote IKE requests. Cisco RV180/RV180W Administration Guide...
  • Page 120 Enter the IP address or domain name in the Identifier field. In the IKE SA Parameters section, enter these settings: STEP 4 The Security Association (SA) parameters define the strength and mode for negotiating the SA. • Encryption Algorithm—Choose the algorithm used to negotiate the SA: Cisco RV180/RV180W Administration Guide...
  • Page 121 The DH Group sets the strength of the algorithm in bits. Ensure that the DH Group is configured identically on both sides of the IKE policy. • SA Lifetime—Enter the interval, in seconds, after which the Security Association becomes invalid. Cisco RV180/RV180W Administration Guide...
  • Page 122 (CHAP). After completing this procedure, set up the RADIUS server on the Security > RADIUS Server page. See Using the Cisco RV180/RV180W With a RADIUS Server, page 125. IPsec Host—The router is authenticated by a remote gateway with a username and password combination.
  • Page 123: Configuring Vpn Policies

    VPN. Enter the Start IP Address and End IP Address in the provided fields. Enter the first IP address of the range in the Start Address field. Enter the final IP address of the range in the End Address field. Cisco RV180/RV180W Administration Guide...
  • Page 124 Local Traffic Selector: 192. 1 68. 1 .0/24 Remote Traffic Selector: 192. 1 68.0.0/16 In the Split DNS section, check the Enable box to allow the Cisco RV180/RV180W STEP 3 to find the DNS server of the remote router without going through the ISP (Internet).
  • Page 125 When configuring a lifetime in kilobytes (also known as lifebytes), be aware that two SAs are created for each policy. One SA applies to inbound traffic, and one SA applies to outbound traffic. Due to differences Cisco RV180/RV180W Administration Guide...
  • Page 126 Remote Endpoint: 10.0.0.2 Local IP: Subnet 192.168.1.0 255.255.255.0 Remote IP: Subnet 192.168.2.0 255.255.255.0 SPI-Incoming: 0x1111 Encryption Algorithm: DES Key-In: 11112222 Key-Out: 33334444 SPI-Outgoing: 0x2222 Integrity Algorithm: MD5 Key-In: 1122334444332211 Key-Out: 5566778888776655 Router 2: WAN1=10.0.0.2 LAN=192.168.2.1 Subnet=255.255.255.0 Cisco RV180/RV180W Administration Guide...
  • Page 127: Monitoring Vpn Tunnel Status

    Status of the SA for IKE policies: Not Connected or State If a VPN policy state is “not IPsec SA Established. connected”, it can be enabled from the List of VPN Policies in the VPN > IPsec > Advanced VPN Setup page. Cisco RV180/RV180W Administration Guide...
  • Page 128: Configuring Vpn Users

    Configuring VPN Users Use the VPN > IPsec > VPN Users page to configure PPTP Server settings (if applicable) and to add VPN clients for PPTP, XAUTH, and Cisco QuickVPN. You can also created comma-separated value (CSV) files containing user NOTE information and import them to easily add multiple users.
  • Page 129 Allow User to Change Password—Check the box if you want the user to be able to change the password. Otherwise, uncheck the box. Protocol—Choose the type of user: QuickVPN—The user uses the Cisco QuickVPN client and is authenticated by the VPN server. PPTP—The user is authenticated by a PPTP server.
  • Page 130: Configuring Vpn Passthrough

    VPN passthrough allows VPN traffic that originates from VPN clients to pass through the router. For example, if you are not using a VPN that is configured on the Cisco RV180/RV180W, but are using a laptop to access a VPN at another site, configuring VPN passthrough allows that connection.
  • Page 131: Uploading A Trusted Certificate

    Uploading a Trusted Certificate. • Self Certificates—Upload a certificate that has been generated from the Cisco RV180/RV180W, and either signed by a CA, or self-signed. See Uploading a Self Certificate. • Self Certificate Requests—Generate a self-certificate request to give to a CA for signing, or to self-certify.
  • Page 132: Generating New Certificate Requests

    (Optional) Enter the IP address of the router. STEP 7 (Optional) Enter the domain name of the router. STEP 8 (Optional) Enter the e-mail address of the company contact that is used when STEP 9 generating the self certificate request. Cisco RV180/RV180W Administration Guide...
  • Page 133: Viewing A Self Certificate Request

    .csr file. Uploading a Self Certificate You can upload a certificate that you have generated from the Cisco RV180/ RV180W and has been either signed by a CA, or signed by your organization. The file must be located on the computer connected to the Cisco RV180/RV180W.
  • Page 134: Exporting The Router's Current Certificate

    STEP 1 Under Export Certificate, click Export for Client to export the certificate. It will be STEP 2 uploaded to an endpoint that will connect to the Cisco RV180/RV180W as a VPN client. Using the Cisco RV180/RV180W With a RADIUS Server A RADIUS server can be configured to maintain a database of user accounts and can be used for authenticating this device's users.
  • Page 135: Configuring Captive Portal

    It also prevents access to that port in cases where the authentication fails. It provides an authentication mechanism to devices trying to connect to a LAN. The Cisco RV180/RV180W acts as a supplicant in the 802. 1 x authentication system.
  • Page 136 Select the LAN port that should be configured as an 802. 1 x supplicant. STEP 3 Enter the username and password sent by the Cisco RV180/RV180W to the STEP 4 authenticator for authentication. The username and password are the credentials sent to the authenticating server (the device running 802.
  • Page 137: Chapter 6: Configuring Quality Of Service (Qos)

    WAN QoS profiles let you manage the bandwidth of the traffic flowing from the secure network (LAN) to the insecure network (WAN). You can configure WAN QoS profiles to control the rate at which the RV180/ RV180W transmits data. For example, limiting the outbound traffic helps you prevent the LAN users from consuming all of the bandwidth of the Internet link.
  • Page 138 Enter the total WAN bandwidth (1–100 Mbps). Bandwidth Click Save. STEP 3 Adding WAN QoS Profiles To add a WAN QoS profile: Choose QoS > WAN QoS Profiles. STEP 1 In the WAN QoS Profile Table, click Add. STEP 2 Cisco RV180/RV180W Administration Guide...
  • Page 139: Configuring Profile Binding

    In the Available Profiles field, choose a WAN QoS profile. STEP 2 To create a profile, click Configure Profile. See Configuring WAN QoS Profiles, page 128 for more information. From the Service drop-down menu, choose the service to which the profile STEP 3 applies. Cisco RV180/RV180W Administration Guide...
  • Page 140: Configuring Cos Settings

    Click Save. STEP 6 Configuring CoS Settings You can map CoS priority settings to the traffic forwarding queue on the RV180/ RV180W. To map CoS priority settings to the traffic forwarding queue: Choose QoS > CoS Settings > Cos Settings.
  • Page 141: Mapping Cos Settings To Dscp Values

    For each CoS priority level, enter the corresponding DSCP value (0–63). The STEP 3 default value is 63. Click Save. STEP 4 To restore the default CoS to DSCP mappings, click Restore Default and, when prompted, click OK. Then, click Save. Cisco RV180/RV180W Administration Guide...
  • Page 142: Chapter 7: Administering Your Cisco Rv180/Rv180W

    Administering Your Cisco RV180/RV180W This chapter describes the administration features of the Cisco RV180/RV180W, including creating users, configuring network management, diagnostics and logging, date and time, and other settings. It contains the following sections: • Configuring Language, page 134 •...
  • Page 143: Configuring Language

    STEP 2 In the Individual Rule Settings field, in the Minimal Password Length field, enter the STEP 3 minimum password length. NOTE: Passwords cannot be the same as the username, which is “cisco” by default. Click Save. STEP 4 Using the Management Interface The Cisco RV180/RV180W provides a management interface to configure accounts for user and administrative access to the system.
  • Page 144: Configuring Https Access

    Administering Your Cisco RV180/RV180W Using the Management Interface Configuring HTTPS Access You can enable HTTPS access on the LAN interface of the Cisco RV180/RV180W. If a user connects a PC to the LAN port, web access is then allowed using secure HTTP (HTTPS).
  • Page 145: Setting The Session Timeout Value

    STEP 4 Configuring Network Management The Cisco RV180/RV180W supports Simple Network Management (SNMP) to allow you to monitor and manage your router from an SNMP manager. SNMP provides a remote means to monitor and control network devices, and to manage configurations, statistics collection, performance, and security.
  • Page 146: Editing Snmpv3 Users

    Click Save. STEP 3 Editing SNMPv3 Users SNMPv3 parameters can be configured for the two default Cisco RV180/RV180W user accounts (Admin and Guest). To configure: In the SNMPv3 User Table, check the box for the user to edit and click Edit.
  • Page 147: Configuring Access Control Rules

    Administering Your Cisco RV180/RV180W Configuring Network Management Enter the community string to which the agent belongs. Most agents are STEP 5 configured to listen for traps in the Public community. Click Save. STEP 6 Configuring Access Control Rules The SNMP v1/v2c Access Control Table is a table of access rules that enables read-only or read-write access for select IP addresses in a defined SNMP agent's community.
  • Page 148: Configuring The Wan Traffic Meter

    STEP 3 Configuring the WAN Traffic Meter The WAN traffic meter displays statistics for traffic coming from the WAN (Internet) to the Cisco RV180/RV180W, and traffic going from the Cisco RV180/RV180W to the WAN. To configure the WAN Traffic Meter: Choose Administration >...
  • Page 149 STEP 3 statistics before the counter is reset. Click Save. STEP 4 To configure what the Cisco RV180/RV180W does when the traffic limit is reached: Choose Administration > WAN Traffic Meter. STEP 1 Under When Limit Is Reached, select one of the following: STEP 2 •...
  • Page 150: Using Network Diagnostic Tools

    Administering Your Cisco RV180/RV180W Using Network Diagnostic Tools Using Network Diagnostic Tools Using PING PING can be used to test connectivity between this router and another device on the network connected to this router. To use PING: Choose Diagnostics > Network Tools.
  • Page 151: Capturing And Tracing Packets

    Administering Your Cisco RV180/RV180W Capturing and Tracing Packets Capturing and Tracing Packets You can capture all packets that pass through a selected interface (LAN or WAN). To capture packets: Choose Diagnostics > Capture Packets. STEP 1 Click Packet Trace; a new window appears.
  • Page 152: Configuring Firewall Logs

    Administering Your Cisco RV180/RV180W Configuring Logging Configuring Firewall Logs To configure firewall logs: Choose Administration > Logging > Firewall Logs. STEP 1 Under the type of routing logs, check the box to choose one or both of the STEP 2 following for each type: •...
  • Page 153: Configuring Remote Logging

    Administering Your Cisco RV180/RV180W Configuring Logging Click Save. STEP 5 Configuring Remote Logging To configure remote logging: Choose Administration > Logging > Remote Logging Configuration. STEP 1 In the Remote Log Identifier field, enter a prefix to add to every logged message STEP 2 for easier identification of the source of the message.
  • Page 154: Configuring The Discovery Settings

    Syslog Server field. Choose the logging policy for each syslog server. You can configure up to 8 syslog servers. Click Save. STEP 7 Configuring the Discovery Settings The Cisco RV180/RV180W supports two types of discovery protocols: Bonjour and Universal Plug and Play (UPnP). Cisco RV180/RV180W Administration Guide...
  • Page 155: Configuring Bonjour

    Cisco RV180/RV180W advertises itself to all devices connected to it on VLAN 1, and devices joining the network can connect to the Cisco RV180/ RV180W. If you have other VLANs created on your network, you can enable Bonjour on those VLANs too.
  • Page 156: Configuring Time Settings

    Cisco RV180/RV180W advertises itself to plug and play devices connected to it on VLAN 1, and plug and play devices joining the network can connect to the Cisco RV180/RV180W. If you have other VLANs created on your network, you can enable UPnP on those VLANs too. (See...
  • Page 157: Backing Up And Restoring The System

    Administering Your Cisco RV180/RV180W Backing Up and Restoring the System Select whether to use a Network Time Protocol (NTP) server, or set the time and STEP 4 date manually. If you chose NTP, choose to use either a default NTP server, or a custom NTP STEP 5 server.
  • Page 158: Importing Csv Files

    Administering Your Cisco RV180/RV180W Importing CSV Files To save a copy of your router’s mirror configuration, click Backup Mirror Configuration. The browser downloads the configuration file and prompts you to save the file on the PC. The mirror image is the last working configuration. The startup configuration is the configuration that the device used to boot up.
  • Page 159 Administering Your Cisco RV180/RV180W Importing CSV Files Possible Values: • SSLVPNDomain Code - 5 • Domain Name - String • PortalLayoutName - String • AutheticationType - String • AuthenticationServer - IP Address • AuthenticationRadiusSecret - String • NTDomainWorkGroup - String •...
  • Page 160 IPSECUSER Code: 1 • Username - String • Password - String • UserType - boolean (0 - Standard Ipsec / 1 - Cisco Quick VPN) • AllowChangePassword - boolean "<SSLVPNUSER Code>", "<UserName>", "<FirstName>", "<LastName>", "<GroupName>", "<UserType>", "<UserTimeOut>", "<DenyLogin>", "<DenyLoginFromWan>", "<LoginFromIP>", "<LoginFromBrowser>", "<Password>"...
  • Page 161: Upgrading Firmware

    Administering Your Cisco RV180/RV180W Upgrading Firmware Sample CSV file format: "5","domain1","SSLVPN","radius_pap","14.0.0.1","test","","","" "4","group2","domain1","30" "3","cisco","RWUSER","1","SHA","authPassword","AES","privPassword" "2","p2","pp2" "1","rrrr","sss","0","1" "0","user102","sss","dddd","SSLVPN","4","10","0","1","0","0","fail" Importing a File Use the Administration > CSV File Import page to import a CSV file that you created for domains, groups, and users.
  • Page 162: Rebooting The Cisco Rv180/Rv180W

    Administering Your Cisco RV180/RV180W Rebooting the Cisco RV180/RV180W firmware. Choose Status > System Summary to make sure the router installed the new firmware version. Rebooting the Cisco RV180/RV180W To reboot the router, choose Administration > Reboot Router. Click Reboot. Restoring the Factory Defaults...
  • Page 163 Administering Your Cisco RV180/RV180W Restoring the Factory Defaults Cisco RV180/RV180W Administration Guide...
  • Page 164: Chapter 8: Viewing The Cisco Rv180/Rv180W Status

    Cisco RV180/RV180W. • Viewing the Dashboard, page 155 • Viewing the System Summary, page 158 • Viewing the Wireless Statistics (Cisco RV180W), page 162 • IPsec Connection Status, page 163 • Viewing VPN Client Connection Status, page 164 •...
  • Page 165 Viewing the Cisco RV180/RV180W Status Viewing the Dashboard The view of the back panel shows you which ports are used (colored in green) and allows you to click the port to obtain information about the connection. • To view a port’s connection information, click the port.
  • Page 166 Viewing the Cisco RV180/RV180W Status Viewing the Dashboard Syslog Summary Displays the number of events logged for these categories: • Emergency • Alert • Critical • Error • Warning To view the logs, click details. For more information see Viewing Logs, page 165.
  • Page 167: Viewing The System Summary

    Wireless Networks Lists the status of the four wireless network SSIDs. To view the router’s wireless settings, click details. For more information see Viewing the Wireless Statistics (Cisco RV180W), page 162. Site-to-Site Tunnels Displays the connected IPSec VPN tunnels. Click to view the IPsec Connection Status page.
  • Page 168 Viewing the Cisco RV180/RV180W Status Viewing the System Summary If applicable, to change a system setting, click its corresponding Edit link. STEP 3 The System Summary page displays this information: System Information Host Name The name of the device. Firmware Version Current software version the device is running.
  • Page 169 Viewing the Cisco RV180/RV180W Status Viewing the System Summary WAN (Internet) Information (IPv4) MAC Address The MAC address of the WAN port. Connection Time The time duration for which the connection is up. Connection Type Indicates if the WAN IPv4 address is obtained...
  • Page 170 Viewing the Cisco RV180/RV180W Status Viewing the System Summary WAN (Internet) Information (IPv6) Connection Time The time duration for which the connection is up. Connection Type Indicates if the WAN IPv6 address is obtained dynamically through a DHCP server, assigned statically by the user, or obtained through a PPPoE/ PPTP/L2TP ISP connection.
  • Page 171: Viewing The Wireless Statistics (Cisco Rv180W)

    Viewing the Cisco RV180/RV180W Status Viewing the Wireless Statistics (Cisco RV180W) Available Access Points Table This table displays the list of access points currently enabled on the router. It contains the following information: SSID The SSID (name) of the access point.
  • Page 172: Ipsec Connection Status

    Viewing the Cisco RV180/RV180W Status IPsec Connection Status Errors The number of received/sent packet errors reported to the radio, over all configured APs. Dropped The number of received/sent packets dropped by the radio, over all configured APs. Multicast The number of multicast packets sent over this radio.
  • Page 173: Viewing Vpn Client Connection Status

    Viewing the Cisco RV180/RV180W Status Viewing VPN Client Connection Status State The current status of the SA for IKE policies. The status can be IPsec SA Established or IPsec SA Not Established. Action Click Connect to establish an inactive SA connection.
  • Page 174: Viewing Logs

    The protocol the user uses, QuickVPN or PPTP. Disconnect Click to disconnect this user. Viewing Logs The View Logs page allows you to view the Cisco RV180/RV180W logs. To view the logs: Choose Status > View Logs. STEP 1 Click Refresh Logs to display the latest log entries.
  • Page 175: Viewing Port Triggering Status

    Viewing the Cisco RV180/RV180W Status Viewing Port Triggering Status From the Filter drop-down menu, choose the interface type. You can choose one STEP 2 of the following options: Displays a list of all devices connected to the router. Wireless Displays a list of all devices connected through the wireless interface.
  • Page 176: Viewing Port Statistics

    Viewing the Cisco RV180/RV180W Status Viewing Port Statistics The Port Triggering Status window provides information on the ports that have been opened per the port triggering configuration rules. The ports are opened dynamically whenever traffic that matches the port triggering rules flows through them.
  • Page 177: Viewing Open Ports

    Viewing the Cisco RV180/RV180W Status Viewing Open Ports The Port Statistics page displays this information: Port The name of the port. Status The status of the port (enabled or disabled). Operational Mode The bandwidth the port is operating at. Packets The number of received/sent packets per second.
  • Page 178 Viewing the Cisco RV180/RV180W Status Viewing Open Ports Cisco RV180/RV180W Administration Guide...
  • Page 179: Appendix A: Using Cisco Quickvpn For Windows 7, 2000, Xp, Or Vista

    Using Cisco QuickVPN for Windows 7, 2000, XP, or Vista Overview This appendix explains how to install and use the Cisco QuickVPN software that can be downloaded from www.cisco.com. QuickVPN works with computers running Windows 7, 2000, XP, or Vista. (Computers using other operating systems will have to use third-party VPN software.)
  • Page 180: Installing The Cisco Quickvpn Software

    Installing the Cisco QuickVPN Software Installing the Cisco QuickVPN Software Installing from the CD-ROM Insert the Cisco RV180/RV180W CD-ROM into your CD-ROM drive. After the STEP 1 Setup Wizard begins, click the Install QuickVPN link. The License Agreement window appears.
  • Page 181: Using The Cisco Quickvpn Software

    Configuring VPN Users, page 119. In the Server Address field, enter the IP address or domain name of the Cisco RV180/RV180W. In the Port For QuickVPN field, enter the port number that the QuickVPN client will use to communicate with the remote VPN router, or keep the default setting, Auto.
  • Page 182 Using Cisco QuickVPN for Windows 7, 2000, XP, or Vista Using the Cisco QuickVPN Software If you clicked Change Password and have permission to change your own STEP 6 password, you will see the Connect Virtual Private Connection window. Enter your password in the Old Password field.
  • Page 183: Appendix B: Where To Go From Here

    Where to Go From Here Cisco provides a wide range of resources to help you obtain the full benefits of the Cisco RV180/RV180W. Product Resources Support Cisco Small Business www.cisco.com/go/smallbizsupport Support Community Cisco Small Business www.cisco.com/go/smallbizhelp Support and Resources Phone Support Contacts www.cisco.com/en/US/support/...

This manual is also suitable for:

Rvrv180w

Table of Contents