Cisco RV160 Bruksanvisning

Cisco Router RV160

Läs gratis den bruksanvisning för Cisco RV160 (112 sidor) i kategorin Router. Guiden har ansetts hjälpsam av 7 personer och har ett genomsnittsbetyg på 4.4 stjärnor baserat på 4 recensioner. Har du en fråga om Cisco RV160 eller vill du ställa frågor till andra användare av produkten? Ställ en fråga

Sida 1/112
RV160x Administration Guide
First Published: 2018-03-07
Last Modified: 2018-03-30
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15
of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment
generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications.
Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense.
The following information is for FCC compliance of Class B devices: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of
the FCC rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio
frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference
will not occur in a particular installation. If the equipment causes interference to radio or television reception, which can be determined by turning the equipment off and on, users are
encouraged to try to correct the interference by using one or more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
Modifications to this product not authorized by Cisco could void the FCC approval and negate your authority to operate the product
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of
the UNIX operating system. All rights reserved. Copyright ©1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED "AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com
go trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any
other company. (1721R)
©2018 Cisco Systems, Inc. All rights reserved.
C O N T E N T S
Getting Started 1
C H A P T E R 1
RV160X Product Features 1
Getting Started 5
Launch Setup Wizard 6
User Interface 7
Status and Statistics 11
C H A P T E R 2
System Summary 11
TCP/IP Services 13
Port Traffic 14
WAN QoS Statistics 15
Switch QoS Statistics 16
Connected Devices 16
Routing Table 17
DHCP Bindings 17
VPN Status 18
View Logs 19
Captive Portal Status 20
Administration 21
C H A P T E R 3
File Management 21
Manual Upgrade 22
Auto Update 22
Firmware Auto Fallback Mechanism 23
Reboot 23
Diagnostic 24
RV160x Administration Guide
iii
Certificate 24
Import Certificate 24
Generate CSR/Certificate 25
Show Built-in 3rd Party CA Certificates 26
Configuration Management 26
Copy/Save Configuration 26
System Configuration 27
C H A P T E R 4
Initial Router Setup 27
System 29
Time 29
Log 30
Email Server 31
Remote Syslog Servers 31
Email 32
User Accounts 32
Remote Authentication Service 34
User Groups 34
IP Address Groups 36
SNMP 36
Discovery-Bonjour 37
LLDP 37
Automatic Updates 38
Schedules 39
Service Management 39
PnP (Plug and Play) 39
Plug and Play Connect Service 40
Creating a Controller Profile 40
Registering Devices 41
WAN 43
C H A P T E R 5
WAN Settings 43
Dynamic DNS 46
IPv6 Transition 46
RV160x Administration Guide
iv
Contents
IPv6 in IPv4 Tunnel (6in4) 46
IPv6 Rapid Deployment (6rd) 47
LAN 49
C H A P T E R 6
Port Settings 49
VLAN Settings 50
Option82 Settings 52
Static DHCP 53
802.1X Configuration 53
Router Advertisement 54
Wireless 57
C H A P T E R 7
Basic Settings 57
Concurrent Dual Band Selection 59
Configuring 2.4 GHz Radio 59
Configuring 5 GHz Radio 60
Advanced Settings 61
WPS 62
Captive Portal 63
Lobby Ambassador 64
Routing 67
C H A P T E R 8
Static Routing 67
RIP 68
IGMP Proxy 69
Firewall 71
C H A P T E R 9
Basic Settings 71
Access Rules 73
Network Address Translation 74
Static NAT 74
Port Forwarding 75
Port Triggering 76
Policy NAT 77
RV160x Administration Guide
v
Contents
Policy NAT Use Cases 77
Session Timeout 80
DMZ Host 81
VPN 83
C H A P T E R 1 0
VPN Setup Wizard 83
IPSec VPN 85
IPSec Profiles 86
Site-to-Site 88
Site-to-Site VPN Connection 88
Client to Site 91
OpenVPN 93
PPTP Server 94
GRE Tunnel 95
VPN Passthrough 95
Resource Allocation 96
Security 97
C H A P T E R 1 1
Content Filtering 97
QoS 99
C H A P T E R 1 2
Traffic Classes 99
WAN Queuing 100
WAN Policing 101
WAN Bandwidth Management 102
Switch Classification 102
Switch Queuing 103
Where To Go 105
C H A P T E R 1 3
Where To Go From Here 105
RV160x Administration Guide
vi
Contents
C H A P T E R 1
Getting Started
This section describes how to get started on the device and contains the following topics:
RV160X Product Features, on page 1
Getting Started, on page 5
Launch Setup Wizard, on page 6
User Interface, on page 7
RV160X Product Features
Thank you for purchasing the Cisco RV160/RV160W VPN routers. The Cisco RV160 and RV160W VPN
routers are high-performance models that combine business-class features with security, reliability and overall
value. Both models are perfect for the small business or small home office network.
Features and Benefits
RV160 VPN Router provides wired connectivity
RV160W is a wireless VPN Router: 2x2 11ac wireless
Flexible SFP/RJ45 combination WAN Ports
Native 4-port Switch
High-performance Gigabit Ethernet ports, enabling large file transfers and multiple users
IP Security, PPTP and Open VPN Server for secure connectivity for remote employees and multiple
office sites
Strong security: Proven stateful packet inspection (SPI) firewall and hardware encryption
Easy to set up and use with wizard-based configuration
New User Interface design for easier configuration and device management
Updated, new hardware enclosure design
Product Specifications
SpecificationDescription
RJ45 SFP Gigabit Combination PortEthernet WAN
RV160x Administration Guide
1
SpecificationDescription
4 RJ45 Gigabit EthernetEthernet LAN
1 RJ45Console Port
Power On/OffSwitch
CAT5 or betterCabling Type
Power, VPN, WAN, LANLED’s
LinuxOperating System
LAN
16VLAN
Yes, 802.1XPort Security
Dual Stack, 6rd,6in4IPv6
Dynamic Host Configuration Protocol (DHCP) client,
static IP, Point-to-Point Protocol over Ethernet
(PPPoE), PPTP, L2TP, transparent bridge
WAN
2x2 Wireless 11acWLAN
Security
Stateful Packet Inspection (SPI) FirewallFirewall
Port-Forwarding and Triggering
Denial of Service prevention (DoS)
IP access control listsAccess Control
HTTPS, username/password complexitySecure Management
Two levels of access: Admin and GuestUser Privileges
Network
RV160x Administration Guide
2
Getting Started
RV160X Product Features
SpecificationDescription
Dynamic Host Configuration Protocol (DHCP)
server
Point-to-Point Protocol over Ethernet (PPPoE)
Point-to-Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
DNS proxy
DHCP relay agent
IGMP Proxy and multicast forwarding
Rapid Spanning Tree Protocol (RSTP)
Dynamic Domain Name System (TZO, DynDNS,
3322.org, NOIP)
Network Address Translation (NAT), Port
Address Translation (PAT)
One-to-One NAT
Port management
Port mirroring
Software configurable DMZ to any LAN IP
address
Session Initiation Protocol (SIP) Application
Layer Gateways (ALG)
Network Protocols
Static routing, IGMP proxy
Dynamic routing
RIP v1 and v2
RIP for IPv6 (RIPng)
Inter-VLAN routing
Routing Protocols
Port Address Translation (PAT), Network Address
Port Translation (NAPT)
Port forwarding, One-to-one NAT, VPN NAT
Transversal, Session Initiation (SIP), Application
Level Gateway (ALG), FTP ALG
Network Address Translation (NAT Protocol
VPN
10 IPsec TunnelsGateway-to-Gateway IPsec VPN
10 IPsec TunnelsClient-to-Gateway IPsec VPN
RV160x Administration Guide
3
Getting Started
RV160X Product Features
SpecificationDescription
0° to 40°C (32° to 104°F)Operating Temperature
-20° to 70°C (-4° to 158°F)Storage Temperature
10% to 85% noncondensingOperating Humidity
5% to 90% noncondensingStorage Humidity
Safety:
UL 60950-1
CAN/CSA-C22.2 No. 60950-1
IEC 60950-1
EN 60950-1
Radio approvals:
FCC Part 15.247, 15.407
RSS-210 (Canada)
EN 300.328, EN 301.893 (Europe)
AS/NZS 4268.2003 (Australia and New Zealand)
EMI and susceptibility (Class B):
FCC Part 15.107 and 15.109
ICES-003 (Canada)
EN 301.489-1 and -17 (Europe)
Certifications
Getting Started
Your device comes with default settings that are optimized for many small businesses. However, your network
demands or Internet Service Provider (ISP) might require you to modify a few of these settings. You can do
so using the web interface, that is using Internet Explorer, Firefox or Safari (for Mac) on a PC.
To launch the web interface, follow these steps:
Step 1 Connect a PC to a numbered LAN port on the device. If the PC is configured to become a Dynamic Host Configuration
Protocol (DHCP) client, an IP address in the 192.168.1.x range is assigned to the PC. DHCP automates the process of
assigning IP addresses, subnet masks, default gateways and other settings to computers. Computers must be set to
participate in the DHCP process to obtain an address. This is done by selecting to obtain an IP address automatically in
the properties of TCP/IP on the computer.
Step 2 Start a web browser.
Step 3 In the address bar, enter the default IP address of the device, . The browser might issue a warning that the192.168.1.1
website is untrusted. Continue to the website.
RV160x Administration Guide
5
Getting Started
Getting Started
Link to the .VPN Status WizardVPN Setup Wizard
Initial Configuration
Link to the page where you can change the administratorUser Accounts
password and set up a guest account.
Change Administrator
Password
Link to the WAN Settings page where you can modify the WAN parameters.Configure WAN Settings
Link to the page where you can configure the VLAN.VLAN MembershipConfigure LAN Settings
Quick Access
Link to the page where you can update the device firmware.File ManagementUpgrade Router
Firmware
Link to the page where you can enable the basicFirewall >Basic Settings
features of the device.
Configure Remote
Management Access
Link to the page where you can manage the routersConfig Management
configuration.
Backup Device
Configuration
Device Status
Link to the page that displays the IPv4 and IPv6 configuration,System Summary
and firewall status on the device.
System Summary
Link to the page that displays the status of the VPNs managed byVPN Status
this device.
VPN Status
Link to the Port Traffic page which displays the devices port status and port
traffic.
Port Statistics
Link to the page which displays the device’s port listen statusTCP/IP Services
and the established connection status.
Traffic Statistics
Link to the View Logs page which displays the logs on the device.View System Log
User Interface
The user interface is designed to make it easy to set up and manage the device.
The header toolbar icons are described in the table below.
Table 1: Header Toolbar Options
DescriptionIcon
Toggle button – Located on the top left of the header – This toggle button helps
to expand or collapse the navigation pane.
Language Selection This drop-down list allows you to select the language for
the user interface.
RV160x Administration Guide
7
Getting Started
User Interface
DescriptionIcon
Help – The online-help documentation for the router.
About – The firmware version information for the router.
Logout – Click to log out of the router.
Icon Legend
This table displays the most common icons found throughout the router's graphical interface and their meanings.
Add – Click to add an entry.
Edit – Click to edit an entry.
Delete Click to delete an entry.
Refresh – Click to refresh the data.
Reset counters – Click to reset the counters.
Clone – Click to clone the settings.
Export – Click to export the configurations.
Import – Click to import the configurations.
RV160x Administration Guide
8
Getting Started
User Interface
Popup Windows
Some links and buttons launch popup windows that display more information or related configuration pages.
If the web browser displays a warning message about the popup window, allow the blocked content.
RV160x Administration Guide
9
Getting Started
User Interface
RV160x Administration Guide
10
Getting Started
User Interface
C H A P T E R 2
Status and Statistics
This section describes the device's status and statistics and contains the following topics:
System Summary, on page 11
TCP/IP Services, on page 13
Port Traffic, on page 14
WAN QoS Statistics, on page 15
Switch QoS Statistics, on page 16
Connected Devices, on page 16
Routing Table, on page 17
DHCP Bindings, on page 17
VPN Status, on page 18
View Logs, on page 19
Captive Portal Status, on page 20
System Summary
The System Summary provides a snapshot of the settings on your device. It displays your devices firmware,
serial number, port traffic, routing status, VPN server settings, and mobile networks. To view this System
Summary, click .Status and Statistics> System Summary
System Information
– The serial number of the device.Serial Number
– The active length of time in yy-mm-dd, hours, and minutes that the device has beenSystem Up Time
up.
– The current date and time.Current Time
– The hardware version number.PID VID
– The LAN MAC address.LAN MAC
WAN MAC – The WAN MAC address.
RV160x Administration Guide
11
Firmware Information
Firmware Version – The firmware version number installed on the router.
– A value used for file validation.Firmware MD5 Checksum
Defined localization support.Locale
Language Version – Language version.
– A value used for language file validation.Language MD5 Checksum
Port Status
– Defined name and number of the port.Port ID
Name of the interface used for the connection.Interface
– Status of connectionStatus
– Connection speed.Speed
IPv4 and IPv6
Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) are numerical IP addresses necessary
for Internet-enabled devices to communicate. Without IP addresses, computers would not be able to
communicate and send data to each other. It's essential to the infrastructure of the web.
This section diplays the following:
– IP address assigned to the interface.IP Address
– Default gateway for the interface.Default Gateway
– IP address of the DNS server. A DNS server is a computer server that contains a database ofDNS
public IP addresses and their associated hostnames.
– Dynamic domain name system (DNS) is a method of automatically updating a nameDynamic DNS
server in the DNS, often in real time, with the active DDNS configuration of its configured hostnames,
addresses or other information. This displays the IP address of the DDNS for the interface and if it is
Disabled Enabledor .
Click to disconnect the connection.Disconnect
– Click to renew the IP address.Renew
Connect or Disconnect buttons are applicable when the WAN connection type is PPTP, L2TP, and
PPPoE.
WAN gets connected only if you reconnect or change the WAN configuration after disconnecting the
existing WAN connection.
Note
RV160x Administration Guide
12
Status and Statistics
System Summary
Wireless Status
This section displays the status of the Wireless.
, and Bands displaying the MAC address, mode, channel, andRadio 1 (2.4G), Radio 2 (5G) Enabled
operation bandwidth and their details.
VPN Status
This section displays the status of the VPN tunnels.
Type – Type of VPN tunnel.
– If VPN is Enabled (active) or Disabled.Active
– VPN tunnel’s status whether it is configured or not.Configured
– The maximum number of tunnels supported on the device.Max Supported
Status of the tunnel.Connected
Firewall Setting Status
This section displays the status of the firewall.
–Status of the SPI filter service is enabled (on) or disabled (off).Stateful Packet Inspection (SPI)
Legitimate packets are only allowed through the firewall. It is also called a dynamic packet filtering.
– Status of the DoS filter service is enabled (on) or disabled (off). A DoS attackDenial of Service (DoS)
is an attempt to make a machine or network resource unavailable to its intended users.
Block WAN Request – Makes it difficult for outside users to work their way into your network by hiding
the network ports from Internet devices and preventing the network from being pinged or detected by
other Internet users.
Remote Management Indicates that a remote connection for managing the device is allowed or denied.
Number of access rules that have been set.Access Rule
Log Setting Status
Logs allow you to track router activity, process failures, firewall events, connects and disconnects of WAN
devices, DDNS (Dynamic DNS) updates, VPN connection statuses, and many other events taking place in
your router. Logs are a very useful tool in troubleshooting and monitoring your routers health at any given
time.
– Status of system logs.Syslog Server
– Status of logs to send using email.Email Log
TCP/IP Services
The TCP/IP Services page displays the statistics of the protocol, port, and IP address. To view the TCP/IP
Services, click .Status and Statistics > TCP/IP Services
RV160x Administration Guide
13
Status and Statistics
TCP/IP Services
– The number of associated clients on wireless.Number of Associated Clients
– Number of RX packets.RX Packets
Number of RX bytes.RX Bytes
Number of TX packets.TX Packets
Number of TX bytes.TX Bytes
– Number of multicast packets.Multicast Packets
– Number of packet errors.Packet Error
– Number of packets dropped.Packet Dropped
– Number of collisions.Collisions
Click the Refresh button to refresh the data or click to reset the counters.Reset
Port Status
– Defined name and number of the port.Port ID
– Status of the interface.Link Status
– Status of the port (example: port enabled or disabled or connected).Port Activity
– The speed (in Mbps) of the device after auto negotiation.Speed Status
– Duplex mode: Half or Full.Duplex Status
Status of the auto negotiation parameter. When ( ), it detects the duplex mode. IfAuto Negotiation On
the connection requires a crossover, it automatically chooses the MDI or MDIX configuration that matches
the other end of the link.
WAN QoS Statistics
The WAN QoS Statics page displays the statistics of the outbound and inbound WAN QoS. To view the
device’s WAN QoS Statics page, click Status and Statistics > WAN QoS Statistics.
Select the name of the interface from the drop-down list.Interface
Name of the policy.Policy Name
Description of the WAN QoS statistics.Description
– Click to clear the counters.Clear Counters
Outbound QoS Statistics
– Number of outbound queues.Queue
Traffic Class – Name of traffic class assigned to queue.
– Number of outbound packets of the traffic class sent.Packets Sent
RV160x Administration Guide
15
Status and Statistics
WAN QoS Statistics
– MAC address of the connected device.MAC Address
Type – The type of IP address of the connected device.
– The interface the device is connected to.Interface
– The primary name assigned to a wireless network.SSID
Routing Table
Routing is the process of moving packets across a network from one host to another. The Routing Status of
this process is displayed in the route table. The route table contains information about the topology of the
network immediately around it. To view the device’s routing status for IPv4 and IPv6, click Status and
Statistics > Route Table.
IPv4 and IPv6 Routes
IP Address and subnet mask of the connection.Destination
– IP address of the next hop.Next Hop
– Number of intermediate devices (like routers) through which data must pass between theHop Count
source and the destination.
Name of the interface to which the route is attached to.Interface
– Source of the route.Source
DHCP Bindings
The DHCP Bindings page displays the IP and MAC address, Lease Expire Time and Type of Binding (static
or dynamic). To view the device’s DHCP Bindings, click . Select aStatus and Statistics > DHCP Bindings
hostname from the list and click to add the binding to the binding table. Click the refreshAdd to Static DHCP
icon to refresh the data in the binding table.
In the DHCP Binding Table, the following is displayed:
– Name of host.Hostname
– Assigned IP address for IPv4 or IPv6.IPv4/IPv6 Address
– The MAC address of the client's assigned IP address.MAC Address
– Lease time for the client's system.Lease Expires
Type Static Dynamic– Connection status ( or ).
– Action status of the DHCP bindings.Action
RV160x Administration Guide
17
Status and Statistics
Routing Table
VPN Status
The VPN Status displays the tunnel status of the Site-to-Site, Client-to-Site, OpenVPN, and PPTP. To view
the device’s VPN status, click .Status and Statistics > VPN Status
Site-to-Site Tunnel Status
Tunnel(s) Used – VPN tunnels in use.
Tunnel(s) Available Available VPN tunnels.
Tunnel(s) Enabled VPN tunnels enabled.
Tunnel(s) Defined – Defined VPN tunnels.
In the Connection Table, you can add, edit, delete, or refresh a tunnel. You can also click on Column Display
Selection to select the column headers displayed in the Connection Table.
GRE Tunnel Status
The Connection Table displays the following:
Name of the interface.Interface Name
– IP address of the GRE tunnel.IP Address
– The source of the GRE tunnel.Source
Destination of the GRE tunnel.Destination
– Enable the GRE tunnel.Enable
– Status of the GRE tunnel.Status
Client-to-Site VPN Status
In this mode, the client from Internet connects to the server to access the corporate network/LAN behind the
server. For a secure connection, you can implement a client-to-site VPN. You can view all the Client-to-Tunnel
connections, add, edit, or delete the connections in the Connection Table.
The Connection Table displays the following:
Group/Tunnel Name - Name of the VPN tunnel. This is for reference purposes only and does not match
the name used at the other end of the tunnel.
Status of the connection.Connections
– Phase 2 encryption type (NULL/DES/3DES/AES-128/AES-192/AES-256),Phase2 Enc/Auth/Grp
authentication method (NULL/MD5/SHA1), and DH group number (1/2/5).
– IP address and subnet mask of the local group.Local Group
–Action status.Action
RV160x Administration Guide
18
Status and Statistics
VPN Status
OpenVPN Status
OpenVPN is an open software application that implements VPN techniques for creating secure point-to-point
or site-to-site connections in routed or bridged configurations and remote access facilities. Here, you can view
the status of the OpenVPN.
The Connection Table shows the status of the OpenVPN. You can also add edit or delete connections.
– Session identification.Session ID
– Name of user.User
Actual client IP address.Client IP (Actual)
– Client VPN IP address.Client IP (VPN)
– Number of TX bytes.TX Bytes
– Number of RX bytes.RX Bytes
– Amount of time connected.Connect Time
–Action status.Action
PPTP Tunnel Status
Point-to-Point Tunneling Protocol has the capability to encrypt data with 128-bit. It is used to ensure that
messages sent from one VPN node to another are secure.
Tunnel(s) Used – PPTP Tunnels used for the VPN connection.
Tunnel(s) Available – Available tunnels for the PPTP connection.
The Connection Table displays the status of the established tunnels. You can also connect or disconnect the
connections.
– Session ID of the proposed or current connection.Session ID
– Name of the connected user.User Name
– IP address of the remote connection.Remote Address
PPTP IP Address – IP address of the PPTP.
– Time of the tunneling time.Connect Time
Connect or disconnect the tunnel.Action
View Logs
The View Logs page displays all of the devices logs. You can filter these logs based on category, severity,
or keyword. You can also refresh, clear, and export these logs to a PC or USB. To view the device’s logs,
follow these steps:
Step 1 Click .Status and Statistics > View Logs
RV160x Administration Guide
19
Status and Statistics
View Logs
C H A P T E R 3
Administration
This section describes the device's administration features and contains the following topics:
File Management, on page 21
Reboot, on page 23
Diagnostic, on page 24
Certificate, on page 24
Configuration Management, on page 26
File Management
The File Management provides a snapshot of your device. To view the File Management info, follow these
steps:
Step 1 Click to see the following information:Administration> File Management
System Information
Model number of the device.Device Model
– PID and VID number of the router.PID VID
Current Firmware Version – Current firmware version.
Latest Firmware Version Latest firmware version.
– Last date when the firmware was updated.Firmware Last Updated
Language File
Current Version – Current version of the language file on the device.
Manual Upgrade
In the Manual Upgrade section, you can upload and upgrade to a newer firmware image or language file.
During a firmware upgrade, do not try to go online, turn off the device, shut down the PC, or interrupt the
process in any way, until the operation is complete. This process takes about a minute, including the reboot
process. Interrupting the upgrade process at specific points when the flash memory is being written to, may
corrupt it, and render the router unusable.
Caution
RV160x Administration Guide
21
Step 2 If you choose to upgrade from the USB drive, the router searches the USB flash drive for a firmware image file whose
name has one or more of the following: PID, MAC address, and Serial Number. If there are multiple firmware files in
the USB flash drive, the router checks the one with the most specific name, i.e. priority from high to low.
Manual Upgrade
To update the router with a newer version of the firmware.
Step 1 Select Administration > File Management.
Step 2 In the Manual Upgrade section, select the file type.
Step 3 In the Upgrade From section, select an option ( ).Cisco.com, PC, or USB
a) If you select Cisco.com, click to upgrade the firmware or to save the firmware imageUpgrade Download to USB
file.
b) If you select PC or USB, click to locate the firmware file on your PC and click .Browse Upgrade
Step 4 Check to reset all the configuration and apply factory defaults.Reset all configuration/setting to factory defaults
Step 5 Click to upload the selected image to the device.Upgrade
Auto Update
The router supports loading a firmware from USB flash drive if the USB stick is present during the system
bootup. The router will search the USB flash drive for a firmware image file whose name has one or more of
the following: PID, MAC address, and Serial Number. If there are multiple firmware files in the USB flash
drive, the router will check the one with the most specific name, i.e. priority from high to low.
• PID-MAC-SN.IMG
• PID-SN.IMG
• PID-MAC.IMG
• PID.IMG
The files with other names will be ignored. If the version is higher than the current version, it will be upgraded
to this image and the DUT will reboot. After that, the upgrade process will start again.
If it does not find a more recent image in the USB1, then it will check the USB2 using the same logic.
The router also supports loading a configuration file from a USB flash drive during the system bootup.
The behavior only happens when the router is in factory default and attached with a USB flash drive
before it is
powered on.
The router will search the USB flash drive for a config file whose name has one or more of the following:
PID,
MAC address, and Serial Number. If there are multiple firmware files in the USB flash drive, the router
will check
RV160x Administration Guide
22
Administration
Manual Upgrade
the one with the most specific name, i.e. priority from high to low.
• PID-MAC-SN.xml
• PID-SN.xml
• PID-MAC.xml
• PID.xml
The files with the other names will be ignored.
Firmware Auto Fallback Mechanism
A fallback mechanism is available to allow the router to overcome failures when performing a direct filesystem
lookup on the root filesystem or when the firmware simply cannot be installed for practical reasons on the
root filesystem. The router includes two firmware images in the flash, to provide an Auto Fallback Mechanism,
so that the device can automatically switch to the secondary firmware, when the active firmware is corrupted,
or cannot bootup successfully after five trials.
The Auto Fallback Mechanism operates as follows:
Step 1 The device will boot up with the active firmware.
Step 2 If the firmware is corrupted, it will switch to the secondary firmware automatically after the active firmware has failed
to boot up after 5 times.
Step 3 If the router gets stuck does not reboot automatically, turn the power off then power on, and wait for 30 seconds, then
turn the power off, for 5 times to switch to the secondary or inactive firmware.
Step 4 After the router boots up with the secondary or inactive firmware, please check the router to see if anything is wrong
with the active firmware.
Step 5 Reload the new firmware again if necessary.
Reboot
The Reboot allows users to restart the device with active or inactive images.
To access the Reboot page, follow these steps:
Step 1 Click Administration >Reboot.
Step 2 In the Active Image after reboot section, select an option ( ) from the drop-down list.Active Image x.x.xx.xx
Step 3 Select from the following reboot options.
Reboot the device.
Return to factory default settings after reboot.
Return to factory default settings including certificates after reboot.
RV160x Administration Guide
23
Administration
Firmware Auto Fallback Mechanism
Step 4 Click to reboot device.Reboot
Diagnostic
Your device provides several diagnostic tools to help you with troubleshooting network issues. Use the
following diagnostic tools to monitor the overall health of your network.
You can use the Ping or Trace utility to test the connectivity between a router and another device on the
network. To Ping or Trace an IP address, follow these steps:
Step 1 Select .Administration > Diagnostic
Step 2 In the IP Address/Domain Name field, enter the IP address or domain name.
Step 3 Click to display the ping results. This tells you if the device is accessible. Or clickPing Traceroute to display the
traceroute results.
Step 4 To perform a DNS lookup, enter the IP address or domain name in the Perform a DNS Lookup and click .Lookup
Step 5 You can export the technical support report by selecting from one of the following options:
– to export the technical support report to a PC.Export to PC
– to export the technical support report to a USB.Export to USB
– to email the report to an email address.Email to ...
Certificate
Certificates are important in the communication process. A trusted Certificate Authority (CA), ensures that
the certificate holder is really who they claim to be. Without a trusted signed certificate, data may be encrypted,
however, the party you are communicating with may not be the one whom you think.
A list of certificates with the certificate details are displayed on this page. You can export a Self signed, local,
and CSR certificate.
If a device certificate is imported, it replaces its corresponding CSR certificate.
In the Certificate Table, the certificates that are associated with the router are displayed. You can you delete,
export, view the details, or import a certificate that is listed in the Certificate Table.
Import Certificate
To import a certificate, follow these steps:
Step 1 Click .Import Certificate
Step 2 Select the type of certificate to import from the drop-down list:
RV160x Administration Guide
24
Administration
Diagnostic
CA Certificate
Local Device Certificate
PKCS#12 Encoded File.
Step 3 Enter a certificate name. (For PKCS#12, you must enter a password).
Step 4 In the Upload Certificate file section, check and click to upload and import the certificate fromImport from PC Browse
a specific location.
Step 5 Check and click to upload and import the certificate from a USB key.Import From USB Refresh
Step 6 Click .Upload
Generate CSR/Certificate
To generate a CSR/certificate, follow these steps:
Step 1 Click .Generate CSR/Certificate
Step 2 Select the type of certificate to generate from one of the following options in the drop-down list.
a) – Select this certificate and provide relevant details. You must provide the valid duration inSelf-Signed Certificate
days.
b) – Select this certificate type and provide relevant details to get it signed by self.CA Certificate
c) – Select this certificate type and provide the relevant details.Certificate Signing Request
d) – Select this certificate type and provide relevant details to get the certificateCertificate Signed by CA Certificate
signed by CA.
Step 3 Enter the following information:
Enter a name for certificate. Certificate name should not contain spaces or special
characters.
Certificate Name
Enter a name and select one of the following: .IP Address, FQDN, or EmailSubject Alternative Name
(optional)
Select a country from the drop-down list.Country Name
Enter a State or Province.State or Province Name
Enter a locality name.Locality Name
Enter the name of the organization.Organization Name
Enter the name of the organization unit.Organization Unit Name
Enter a common name.Common Name
Enter the email address.Email Address
Select the Key Encryption Length from the drop-down menu. It should be 512, 1024 or
2048.
Key Encryption Length
Enter the number of days ( ).Range 1-10950, Default: 360Valid Duration
RV160x Administration Guide
25
Administration
Generate CSR/Certificate
C H A P T E R 4
System Configuration
This section describes the device's system configuration and contains the following topics:
Initial Router Setup, on page 27
System, on page 29
Time, on page 29
Log, on page 30
Email, on page 32
User Accounts, on page 32
User Groups, on page 34
IP Address Groups, on page 36
SNMP, on page 36
Discovery-Bonjour, on page 37
LLDP, on page 37
Automatic Updates, on page 38
Schedules, on page 39
Service Management, on page 39
PnP (Plug and Play), on page 39
Initial Router Setup
You can check the connection and configure the basic router settings on the Initial Setup Wizard page. From
the page, you can follow the instructions that guide you through the process for configuringRun Setup Wizard
the device.
Step 1 Click to access the Router Setup Wizard.System Configuration > Initial Router Setup
Step 2 Click to go to Check Connection page. If your router has detected a connection, the connection details are displayedNext
on this page.
Step 3 Click .Next
Step 4 The Configure Router – Select Connection Type pop-up appears. Select your internet connection type.
Step 5 If you select or (Recommended), click .Dynamic IP DHCP Next
Step 6 If you select , click and configure these settings.Static IP Address Next
RV160x Administration Guide
27
Step 15 In the Enable Security – Set Router Password section, enter, and confirm the router password. You can check the
Disable Password Strength Enforcement to disable the strength enforcement.
Step 16 Click , and in the Network Name field, enter a name for the network.Next
Step 17 Click , and in the Enable Security – Secure your Wireless Network, select the type of network security from theNext
following options:
Best Security (WPA2 Personal AES)
Recommended for new wireless computers and devices. Older wireless devices may not support this option.
Enter a security key with 8-63 characters or 64 hexadecimal digits, or use the randomly generated security
key, when you choose this option.
No Security (Not Recommended)
No additional security settings needed on the device. This mode means that any data transferred to and from
the device is not encrypted.
Step 18 Click to save the security settings.Save security settings
Step 19 Click to print a copy of the router's security settings.Print security settings
Step 20 Click .Apply
System
Assign a host name and a domain name to identify your device to ensure that it is easily identified y other
devices.
Step 1 Click .System Configuration > System
Step 2 In the Host Name field, enter a name to identify the device uniquely on your network. For example, Router001.
Step 3 In the Domain Name field, enter a domain in which your device is located. For example, example.com. If you do not
know the name of your organization's domain, contact your network administrator.
Step 4 Click to apply your changes.Apply
Time
Setting the time is critical for a network device so that every system log and error message is timestamped
for accurate tracking and synchronizing the data transfer with other network devices.
You can configure the time zone, adjust for daylight savings time if necessary, and select the Network Time
Protocol (NTP) server to synchronize the date and time.
To configure the time and NTP server settings, follow these steps:
Step 1 Click .System Configuration > Time
RV160x Administration Guide
29
System Configuration
System
Step 2 Set Time Zone – Select your time zone relative to Coordinated Universal Time (UTC).
Step 3 Set Date and Time – Select or .Auto Manual
a) For Manual – Enter the date and time.
Step 4 In the NTP Server section – Check or and enter a qualified NTP server name in the NTP ServerDefault User Defined
1 to 4 fields.
Step 5 Set Daylight Savings Time – Check to enable daylight savings time. You can choose the Daylight Saving Mode – By
Date Recurringor and enter the start dates (From) and end dates (To). You can also specify the Daylight Saving Offset
in minutes.
Step 6 Click .Apply
Log
One of the basic settings of a network device is its system log (Syslog), which is used to log the device data.
You can define the instances that should generate a log. Whenever such defined instance occurs, a log is
generated with the time and event and sent to a syslog server or sent in an email. Syslog can then be used to
analyze and troubleshoot a network and to increase the network security.
Configure Log Settings
To configure the log settings, follow these steps:
Step 1 Click .System Configuration > Log
Step 2 Under , in the Log section, check .Log Setting Enable
Step 3 In the field, enter the number of KB (Range 1 KB to 4096 KB, Default is 1024 KB).Log Buffer
Step 4 Severity- select the appropriate log severity level from the drop down list. They are listed from the highest to the lowest.
Level 0, which means that the system is unusable.Emergency
Level 1, which indicates that immediate action is needed.Alert
Level 2, which indicates that the system is in critical condition.Critical
Level 3, which indicates that there is an error in the device, such as a single port being
off-line.
Error
Level 4, which indicates that a warning message is logged when the device is functioning
properly, but an operational problem has occurred.
Warning
Level 5, which indicates a normal but significant condition. A notification log is logged
when the device is functioning properly, but a system notice has occurred.
Notification
Level 6, which indicates a condition that is not a condition error, but requires special
handling.
Information
Level 7, which indicates that the debugging messages contain information normally of
use only when debugging a program.
Debugging
Step 5 Category All- check or any of the required event categories that you want logged on the device.
Logs involving kernel code.Kernel
RV160x Administration Guide
30
System Configuration
Log
Logs involving the system.System
Logs involving the firewall rules, attacks, and content filtering.Firewall
Logs involving the network.Network
Logs involving the VPN.VPN
OpenVPN-related logs including instances like VPN tunnel establishment failure, VPN
gateway failure, and so on.
OpenVPN
Logs involving web filtering.Web Filtering
Logs involving the device's users.Users
Logs related to the wireless networkWireless
RV160W
Logs related to PnP.PnP
Step 6 In , check to save the logs automatically.Save to USB Automatically Enable
Email Server
The email server can be configured to your email account. The email server logs are periodically sent to
specific email address, so that the administrator is always up to date on the network. The router supports
SMTP mail account configuration such as email addresses, password, message digest; optional parameters,
SMTP server port number, SSL, TLS.
Step 1 In the section, check to enable the email syslogs.Email Syslogs Enable
Step 2 In the section, click to configure your email settings.Email Settings Link to Email Setting page
Step 3 In the section, enter the subject.Email Subject
Step 4 In the section, select the severity level from the drop-down list.Severity
Step 5 In the section, enter a range from 1 to 1000. The default is 50.Log Queue Length
Step 6 In the section, select the time threshold from the drop-down list.Log Time Threshold
Step 7 In the section, check All or any of the e-mail alerts categories that you want logged on theReal Time Email Alerts
device.
Step 8 Click .Apply
Remote Syslog Servers
A remote syslog server allows for event messages to be sent to a logging server. The syslog servers can be
configured by specifying the name or IP address.
RV160x Administration Guide
31
System Configuration
Email Server
Step 1 In the section, check to enable the syslog server.Syslog Servers Enable
Step 2 In the field, enter the IP address of a syslog server to which the log messages are sent.Syslog Server 1
Step 3 In the field, enter the IP address of a syslog server to which the log messages are sent.Syslog Server 2
Step 4 Click .Apply
Email
You can configure your devices email server to your specifications.
Configuring Email
To configure the email server, follow these steps.
Step 1 Select .System Configuration > Email
Step 2 Under , enter the following:Email Server
Enter the address of the SMTP server.SMTP Server
Enter the SMTP port.SMTP Port
Select or as the email encryption method.None TLS/SSLEmail Encryption
Select the type of authentication from the drop-down list: orNone, Cleartext, MD5
Login.
Authentication
Enter a username.Username
Enter a password.Password
Enter an email address to send to.Send Email to 1
Enter an email address to send to (optional).Send Email to 2
Enter an email address to send from.From Email Address
Step 3 Click Apply and Test Connectivity to Email Server to test connectivity.
Step 4 Click to clear the current email settings.Clear
Step 5 Click .Apply
User Accounts
You can create, edit, and delete local users and authenticate them using a local database for various services
like PPTP, VPN Client, and the Web GUI login. This enables the administrators to control and allow only
the local users access the network. You can also configure the web login session timeout.
RV160x Administration Guide
32
System Configuration
Email
Remote Authentication Service
Remote Authentication Service is a distributed client/server system that secures networks against unauthorized
access. In the Cisco implementation, RADIUS clients run on Cisco routers and send authentication requests
to a central RADIUS server that contains all user authentication and network service access information. The
RADIUS security server is identified on the basis of their host name or IP address, host name and specific
UDP port numbers, or IP address and specific UDP port numbers.
To enable external user authentication using RADIUS and LDAP, use the Remote Authentication Service
and select the Default Group from the drop-down list. Then, configure the following:
Step 1 Under the Remote Authentication Service Table Add, click and enter the following information in the Add/Edit Domain
pop-up:
Specify a name for the domain.Name
Select an authentication type from the drop-down list:
— a Lightweight Directory Access Protocol.LDAP
— a networking protocol that providesRADIUS
centralized Authentication, Authorization, and
Accounting (AAA) management for users who connect
and use a network service.
Active Directory — a Windows OS directory service
that facilitates working with interconnected, complex
and different network resources in a unified manner.
Authentication Type
Enter the IP address of the primary server.Primary Server
Enter the backup port of the server.Port
Enter the base-dn to begin the search.Base-dn
Step 2 Click to save the settings. Click or to edit or delete an existing domain.Apply Edit Delete
The external database priority is always RADIUS/LDAP/AD/Local. If you add the RADIUS server on the
router, the Web Login Service and other services will use the RADIUS external database to authenticate the
user. There is no option to enable an external database for Web Login Service alone and configure another
database for another service. Once RADIUS is created and enabled on the router, the router will use the RADIUS
service as an external database for Web Login, Site to Site VPN, PPTP VPN, Open VPN, Client to Site VPN
and 802.1x.
Note
User Groups
The administrator can create user groups for a team of users that share the same set of services. Such user
groups can be authorized to access multiple services like OpenVPN, PPTP VPN< 802.1x and Captive
Portalservices like .
RV160x Administration Guide
34
System Configuration
Remote Authentication Service
To create user groups, follow these steps:
Step 1 Select .System Configuration > User Groups
Step 2 Under the User Groups, click to create a new user group.Add
Step 3 In the Group Name field, enter a name for the group.
Step 4 Under the Local User Membership List, click and check the box and select desired user group to add the new userAdd
to.
Step 5 Under Services, select the services the user groups should have access to and enter the following information.
Specify the web log in permissions granted to the users attached to the group:
– No member of the user group can log in to the Configuration UtilityDisable
using a web browser.
– The members of the user group can only read the system status afterRead Only
they log in. They cannot edit any settings.
All members of the user group have full privileges to configure and readAdmin
the system status.
Web
Login/NETCONF/RESTCONF
Click to open the pop up.Add Add Feature List
Select a profile from the drop-down list and click Add.
Site to Site VPN
Click to open the pop up.Add Add Feature List
Select a profile from the drop-down list and click Add.
Client to Site VPN
Click to enable the Open VPN or to disable.On Off
Select a profile drop-down list.
OpenVPN
Click to enable the PPTP or to disable.On OffPPTP VPN
Check to enable 802.1x authentication.Permit802.1x
Click to enable the Lobby Ambassador or to disable.On OffLobby Ambassador
Click to add a new captive portal and configure the SSID and Radio for the captiveAdd
portal.
Captive Portal
Step 6 Click .Apply
The 802.1x only supports RADIUS authentication. The PPTP/L2TP support RADIUS and local database. If
you choose local database, only the Password Authentication Protocol (PAP) is supported for local authentication.
Note
RV160x Administration Guide
35
System Configuration
User Groups
IP Address Groups
In order to configure and manage the application control policies and web filtering, you must set up the IP
address groups. To configure the IP address groups, follow these steps:
Step 1 Click .System Configuration> IP Address Groups
Step 2 Under IP Address Groups, click to add a group and enter a name. To delete a group click .Add Delete
Step 3 Click and enter the following information.Add
Select the type of group from the drop-down list, and enter the address details:
– Enter an IP address in the Address Details field.Single IP
– Enter an IP address in the Details Address field.IP Address Subnet
– Enter an IP address in the Details Address field.IP Address Range
Type and Address Details
Step 4 Click .Apply
SNMP
Simple Network Management Protocol (SNMP) is an Internet-standard protocol for collecting and organizing
data on managed devices on the IP networks. It allows network administrators to manage, monitor, and receive
notifications of critical events as they occur on the network. The device supports version v1, v2c, and v3.
The device acts as an SNMP agent that replies to the SNMP commands from the SNMP Network Management
Systems. The command it supports are the standard SNMP commands get/next/set. It also generates trap
messages to notify the SNMP manager when alarm conditions occur. Examples include reboots, power cycles
and WAN link events.
Step 1 To configure the router's SNMP, enter the following information:
Check to enable SNMP.SNMP Enable
Check to allow user from the Internet.Allow user access from
Internet
Check to allow user access from VPN.Allow user access from VPN
Select the version from the drop-down list.Version
Enter a system name.System Name
Enter a system contact.System Contact
Enter a system location.System Location
Enter a name for the community.Get Community
RV160x Administration Guide
36
System Configuration
IP Address Groups
Enter a name for the community.Set Community
Trap Configuration
Using Trap configurations, you can set the source address of every SNMP trap packet sent by the router to a single address
regardless of the outgoing interface.
Step 2 To configure the SNMP trap, enter the following information.
Enter the name of the trap community.Trap Community
Enter the IP address.Trap Receiver IP Address
Enter the port number.Trap Receiver Port
Step 3 Click Apply.
Discovery-Bonjour
Bonjour is a service discovery protocol that locates network devices such as computers and servers on your
LAN. When this feature is enabled, the device periodically multicasts Bonjour service records to the LAN to
advertise its existence.
For discovery of Cisco Small Business products, Cisco provides a utility that works through a simple toolbar
on the web browser called FindIt. The FindIT Discovery Utility discovers Cisco devices in the network and
display basic information, such as serial numbers and IP addresses. For more information and to download
the FindIT Discovery Utility, visit www.cisco.com/go/findit.
Note
To enable Discovery-Bonjour, follow these steps:
Step 1 Select .System Configuration > Discovery-Bonjour
Step 2 Check , to enable Discovery-Bonjour globally. (It is enabled by default).Enable
Step 3 Check .Apply
LLDP
The Link Layer Discovery Protocol (LLDP) is a vendor-neutral protocol used by network devices for advertising
their identity, capabilities, and neighbors on an IEEE 802 local area network. The LLDP information is sent
by the device’s interface at a fixed interval, in the form of an Ethernet frame. Each frame contains one LLDP
Data Unit (LLDPDU). Each LLDPDU is a sequence of type-length-value (TLV) structure.
To configure LLDP, follow these steps:
RV160x Administration Guide
37
System Configuration
Discovery-Bonjour
Step 1 Select .System Configuration > LLDP
Step 2 In the LLDP section, check . (It is enabled by default).Enable
Step 3 In the LLDP Port Setting Table Enable LLDP, check to enable LLDP on an interface.
Step 4 Click .Apply
Step 5 In the LLDP Neighbors Table, the following information is displayed:
– Port identifier.Local Port
Type of chassis ID (for example, MAC address).Chassis ID Subtype
– Identifier of the chassis. Where the chassis ID subtype is a MAC address, the MAC address of theChassis ID
device is displayed.
Type of the port identifier.Port ID Subtype
– Port identifier.Port ID
– Name of the device.System Name
– Rate in seconds at which LLDP advertisement updates are sent.Time to Live
Step 6 Click to refresh the data.Refresh
Automatic Updates
Upgrading to the latest firmware can help fix bugs and other intermittent issues on the router. The router can
be configured to send you email notifications on important firmware updates for your device. The information
can be configured to be sent at specified intervals and for specific types of network events. Before you can
configure these notifications, the email server should be configured.
To configure the Automatic Updates, follow these steps:
Step 1 Select .System Configuration > Automatic Updates
Step 2 From the Check Every drop-down list, choose how often the device should automatically check for possible firmware
revisions. Click to check immediately.Check Now
Step 3 In the Notify via field, check or and enter the email address. The notifications are sent to a configuredAdmin GUI Email to
email address. If you haven’t configured an email server, you should click the link in the note given beside the email
field and configure the email server.
Step 4 Under Automatic Update, you can select the time when the system firmware and USB modem firmware is automatically
updated. You can also choose to be notified for each update.
Step 5 Click .Apply
RV160x Administration Guide
38
System Configuration
Automatic Updates
Schedules
The network devices should be protected against intentional attacks and viruses that could compromise
confidentiality or result in data corruption or denial of service. Schedules can be created to apply firewall or
port forwarding rules on specific days or time of day.
To configure the schedule, follow these steps.
Step 1 Select .System Configuration > Schedules
Step 2 Under Schedules, click to create a new schedule. You can edit or delete an existing schedule by selecting it andAdd
clicking .Edit or Delete
Step 3 Enter a name to identify the schedule in the Name column.
Step 4 Enter the desired Start and End time for the schedule.
Step 5 In the Days column, check to apply the schedule to all the days of the week. Leave it unchecked if you wantEveryday
it to only apply to certain days. If so, then check the desired days of the week you want to apply the schedule to. You can
also choose Weekdays Weekends.or
Step 6 Click .Apply
Service Management
The Service Management section displays information on the system configuration. You can add a new entry
to the Service Management list or to change an entry. To configure the Service Management, follow these
steps.
Step 1 Click .System Configuration > Service Management
Step 2 In the Service Table, click .Add
Step 3 In the Name field, enter a name for the service management.
Step 4 In the Protocol field, select the Layer 4 protocol that the service uses from the drop-down list.
Step 5 In the Port Start/ICMP Type/IP Protocol, enter the port number, ICMP type, or IP protocol.
Step 6 In the Port End/CMP Code field, enter the port number.
Step 7 Click .Apply
Step 8 To edit or delete an entry, select the entry and click . Make your changes, and then click .Edit or Delete Apply
PnP (Plug and Play)
Network Plug and Play is a service that works in conjunction with Network Plug and Play enabled devices
to allow firmware and configuration to be managed centrally, and to allow zero-touch deployment of new
network devices. When installed, a Network Plug and Play enabled device will identify the Network Plug and
Play server through one of manual configuration, DHCP, DNS, or the Plug and Play Connect service.
RV160x Administration Guide
39
System Configuration
Schedules
To enable or disable Plug and Play, follow these steps:
Step 1 Click .System Configuration > PnP
Step 2 Under , check .PnP Enable
Step 3 In the PnP Transport field, select an option from the drop-down list.
– PnP Server Discovery downloaded by PnP automatically.Auto
– Select and enter IP/FQDN, port number and select the certificate to be imported from the CA CertificateStatic
drop-down list.
Step 4 Click .Apply
Please note that the router will verify that the identity configured in the server certificate matches the FQDN
or IP address that the router acquires from the DHCP, DNS or the configuration. If the FQDN or IP address is
not recognized, the router will refuse to connect to the server. For the Network Plug and Play to work correctly,
you should ensure that the certificate lists all variations of the server name and IP address(es) in the Subject
Alternative Name field. If you are experiencing issues with your certificate while trying to connect to PnP,
please see for instructions on how to manage your certificates on the device.Certificate, on page 24
Note
Plug and Play Connect Service
Plug and Play Connect is a Cisco-provided service that is the last resort used by a Network Plug and
Play-enabled device to discover the server. To use Plug and Play Connect for server discovery, you must first
create a Controller Profile representing the Manager, and then register each of your devices with the Plug and
Play Connect Service.
To access the Plug and Play Connect Service, Follow these steps:
Step 1 In your web browser, navigate to https://software.cisco.com.
Step 2 Click the button at the top right of the screen. Log in with a cisco.com ID associated with your Cisco SmartLog In
Account.
Step 3 Select the link under the heading. The main page for thePlug and Play Connect Network Plug and Play Plug and
Play Connect service is displayed.
Creating a Controller Profile
To create a Controller Profile, follow these steps:
Step 1 Open the Plug and Play Connect web page in your browser. If necessary, selecthttps://software.cisco.com/#module/pnp
the correct Virtual Account to use.
Step 2 Select the Controller Profiles link, and then click .Add Profile
Step 3 Select a Controller Type of PNP SERVER from the dropdown list. Then click .Next
Step 4 Specify a name, and optionally a description for the profile.
RV160x Administration Guide
40
System Configuration
Plug and Play Connect Service
Step 5 Under the heading for Primary Controller, use the dropdown provided to select whether to specify the server by name or
IP address. Fill in the name or addresses of the server in the fields provided.
Step 6 Select the protocol to use when communicating with the server. It is strongly recommended that HTTPS be used to ensure
the integrity of the provisioning process.
Step 7 If the protocol selected is HTTPS and the server is configured with a self-signed certificate (default) or one that is not
signed by a well-known certificate authority, then the certificate used by the server should be uploaded using the controls
provided.
Step 8 Click , and review the settings before clicking .Next Submit
Registering Devices
Certain products purchased directly from Cisco may be associated with your Cisco Smart Account at the time
of purchase, and these will automatically be added to Plug and Play Connect. However, the majority of Cisco's
100 to 500 series Plug and Play-enabled products will need to be registered manually. To register the devices
with Plug and Play Connect, follow these steps:
Step 1 Open the Plug and Play Connect web page in your browser. If necessary, selecthttps://software.cisco.com/#module/pnp
the correct Virtual Account to use.
Step 2 Select the link, and then click . You may need to be approved to manually add devices to yourDevices Add Devices
account. This is a one-time process, and, if it is required, you will be notified by email once approval has been granted.
Step 3 Choose whether to add devices manually, or to add multiple devices by uploading details in CSV format. Click the link
provided to download a sample CSV file. If you choose to upload a CSV file, click the button to select the file.Browse
Then click .Next
Step 4 If you selected to add devices manually, click . Specify the Serial Number and Product ID for the deviceIdentify Device
to be added. Select a Controller Profile from the dropdown. Optionally enter a description for this device.
Step 5 Repeat Step 4 until you have added all your devices, then click .Next
Step 6 Review the devices that you have added, and then click .Submit
RV160x Administration Guide
41
System Configuration
Registering Devices
For DCHP, select this option to enable DHCP to provide an IP address. For Static IP,
select this option and provide an IP address, netmask, and the IP address of the default
gateway.
IP Assignment
Enter the name of the server.L2TP Server IP/FQDN
The username assigned to you by the ISP.Username
The password assigned to you by the ISP.Password
Check to display the password.Show Password
Select Use L2TP Provided DNS Server Use DNSor .DNS Server
Enter the IP address of the primary and or secondary Static DNS in the fields.Static DNS 1 & 2
Select if your ISP charges when connected. Enter the maximumConnection on Demand
idle time, in seconds, to wait before terminating the connection due to inactivity. Default
is 5 minutes.
Connection on Demand
Select to periodically check the connection, and to re-establish the connectionKeep Alive
when it is disconnected.
Keep Alive
Select the authentication type from the drop-down list (Auto Negotiation, PAP, CHAP,
MS-CHAP, MS-CHAPv2).
Authentication Type
If the IPv6 Uses SLAAC to Connect
In the SLAAC Settings section, enter the following information:
Enter the IP address of the primary and or secondary Static DNS.Static DNS 1 & 2
Check to enable and enter a prefix name.DHCP-PD (IPv6 only)
Step 5 Click .Apply
For Advanced Settings
Step 6 Click the Advanced Settings tab and configure the following:
Check to enable the WAN VLAN tag.WAN VLAN Tag
Enter the VLAN ID.VLAN ID
Select to set the size automatically. To set the MTUAuto
size manually, select and enter the MTU size. (TheManual
size in bytes of the largest protocol data unit that the layer
can pass.).
MTU– Maximum Transmission Unit
Check and enter the MAC address.MAC Address Clone
Click Clone My PC’s MAC to use the MAC address of
your computer as the clone MAC address for the device.
MAC Address Clone
When MAC Address Clone is enabled, the port mirroring does not work.
Note
Step 7 Click .Apply
RV160x Administration Guide
45
WAN
WAN Settings
Step 1 Click the IPv6 in IPv4 Tunnel (6in4) tab.
Step 2 Enter the remote IPv4 address.
Step 3 Enter the local IPv6 address and length.
Step 4 Enter the remote IPv6 address and length.
Step 5 Click Apply.
IPv6 Rapid Deployment (6rd)
In IPv6 Rapid Deployment (6rd), each ISP uses one of its own IPv6 prefixes instead of the special 2002::/16
prefix standardized for 6to4. Hence, a provider is guaranteed for its 6rd hosts availability from all native IPv6
hosts that can reach their IPv6 network.
Step 1 Check the and enter the following.IPv6 Rapid Deployment (6rd)
Step 2 In the Configuration Mode section, click to use the DHCP (option 212) to obtain a 6rdAutomatically from DHCP
Prefix, Relay IPv4 Address, and IPv4 Mask Length.
Step 3 Or, select and set the following 6rd parameters.Manual
a) Enter the IPv4 Address of Relay.
b) Enter the IPv4 Common Prefix Length.
c) Enter the IPv6 Prefix/Length. The IPv6 network (subnetwork) is identified by the prefix. All hosts in the network
have the identical initial bits for their IPv6 address. Enter the number of common initial bits in the network addresses.
Default is 64.
Step 4 Click .Apply
RV160x Administration Guide
47
WAN
IPv6 Rapid Deployment (6rd)
RV160x Administration Guide
48
WAN
IPv6 Rapid Deployment (6rd)
C H A P T E R 6
LAN
A local area network (LAN) is a computer network that spans within a relatively small area close to each
other, such as in an office building, a school, or a home. LANs are characterized by their topology, protocols,
and media. Topology is the geometric arrangement of devices on a network. Protocols are the rules and
encoding specifications for sending data. Protocols also determine whether the network uses a peer-to-peer
or client/server architecture. The most common type of LAN is Ethernet.
This section describes the device's LAN features and contains the following topics:
Port Settings, on page 49
VLAN Settings, on page 50
Option82 Settings, on page 52
Static DHCP, on page 53
802.1X Configuration, on page 53
Router Advertisement, on page 54
Port Settings
The Port Settings page displays the ports for EEE, Flow Control, Mode, Port Mirror, Jumbo Frame, and Link
Aggregation.
To configure the port settings for the LAN, follow these steps:
Step 1 Select .LAN > Port Settings
Step 2 In the Basic Per Port Configuration table, configure the following:
Lists the ports currently available on the router.Port
Enter a port label.Port Label
Check to enable the port settings. When this check box is disabled, all settingsEnable
on the port are lost.
Enable
Check to allow port to consume less power during period of low data activity.EEE (Energy-Efficient on
Ethernet)
Check to enable to symmetric flow control. Flow control is used to send pause frames
and respecting pause frames to and from the LAN PC connected to the device.
Flow Control
RV160x Administration Guide
49
Select the port setting mode from the drop-down list.Mode
Jumbo frames are Ethernet frames with more than 1500 bytes of payload, which is the
limit set by the IEEE 802.3 standard. Jumbo frames can carry up to 9000 bytes of payload.
Check to enable jumbo frames.Enable
Jumbo Frames
Step 3 In the Port Mirror Configuration section, enter the following information:
Check to enable port mirror configuration.EnableEnable
The port on which the mirrored traffic can be monitored. Select anyone of the LANs
(LAN1 to LAN4) from the drop-down list.
Destination Port
Select the ports whose traffic must be monitored on the Destination port.Monitored Port
Step 4 Click .Apply
VLAN Settings
On the VLAN Settings page, you can add the VLAN ID to differentiate traffic.
To create new VLANs, follow these steps:
Step 1 Select .LAN > VLAN Settings
Step 2 Click to create a new VLAN.Add
Step 3 Enter the VLAN ID (Range is 1-4093) and a name.
Step 4 Check Enabled to enable both the Inter-VLAN routing and Device Management.
Step 5 Enter the following information for IPv4 or IPv6.
Configuring VLAN for IPv4
To configure the VLAN for IPv4, select the IPv4, and enter the following information.
Enter the IPv4 address.IP Address
Enter the subnet mask.Subnet Mask
RV160x Administration Guide
50
LAN
VLAN Settings
Disabled – Disables the DHCP IPv4 server on VLAN.
Server
– Enter a time value of 5 to 43,200Lease Time
minutes. Default is 1440 minutes (equal to 24
hours).
– Enter the rangeRange Start and Range End
start and end of IP addresses that can be assigned
dynamically.
Select to use DNS server as proxy,DNS Server
or from ISP from the drop-down list.
– Enter the WINS server name.WINS Server
DHCP Options
– Enter the IP address of theOption 66
TFTP server.
– Enter the IP address of a listOption 150
of TFTP server.
– Enter the configurationOption 67
filename.
– Enter the remote DHCP server IPv4 addressRelay
to configure the DHCP relay agent.
DHCP Type
Configuring DHCP Type for IPv6
To configure the DHCP Mode for IPv6, enter the following:
Enter the IPv6 prefix.Prefix
Enter the IPv6 prefix length.Prefix Length
Preview the IPv6 address.Preview
Select the appropriate interface identifier.Interface
Identifier
– Disables the DHCP IPv6 server on VLAN.Disabled
Server
Lease Time – Enter a time value of 5 to 43,200 minutes. Default is 1440 minutes (equal
to 24 hours).
– Enter the start and end IP address range that can beRange Start and Range End
assigned dynamically.
– Select to use DNS server as proxy, or from ISP from the drop-down list.DNS Server
DHCP Type
RV160x Administration Guide
51
LAN
VLAN Settings
The range start and end of IP addresses that can be assigned dynamically. The range can
be up to the maximum number of IP addresses that the server can assign without
overlapping the PPTP and SSL VPN. For example, if the router uses the default LAN
IP address, 192.168.1.1, the starting value must be 192.168.1.2 or greater.
Range Start Range Endand
DNS service type: where the DNS server IP address is acquired.DNS Server
Static IP address of a DNS Server. (Optional) if you enter a second DNS server, the
device uses the first DNS server to respond to a request.
Static DNS 1 and Static DNS
2
Optional IP address of a Windows Internet Naming Service (WINS) server that resolves
NetBIOS names to IP addresses. Default is blank.
WINS
– Enter the IP address or the hostname of a single TFTP server.Option 66
– Enter the IP addresses of a list of TFTP servers.Option 150
– Enter the boot filename.Option 67
DHCP Options
Step 4 Click .Finish
Static DHCP
Static DHCP is a useful feature which makes the DHCP server on your router always assign the same IP
address to a specific computer on your LAN. Click to display the devices whichShow Connected Devices
are already connected to the router.
To configure static DHCP, follow these steps:
Step 1 Select .LAN > Static DHCP
Step 2 Click .Add
Step 3 Enter a description name.
Step 4 Enter the MAC address and static IPv4 address.
Step 5 Check Enabled.
Step 6 Click to add the devices to the Static IP list.Apply
Step 7 Click or to use these details.Import Export
802.1X Configuration
The IEEE 802.1X port-based authentication prevents unauthorized devices (clients) from gaining access to
the network. This network access control uses the physical access characteristics of the IEEE 802 LAN
infrastructures to authenticate and authorize devices attached to a LAN port, that has point-to-point connection.
A port in this context is a single point of attachment to the LAN infrastructure.
To configure port-based authentication:
RV160x Administration Guide
53
LAN
Static DHCP
Determines whether hosts can use DHCPv6 to obtain IP addresses and related information.
Check one of the following:
– Hosts use an administered, stateful configuration protocol (DHCPv6)Managed
to obtain stateful addresses and other information through DHCPv6.
Uses an administered, stateful configuration protocol (DHCPv6) to obtainOther
other, non-address information, such as DNS server address.
RA Flags
Preference metric used in a network topology where multi-homed hosts have access to
multiple routers. Router Preference helps a host to choose an appropriate router. There
are three preferences to choose from, such as , or . The default settingHigh, Medium Low
is High. Select the preference from the drop-down list.
Router Preference
Maximum Transmission Unit (MTU) is the size of the largest packet that can be sent
over the network. MTUs are used in Router Advertisement messages to ensure that all
nodes on the network use the same MTU value when the LAN MTU is unknown. The
default setting is 1500 bytes, which is the standard value for Ethernet networks. For
PPPoE connections, the standard is 1492 bytes. Unless your ISP requires a different
setting, this setting should not be changed. Enter a value between 1280 and 1500.
Maximum Transmission
Unit (MTU)
Time in seconds that the Router Advertisement messages exist on the route. Enter time
in seconds. The default is 3600 seconds.
Router Lifetime
Step 3 In the Prefix Table, click or to add or edit a subnet and enter an IPv6 address, Prefix Length, and Lifetime.Add Edit
Step 4 Click .Apply
RV160x Administration Guide
55
LAN
Router Advertisement
RV160x Administration Guide
56
LAN
Router Advertisement
C H A P T E R 7
Wireless
A Wireless Local Area Network (WLAN) is a wireless distribution method that implements a flexible data
communication system using high-frequency radio waves and often includes an access point to the Internet.
This is achieved by augmenting, rather than replacing a wired LAN within a building or campus. Since the
WLANs use radio frequency to transmit and receive data, they don't require a wired connections. This allows
users to move around the coverage area, and still maintain a network connection.
This section describes the WLAN, which is a type of local-area network that uses high-frequency radio waves
rather than wires to communicate between nodes and contains the following topics:
Basic Settings, on page 57
Advanced Settings, on page 61
WPS, on page 62
Captive Portal, on page 63
Lobby Ambassador, on page 64
Basic Settings
The device provides Wireless LAN (WLAN), with all ports (LAN and WLAN) on single broadcast domain.
The router supports 802.11ac standard and concurrent dual-band selection at 2.4 and 5 GHz. Depending on
the radio, you can select the frequency or channel for WLAN network data transmission and reception.
Selecting the appropriate channel width for each radio can improve the WLAN throughput.
On the Basic Settings page, you can add, edit, or delete the wireless SSID settings, and select and configure
the radio channels. You can add up to four separate virtual wireless networks per Radio. In other words, you
cannot add more than eight SSIDs (that is, four SSIDs per radio); the Add button is grayed out when you
reach this limit.
To configure the Wireless SSID settings, follow these steps:
Step 1 Select .Wireless > Basic Settings
Step 2 Under the Wireless Table, click or and configure the following.Add Edit
Specify the name of the network.SSID Name
Check to enable the network.EnableEnable
RV160x Administration Guide
57
Select or band to connect only to a network matching both network settings2.4G 5G
and band selection. The SSID is created on the radio selected.
Select to configure the SSID on both the radios and connect this profile to anBoth
available network with matching network settings.
Actively applied to Radio
Check to enable SSID broadcasting if you want to allow wireless clients withinEnable
range to detect this wireless network when scanning for available networks. Disable this
feature if you do not want to make the SSID known. If disabled, the wireless client can
connect to your wireless network only if they provide the SSID and the required security
credentials.
SSID Broadcast
Choose a security mode for the network from the following:
: Select this option for an unsecured network.None
: Select the 64-bit WEP security mode and enter a WEP Key if you areWEP-64
using old equipment that does not support WPA or WPA2 security. The WEP key
is a string of 10 hexadecimal characters.
: Select the 128-bit WEP security mode and enter a WEP Key if you areWEP-128
using old equipment that does not support WPA or WPA2 security. The WEP Key
is a string of 26 hexadecimal characters.
WPA2-Personal: Select Wi-Fi Protected Access II (WPA2) security protocol for
stronger security. If selected, enter an alphanumeric pass phrase.
WPA2-Personal Mixed : Select this security protocol for stronger security when
you allow both WPA and WPA2 clients to connect simultaneously. If selected,
enter an alphanumeric passphrase.
WPA2-Enterprise: Select this security protocol to use RADIUS server
authentication. If selected, specify the following:
(handles client authentication).RADIUS Server IP Address
(port used to access the RADIUS server).RADIUS Server Port
(shared RADIUS secret).RADIUS Secret
WPA2-Enterprise Mixed: Select this security protocol to use the RADIUS server
authentication when you allow both WPA and WPA2 clients to connect
simultaneously. If selected, specify the RADIUS Server IP Address, RADIUS
Server Port, and RADIUS Secret.
Security Mode
Enter the passphrase.
If using a passphrase, check to make the passphrase visible.Show Passphrase
Note
Passphrase
Wi-Fi certified WPA2 with PMF provides a WPA2-level of protection for unicast and
multicast management action frames. Check one of the following options:
Not Required
• Capable
• Required
PMF (Protected Management
Frames
RV160x Administration Guide
58
Wireless
Basic Settings
Check to enable wireless isolation within the SSID. When wireless isolation isEnable
configured, wireless clients will not be able to see or communicate with each other when
connected to the same SSID.
Wireless Isolation with SSID
To prioritize and queue the traffic according to the Access Category (AC), check Enable
to enable the Wireless Multimedia Extensions (WME). Enabling WME may result in
more efficient throughput, but higher error rates within a noisy Radio Frequency (RF)
environment.
WMM
Check to enable Wi-Fi Protected Setup (WPS). It allows up to two usage modes: PIN
and Push Button. If enabled, click and set up the WPS parameters in theConfigure
pop-up. For more information on configuring WPS, see .WPS, on page 62
WPS
Specify the VLAN ID, the SSID is mapped to. Devices connecting to this network are
assigned addresses on this VLAN. The default VLAN ID is 1 and if all the devices are
on the same network, this can be left unchanged.
VLAN
Specify the time period if the SSID is available only for certain hours every day or for
certain days in every week. Thus, you can protect your network, by specifying when
users can access the network, thereby restricting access to it.
Time of Day Access
You can use MAC Filtering to permit or deny access to the wireless network based on
the MAC (hardware) address of the requesting device. Check to enable MAC filtering
for the SSID. If enabled, click Configure and specify the MAC blacklist (devices to be
prevented from accessing) and white list (devices to be permitted to access) for the
wireless network.
MAC Filtering
Check to enable the Captive Portal verification for the SSID. Next, select a portalEnable
profile from the drop-down list. If enabled, you can also click and configure a newNew
profile. See for more information on adding a new CaptiveCaptive Portal, on page 63
Portal Profile.
Captive Portal
Step 3 Click .Apply
Concurrent Dual Band Selection
You can enable or disable the dual-band frequencies — 2.4 GHz and 5 GHz — that are supported by the
router. You can manually specify the channel number for each band or choose Auto Channel Selection and
these settings are applied to all virtual wireless networks. Depending on the radio selected, the WLAN network
transmits and receives data on the specific frequency, or channel selected. Selecting an appropriate channel
width for each radio can improve the WLAN throughput
Configuring 2.4 GHz Radio
To configure the 2.4 GHz radio, follow these steps:
Step 1 Click .Wireless >Basic Settings > 2.4G
Step 2 Check to enable the 2.4 GHz band.Radio
Step 3 Select the network band mode from the Wireless Network Mode drop-down list.
RV160x Administration Guide
59
Wireless
Concurrent Dual Band Selection
DescriptionOption
Select this option if you have only Wireless-B devices in
your network.
B Only
Select this option if you have only Wireless-G devices in
your network.
G Only
Select this option if you have only Wireless-N devices in
your network.
N Only
Select this option if you have Wireless-B and Wireless-G
devices in your network.
B/G-Mixed
Select this option if you have Wireless-G and Wireless-N
devices in your network.
G/N-Mixed
If you have Wireless-B, Wireless-G, and Wireless-N devices
in your network.
B/G/N-Mixed
Step 4 Click or to select the channel bandwidth.20 MHz 20/40 MHz
When using the 2.4GHz broadcasting radio you should generally use a channel bandwidth block 20MHz wide.
This is because there are more non-overlapping channels available when using 20MHz (as opposed to 40MHz)
which means there is less likelihood of congestion or clashing channels.You can also use 40MHz on the 2.4GHz
broadcasting radio. However it congests the Wi-FI in the area so if you live in a built up area it probably isn’t
a great idea as it will interfere with other 2.4GHz users. In this case, it is best to select the 20/40 MHz option.
Note
Step 5 Select the primary channel by clicking the or radio button.Lower Upper
You cannot select a primary channel, if you have selected 20 MHz bandwidth in Step 4 or Auto from the channel
drop-down list below.
Note
Step 6 Select an appropriate wireless channel from the drop-down list. You may choose and let the system select theAuto
channel.
If you have selected as your primary channel, you can select the channels 1 to 7. If you have selected , youLower Upper
can select channels 5 to 11.
Step 7 To enable the Unscheduled Automatic Power Save Delivery (U-APSD) mode, and allow the connected clients that have
U-APSD feature, to save power, check . This uses mechanisms from 802.11e and legacyU-APSD (WMM Power Save)
802.11 to save power and fine-tune power consumption.
Step 8 Enter the number of MAX associated clients in the designated field.
Step 9 Click .Apply
Configuring 5 GHz Radio
To configure the 5 GHz radio, follow these steps:
Step 1 Click Wireless > Basic Settings > 5G.
Step 2 In the Radio section, check to enable 5 GHz band.Enable
RV160x Administration Guide
60
Wireless
Configuring 5 GHz Radio
Step 3 Select the network band mode from the Wireless Network Mode drop-down list.
DescriptionOption
Select this option if you have only Wireless-A devices in
your network.
A Only
Select this option if you have Wireless-N and Wireless-AC
devices in your network.
N/AC-Mixed
Select this option if you have Wireless-A, Wireless-N and
Wireless-AC devices in your network.
A/N/AC-Mixed
Step 4 Click the , or radio button to select the channel bandwidth.20 MHz, 40 MHz 80 MHz
When using 5GHz, however, it is possible to use wider channel bandwidths for increased bandwidth. As such
on the 5GHz channel you can use the 20MHz, 40MHz or even the 80MHz channel bandwidths.
In an environment with less congestion where a higher data throughput is required, using the 40MHz channel
can be a good idea as it still offers 12 non-overlapping channels on 5GHz.
Note
Step 5 Select the primary channel by clicking or .Lower Upper
You can select a primary channel, only if you have selected 40 MHz bandwidth.
Note
Step 6 Select an appropriate wireless channel from the drop-down list. You may select and let the system select the channel.Auto
Step 7 If you are using battery powered equipment and want to enable the Unscheduled Automatic Power Save Delivery
(U-APSD) mode, check the .U-APSD (WMM Power Save)
Step 8 Enter the number of clients in the MAX number of Associated clients to be associated simultaneously.
Step 9 Click .Apply
Advanced Settings
For each radio, you can specify the advanced settings, such as Frame Burst, WMM No Acknowledgment,
Basic Rate, Transmission Rate, DTIM Interval, RTS Threshold, etc.
To configure the advanced settings under Wireless, follow these steps:
Step 1 Click .Wireless > Advanced Settings > 2.4G or 5G
Step 2 Next, configure the following settings:
Check to enable sending multiple frames with minimum inter-frame gap thatEnable
enhances network efficiency and reduces overhead.
Frame Burst
Check to achieve efficient throughput. This may result in higher error rates in aEnable
noisy Radio Frequency (RF) environment.
WMM No Acknowledgment
For Data Rate, click , to reset the default basic and transmission rates.Set to DefaultData Rate
RV160x Administration Guide
61
Wireless
Advanced Settings
Step 1 Click . The Wi-Fi Protected Setup page appears.Wireless > WPS
Step 2 Select the SSID (for which the WPS is to be configured) from the WPS drop-down list.
Step 3 Select the Radio ( ) from the radio drop-down list.2.4G, 5G, or Both
Step 4 Configure the WPS on client devices in one of the following three methods:
a) Click on the client, and then click on this WPS configuration page.WPS WPS
b) If your client device has a WPS PIN number, enter the number in the text field and then click .Register
c) If the client device requires a PIN number from your router, click and enter the PIN number.Generate
In the PIN Lifetime field, choose the desired lifetime of the key. If the time expires, a new key is negotiated.
This completes the WPS configuration.
Captive Portal
The Captive Portal feature is available only on the wireless router models, and provides clients with a controlled
and authenticated access to network resources, without compromising security. In other words, a client
connecting to the WLAN interfaces is limited to a “walled garden” until authorized. The captive portal displays
a special web page to authenticate clients before they can use the Internet. The client can resolve DNS and
web browser websites specifically added to such a walled garden.” Authentication uses a captive portal that
initiates authentication. When an unauthenticated client tries to connect to a web page (on port 80), the request
is intercepted by a daemon and redirected to the captive portal (UI port).
You can configure Captive Portal for each virtual wireless network on your device by associating it with a
portal profile. You can also view the Captive Portal status by choosing Status and Statistics > Captive Portal
Status. See for instructions on how to enable a Captive Portal profile.Basic Settings, on page 57
To create Captive Portal Profile:
Step 1 Click .Wireless > Captive Portal
Step 2 On the Captive Portal page, click under Portal Profile Table. To modify an existing Portal Profile, check theAdd
corresponding check box and click .Edit
Step 3 On the Add Captive Portal Profile page, configure the following:
Enter a profile name for the new Captive Portal.Profile Name
Choose if you want to enable ( ) or disable ( ) authentication.Auth No AuthAuthentication
Select , or and enter the URL in the text field, to redirectOriginal URL A new URL
users to a URL after authentication.
After user login, redirect to
Set the lifetime of the authentication in seconds, ranging from 0 to 1440. 0 indicates
infinite time.
Idle Timeout
Step 4 On the Portal Page Customization section, configure the following:
Select a font color, from the drop-down list, for the text you want to display on the page.Font Color
RV160x Administration Guide
63
Wireless
Captive Portal
Click and select an image to be displayed as the background of the portal page.BrowseBackground Picture
Specify the company name to be displayed.Company Name
Click and select the image of the company logo to be displayed.BrowseCompany Logo Picture
Enter the welcome message to be displayed at login.Welcome Message
Enter the text for user name field.Username Field
Enter the text for password field.Password Field
Enter the text displayed on the login button.Login Button Name
Enter standard Copyright text associated with your company.Copyright Message
Enter the error message to be displayed when the login fails.Error Message for
Authentication Failure
Enter the message text to be displayed when the maximum number of connections is
exceeded.
Error Message for
Exceeding Max Client
Number.
Check to accept the terms of use.EnableShow Agreement
Enter a title for the Agreement text.Agreement Title
Enter the Agreement terms to be displayed.Agreement Message
Step 5 Click to preview the new settings.Preview
Step 6 Click .Apply
Lobby Ambassador
A lobby ambassador can create and manage guest user accounts on the wireless router. The lobby ambassador
has limited configuration privileges and can access only the web pages used to manage the guest accounts.
The lobby ambassador can specify the amount of time that the guest user accounts remain active. After the
specified time elapses, the guest user accounts expire automatically. By default, the Lobby Ambassador page
is invisible or greyed out. To use this feature follow these steps:
Step 1 Enable Lobby Ambassador service for the specific user groups in System Configuration>User Groups page.
Step 2 Enable Captive Portal on one SSID, and choose the authentication group name.
Step 3 Next, select Wireless > Lobby Ambassador.
Step 4 In the Add New Guest section, in the Username field, enter a username or click to automatically generateAuto Generate
a user name.
Step 5 In the Password field, enter a password or click to automatically generate a password.Auto Generate
Step 6 In the Expires In section, select the and , from the drop-down list.Days, Hours, Minutes
RV160x Administration Guide
64
Wireless
Lobby Ambassador
Step 7 Check one of the following radio buttons, orDelete guest account when it expires Suspend guest account when it
expires, to delete or suspend the lobby ambassador account.
Step 8 In the SSID field, enter the SSID by selecting the options from the drop down list.
Step 9 Click , to add the new configurations or to reset and start over.Add Reset
Step 10 To edit or delete an existing Lobby Ambassador, under Guest, click or .Edit Delete
Step 11 Click to save the settings.Apply
RV160x Administration Guide
65
Wireless
Lobby Ambassador
RV160x Administration Guide
66
Wireless
Lobby Ambassador
Enter the IPv6 prefix.Prefix
Enter the number of prefix bits of the IP address.Length
Enter the IP address of the router of the last resort.Next Hop
Enter the hop count number (Max 255).Hop Count
Choose the interface to use for this static route from the drop-down list.Interface
Step 4 Click .Apply
RIP
Routing Information Protocol (RIP) is the standard IGP that is used on Local Area Networks (LAN). The RIP
ensures a higher degree of network stability by quickly rerouting network packets if one of the network
connections goes off-line. When RIP is active, users experience little to no service interruptions due to single
router, switch, or server outages if there are sufficient network resources available.
To configure RIP, follow these steps:
Step 1 Select .Routing > RIP
Step 2 To enable RIP, check or or both and configure the following:for IPv4 for IPv6
Transmission of RIP advertisement on WAN interface is automatically disabled if NAT is enabled.
Note
Check in the corresponding Interface to allow routes from upstream to beEnable
received.
Checking for an interface automatically checks RIP version 1, RIPEnable
version 2, RIPng (IPv6), and Authentication for that interface. Similarly,
unchecking unchecks all.Enable
Note
Interface
This protocol uses classful routing and does not include subnet information or
authentication.
Check to enable sending and receiving routing information on RIP versionEnable
1.
Check to disable routing information from being sent on RIP version 1.Passive
Passive configuration is activated only when is checked.Enable
Note
RIP version 1
This is a classless protocol that uses multicast and has a password authentication.
Check to enable sending and receiving routing information on RIP versionEnable
2.
Check to disable routing information from being sent on RIP version 2.Passive
Passive configuration is activated only when is checked.Enable
Note
RIP version 2
RV160x Administration Guide
68
Routing
RIP
RV160x Administration Guide
70
Routing
IGMP Proxy
Enter the RESTCONF port number. Default is 443.RESTCONF Port
The NETCONF protocol defines a simple mechanism through which a network device
can be managed, configuration data information can be retrieved, and new configuration
data can be uploaded and manipulated. Check and and/ orEnable LAN WAN to enable
NETCONF.
NETCONF
Enter the NETCONF port number.NETCONF Port
Check to enable the LAN/VPN web management. Then select HTTP or HTTPSEnable
and enter the port number in the Port field.
LAN/VPN Web
Management
Check to enable remote web management.Enable
Select or and enter the port (Default 443, Range 1025-65535).HTTP HTTPS
Remote Web Management
Check orAny IP Addresses IPv4 or IPv6 address range and enter a From and To
range for remote access.
Allowed Remote IP Address
Check to allow SIP ALG. This embeds messages of the SIP passing through aEnable
configured device with Network Address Translation (NAT) to be translated and encoded
back to the packet.
SIP ALG (Session Initiation
Protocol Application Layer
Gateway)
Enter the port number. The default value is 21. FTP ALG port translates the FTP packets.FTP ALG Port
Check to enable UPnP. UPnP is a set of networking protocols that permitsEnable
network devices (PCs, printers, Internet gateways, Wi-Fi access points, and mobile
devices), to seamlessly discover each other's presence on the network and establish
functional network services for data sharing and communications.
UPnP (Universal Plug and
Play)
Step 2 In the Restrict Web Features section, configure the following:
Check to restrict the following web features:
: Blocks Web Java feature.Java
: Blocks cookies.Cookies
: Blocks ActiveX.ActiveX
: Blocks HTTP proxy servers.Access to HTTP Proxy Server
Block
Check to allow only the selected web features such as Java, Cookies, ActiveX, or Access to HTTPEnable
Proxy Servers and restrict all others.
Exception
Step 3 In the Trusted Domains Table Domain Name, check to edit the existing domain settings.
Step 4 Click or to add, edit or delete a domain.Add, Edit Delete
Step 5 Click .Apply
RV160x Administration Guide
72
Firewall
Basic Settings
Access Rules
Rules can be configured for filtering the packets based on particular parameters like IP address or ports. To
configure the access rules, follow these steps:
Step 1 Select .Firewall > Access Rules
Step 2 In the IPv4 or IPv6 Access Rules Table, click or select the row and click and enter the following:Add Edit
Check to enable the specific access rule. Uncheck to disable.EnableRule Status
Choose or from the drop-down list.Allow DenyAction
– Select the service to apply IPv4 rule.IPv4
– Select the service to apply IPv6 rule.IPv6
– Select the service from the drop-down list.Services
Services
Select an option from the drop-down list.
– Logs appear for packet that matches the rules.Always
– No log required.Never
Log
Select the source interface from the drop-down list.Source Interface
Select the source IP address to which the rule is applied and enter the following:
– Select to match all IP addressesAny
– Enter an IP address.Single
– Enter a subnet of a network.Subnet
– Enter the range of IP addresses.IP Range
Source Address
Select the source interface from the drop-down list.Destination Interface
Select the source IP address to which the rule is applied and enter the following:
– Select to match all IP addressesAny
– Enter an IP address.Single
– Enter a subnet of a network.Subnet
– Enter the range of IP addresses.IP Range
Destination Address
Select orAlways, Business, Evening hours, Marketing, Work hours from the
drop-down list to apply the firewall rule. Then, click to configure the schedules.here
Schedule Name
Step 3 Click .Apply
Step 4 Click , to restore the default settings.Restore Defaults
Step 5 Click .Service Management
RV160x Administration Guide
73
Firewall
Access Rules
Enter the number of IP addresses in the range.
The range length must not exceed the number of valid IP addresses. To map
a single address, enter 1.
Note
Range Length
Select the name of the service, from the drop-down list, to apply for the Static NAT.Services
Select the name of the interface from the drop-down list.Interfaces
Step 3 Click .Service Management
Step 4 To add a service, click under the Service table. To edit or delete a service, select the row and click .Add Edit or Delete
The fields open for modification.
Step 5 Configure the following services:
– Name of the service or application.Name
– Enter the protocol.Protocol
Port Start/ICMP Type/IP Protocol – Enter a range of port numbers reserved for this service.
Enter the last number of the port, reserved for this service.Port End/CMP Code
Step 6 Click .Apply
Port Forwarding
Port forwarding allows public access to services on network devices on the Lan by opening a specific port or
port range for a service, such as FTP. Port forwarding opens a port range for services such as Internet gaming
that uses alternate ports to communicate between the server and the LAN host.
To configure the port forwarding, follow these steps:
Step 1 Click .Firewall > Port Forwarding
Step 2 In the Port Forwarding Table, click or select the row and click ) and configure the following:Add Edit
Check to enable port forwarding.EnableEnable
Select an external service from the drop-down list. (If a service is not listed, you can add
or modify the list by following the instructions in the Service Management section.).
External Service
Select an internal service from the drop-down list. (If a service is not listed, you can add
or modify the list by following the instructions in the Service Management section.).
Internal Service
Enter the internal IP addresses of the server.Internal IP Address
Select the interface from the drop-down list, to apply port forwarding on.Interfaces
To add or edit an entry on the Service list, follow these steps:
Step 3 Click .Service Management
Step 4 In the Service Table Add Edit, click or select a row and click and configure the following:
RV160x Administration Guide
75
Firewall
Port Forwarding
– Name of the service or application.Application Name
– Required protocol. Refer to the documentation for the service that you are hosting.Protocol
Port Start/ICMP Type/IP Protocol – Range of port numbers reserved for this service.
– Last number of the port, reserved for this service.Port End
Step 5 Click .Apply
Step 6 In the UPnP Port Forwarding Table, click the refresh button to refresh the data. The port forwarding rules for UPnP are
dynamically added by the UPnP application.
Port Triggering
Port triggering allows a specified port or port range to open for inbound traffic after user sends outbound
traffic through the trigger port. Port triggering allows the device to monitor outgoing data for specific port
numbers. The device recalls the client’s IP address that sent the matching data. When the requested data returns
through the device, the data is sent to the proper client using the IP addressing and port mapping rules.
To add or edit a service to the port triggering table, configure the following:
Step 1 Click (or select the row and click ) and enter the information:Add Edit
Check to enable port triggering.Enable
Enter the name of the application.Application Name
Select a service from the drop-down list. (If a service is not listed, you can add or modify
the list by following the instructions in the Service Management section.).
Trigger Service
Select a service from the drop-down list. (If a service is not listed, you can add or modify
the list by following the instructions in the Service Management section.).
Incoming Service
Select the interface from the drop-down list.Interfaces
Step 2 Click , to add, or edit an entry on the Service list.Service Management
Step 3 In the Service Table Add Edit, click or and configure the following:
– Name of the service or application.Application Name
– Required protocol. Refer to the documentation for the service that you are hosting.Protocol
Port Start/ICMP Type/IP Protocol Range of port numbers reserved for this service.
Last number of the port, reserved for this service.Port End//ICMP Code
Step 4 Click .Apply
RV160x Administration Guide
76
Firewall
Port Triggering
Policy NAT
Policy NAT allows you to identify the real address for the address translation by specifying the source and
destination address in an extended access list. You can specify the source and destination ports. The Policy
NAT allows you to create flexible NAT rules for advanced users. Please understand the capabilities of the
feature and your use case before configuring the rules. Invalid settings may be accepted but they may not
work. For most users, it is recommended to use the Port Forwarding or Static NAT instead.
Dynamic address translation (DNAT), is an enhanced form of NAT which involves the router translating the
IP address but not the port number. This dynamic approach is used for mapping the addresses of large numbers
of internal computers to a few routable IP addresses. For DNAT, you should set the "To interface" as .any
Note
To configure the Policy NAT, follow these steps:
Step 1 Choose Firewall > Policy NAT.
Step 2 Click to add a new policy NAT rule.Add
Step 3 Enter the name for the new policy NAT rule.
Step 4 Check to enable the policy NAT.Enable
Step 5 In the From Interface section, select the interface from the drop-down list.
Step 6 In the To Interface section, select the interface from the drop-down list.
Step 7 In the Source Address section, select or to create a new address. Next, check the TranslatedAny Use a new IP Group
box and select an option from the drop-down list.
Step 8 In the Destination Address section, select or to create a new address. Next, check theAny Use a new IP Group
Translated box and select an option from the drop-down list.
Step 9 In the Service section, select an option from the drop-down list. Next, check the box and select the Translated option
from the drop-down list.
IP source address or group can be created or selected from IP address groups page under the System
configuration page. If it is a service management record, the page is directed to Service Management page
under IP address group.
Note
Step 10 Click .Apply
Step 11 Click or to edit or delete an existing Policy NAT.Edit Delete
Step 12 Click .Apply
Policy NAT Use Cases
Policy NAT allows you to identify real addresses for address translation by specifying the source and destination
addresses in an extended access list. You can specify the source and destination ports. Regular NAT can only
consider the source addresses, not the destination address. For example, with policy NAT you can translate
the real address to a mapped address when it accesses a specific server, but also translate the real address to
a mapped address when it accesses a designated server. The following are use case examples for Policy NAT.
RV160x Administration Guide
77
Firewall
Policy NAT
Case 1: The source address for the HTTP traffic is translated by another public address, for traffic that is
initiated from the same LAN host.
Topology: PC1 –– LAN[RV260W]WAN –– (Internet) –– PC2
PC1: 192.168.1.111
RV260W LAN: 192.168.1.1
RV260W WAN: 172.16.1.1/24
PC2: 172.16.1.100
Goal: The HTTP traffic is translated to a new public address (172.16.1.10) and the non-HTTP traffic is
translated to a WAN address for PC1.
Address Object: Configure the address on PC1 as a single IP of 192.168.1.111 and the wan_alias as the new
public address of 172.16.1.10
Result: The source address is translated to 172.16.1.10 when initiating HTTP traffic from PC1. When initiating
FTP traffic from PC1, the source address is translated to the original WAN address of 172.16.1.1.
Case 2
Topology PC1/PC10 –– LAN[RV260W]WAN –– (Internet) –– PC2
PC1: 192.168.1.111
• PC10:192.168.1.10
RV260W LAN: 192.168.1.1
RV260W WAN: 172.16.1.1/24
PC: 172.16.1.100
Goal: Use the source address to let the PC translate to a specific public address while the others will still
translate to a WAN address.
Address Object: Configure the address on PC1 to 192.168.1.111, PC10 to 192.168.1.10, wan_alias to
172.16.1.10 and wan_alias2 to 172.16.1.11.
Result: Initiate traffic from PC1, PC10, and the other PC. The traffic from PC1 and PC10 is translated to
172.16.1.10 and 172.16.1.11 respectively. The traffic from the other PC is translated to the WAN address of
172.16.1.1.
Case 3
The VLAN2 subnet runs NAT while the VLAN1 and the other subnet runs on routing mode.
Topology PC1/PC10 –– LAN[RV260W]WAN –– (Intranet) –– PC2
PC1: 192.168.1.111, in VLAN1
PC10: 192.168.2.10, in VLAN2
RV260W LAN: 192.168.1.1 (VLAN1), 192.168.2.1 (VLAN2)
RV260W WAN: 172.16.1.1/24
PC2: 172.16.1.100
RV160x Administration Guide
78
Firewall
Policy NAT Use Cases
Disable the global NAT on WAN1.
Note
Address Object: Configure the VLAN2_subnet to 192.168.2.0/24.
Result: The VLAN traffic from VLAN2 subnet is translated to WAN IP. The other traffic from VLAN2 goes
to routing mode out of WAN (source address will not be translated).
Case 4
You configure the VLAN1 with subnet A and VLAN2 with subnet B. Both subnets are NATed to WAN, with
subnet A to be NATed to a public IP 1 and subnet B to public IP 2.
Topology PC1/PC10 –– LAN[RV260W]WAN (Internet) –– PC2
PC1: 192.168.1.111, in VLAN1
PC10: 192.168.2.10, in VLAN2.
RV260W LAN: 192.168.1.1 (VLAN1), 192.168.2.1 (VLAN2)
RV260W WAN: 172.16.1.1/24
PC2: 172.16.1.100
Result: PC1 in VLAN1 is translated to WAN_alias 172.16.1.10, and PC10 in VLAN2 is translated to
WAN_alias2 172.16.1.11.
Case 5
General LAN hosts are translated to WAN IP address when accessing the Internet. The OpenVPN client is
translated to another public address when accessing the Internet.
Address Object: Configure the WAN_alias to 172.16.1.10 and the OpenVPN to 10.1.4.0/24.
Result: The PC accesses the Internet server, and the general LAN user is translated to WAN IP 172.16.1.1.
The OpenVPN client (PC2) is translated to 172.16.1.10.
Case 6
Only allow particular Internet hosts to access the LAN side server.
Topology PC1/PC10 –– LAN[RV260W]WAN PC2
PC1: 192.168.1.111/24
RV260W LAN: 192.168.1.1/24
RV260W WAN: 172.16.1.1/24, GW 172.16.1.2
PC2: 172.16.1.110
Address Object: Configure allowed_hosts to 172.16.1.100-110, WAN IP to 172.16.1.1, and PC1 to
192.168.1.111.
Select as the "To Interface" to pre-route DNAT. The device forwards the traffic to the right interfaceAny
based on the translated destination address. You cannot configure it as specific VLAN interface.
Note
RV160x Administration Guide
79
Firewall
Policy NAT Use Cases
Result The PC2 address is 172.16.1.110, and can access PC1 by . Change the PC address tohttp://172.16.1.1
another address out of the range 172.16.1.100-110, if it cannot access the internal server.
Case 7
Only allows particular Internet hosts to access the LAN server by 1:1 like rule.
Topology PC1/PC10 –– LAN[RV260W]WAN –– PC2
PC1: 192.168.1.111/24
RV260W LAN: 192.168.1.1/24
RV260W WAN: 172.16.1.1/24, GW 172.16.1.2
PC2: 172.16.1.110
Address Object: Configure allowed_hosts to 172.16.1.100-110, WAN_alias to 172.16.1.10 and PC1 to
192.168.1.111.
Result: Only the hosts in the 172.16.1.100-110 range can access PC1 via 172.16.1.10.
Session Timeout
In the Session Timeout section, you can configure the session time-out and maximum concurrent connections
for the TCP/UDP/ICMP flows. The session timeout is the time it takes for the TCP or UDP session to time
out after a period of idleness.
To configure the Session Timeout, follow these steps:
Step 1 Click .Firewall > Session Timeout
Step 2 Enter the following:
Enter the timeout value in seconds for TCP sessions. Inactive TCP sessions are removed
from the session table after this duration (Default 1800, Range 30 to 1800).
TCP Session Timeout
Enter the timeout value in seconds for UDP sessions. Inactive UDP sessions are removed
from the session table after this duration (Default 30, Range 30 to 86400).
UDP Session Timeout
Enter the timeout value in seconds for ICMP sessions. Inactive ICMP sessions are
removed from the session table after this duration (Default 30, Range 15 to 60).
ICMP Session Timeout
Enter the maximum number of concurrent connections allowed (Default 15000, Range
10000 to 15000).
Maximum Concurrent
Connections
Displays the number of current connections.Current Connections
Click to clear the current connections.Clear Connections
Step 3 Click .Apply
RV160x Administration Guide
80
Firewall
Session Timeout


Produktspecifikationer

Varumärke: Cisco
Kategori: Router
Modell: RV160
Färg på produkten: Walnut, White
Inbyggd display: Ja
Vikt: 1400 g
Bredd: 130 mm
Djup: 100 mm
Höjd: 186 mm
Kraftkälla: AC
Blåtand: Ja
Typ av anslutningskontakt: 3,5 mm
Snooze-funktion: Ja
Inbyggda högtalare: Ja
Genomsnittlig effekt: 10 W
Antal inbyggda högtalare: 1
Visa siffror: 32 cijfers
Ljudlarm: Ja
Typ av tuner: Analoog & digitaal
Equalizerinställningar: Ja
Typ av antenn: Extern
Väckarklocka: Ja
USB-laddningsport: Ja
Inkluderar dockningsstation: Nee
Handvat(en): Ja
Termometer: Nee
Spela MP3: Nee
AUX ingång: Ja
Frekvensband som stöds: DAB, DAB+, FM
Antal förinställda kanaler: 60
Radio: Persoonlijk
Typ av högtalare: Volledig bereik
Utsprång: Nee
Apple dockningskompatibilitet: Niet ondersteund
Slaaptimer: Ja

Behöver du hjälp?

Om du behöver hjälp med Cisco RV160 ställ en fråga nedan och andra användare kommer att svara dig