Etherfast cable/dsl router with qos and 8-port switch instant broadband series (54 pages)
Summary of Contents for Linksys Etherfast BEFSX41
Page 1
Instant Broadband ® Series EtherFast ® Cable/DSL Firewall Router with 4-Port Switch/VPN Endpoint Use this guide to install: BEFSX41 User Guide...
Page 2
If the product proves defective during this warranty period, go to the Linksys website at www.linksys.com for complete RMA (Return Merchandise Authorization) assistance. You can also call Linksys Technical Support in order to obtain a RMA Number. BE SURE TO HAVE YOUR PROOF OF PURCHASE AND A BARCODE FROM THE PRODUCT'S PACK- AGING ON HAND WHEN CALLING.
Table of Contents Chapter 1: Introduction The Linksys EtherFast Cable/DSL Firewall Router with 4-Port Switch/VPN Endpoint Features An Introduction to LANs and WANs IP Addresses Network Setup Overview Chapter 2: Your Virtual Private Network (VPN) Why Do I Need a VPN?
The Linksys EtherFast 4-Port Switch/VPN Endpoint The Linksys Instant Broadband EtherFast Cable/DSL Firewall Router with 4- Port Switch/VPN Endpoint is the perfect solution for connecting a small group of PCs to a high-speed broadband Internet connection or a 10/100 Ethernet backbone.
An Introduction to LANs and WANs Simply put, a router is a network device that connects two networks together. In this instance, the Router connects your Local Area Network (LAN), or the group of PCs in your home or office, to the Wide Area Network (WAN), that is, the Internet.
By default, a DHCP server (LAN side) is enabled on the Router. If you already have a DHCP server running on your network, you must disable one of the two DHCP servers. If you run more than one DHCP server on your network, you will experience network errors, such as conflicting IP addresses.
2) Data Sniffing Data “sniffing” is a method used by hackers to obtain network data as it trav- els through unsecured networks, such as the Internet. Tools for just this kind of activity, such as protocol analyzers and network diagnostic tools, are often built into operating systems and allow the data to be viewed in clear text.
Figure 2-2 For additional information and instructions about creating your own VPN, please visit Linksys’s website at www.linksys.com or refer to “Appendix C: Configuring IPSec between a Microsoft Windows 2000 or XP PC and the Firewall Router.” Instant Broadband...
The Reset Button Briefly pressing the Reset Button will refresh the Cable/DSL Firewall Router’s connections, potentially clearing any jammed links. Pressing the Reset Button and holding it in for a few seconds will clear all of the Cable/DSL Firewall Router’s data. This should be done only if you are experiencing heavy routing problems, and only after you have exhausted all of the other troubleshooting options.
Chapter 4: Connect the Router Overview Unlike a hub or a switch, the Router’s setup consists of more than simply plug- ging hardware together. You will have to configure your networked PCs to accept the IP addresses that the Router assigns them (if applicable), and you will also have to configure the Router with setting(s) provided by your Internet Service Provider (ISP).
Chapter 5: Configure the PCs Overview The instructions in this chapter will help you configure each of your comput- ers to be able to communicate with the Router. To do this, you need to configure your PC’s network settings to obtain an IP (or TCP/IP) address automatically (called DHCP).
3. Click the IP Address tab and select Obtain an IP address automatically, as shown in Figure 5-2. Figure 5-2 4. Now click the Gateway tab to ensure that the Installed Gateway field is left blank. Click the OK button. 5.
3. Select Internet Protocol (TCP/IP), shown in Figure 5-4, and click the Properties button. Figure 5-4 4. Select Obtain an IP address automatically in both places, as shown in Figure 5-5, and click the OK button. Click the OK button again to complete the PC configuration.
3. Select Internet Protocol (TCP/IP), as shown in Figure 5-7, and click the Properties button. Figure 5-7 4. Select Obtain an IP address automatically. Once the new window Select Obtain an IP address automatically in both places, as shown in Figure 5- 8, and click the OK button.
Page 15
3. The Router configuration screen will appear with the Setup tab selected. Based on the setup instructions from your ISP, you may need to provide the following information. Host Name and Domain Name: These fields allow you to provide a host name and domain name for the Router.
Page 16
PPPoE If your DSL provider says that you are connecting through PPPoE or if you normally enter a user name and password to access the Internet, perform these steps: A. Select PPPoE as the WAN Connection Type. (Shown in Figure 6-6.) B.
7. Restart your computers so that they can obtain the Router’s new settings. If you need advanced setting information, please refer to “Chapter 7: The Cable/DSL Firewall Router’s Web-based Utility” or the Linksys support website at support.linksys.com. Congratulations! You’ve suc-...
• Firmware Version This entry shows the version and date of the firmware you are using. Future versions of the Router’s firmware will be posted and available for download on the Linksys website at www.linksys.com. • Time Zone Set your local time zone here.
Page 19
Static IP required to use a permanent IP address, then select Static IP, as shown in Figure 7-5. Figure 7-5 Specify WAN IP Address This is the IP address that the Router has, when seen from the WAN, or the Internet. Your ISP will provide you with the IP Address you need to specify here.
Page 20
Remote Access Service (RAS) is a service that applies to connections Singapore only (shown in Figure 7- users Singapore, check with Singtel information on RAS. User Name and Password Enter the User Name and Password supplied by Singtel. RAS Plan Select the type of plan you have. Connect on Demand and Max Idle Time You can configure the Router to cut your connection with your ISP after a specified period of time (Max Idle Time).
HeartBeat Signal (HBS) service that applies to connec- tions in Australia only. (Shown Figure 7-9.) users in Australia, check with your ISP for setup informa- tion. Figure 7-9 User Name and Password Enter the User Name and Password supplied by your ISP.
Page 22
Web Filter You can either enable or disable these four filtering methods by selecting Allow or Deny. • Proxy If local users have access to WAN proxy servers, they may be able to circumvent the Router’s content filters and access Internet sites blocked by the Router.
Figure 7-11 Instant Broadband Series EtherFast ® Virtual Private Networking (VPN) is a security measure that basically creates a secure connection between two remote locations. This connection is very specific as far as its settings are concerned; this is what creates the security. The VPN screen, shown in Figure 7-11, allows you to configure your VPN set- tings to make your network more secure.
Page 24
Local Secure Group and Remote Secure Group The Local Secure Group is the computer(s) on your LAN that can access the tunnel. The Remote Secure Group is the computer (s) on the remote end of the tunnel that can access the tunnel. Under Local Secure Group and Remote Secure Group, you may choose one of three options: Subnet, IP Address, and IP Range.
Page 25
Under Remote Secure Group, you have two additional options: Host and Any. • Host - If you select Host for the Remote Secure Group, then the Remote Secure Group will be the same as the Remote Security Gateway setting: IP Address, FQDN (Fully Qualified Domain Name), or Any. (Remote Security Gateway settings are explained on the following page.) In the example shown in Figure 7-15, the Remote Secure Group is the same as the Remote Security Gateway, set to a specific IP Address.
Page 26
• Any - If you select Any for the Remote Security Gateway, as shown in Figure 7-19, the VPN device at the other end of the tunnel will accept a request from any IP address. The remote VPN device can be another Firewall Router, a VPN Server, or a computer with VPN client software that supports IPSec.
Page 27
The Inbound SPI and Outbound SPI fields are different, however. The Inbound SPI value set here must match the Outbound SPI value at the other end of the tunnel. The Outbound SPI here must match the Inbound SPI value at the other end of the tunnel.
Page 28
To get more details concerning your tunnel connection, click the View Logs button. The screen in Figure 7-24 will appear: Figure 7-24 Select the log you wish to view: All (to view all logs), System Log, Access Log, Firewall Log, or VPN Log. The System Log screen displays a list of cold and warm starts, web login successes and failures, and packet filtering policies.
Phase 2 Group There are two Diffie-Hellman Groups to choose from: 768-bit and 1024-bit. Diffie-Hellman refers to a cryptographic technique that uses public and private keys for encryption and decryption. Key Lifetime In the Key Lifetime field, you may optionally select to have the key expire at the end of a time period of your choosing.
Do not restore the factory defaults unless you are having difficulties with the Router and have exhausted all other troubleshooting measures. Once the Router is reset, you will have to re-enter all of your configuration data. UPnP Function Universal Plug and Play (UPnP) allows Windows XP to auto- matically configure the Router for various Internet applications, such as gam- ing and videoconferencing.
Firmware Version This field shows the installed version and date of the firmware. Version dates are slightly more accurate than version numbers. Current Time Based upon the time zone selection made on the Setup tab, this field will display the current time. Login This indicates if you are using a dial-up style connection like PPPoE, RAS, PPTP, or HBS.
Internet sites that users on your network have accessed. For a permanent record of these logs, Logviewer software must be used. This software is downloadable from the Linksys website, www.linksys.com. The Logviewer saves all incoming and outgoing activity as a permanent file on your PC’s hard drive.
Clicking on any of the topics in the bar on the left will give you help informa- tion about that topic. Clicking the Linksys Website link will take you to Linksys’s website, www.linksys.com, provided you are connected to the Internet.
2. Click Upgrade Firmware to display the window shown in Figure 7-32. 3. Click the Browse but- find firmware upgrade file that you downloaded from Linksys website then extracted. 4. Double-click the firmware file you downloaded and extracted. Click the Upgrade button, and follow the instructions there.
Page 35
To see a summary of all Policies, click the Summary button. Figure 7-34 The Policies are listed on this screen with their names and settings (see Figure 7-34). To update the Internet Policy Summary screen with the most recent infor- mation, click the refresh button.
b. To create a new service, enter the name of the service in the Service Name field. To edit a service’s settings, select the service from the box on the right of the screen. c. From the Protocol drop-down menu, select the protocol type for this serv- ice, such as TCP, UDP, or ICMP.
Page 37
If you need to forward all ports to one PC, see the “DMZ Host” section. To add a server using Forwarding: 1. Enter the name of the application in the appropriate Customized Applications field. 2. Next to the name of the application, enter the number or range of the exter- nal port(s) used by the server or Internet application in the Ext.
Page 38
• HTTP (HyperText Transport Protocol) The communications protocol used to connect to servers on the World Wide Web. Its primary function is to establish a connection with a web server and transmit HTML pages to the client web browser. • POP3 (Post Office Protocol 3) A standard mail server commonly used on the Internet.
Dynamic Routing Figure 7-40 From the Dynamic Routing screen, shown on Figure 7-40, you can enable the Router to automatically adjust to physical changes in the network’s layout. The Router, using the RIP protocol, determines the network packets’ route based on the fewest number of hops between the source and the destination.
2. Enter the following data to create a new static route. Destination LAN IP: The Destination LAN IP is the address of the remote network or host to which you want to assign a static route. Enter the IP address of the host for which you wish to create a static route here. If you are building a route to an entire network, be sure that the network portion of the IP address is set to 0.
Specify an IP Address behind the DMZ Port: If you have multiple PCs connected to Port 4/DMZ via a hub or switch, you can specify which PC is the DMZ host. To expose a computer with a specific IP address, enter that computer’s IP address in this field.
DDNS Figure 7-44 The Router offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address. It is useful when you are hosting your own website, FTP server, or other serv- er behind the Router.
Router. If your situation is described here, the problem should be solved by applying the corresponding solution. If you can’t find an answer here, check the Linksys website at www.linksys.com. 1. I need to set a static IP address on a PC.
Page 44
For Windows 2000: A. Click Start, Settings, and Control Panel. Double-click Network and Dial-Up Connections. B. Right-click the Local Area Connection that is associated with the Ethernet adapter you are using, and select the Properties option. C. In the Components checked are used by this connection box, highlight Internet Protocol (TCP/IP), and click the Properties button.
Page 45
that Obtain an IP address automatically and Obtain DNS server address automatically are selected. • Click the OK button in the Internet Protocol (TCP/IP) Properties win- dow, and click the OK button in the Local Area Connection Properties window. • Restart the computer if asked. For Windows XP: The following instructions assume you are running Windows XP with the default interface.
Page 46
IPSec server. Refer to “Problem #7, I need to set up online game hosting or use other Internet applications” for details. Check the Linksys website for more information at www.linksys.com. 6. I need to set up a server behind my Router.
Page 47
7. I need to set up online game hosting or use other Internet applications. If you want to play online games or use Internet applications, most will work without doing any port forwarding or DMZ hosting. There may be cases when you want to host an online game or Internet application.
Page 48
In order to upgrade the firmware with the latest features, you need to go to the Linksys website and download the latest firmware at www.linksys.com. Follow these steps: A. Go to the Linksys website at http://www.linksys.com and download the latest firmware. B. To upgrade the firmware, follow the steps in the Help section found in “Chapter 7: The Cable/DSL Firewall Router’s Web-based Utility.”...
Page 49
15. I can't access my email, web, or VPN, or I am getting corrupted data from the Internet. The Maximum Transmission Unit (MTU) setting may need to be adjusted. By default, the MTU is set at 1500. For most DSL users, it is strongly recom- mended to use MTU 1492.
ISP. Does the Router support any operating system other than Windows 95, Windows 98, Windows 2000, Windows NT, or Windows XP? Yes, but Linksys does not, at this time, provide technical support for setup, configuration or troubleshoot- ing of any non-Windows operating systems.
Page 51
How will I be notified of new Router firmware upgrades? All Linksys firmware upgrades are posted on the Linksys website at www.linksys.com, where they can be downloaded for free. The Router’s firmware can be upgraded with TFTP programs. If the Router’s Internet connection is working well, there is no need to download a newer firmware version, unless that version contains new features that you would like to use.
Appendix B: Maximizing VPN Security Just as you maximized your network security with a firewall, you should also maximize security for your data with the Firewall Router. IPSec is compatible with most VPN endpoints and ensures privacy and authen- tication for data, while authenticating user identification. With IPSec, authen- tication is based upon the PC's IP Address.
Appendix C: Configuring IPSec between a Windows 2000 or XP PC and the Firewall Router Introduction This document demonstrates how to establish a secure IPSec tunnel using pre- shared keys to join a private network inside the Firewall Router and a Microsoft Windows 2000 or XP PC.
Step Two: Build Filter Lists Filter List 1: win->router Note: The references in this section to “win” are references to Windows 2000 and XP. 1. In the new policy’s prop- erties screen, verify that the Rules tab is selected, as shown in Figure C-2. Deselect the Use Add Wizard check box, and click the Add button to...
Page 55
5. If you want to enter a description for your filter, click the Description tab and enter the description there. 6. Click the OK button. Then, click the OK (for Windows XP) or Close (for Windows 2000) button on the IP Filter List window. Filter List 2: router=>win 7.
10. If you want to enter a description for your filter, click the Description tab and enter the description there. 11. Click the OK button and the New Rule Properties screen should appear with the IP Filer List tab selected, as shown in Figure C-9. There should now be a listing for “router ->...
Page 57
3. From Security Methods tab, shown in Figure C-12, verify that the Negotiate security option is enabled, and deselect Accept unsecured communica- tion, always respond using IPSec check box. Select Session Perfect Forward Secrecy, and click the OK button. 4. Select the Authentication Methods tab, shown in Figure C-13, and click the Edit button.
Page 58
7. Select Tunnel Setting tab, shown in Figure C-16, and click The tunnel endpoint is specified by this IP Address radio button. Then, enter the Router’s WAN IP Address. 8. Select the Connection Type tab, as shown in Figure C-17, and click All network connec- tions.
Page 59
11. Click the Filter Action tab, and select the filter action Require Security, as shown in Figure C-20. Then, click the Edit but- ton. 12. Click the Authentication Methods tab, and verify that the authentication method Kerberos selected, as shown in Figure C-21.
15. From Tunnel Setting tab, shown in Figure C-24, click the radio button for The tunnel endpoint is specified by this IP Address, and enter Windows 2000/XP computer’s IP Address. 16. Click the Connection Type tab, shown in Figure C-25, select All network connections.
Step Five: Create a Tunnel Through the Web-based Utility Note: Further details on this step can be found in the VPN Tab section in “Chapter 7: The Cable/DSL Firewall Router’s Web-based Utility”. 1. Open your web browser, and enter 192.168.1.1 in the Address field. Press the Enter key.
Internet. For example, www.linksys.com is actually 216.23.162.142. Type it into your web browser and you will wind up at the Linksys home page every time. There are servers that translate the URL to an IP address; this is called Domain Name System (DNS).
Page 63
Step One: Pinging an IP Address The first step to determining your ISP’s web and e-mail server address is to ping its IP address. 1. Power on the computer and the cable or DSL modem, and restore the network configuration set by your ISP if you have since changed it. 2.
Appendix F: Installing the TCP/IP Protocol Follow these instructions to install the TCP/IP protocol on one of your PCs only after a network card has been successfully installed inside the PC. These instructions are for Windows 95, Windows 98, and Windows Me. For TCP/IP setup under Windows NT, 2000, and XP, see your Windows documentation or the Help feature.
Appendix G: Finding the MAC Address and IP Address for Your Ethernet Adapter This section describes how to find the MAC address for your Ethernet adapter to do MAC Address Cloning for the Router and ISP. You can also find the IP address of your computer’s Ethernet adapter.
Page 66
2. In the command prompt, enter ipconfig /all. Then press the Enter key. Figure G-5 3. Write down the Physical Address as shown on your computer screen; it is the MAC address for your Ethernet adapter. This will appear as a series of letters and numbers.
Appendix H: Glossary 3DES - 3DES is a variation on DES that uses a 168-bit key. Adapter - Printed circuit board that plugs into a PC to add to capabilities or connectivity to a PC. AppleTalk - An Apple Computer networking system that supports Apple's pro- prietary local talk.
Page 68
Linksys DES encryption uses a 56-bit key. DHCP (Dynamic Host Configuration Protocol) - A protocol that lets network administrators manage centrally and automate the assignment of Internet Protocol (IP) addresses in an organization's network.
Page 69
Firmware - Code that is written onto read-only memory (ROM) or program- mable read-only memory (PROM). Once firmware has been written onto the ROM or PROM, it is retained even when the device is turned off. FTP (File Transfer Protocol) - A protocol used to transfer files over a TCP/IP network (Internet, UNIX, etc.).
Page 70
e-mail address you're sending a note to. At the other end, the recipient can see the IP address of the Web page requestor or the e-mail sender and can respond by sending another message using the IP address it received. IPSec (Internet Protocol Security) - A suite of protocols used to implement secure exchange of packets at the IP layer.
Page 71
Packet - A unit of data routed between an origin and a destination in a network. Packet Filtering - Discarding unwanted network traffic based on its originat- ing address or range of addresses or its type (e-mail, file transfer, etc.). Ping (Packet INternet Groper) - An Internet utility used to determine whether a particular IP address is online.
Page 72
et than just its source and destination information. It is called "stateful" because verifies that the stated destination computer has previously requested the cur- rent communication. In this way, it verifies that all communications are initiat- ed by the recipient computer and are taking place only with sources that are known and trusted from previous interactions.
phone (DSL) or cable systems, or through leased lines or satellites. In its most basic definition, the Internet could be considered a WAN. WINIPCFG - Configuration utility based on the Win32 API for querying, defining and managing IP addresses within a network. A commonly used util- ity for configuring networks with static IP addresses.
EtherFast ® Appendix K: Contact Information For help with the installation or operation of the EtherFast Cable/DSL Firewall Router, contact Linksys Technical Support at one of the phone numbers or Internet addresses below. Sales Information Technical Support RMA (Return Merchandise...