- Rv042 Vpn Client To Gateway Login
- Rv042 Vpn Client Download
- Linksys Rv042 Vpn Client To Gateway
- Rv042 Vpn Client To Gateway Password
- Rv042 Vpn Client To Gateway Router
Objective
Introduction
Applicable Devices
- RV016
- RV042
- RV042G
- RV082
Software Version
- v4.2.2.08
Configure a VPN Tunnel
Add a New Tunnel
- Tunnel - Represents a tunnel for a remote single user.
- Group VPN - Represents a tunnel for a remote group of users.
Local Group Setup
- IP Only - Access to the tunnel is possible through a static WAN IP address. You can choose this option only if the router has a static WAN IP. The static WAN IP address appears automatically.
- IP + Domain Name(FQDN) Authentication - Access to the tunnel is possible through a static IP address and a registered Fully Qualified Domain Name (FQDN) domain. The static WAN IP address is an auto generated field.
- IP + E-mail Address(USER FQDN) Authentication - Access to the tunnel is possible through a static IP address and an email address. The static WAN IP address is an auto generated field.
- Dynamic IP + Domain Name(FQDN) Authentication - Access to the tunnel is possible through a dynamic IP address and a registered domain.
- Dynamic IP + E-mail Address(USER FQDN) Authentication — Access to the tunnel is possible through a dynamic IP address and an email address.
- IP - Only one specific LAN device can access to the tunnel. If you choose this option, enter the IP address of the LAN device in the IP Address field. The default IP is 192.168.1.0.
- Subnet - All LAN devices on a specific subnet can access to the tunnel. If you choose this option, enter the IP address and subnet mask of the LAN devices in the IP Address and Subnet Mask field respectively. The default mask is 255.255.255.0.
- IP Range - A range of LAN devices can access to the tunnel. If you choose this option, enter the starting and ending IP address in the Begin IP and End IP fields respectively. The default range is from 192.168.1.0 to 192.168.1.254.
Remote Client Setup
- IP Only - Access to the tunnel is possible through the static WAN IP of the client only. You must know the static WAN IP of the client to use this option.
- IP + Domain Name(FQDN) Authentication - Access to the tunnel is possible through a static IP address of the client and a registered domain.
- IP + E-mail Address(USER FQDN) Authentication - Access to the tunnel is possible through a static IP address of the client and an email address.
- Dynamic IP + Domain Name(FQDN) Authentication - Access to the tunnel is possible through a dynamic IP address of the client and a registered domain.
- Dynamic IP + E-mail Address(USER FQDN) Authentication - Access to the tunnel is possible through a dynamic IP address of the client and an email address.
Rv042 Vpn Client To Gateway Login
- IP Address - Represents the static IP address of the remote client. Enter the static IP address in the field.
- IP by DNS Resolved - Represents the domain name of the IP address which retrieves the IP address automatically through the local DNS server if you do not know the static IP address of the remote client. Enter the domain name of the IP address in the field.
- Domain Name (FQDN) - Access to the tunnel is possible through a registered domain. If you choose this option, enter the name of the registered Domain in the Domain Name field.
- E-mail Addr.(USER FQDN) - Access to the tunnel is possible through an email address of the client. If you choose this option, enter the Email Address in the Email Address field.
- Microsoft XP/2000 VPN Client - Access to the tunnel is possible through Microsoft XP or Microsoft 2000 windows software. Remote users with Microsoft VPN client software can access to the tunnel through the software.
IPSec Setup
![Gateway Gateway](/uploads/1/1/9/6/119677428/361099997.jpg)
- Manual - A custom security mode to generate a new security key by yourself and no negotiation with the key. It is the best to use during troubleshooting and small static environment. If you choose Group VPN in Step 1 in Add A New Tunnel section, this option is disabled.
- IKE with Preshared key - Internet Key Exchange (IKE) protocol is used to automatically generate and exchange a preshared key to establish authenticate communication for the tunnel.
Manual Key Mode Configuration
- DES - Data Encryption Standard (DES) uses a 56-bit key size for data encryption. DES is outdated and should be only used if one endpoint only supports DES.
- 3DES - Triple Data Encryption Standard (3DES) is a 168 bit, simple encryption method. 3DES encrypts the data three times, which provides more security then DES.
- MD5 - Message Digest Algorithm-5 (MD5) represents 32 digit hexadecimal hash function which provides protection to the data from malicious attack by the checksum calculation.
- SHA1 - Secure Hash Algorithm version 1 (SHA1) is a 160 bit hash function which is more secure than MD5 but it takes more time to compute.
IKE with Preshared Key Mode Configuration
- Group 1 - 768 bit - The lowest strength key and the most insecure authentication group. But it takes less time to compute the IKE keys. This option is preferred if the speed of the network is low.
- Group 2 - 1024 bit - The higher strength key and more secure authentication group. But it needs some time to compute the IKE keys.
- Group 5 - 1536 bit - Represents the highest strength key and the most secure authentication group. It needs more time to compute the IKE keys. It is preferred if the speed of the network is high.
- DES - Data Encryption Standard (DES) uses a 56-bit key size for data encryption. DES is outdated and should be only used if one endpoint only supports DES.
- 3DES - Triple Data Encryption Standard (3DES) is a 168 bit, simple encryption method. 3DES encrypts the data three times, which provides more security then DES.
- AES-128 - Advanced Encryption Standard (AES) is 128 bit encryption method which transforms the plain text into cipher text through 10 cycles repetitions.
- AES-192 - Advanced Encryption Standard (AES) is 192 bit encryption method which transforms the plain text into cipher text through 12 cycles repetitions. AES-192 is more secure than AES-128.
- AES-256 - Advanced Encryption Standard (AES) is 256 bit encryption method which transforms the plain text into cipher text through 14 cycles repetitions. AES-256 is the most secure encryption method.
- MD5 - Message Digest Algorithm-5 (MD5) represents 32 digit hexadecimal hash function which provide protection to the data from malicious attack by the checksum calculation.
- SHA1 - Secure Hash Algorithm version 1 (SHA1) is a 160 bit hash function which is more secure than MD5 but it takes more time to compute.
- DES - Data Encryption Standard (DES) uses a 56-bit key size for data encryption. DES is outdated and should be only used if one endpoint only supports DES.
- 3DES - Triple Data Encryption Standard (3DES) is a 168 bit, simple encryption method. 3DES encrypts the data three times, which provides more security then DES.
- AES-128 - Advanced Encryption Standard (AES) is 128 bit encryption method which transforms the plain text into cipher text through 10 cycles repetitions.
- AES-192 - Advanced Encryption Standard (AES) is 192 bit encryption method which transforms the plain text into cipher text through 12 cycles repetitions. AES-192 is more secure than AES-128.
- AES-256 - Advanced Encryption Standard (AES) is 256 bit encryption method which transforms the plain text into cipher text through 14 cycles repetitions. AES-256 is the most secure encryption method.
- MD5 - Message Digest Algorithm-5 (MD5) represents 32 digit hexadecimal hash function which provide protection to the data from malicious attack by the checksum calculation.
- SHA1 - Secure Hash Algorithm version 1 (SHA1) is a 160 bit hash function which is more secure than MD5 but it takes more time to compute.
- Null - No authentication method is used.
Rv042 Vpn Client Download
Advanced IKE with Pre-shared Key Mode Configuration
- MD5 - Message Digest Algorithm-5 (MD5) represents 128 digit hexadecimal hash function which provides protection to the data from malicious attack by the checksum calculation.
- SHA1 - Secure Hash Algorithm version 1 (SHA1) is a 160 bit hash function which is more secure than MD5 but it takes more time to compute.
Linksys Rv042 Vpn Client To Gateway
Routing Performance
Test Description | RV042G | RV042 v3 |
---|---|---|
WAN - LAN | 609 | 91 |
LAN - WAN | 492 | 90 |
Total Simultaneous | 739 | 91 |
Maximum Simultaneous Connections | 24061 | 34925 |
Firmware Version | v4.2.1.02 | v4.0.0.07-tm |
Table 2: Routing throughput
RV042G routing throughput
VPN Performance
Test Description | RV042G Local-to-Remote | RV042G Remote-to-Local |
---|---|---|
DES | 58 | 61 |
3DES | 58 | 61 |
AES 256 | 59 | 60 |
Rv042 Vpn Client To Gateway Password
Table 3: Gateway-to-gateway IPsec throughpt
I also ran client-to-Gateway tests connecting another Win 7 machine via Cisco'sQuickVPN utility and measured a nice steady 54 Mbps. QuickVPN uses 3DES and MD5 in its one-way IPsec tunnel (traffic must be initiated by the client) and I had my usual struggles with it.
Even though the latest 1.4.2.1 version QuickVPN client now offers the hint (when the connection attempt fails) that Windows Firewall must be enabled, I still could not connect when I switched my machine's network profile from Home to Public to comply with this requirement.
After many attempts, I finally succeeded when I stopped trying to use a security certificate exported from the RV042G. I just refused to quit when the missing certificate message popped up (twice) and finally was able to connect and run the tests.
I also checked the RV042G's PPTP server performance using the Win 7 built in client. Gateway-to-client throughput of only 9 Mbps and client-to-gateway of only 12 Mbps (not shown) showed that PPTP performance isn't a priority for Cisco. These results closely match what Doug measured on the RV042 v3 for PPTP.
The IxChariot plot below of PPTP and IPsec tests shows nice steady IPsec throughput, but cyclical throughput variation for PPTP.
RV042G VPN throughput
Closing Thoughts
Related Articles
Rv042 Vpn Client To Gateway Router
- New To The Charts: Cisco RV042 Dual WAN VPN Router
- Cisco RV082 and RV016 v3 VPN Routers Reviewed