USER GUIDE Broadband Firewall Router with 4-Port Switch/VPN Endpoint Model: BEFSX41
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
Table of Contents Chapter 1: Product Overview 1 Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 2: Advanced Configuration 2 How to Access the Web-Based Utility . . . . . . . . . . . . . . . . . . . .
Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys by Cisco Broadband Firewall Router with 4-Port Switch/VPN Endpoint. The Router lets you access the Internet through its four switched ports. You can also use the Router to share resources such as computers, printers and files. A variety of security features help to protect your data and your privacy while online. Security features include a Stateful Packet Inspection (SPI) firewall and NAT technology.
Advanced Configuration Chapter 2 Chapter 2: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you’d like to change its advanced settings, use the Router’s web-based utility. This chapter describes each web page of the utility and each page’s key functions. You can access the utility via a web browser on a computer connected to the Router.
Advanced Configuration Chapter 2 (otherwise, leave it set at Disable) and enter the value desired. You should leave this value in the 1200 to 1500 range. Most DSL users should use the default of 1492. connected to the Internet through a DSL line, check with your ISP to see if they use PPPoE. If they do, you will have to enable PPPoE. Internet Connection Type > Obtain an IP Automatically Static IP If you are required to use a permanent IP address to connect to the Internet, select Static IP.
Advanced Configuration Chapter 2 RAS PPTP Remote Access Service (RAS) is a service that applies to connections in Singapore only. For users in Singapore, check with Singtel for information on RAS. Point-to-Point Tunneling Protocol (PPTP) is a service that applies to connections in Europe only. Internet Connection Type > RAS User Name and Password Enter the User Name and Password provided by Singtel. RAS Plan Select the type of plan you have.
Advanced Configuration Chapter 2 desired. You should leave this value in the 1200 to 1500 range. Most DSL users should use the default of 1492. When you are finished, click the Save Settings button. Then click the Status tab, and click the Connect button to start the connection. Heart Beat Signal When you are finished, click the Save Settings button. Then click the Status tab, and click the Connect button to start the connection. L2TP L2TP is a service that applies to connections in Israel only.
Advanced Configuration Chapter 2 Network Setup The Network Setup section changes the settings on the network connected to the Router’s Ethernet ports. Local IP Address The default value is 192.168.1.1. Subnet Mask The default value is 255.255.255.0. Network Address Server Settings (DHCP) The settings allow you to configure the Router’s Dynamic Host Configuration Protocol (DHCP) server function. The Router can be used as a DHCP server for your network.
Advanced Configuration Chapter 2 Clone Click this button to clone the MAC address of the computer you are using. TZO.com Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Setup > Advanced Routing This screen is used to set up the Router’s advanced functions. Dynamic Routing automatically adjusts how packets travel on your network. Static Routing sets up a fixed route to another network destination.
Advanced Configuration Chapter 2 Static Routing A static route is a pre-determined pathway that network information must travel to reach a specific host or network. Enter the information described below to set up a new static route. Select Entry To set up a static route between the Router and another network, select a number from the dropdown list. Click Delete Entry to delete a static route.
Advanced Configuration Chapter 2 computers. Select Enabled to filter multicasting. This feature is disabled by default. VPN Tunnel Filter Internet NAT Redirection This feature uses port forwarding to block access to local servers from local networked computers. Select Enabled to filter Internet NAT redirection. This feature is disabled by default. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Security > VPN The VPN screen allows you to enable VPN tunnels.
Advanced Configuration Chapter 2 IP Address If you select IP Address, only the computer with the specific IP Address that you enter will be able to access the tunnel. must be the same type of encryption that is being used by the VPN device at the other end of the tunnel. Or, you may choose not to encrypt by selecting Disable. IP Range If you select IP Range, it will be a combination of Subnet and IP Address. You can specify a range of IP Addresses within the Subnet which will have access to the tunnel.
Advanced Configuration Chapter 2 Log screen of the Administration tab, will show you VPN activity on a separate screen. The VPN Log screen displays successful connections, transmissions and receptions, and the types of encryption used. For more advanced VPN options, click the Advanced Setting button to open the Advanced Setting screen. When finished making your changes on this screen, click the Save Settings button to save these changes, or click the Cancel Changes button to undo your changes.
Advanced Configuration Chapter 2 Internet Access PCs Click the Edit List button to select which PCs will be affected by the policy. You can enter the PC by MAC Address or IP Address. You can also enter a range of IP Addresses if you wish this policy to affect a group of PCs. After making your changes, click the Save Settings button to apply your changes or Cancel Changes to cancel your changes. Restrict Access > Internet Access Internet Access Policy Access is managed by a policy.
Advanced Configuration Chapter 2 2. If you wish to deny or allow Internet access for those PCs you listed on the List of PCs screen, click the option. Applications & Gaming > Port Range Forwarding 3. You can filter access to various services accessed over the Internet, such as FTP or Telnet, by selecting a service from the drop-down menus next to Blocked Services. If a service isn’t listed, you can click the Service button to open the Service screen and add a service to the list.
Advanced Configuration Chapter 2 Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Applications & Gaming > Port Triggering The Port Triggering screen allows the Router to watch outgoing data for specific port numbers. The IP address of the computer that sends the matching data is remembered by the Router, so that when the requested data returns through the Router, the data is pulled back to the proper computer by way of IP address and port mapping rules.
Advanced Configuration Chapter 2 “fingered” must have placed his or her profile on the system in order for the information to be available. Fingering requires entering the full user@domain address. HTTP (HyperText Transport Protocol) The communications protocol used to connect to servers on the World Wide Web. Its primary function is to establish a connection with a web server and transmit HTML pages to the client web browser.
Advanced Configuration Chapter 2 SNMP The Router supports Simple Network Management Protocol (SNMP), which is a widely used network monitoring and control protocol. This allows network supervisors to monitor the Router using network management systems such as HP OpenView. Enabled/Disabled To use SNMP, select Enabled. If you do not want to use SNMP, keep the default, Disabled. Get Community Enter the password that allows read‑only access to the Router’s SNMP information.
Advanced Configuration Chapter 2 Log Administration > Diagnostics The Log screen provides you with options for email alerts and a log of all incoming and outgoing URLs or IP addresses for your Internet connection. Diagnostics allow you to check the connections of your network components as well as locations outside your network via the Internet. Email alerts To enable the Router to send email alerts in the event of Denial of Service attacks and the like, click the radio button beside Enable.
Advanced Configuration Chapter 2 Upgrade Firmware Before upgrading the firmware, download the Router’s firmware upgrade file from the Linksys website, www.linksys.com. Then extract the file. Please select a file to upgrade Click Browse and select the extracted firmware upgrade file. Administration > Factory Defaults NOTE: Do not restore the factory defaults unless you are having difficulties with the Router and have exhausted all other troubleshooting measures.
Advanced Configuration Chapter 2 DHCP Renew Click the DHCP Renew button to replace your Gateway’s current IP address with a new IP address. DHCP Release Click the DHCP Release button to delete your Gateway’s current IP address. client. To remove a DHCP client, select the client and click Delete. To retrieve the most up-to-date information, click Refresh. Click Refresh to update the on-screen information. Click Refresh to update the on-screen information.
Troubleshooting Appendix A Appendix A: Troubleshooting Your computer cannot connect to the Internet. When you double-click the web browser, you are prompted for a username and password. If you want to get rid of the prompt, follow these instructions. Launch the web browser and perform the following steps (these steps are specific to Internet Explorer but are similar for other browsers): Follow these instructions until your computer can connect to the Internet: 1. Select Tools > Internet Options.
Specifications Appendix B Appendix B: Specifications Model BEFSX41 Standards IEEE 802.3 (10BaseT), 802.3u (100BaseTX) Ports One 10/100 RJ-45 Port, Four 10/100 RJ-45 Ports Button Reset Cabling Type Ethernet Category 5 LEDs Power, DMZ, Ethernet, Internet Environmental Dimensions 7.32" x 1.88" x 6.06" (186 x 48 x 154 mm) Unit Weight 13.40 oz. (380 g) Power External, 12V DC, 1A Certifications FCC, CE Operating Temp. 32 to 104ºF (0 to 40ºC) Storage Temp.
Appendix C Appendix C: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which begins on the date of purchase by the original end-user purchaser and lasts for the period specified below: •• One (1) year for new product •• Ninety (90) days for refurbished product This limited warranty is non-transferable and extends only to the original end-user purchaser.
Appendix C Warranty Information rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
Appendix D Appendix D: Regulatory Information FCC Statement This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used according to the instructions, may cause harmful interference to radio communications.
Appendix D User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix D Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix D Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix D Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenščina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Appendix E Appendix E: Software License Agreement Software in Linksys Products This product from Cisco-Linksys LLC or from one of its affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or CiscoLinksys K.K. (“Linksys”) contains software (including firmware) originating from Linksys and its suppliers and may also contain software from the open source community. Any software originating from Linksys and its suppliers is licensed under the Linksys Software License Agreement contained at Schedule 1 below.
Software License Agreement Appendix E your Linksys product and/or the Software is being used in accordance with the terms of this Agreement; (iii) to provide improvements to the way Linksys delivers technology to you and to other Linksys customers; (iv) to enable Linksys to comply with the terms of any agreements it has with any third parties regarding your Linksys product and/or Software and/or (v) to enable Linksys to comply with all applicable laws and/or regulations, or the requirements of any regulat
Appendix E GNU General Public License is intended to guarantee your freedom to share and change free software–to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too.
Appendix E c. If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License.
Software License Agreement Appendix E 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
Appendix E GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.
Appendix E freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a “work based on the library” and a “work that uses the library”. The former contains code derived from the library, whereas the latter must be combined with the library in order to run.
Appendix E Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library. In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3.
Appendix E Software License Agreement b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user’s computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with. 8.
Software License Agreement Appendix E software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 12.
Appendix E Software License Agreement OpenSSL License Original SSLeay License Copyright © 1998-2007 The OpenSSL Project. All rights reserved. Copyright © 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). 1.
Appendix E Software License Agreement DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.