User's Manual
Table Of Contents
- Introduction
- LAN Ethernet Interfaces
- Wireless Access Point (Cisco RV180W)
- Firewall and VPN Client Access
- Wireless Distribution System (Cisco RV180W)
- Virtual Networks
- Wireless Security (Cisco RV180W)
- Quality of Service (Cisco RV180W)
- Configuration and Administration
- Front Panel
- Back Panel
- Front Panel
- Back Panel
- Installation Guidelines
- Wall Mounting
- Configuring Networking
- Configuring the IPv4 WAN (Internet)
- Configuring PPPoE Profiles
- Configuring IPv4 LAN (Local Network) Settings
- Configuring Virtual LAN (VLAN) Membership
- Configuring Multiple VLAN Subnets
- Configuring Static DHCP
- Configuring Advanced DHCP Settings
- Viewing DHCP Leased Clients
- Configuring RSTP (Cisco RV180W)
- Configuring Jumbo Frames
- Choosing the Routing Mode
- Viewing Routing Information
- Configuring Static Routes
- Configuring Dynamic Routing
- Configuring the IP Mode
- Configuring IPv6 WAN Settings
- Configuring IPv6 LAN Properties
- Configuring IPv6 Routing
- Configuring Tunneling
- Configuring Router Advertisement
- Configuring the Wireless Network (Cisco RV180W)
- Wireless Security Tips
- General Network Security Guidelines
- Enabling Rogue AP Detection
- Authorizing a Rogue AP
- Adding and Editing Authorized APs
- Configuring the Firewall
- Creating an Access Rule
- Adding a Port Triggering Rule
- Adding a Port Forwarding Configuration
- Configuring One-to-One Network Address Translation (NAT)
- Configuring MAC Address Filtering
- Configuring IP/MAC Address Binding
- Creating Custom Services
- Creating Firewall Schedules
- Configuring Sessions
- Configuring Internet Group Management Protocol (IGMP)
- Configuring LAN (Local Network) Groups
- Enabling Session Initiation Protocol Application-Level Gateway (SIP ALG)
- Configuring Virtual Private Networks (VPNs) and Security
- Creating Cisco QuickVPN Client Users
- Configuring a Basic VPN
- Configuring Advanced VPN Parameters
- Configuring VPN Clients
- Monitoring VPN Tunnel Status
- Configuring VPN Users
- Configuring VPN Passthrough
- Using SSL Certificates for Authentication
- Using the Cisco RV180/RV180W With a RADIUS Server
- Configuring 802.1x Port-Based Authentication
- Configuring Quality of Service (QoS)
- Administering Your Cisco RV180/RV180W
- Configuring Web Access
- Configuring User Accounts
- Setting the Session Timeout Value
- Configuring SNMP
- Configuring Additional SNMP Information
- Configuring Logging Policies
- Configuring Firewall Logs
- Configuring Remote Logging
- Configuring Bonjour
- Configuring UPnP
- Viewing the Cisco RV180/RV180W Status
- Using Cisco QuickVPN for Windows 7, 2000, XP, or Vista
- Installing from the CD-ROM
- Downloading and Installing from the Internet
- Where to Go From Here
Configuring the Wireless Network (Cisco RV180W)
Configuring Basic Wireless Settings
Cisco RV180/RV180W Administration Guide 63
3
DRAFT - CISCO CONFIDENTIAL
to this network are assigned addresses on this VLAN. The default VLAN is 1
and if all the devices are on the same network, this can be left unchanged.
d. (Optional) Check the Wireless Isolation within SSID box to separate this
network from the other three networks on the Cisco RV180/RV180W. When
this feature is enabled, the network can communicate with the Cisco RV180/
RV180W, but not with any of the other networks.
e. In the Max Associated Clients field, enter the maximum number of endpoints
that can connect to this network. The default value is 8. You can change this
number if you want to restrict traffic on the network to prevent it from being
overloaded, for example. The number of clients connected across all four
virtual access points cannot exceed 100.
f. Click Save.
Configuring Security
STEP 1 Choose Wireless > Basic Settings.
STEP 2 In the Wireless Basic Settings Table, check the box on the left of the wireless
network you want to configure.
STEP 3 Click Edit Security Mode to configure security.
STEP 4 Select the SSID to configure.
STEP 5 Click Enable under Wireless Isolation within SSID to separate this network from
the other three wireless networks on the Cisco RV180/RV180W. When this feature
is enabled, the network can communicate with the Cisco RV180/RV180W, but not
with any of the other three networks.
STEP 6 In the Security field, select the type of security. All devices on this network must
use the same security mode and settings to work correctly. Cisco recommends
using the highest level of security that is supported by the devices in your
network.
• Disabled—Any device can connect to the network. Not recommended.
• Wired Equivalent Privacy (WEP)— Weak security with a basic encryption
method that is not as secure as WPA. WEP may be required if your network
devices do not support WPA; however, it is not recommended.