User's Manual
Table Of Contents
- Introduction
- LAN Ethernet Interfaces
- Wireless Access Point (Cisco RV180W)
- Firewall and VPN Client Access
- Wireless Distribution System (Cisco RV180W)
- Virtual Networks
- Wireless Security (Cisco RV180W)
- Quality of Service (Cisco RV180W)
- Configuration and Administration
- Front Panel
- Back Panel
- Front Panel
- Back Panel
- Installation Guidelines
- Wall Mounting
- Configuring Networking
- Configuring the IPv4 WAN (Internet)
- Configuring PPPoE Profiles
- Configuring IPv4 LAN (Local Network) Settings
- Configuring Virtual LAN (VLAN) Membership
- Configuring Multiple VLAN Subnets
- Configuring Static DHCP
- Configuring Advanced DHCP Settings
- Viewing DHCP Leased Clients
- Configuring RSTP (Cisco RV180W)
- Configuring Jumbo Frames
- Choosing the Routing Mode
- Viewing Routing Information
- Configuring Static Routes
- Configuring Dynamic Routing
- Configuring the IP Mode
- Configuring IPv6 WAN Settings
- Configuring IPv6 LAN Properties
- Configuring IPv6 Routing
- Configuring Tunneling
- Configuring Router Advertisement
- Configuring the Wireless Network (Cisco RV180W)
- Wireless Security Tips
- General Network Security Guidelines
- Enabling Rogue AP Detection
- Authorizing a Rogue AP
- Adding and Editing Authorized APs
- Configuring the Firewall
- Creating an Access Rule
- Adding a Port Triggering Rule
- Adding a Port Forwarding Configuration
- Configuring One-to-One Network Address Translation (NAT)
- Configuring MAC Address Filtering
- Configuring IP/MAC Address Binding
- Creating Custom Services
- Creating Firewall Schedules
- Configuring Sessions
- Configuring Internet Group Management Protocol (IGMP)
- Configuring LAN (Local Network) Groups
- Enabling Session Initiation Protocol Application-Level Gateway (SIP ALG)
- Configuring Virtual Private Networks (VPNs) and Security
- Creating Cisco QuickVPN Client Users
- Configuring a Basic VPN
- Configuring Advanced VPN Parameters
- Configuring VPN Clients
- Monitoring VPN Tunnel Status
- Configuring VPN Users
- Configuring VPN Passthrough
- Using SSL Certificates for Authentication
- Using the Cisco RV180/RV180W With a RADIUS Server
- Configuring 802.1x Port-Based Authentication
- Configuring Quality of Service (QoS)
- Administering Your Cisco RV180/RV180W
- Configuring Web Access
- Configuring User Accounts
- Setting the Session Timeout Value
- Configuring SNMP
- Configuring Additional SNMP Information
- Configuring Logging Policies
- Configuring Firewall Logs
- Configuring Remote Logging
- Configuring Bonjour
- Configuring UPnP
- Viewing the Cisco RV180/RV180W Status
- Using Cisco QuickVPN for Windows 7, 2000, XP, or Vista
- Installing from the CD-ROM
- Downloading and Installing from the Internet
- Where to Go From Here
Configuring the Wireless Network (Cisco RV180W)
Configuring Basic Wireless Settings
Cisco RV180/RV180W Administration Guide 65
3
DRAFT - CISCO CONFIDENTIAL
d. Select one of the four keys to use as the shared key that devices must have in
order to use the wireless network. If you did not generate a key in Step 7c,
enter a key directly into the WEP Key field. The length of the key should be 5
ASCII characters (or 10 hexadecimal characters) for 64-bit WEP and 13 ASCII
characters (or 26 hexadecimal characters) for 128-bit WEP. Valid hexadecimal
characters are “0” to “9” and “A” to “F”.
STEP 9 If you chose WPA Personal, WPA2 Personal, or WPA2 Personal Mixed:
a. Enter the WPA Key, or password/phrase that will secure the network. Devices
connecting to the network must use this phrase for authentication.
b. If you want to see the password as you are entering it, check the Unmask
Password box.
c. In the Key Renewal field, enter the number of seconds after which the Cisco
RV180/RV180W will generate a new key. These keys are internal keys
exchanged between the Cisco RV180/RV180W and connected devices. The
default value (3600 seconds) is usually adequate unless you are experiencing
network problems.
STEP 10 If you chose WPA Enterprise or WPA2 Enterprise Mixed, no further configuration is
required.
STEP 11 If you chose WPA2 Enterprise, you can check the Pre-Authentication box
(optional). Pre-authentication allows wireless clients to quickly switch between
connected wireless networks sharing the same security configuration. When a
wireless client disconnects from a wireless network, a notification is sent to the
network, which then sends the pre-authentication info to other wireless networks.
STEP 12 Click Save.
Configuring MAC Filtering
You can use MAC filtering to permit or deny access to the wireless network based
on the MAC (hardware) address of the requesting device. For example, you can
enter the MAC addresses of a set of PCs and only allow those PCs to access the
network. MAC filtering is configured for each wireless network.
STEP 1 Choose Wireless > Basic Settings.
STEP 2 In the Wireless Basic Settings Table, check the box on the left of the wireless
network you want to configure.
STEP 3 Click Edit MAC Filtering.