LAN & WAN Reviews

Applicable Devices


The default IP is Auto is the default value, which automatically chooses the port number based on the VPN settings. If you choose DES as encryption method in Step 3, enter a 16 digit hexadecimal value. Choose the appropriate mode of key management to ensure security from the Keying Mode drop-down list. By default it is always checked.


Both the rear and front are shown below. The power connector is on the side of the RV There is no cooling fan, so it runs quiet.

It has rubber feet for placing on a desk, as well as holes on the bottom for wall mounting. For , the look and feel of the RV's menu has been updated, but remains intuitive and easy to navigate. There are 10 main menus on the left side of the screen, each with sub-menus. Figure 3 provides a glimpse of the new Admin GUI.

You configure the RV via a browser, but there is a known problem with Firefox. I had no trouble with IE8 and Safari connecting to the RV, but the configuration pages were not completely displayed using Firefox on Windows.

Cisco told me this is a known issue and they have resolved it in the next firmware release. I was able to use Firefox with the RV on a Linux machine without issue. My review described support for multiple LAN subnets, which remains a feature in the v3. This feature allows you to use different subnets on your LAN, a useful and simple way to segment a small network.

Static routes can also be added to direct traffic to specific next hop IP addresses. IPv6 is a new networking feature in the RV, which deserves its own section. IPv6 support in the RV was introduced in firmware 4.

The manual for the RV hasn't kept up with the firmware, though, because it lacks documentation on the RV's IPv6 features. My PC was issued fc Enabling stateless auto-configuration for IPv6 addressing tells the RV to advertise its IPv6 subnet in response to an IPv6 router solicitation multicast message.

Certificates are generated by the router and are used to ensure that both the router and QuickVPN user are secure. From the router, you can export the certificate that can be used by the QuickVPN client. Enter the password again to confirm it in the Confirm New Password field. Optional To allow the user to change their password, click the Yes radio button.

Optional To edit any information about a user, click the specific user in the table. Edit the necessary information and then click Update.

You can not edit the username. However, a certificate will increase the security of the VPN. Scroll down to the Certificate Management area. The current certificate is displayed in the Existing Certificate field.

Enter the key to encrypt and decrypt data in the Encryption Key field. If you choose DES as encryption method in Step 3, enter a 16 digit hexadecimal value. If you choose 3DES as encryption method in Step 3, enter a 40 digit hexadecimal value. Enter a pre-shared key to authenticate the traffic in Authentication Key field. If you choose MD5 as authentication method in step 4, enter 32 digit hexadecimal value.

If you choose SHA as authentication method in Step 4, enter 40 digit hexadecimal value. The VPN tunnel needs to use the same preshared key for both of its ends.

Phase 1 is used to establish the simplex, logical security association SA between the two ends of the tunnel to support secure authenticate communication. Diffie-Hellman DH is a cryptographic key exchange protocol which is used to determine the strength of the key during Phase 1 and it also shares the secret key to authenticate the communication.

But it takes less time to compute the IKE keys. This option is preferred if the speed of the network is low. But it needs some time to compute the IKE keys.

It needs more time to compute the IKE keys. It is preferred if the speed of the network is high. Choose the appropriate Phase 1 Encryption to encrypt the key from the Phase 1 Encryption drop-down list.

The VPN tunnel needs to use the same encryption method for both of its ends. AES is the most secure encryption method. Choose the appropriate Phase 1 authentication method from the Phase 1 Authentication drop-down list. The VPN tunnel needs to use the same authentication method for both of its ends. Check the Perfect Forward Secrecy check box to provide more protection to the keys. This option allows the router to generate a new key if any key is compromised.

The encrypted data is only compromised through the compromised key. So it provides more secure and authenticate communication as it secures other keys though a key is compromised.

This is a recommended action as it provides more security. Phase 2 uses security association and it is used to determine the security of the data packet during the data packets pass through the two end points. But it needs less time to compute the IKE keys.


Leave a Reply

The Cisco RV Dual WAN VPN Router is a proven solution that delivers highly secure, high performance connectivity at the heart of your small business network. Two connections to a service provider help support business continuity, while high capacity VPN capabilities enable other offices and employees working remotely to connect to . One of the Cisco Small Business Routers, the RV Virtual Private Networking (VPN) Router supports up to four wired and 50 off-site connections. The latter allows users to connect into your network with secure access to your files and intranet/5(). RV Dual WAN Router for Argentina Cisco Limited Lifetime Warranty for Cisco Small Business Products This Cisco Small Business product comes with a limited lifetime hardware warranty with return-to-factory replacement and a 1-year limited warranty for fans and power supplies.