Cisco RV132W/RV134W Router Guide
Cisco RV132W/RV134W Router Guide
GUIDE
Chapter 3: Networking 15
WAN Configuration 15
Configuring WAN Connections 15
Configuring a Mobile Network 48
Setting Failover and Recovery 51
LAN Configuration 52
Configuring LAN Connections 53
Configuring VLAN Membership 54
Configuring Static DHCP 55
Viewing DHCP Leased Clients 56
Configuring a DMZ Host 57
Port Management 57
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide
Contents
Configuring Routing 59
Configuring Basic Routing 59
Configuring Dynamic Routing Information Protocol (RIP) 59
Viewing the Routing Table 61
Configuring Dynamic DNS 61
Configuring the IP Mode 62
Configuring IPv6 63
Configuring IPv6 LAN Connections 63
Configuring IPv6 Static Routing 65
Configuring Routing (RIPng) 66
Configuring Router Advertisement 67
Configuring Advertisement Prefixes 68
Chapter 5: Firewall 85
Basic Firewall Settings 86
Schedule Management Configuration 90
Services Management Configuration 90
Access Rules Configuration 92
Internet Access Policy Configuration 95
One-to-One NAT Configuration 97
Single Port Forwarding Configuration 98
Port Range Forwarding Configuration 98
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide
Contents
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide
Contents
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide
1
Getting Started
Thank you for choosing the Cisco RV132W ADSL2+ Wireless-N router or the
Cisco RV134W VDSL2 Wireless-AC routers. This guide describes how to
physically install and manage your Cisco RV132W/RV134W router. The Getting
Started page displays the most common configurations on your device. Click the
links on the Web page to go to the relevant configuration page.
This page appears whenever you start the Device Manager. To change this
behavior, check Don’t show on start up.
Initial Settings
Change Default Displays the User Account page where you can
Administrator Password change the administrator password and set up a
guest account. See Configuring User Accounts.
Launch Setup Wizard Launches the Router Setup Wizard. Follow the on-
screen instructions.
Configure WAN Settings Opens the Internet Setup page to modify the WAN
parameters. See Configuring WAN Connections.
Configure LAN Settings Opens the LAN Configuration page to modify the
LAN parameters. For example, the management IP
address. See Configuring LAN Connections.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 5
Getting Started
Run Setup Wizard 1
Quick Access
Add VPN Clients Opens the PPTP Server page to set up and
manage the VPN tunnels. See Configuring PPTP.
(For RV134W only)
Configure Remote Opens the Basic Settings page to enable the basic
Management Access features of the device. See Basic Firewall
Settings.
Device Status
VPN Status Displays the IPsec VPN Server page that lists the
VPN managed by this device. See PPTP Server.
(For RV134W only)
To open this page, select Run Setup Wizard in the navigation tree.
Follow the on-screen instructions to proceed. Refer to the information from your
ISP to enter the required settings for your Internet connection.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 6
Getting Started
Run Setup Wizard 1
Connecting to Your Wireless Network
To connect a client device (such as a computer) to your wireless network,
configure the wireless connection on the client device with the wireless security
information that you configured for the router by using the Setup Wizard.
The following steps are provided as an example; you may need to configure your
device differently. For specific instructions, consult the documentation for your
client device.
STEP 1 Open the wireless connection settings window or program for your device.
STEP 2 Enter the network name (SSID) that you chose for your network in the Setup
Wizard.
STEP 3 Choose the type of encryption and enter the security key that you specified in the
Setup Wizard.
If you did not enable security (not recommended), leave the wireless encryption
fields that were configured with the security type and passphrase blank.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 7
2
Status and Statistics
Dashboard
The Dashboard provides a snapshot view of the configuration settings on your
device. The dashboard page displays information about your device’s firmware
version, serial number, CPU and memory utilization, error-logging settings, LAN,
WAN, wireless, site-to-site IPsec VPN, and PPTP VPN server settings.
To access the dashboard, select Status and Statistics > Dashboard. To modify
the information displayed, click the detailed link to go to the configuration page for
that section. For more information on managing the settings displayed on the
Dashboard page, see:
From the Refresh Rate drop-down list, select the rate at which the latest statistics
and parameter values are refreshed on the dashboard.
The Dashboard page also displays an interactive view of your device’s back panel
when you click Show Panel View. Mouse-over each port to view port connection
information.
System Summary
Select Status and Statistics > System Summary to view the Internet setup, LAN,
wireless, firewall, and PPTP (for RV134W).
The System Summary page displays information for the following sections:
WAN Configuration
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 8
Status and Statistics
Active TCP/IP Services 2
Displays the setting details for your WAN networks configured on the Networking
> WAN > WAN Configuration > Internet Setup page. For more information, see
Configuring WAN Connections
LAN Configuration
Displays the setting details for your LAN networks configured on the Networking >
LAN > LAN Configuration. For more information, see Configuring LAN
Connections
Wireless Summary
Displays the public name and settings for your wireless networks configured on
the Wireless > Basic Settings. For more information, see Basic Wireless Settings.
Displays the DoS, WAN request, and remote management settings configured on
the Firewall > Basic Settings > Basic Settings page. For more information, see
Basic Firewall Settings.
Displays the available PPTP VPN connections and the connected users for each
VPN type. For more information on configuring VPN server connections and user
accounts, see Configuring PPTP.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 9
Status and Statistics
Wireless Statistics 2
Wireless Statistics
Select Status and Statistics> Wireless Statistics to view the wireless statistical
data for the device radio. In the Refresh Rate field, select the rate at which you
want the latest statistics to be displayed.
To show the bytes in kilobytes (KB) and the numerical data in rounded-up values,
check the Show Simplified Statistic Data check box and click Save. By default,
byte data is displayed in bytes and other numerical data is displayed in long form.
To reset the wireless statistics counters, click Clear Count. The counters are reset
when the device is rebooted.
PPTP Server
Select Status and Statistics> PPTP Server to view a list of your PPTP VPN
connections, the duration of the connection, and the actions you can perform on
this connection. For more information about configuring PPTP VPN connections,
see Configuring PPTP.
STEP 2 Select the Refresh Rate from the drop-down list to display the latest IPSec
connections and the duration of the connection.
STEP 3 Select the Show Simplified Statistic Data to display the simplified statistic data.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 10
Status and Statistics
View Logs 2
View Logs
The View Logs page can only be displayed if the user enables log at Administrator
> Logging > Log Setting. Once this is enabled to view the logs, select Status and
Statistics> View Logs. Click Refresh Rate, to display latest log entries.
To filter logs or specify the severity of the logs to display, in the System Log Table,
check the boxes next to the log type and click Go. Note that all log types above a
selected log type are automatically included and you cannot deselect them. For
example, checking the Error check box automatically includes emergency, alert,
and critical logs in addition to error logs.
The event severity levels are listed from the highest severity to the lowest severity,
as follows:
• Warning—System warnings.
To save all log messages from the device to the local hard drive, click Save Logs.
To specify the number of entries to show per page, select a number from the drop-
down list.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 11
Status and Statistics
Connected Devices 2
Connected Devices
The Connected Devices page displays information about the active client
devices connected to your router. To view connected devices, select Status and
Statistics> Connected Devices.
To specify the types of interfaces to display, select a value from the Filter:
Interface Type matches drop-down list:
IPv4 ARP Table displays information from other routers that have responded to
the device’s Address Resolution Protocol (ARP) request. If a device does not
respond to the request, it is removed from the list.
IPv6 NDP Table displays all IPv6 Neighbor Discovery Protocol (NDP) devices
connected to the device’s local link.
Port Statistics
The Port Statistics page displays detailed port activity.
To view port statistics, select Status and Statistics > Port Statistics.
To refresh the page at regular intervals, select a refresh rate from the Refresh
Rate drop-down list.
To show the bytes in kilobytes (KB) and the numerical data in rounded-up form,
check the Show Simplified Statistic Data box and click Save. By default, byte
data is displayed in bytes and other numerical data is displayed in long form.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 12
Status and Statistics
Mobile Network 2
Error Number of received/sent packet errors.
Mobile Network
The mobile network statistics about the mobile 3G/4G network and
communication device (dongle) configured on the device.
To view the mobile network status, select Status and Statistics> Mobile
Network. The following information is displayed:
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 13
Status and Statistics
Mobile Network 2
• Service Type—Type of service accessed.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 14
3
Networking
WAN Configuration
STEP 2 In the Global Settings > Connect Mode, select one of the following:
• Auto (DSL->Ethernet): the device will check if the DSL link is up. If it is up, the
device will use the DSL link as the WAN interface; if it is down, the device will
check if the Ethernet link is up, and if it is up, it will use the Ethernet link as the
WAN interface.
• DSL: the device will use the DSL link as the WAN interface.
STEP 3 Click Edit (RV132W) or Add Row (RV134W) and configure the settings for the
xDSL WAN or Ethernet WAN.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 15
Networking
Configuring LAN Settings 3
Multiplexing Defines the way in which different
protocols are handled within a DSL
virtual circuit. You can choose
between a Logical Link Control (LLC)
encapsulation and Virtual Channel (VC)
multiplexing.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 16
Networking
Configuring LAN Settings 3
DSL Modulation Select the DSL modulation from the
drop-down list. The default DSL
modulation is Multimode
(recommended).
In the DSL Settings for PTM transfer mode (RV134W) enter the following
information:
In the Bridged Settings section for both the ATM and PTM (RV134W) transfer
modes, enter the following information:
In the Other Settings section for both the ATM and PTM (RV134W) transfer
modes, enter the following information:
VLAN & VLAN ID If enabled, all outbound traffic through this interface is
tagged with the configured VLAN ID.
MTU (Maximum MTU is an advanced configuration that allows you to
Transmission Unit) determine the largest data size permitted on your
connection. Select Auto (default) or Manual to
configure manually.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 17
Networking
Configuring LAN Settings 3
Size Enter the size of bytes. (Range 576 - 1500, Default
1500).
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 18
Networking
Configuring LAN Settings 3
Virtual Circuit The Virtual Path Identifier (VPI) and
Virtual Channel Identifier (VCI) are
values used to identify your line to your
ISP’s ATM network.
In the DSL Settings for the PTM transfer mode (RV134W), enter the following:
In the IPoE Settings section for both the ATM and PTM (RV134W) transfer modes,
enter the following information::
Auto Get IP (DHCP) Check Enable or Disable to enable or disable the Auto
get IP (DHCP) which is a method of automatically
assigning IP addresses. If disabled, manually configure
the IP address.
DNS Server Source Select Get Dynamically from ISP or Use These DNS
Servers to manually configure.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 19
Networking
Configuring LAN Settings 3
Static DNS 1 & 2 Enter the IP address of the primary and or secondary
Static DNS in the fields (Hint 1.2.3.4).
In the IPv6 Settings section for both the ATM and PTM (RV134W) transfer modes,
enter the following information:
For IPv6
Mode IPv6
• IPv6 Address
For 6rd
Mode 6rd
• IPv6 Prefix
• Border Relay
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 20
Networking
Configuring LAN Settings 3
In the Other Settings section for both the ATM and PTM (RV134W) transfer
modes, enter the following information:
MAC Address Clone At times, you may need to set the MAC address of the
device WAN port to be identical to your PC or some
other MAC address. This is called MAC address
cloning.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 21
Networking
Configuring LAN Settings 3
MAC Address To set the MAC address of the device WAN port, do
one of the following:
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 22
Networking
Configuring LAN Settings 3
Virtual Circuit The Virtual Path Identifier (VPI) and
Virtual Channel Identifier (VCI) are
values used to identify your line to your
ISP’s ATM network.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 23
Networking
Configuring LAN Settings 3
When the Internet Connection Type is PPPoE:
In the DSL Settings for the ATM transfer mode, enter the following information:
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 24
Networking
Configuring LAN Settings 3
SRA (Seamless Rate Adaption) Check Enable or Disable to enable or
disable the SRA, a protocol which, by
decoupling the modulation and
framing layer, can change the
transmission data rate parameters
(applied by the modulation layer).
In the DSL Settings for the PTM transfer mode(RV134W), enter the following
information:
In the PPPoE Settings section for both the ATM and PTM (RV134W) transfer
modes, enter the following information:
DNS Server Source Select Get Dynamically from ISP or Use These
DNS Servers to manually configure.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 25
Networking
Configuring LAN Settings 3
Connect on Demand Select this option if your ISP charges when you are
Max Idle Time connected to the Internet. If you select this option,
the Internet connection is on - only when traffic is
present. If the connection is idle - no traffic is
flowing - the connection is closed. If you Connect
on Demand, enter the number of minutes after
which the connection shuts off in the Max Idle Time
field.
In the IPv6 Settings section for both the ATM and PTM (RV134W) transfer modes,
enter the following information:
For IPv6
Mode IPv6
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 26
Networking
Configuring LAN Settings 3
Address Mode Select Dynamic or Static.
• IPv6 Address
For 6rd
Mode 6rd
• IPv6 Prefix
• Border Relay
In the Other Settings section for the ATM and PTM (RV134W) transfer modes,
enter the following:
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 27
Networking
Configuring LAN Settings 3
VLAN & VLAN ID If enabled, all outbound traffic through this interface is
tagged with the configured VLAN ID.
Reset Timer For PPPoE only: Reset the PPPoE connection at a given
time of day and day of the week. Choose one of the
following options from the Frequency drop-down list
and specify the corresponding settings:
MAC Address Clone Sometimes, you may need to set the MAC address of
the device WAN port to be identical to your PC or
some other MAC address. This is called MAC address
cloning.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 28
Networking
Configuring LAN Settings 3
MAC Address To set the MAC address of the device WAN port, do
one of the following:
Virtual Circuit The Virtual Path Identifier (VPI) and Virtual Channel
Identifier (VCI) are values used to identify your line to
your ISP’s ATM network.
SRA (Seamless Rate Check Enable or Disable to enable or disable the SRA,
Adaption) a protocol which, by decoupling the modulation and
framing layer, can change the transmission data rate
parameters (applied by the modulation layer).
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 29
Networking
Configuring LAN Settings 3
DSL Modulation Select the DSL modulation from the drop-down list.
The default DSL modulation is Multimode
(recommended).
DNS Server Source Select Get Dynamically from ISP or Use These
DNS Servers to manually configure.
Connect on Demand Select this option if your ISP charges based on the
Max Idle Time amount of time that you are connected. When you
select this option, the Internet connection is on only
when traffic is present. If the connection is idle -
that is, no traffic is flowing - the connection is
closed. If you Connect on Demand, enter the
number of minutes after which the connection
shuts off in the Max Idle Time field.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 30
Networking
Configuring LAN Settings 3
Authentication Type Select the authentication type from the drop-down
list.
Mode IPv6
• IPv6 Address
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 31
Networking
Configuring LAN Settings 3
Prefix Delegation To assign a network address prefix (from ISP) to LAN,
enable Prefix Delegation.
For 6rd
Mode 6rd
• IPv6 Prefix
• Border Relay
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 32
Networking
Configuring LAN Settings 3
MAC Address Clone Sometimes, you may need to set the MAC address of
the device WAN port to be identical to your PC or
some other MAC address. This is called MAC address
cloning.
MAC Address To set the MAC address of the device WAN port, do
one of the following:
Mode IPv6
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 33
Networking
Configuring LAN Settings 3
Address Mode Select Dynamic or Static.
• IPv6 Address
For 6rd
Mode 6rd
• IPv6 Prefix
• Border Relay
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 34
Networking
Configuring LAN Settings 3
Size Enter the size of bytes. (Range 576 - 1500, Default
1500).
MAC Address Clone Sometimes, you may need to set the MAC address of
the device WAN port to be identical to your PC or
some other MAC address. This is called MAC address
cloning.
MAC Address To set the MAC address of the device WAN port, do
one of the following:
Mode IPv6
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 35
Networking
Configuring LAN Settings 3
Address Mode Select Dynamic or Static.
• IPv6 Address
For 6rd
Mode 6rd
• IPv6 Prefix
• Border Relay
VLAN & VLAN ID If enabled, all outbound traffic through this interface is
tagged with the configured VLAN ID.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 36
Networking
Configuring LAN Settings 3
802.1p Priority Enter a range from 0 to 7. All outbound traffic of this
interface will be tagged with the configured 802.1p
priority. If it conflicts with the QoS setting, the QoS
setting will take precedence.
MAC Address Clone Sometimes, you may need to set the MAC address of
the device WAN port to be identical to your PC or
some other MAC address. This is called MAC address
cloning.
MAC Address To set the MAC address of the device WAN port, do
one of the following:
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 37
Networking
Configuring LAN Settings 3
DNS Server Source Select Get Dynamically from ISP or Use These
DNS Servers to manually configure.
Connect on Demand Select this option if your ISP charges when you are
Max Idle Time connected to the Internet. If you select this option,
the Internet connection is on - only when traffic is
present. If the connection is idle - no traffic is
flowing - the connection is closed. If you Connect
on Demand, enter the number of minutes after
which the connection shuts off in the Max Idle Time
field.
Mode IPv6
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 38
Networking
Configuring LAN Settings 3
Address Mode Select Dynamic or Static.
• IPv6 Address
For 6rd
Mode 6rd
• IPv6 Prefix
• Border Relay
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 39
Networking
Configuring LAN Settings 3
VLAN & VLAN ID If enabled, all outbound traffic through this interface is
tagged with the configured VLAN ID.
Reset Timer For PPPoE only: Reset the PPPoE connection at a given
time of day and day of the week. Choose one of the
following options from the Frequency drop-down list
and specify the corresponding settings:
MAC Address Clone Sometimes, you may need to set the MAC address of
the device WAN port to be identical to your PC or
some other MAC address. This is called MAC address
cloning.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 40
Networking
Configuring LAN Settings 3
MAC Address To set the MAC address of the device WAN port, do
one of the following:
DNS Server Source Select Get Dynamically from ISP or Use These
DNS Servers to manually configure.
Connect on Demand Select this option if your ISP charges when you are
Max Idle Time connected. When you select this option, the
Internet connection is on only when traffic is
present. If the connection is idle - that is, no traffic
is flowing - the connection is closed. If you click
Connect on Demand, enter the number of minutes
after which the connection shuts off in the Max Idle
Time field.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 41
Networking
Configuring LAN Settings 3
In the IPv6 Settings section, enter the following information:
For IPv6
Mode IPv6
• IPv6 Address
For 6rd
Mode 6rd
• IPv6 Prefix
• Border Relay
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 42
Networking
Configuring LAN Settings 3
VLAN & VLAN ID If enabled, all outbound traffic through this interface is
tagged with the configured VLAN ID.
MAC Address Clone Sometimes, you may need to set the MAC address of
the device WAN port to be identical to your PC or
some other MAC address. This is called MAC address
cloning.
MAC Address To set the MAC address of the device WAN port, do
one of the following:
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 43
Networking
Configuring LAN Settings 3
When the Internet Connection Type is PPTP:
In the PPTP Setting section, enter the following information:
DNS Server Source The DNS server address. If you already have DNS
server addresses from your ISP, choose Use these
DNS Servers, and enter the primary and secondary
addresses in the Static DNS 1 and Static DNS 2
fields.
Connect on Demand Select this option if your ISP charges based on the
amount of time that you are connected. When you
select this option, the Internet connection is on only
when traffic is present. If the connection is idle —
that is, no traffic is flowing - the connection is
closed. If you click Connect on Demand, enter the
number of minutes after which the connection
shuts off in the Max Idle Time field.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 44
Networking
Configuring LAN Settings 3
Authentication Type Choose the authentication type:
Mode IPv6
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 45
Networking
Configuring LAN Settings 3
Address Mode Select Dynamic or Static.
• IPv6 Address
For 6rd
Mode 6rd
• IPv6 Prefix
• Border Relay
VLAN & VLAN ID If enabled, all outbound traffic through this interface is
tagged with the configured VLAN ID.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 46
Networking
Configuring LAN Settings 3
802.1p Priority Enter a range from 0 to 7. All outbound traffic of this
interface will be tagged with the configured 802.1p
priority. If it conflicts with the QoS setting, the QoS
setting will take precedence.
MAC Address Clone Sometimes, you may need to set the MAC address of
the device WAN port to be identical to your PC or
some other MAC address. This is called MAC address
cloning.
MAC Address To set the MAC address of the device WAN port, do
one of the following:
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 47
Networking
Configuring LAN Settings 3
Configuring Global Mobile Network Settings
To configure global settings for supported USB devices:
STEP 1 Connect the USB modem. If the modem is supported, it is automatically detected
and appears on the Mobile Network page.
STEP 2 Select Auto or Manual connection mode. Ethernet Connection Recovery works
only if the Connect Mode is set to Auto.
The device displays the current modem connection status that includes initializing,
connecting, disconnecting, or disconnected.
STEP 3 Verify that the Card Status field shows your mobile card is Connected.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 48
Networking
Configuring LAN Settings 3
STEP 1 Enter information in the following fields:
Field Description
Access Point Internet network that the mobile device is connecting to.
Name (APN) Enter the access point name provided by your mobile
network service provider. If you do not know the name
of the access point, contact your service provider.
SIM PIN PIN code associated with your SIM card. This field is
only displayed for GSM SIM cards.
Server Name Name of the server for the Internet connection (if
provided by your service provider).
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 49
Networking
Configuring LAN Settings 3
STEP 1 Click Enabled or Disabled.
STEP 2 Select the Monthly Renewal Date from the drop-down list to indicate which day of
the month the bandwidth cap is reset.
STEP 3 In the Monthly Bandwidth Cap field, enter the maximum amount of data in
megabytes that is allowed to pass before the device takes an action, such as
sending an email to an administrator.
E-mail Setting
When the bandwidth data limit is reached, an email message can be sent to the
administrator. To set up the target email address, see Configuring Log E-Mailing.
STEP 1 Choose Networking > WAN > Failover & Recovery, to display the Failover &
Recovery window.
STEP 2 Select Enable Failover to 3G WAN to enable the mobile network link and set it to
failover from the DSL or Ethernet link. When the Ethernet WAN link is not active, the
device attempts to enable the mobile network link on the USB interface. (If failover
is not enabled, the mobile network link is always disabled.)
STEP 3 Select Enable Recovery back to DSL/Ethernet WAN to enable the link to return to
the Ethernet link, dropping the mobile network link. The Connect Mode accessed
through WAN > Mobile Network must be set to Auto to use Ethernet WAN
connection recovery.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 50
Networking
Configuring LAN Settings 3
STEP 4 In the Failover Check Interval field, enter the frequency (in seconds) with which the
device must attempt to detect the physical connection or presence of traffic on
the mobile network link. If the link is idle, the device attempts to ping a destination
at this interval. If there is no reply to the ping packet, the device assumes the link is
down and retries the Ethernet WAN interface.
STEP 5 In the Recovery Check Interval field, enter the frequency (in seconds) with which
the device must attempt to detect the physical connection or presence of traffic
on the Ethernet WAN link. If the link is idle, the device attempts to ping a
destination at the interval. If there is a reply to the ping packet, the device assumes
the link is up and attempts to disable the mobile network link and enable the
Ethernet WAN link.
STEP 6 Click Switch back to Ethernet immediately when Ethernet is available or click
Switch back to Ethernet in a specific time range and enter the start and end time
for the range.
STEP 7 In the Connection Validation Site field, choose the site from which to perform
failover validation. Use the next hop gateway (by default the device pings the
default gateway) or choose a custom site and enter the site IPv4 or IPv6 address.
The WAN Interface table shows the status of the Ethernet WAN and mobile
network link to the Internet. Click the Status hyper link to view the port detail.
LAN Configuration
The default DHCP and TCP/IP settings work for most applications. If you want
another PC on your network to be the DHCP server, or if you want to configure
manually the network settings of all of your devices, disable DHCP.
Also, instead of using a DNS server that maps Internet domain names (for example,
www.cisco.com) to IP addresses, you can use a Windows Internet Naming Service
(WINS) server. A WINS server is the equivalent of a DNS server but uses the
NetBIOS protocol to resolve hostnames. The device includes the IP address of the
WINS server in the DHCP configuration the device sends to DHCP clients.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 51
Networking
Configuring LAN Settings 3
Configuring LAN Connections
The local device management IP address of the device is static and defaults to
192.168.1.1.
Local IP Address Local LAN IP address of the device. Make sure this
IP address is not used by another device.
Subnet mask Subnet mask for the local IP address. The default
subnet mask is 255.255.255.0.
STEP 4 In the Server Settings (DHCP), in the DHCP Server field, select one of the
following options:
Enable Allows the device to act as the DHCP server in the network.
Start IP Address The first address in the IP address pool. Any DHCP
client joining the LAN is assigned an IP address in
this range.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 52
Networking
Configuring LAN Settings 3
End IP Address The last address in the IP address pool. Any DHCP
client joining the LAN is assigned an IP address in
this range.
Client Lease time Duration (in minutes) that IP addresses are leased
to clients.
DHCP Option 66/150 & Check Enable to enable DCHP option 66/150 & 67.
67
TFTP Server Host Name Option 66, name of the TFTP server host.
If you select DHCP Relay, enter the address of the relay gateway in the Remote
DHCP Server field. The relay gateway transmits DHCP messages between
multiple subnets.
STEP 5 Click Save.
The device has a default VLAN (VLAN 1) that cannot be deleted. You can create up
to five other VLANs on the device.
To create a VLAN:
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 53
Networking
Configuring LAN Settings 3
STEP 3 Enter the following information:
To edit the settings of a VLAN, select the VLAN and click Edit. To delete a selected
VLAN, click Delete. Click Save to apply changes.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 54
Networking
Configuring LAN Settings 3
STEP 3 Click Add Row.
To edit the settings of a static DHCP client, select the client and click Edit. To
delete a selected DHCP client, click Delete. Click Save to apply the changes.
To view the DHCP clients, select Networking > LAN > DHCP Leased Client
Tables.
For every VLAN defined on the device, a table displays a list of the clients
associated with the VLAN.
STEP 1 In the row of the connected device, check Add to Static DHCP.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 55
Networking
Configuring LAN Settings 3
The DHCP server on the device always assigns the IP address shown when the
device requests an IP address.
We recommend that you place hosts that must be exposed to the WAN (such as
web or e-mail servers) in the DMZ network. You can configure the firewall rules to
allow access to specific services and ports in the DMZ from both the LAN or WAN.
In the event of an attack on any of the DMZ nodes, the LAN is not necessarily
vulnerable.
You must configure a fixed (static) IP address for the endpoint that you designate
as the DMZ host. You should assign the DMZ host an IP address in the same
subnet as the device LAN IP address, but it cannot be identical to the IP address
given to the LAN interface of this gateway.
To configure DMZ:
STEP 3 In the Host IP Address field, enter the IP address of the DMZ host. The DMZ host
is the endpoint that receives the redirected packets.
Port Management
You can configure the speed and flow control settings of the device LAN ports.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 56
Networking
Configuring LAN Settings 3
Link The port speed. If no device is connected to the
port, this field displays Down.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 57
Networking
Configuring LAN Settings 3
Configuring Routing
Use the Routing page to configure the operating mode and other routing options
for your device.
Route Entries Select the number of entries from the drop-down list.
Dynamic RIP enables the device to automatically adjust to physical changes in the
network layout and exchange routing tables with the other routers.
The router determines the network packets’ route based on the fewest number of
hops between the source and destination.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 58
Networking
Configuring LAN Settings 3
To configure dynamic RIP:
STEP 3 In the RIP Members area, check Enable RIP to enable RIP on all available
interfaces (i.e. VLAN1, DSL_ATM, ETH_WAN, DSL_PTM).
STEP 4 Click Edit to specify the following RIP authentication settings for an interface:
• MD5 Auth Key: Enter the MD5 authentication key (Length 1 to 64 characters).
STEP 6 Passive Interface determines how the router receives the RIP packets. Check
Passive Interface to enable on the port.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 59
Networking
Configuring LAN Settings 3
Viewing the Routing Table
The routing table contains information about the topology of the network
immediately around it.
To view the routing information on your network, select Networking > Routing
Table and select one of the following:
• Show IPv4 Routing Table—The routing table is displayed with the fields
configured in the Networking > Routing page.
• Show IPv6 Routing Table—The routing table is displayed with the fields
configured in the Networking > IPv6 page.
The router notifies dynamic DNS servers of changes in the WAN IP address, so
that any public services on your network can be accessed by using the domain
name.
To configure DDNS:
STEP 2 You can disable Dynamic DNS or enable a DDNS Service on the device from the
drop-down list.
STEP 3 If you select to enable one of the DDNS services (DynDNS.com, noip.com)
configure the following information:
Timeout Set the number (in hours) that you wish the device
to timeout.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 60
Networking
Configuring LAN Settings 3
Host Name The name of the host account.
To select an IP mode:
STEP 2 From the IP Mode drop-down menu, select one of the following options:
LAN: IPv4, WAN: IPv4 To use IPv4 on the LAN and WAN ports.
LAN: IPv4+IPV6, WAN: To use IPv4 and IPv6 on both the LAN and WAN
IPv4+IPv6 ports.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 61
Networking
Configuring LAN Settings 3
Configuring IPv6
Internet Protocol version 6 (IPv6) is a version of the Internet Protocol (IP) intended
to succeed Internet Protocol version 4 (IPv4). Configuring LAN properties for an
IPv6 network depends on the type of Internet connection that you have.
To configure IPv6 LAN settings on your device, you must first set the IP mode to
the following mode:
See Configuring the IP Mode for more information on how to set the IP mode.
STEP 2 Enter the following information to configure the IPv6 LAN address:
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 62
Networking
Configuring LAN Settings 3
STEP 4 Enter the following information to configure the server settings (DHCPv6):
DNS Server Select DNS Server name from the drop-down list.
Static DNS 1 IPv6 address of the primary DNS server on the ISP
IPv6 network.
Client Lease Time Client lease time duration (in minutes) for which
IPv6 addresses are leased to endpoints on the
LAN.
STEP 5 In the IPv6 Address Pool Table, click Add Row and enter the following
information.
To edit the settings of a pool, select the pool and click Edit. To delete a selected
pool, click Delete. Click Save to apply changes.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 63
Networking
Configuring LAN Settings 3
Configuring IPv6 Static Routing
You can configure static routes to direct packets to the destination network. A
static route is a predetermined pathway that a packet must travel to reach a
specific host or network.
Some ISPs require static routes to build a routing table instead of using dynamic
routing protocols. Static routes do not require CPU resources to exchange routing
information with a peer router.
You can also use static routes to reach peer routers that do not support dynamic
routing protocols. Static routes can be used together with dynamic routes. Be
careful not to introduce routing loops in your network.
Prefix Length Number of prefix bits in the IPv6 address that define
the destination subnet.
Active Check to make the route active. When you add a route
in an inactive state, it is listed in the routing table but is
not used by the device.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 64
Networking
Configuring LAN Settings 3
STEP 4 Click Save.
To edit the settings of a route, select the route and click Edit. To delete a selected
route, click Delete. Click Save to apply changes.
RIPng uses a hop count to measure the distance to a destination. The hop count is
referred to as metric, or cost. The hop count from a router to a directly connected
network is 0. The hop count between two directly connected routers is 1. When
the hop count is greater than or equal to 16, the destination network or host is
unreachable.
By default, the routing update is sent every 30 seconds. If the router receives no
routing updates from a neighbor after 180 seconds, the routes learned from the
neighbor are considered as unreachable. After another 240 seconds, if no routing
update is received, the router removes these routes from the routing table.
To configure RIPng:
STEP 3 In the RIP Members table, select the Index and Interface from the list and check
Enable in the corresponding RIPng and Passive Interface columns
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 65
Networking
Configuring LAN Settings 3
Configuring Router Advertisement
The Router Advertisement Daemon (RADVD) on the device listens for router
solicitations in the IPv6 LAN and responds with router advertisements as required.
This is stateless IPv6 auto-configuration, and the device distributes IPv6 prefixes
to all nodes on the network.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 66
Networking
Configuring LAN Settings 3
Router Preference Select low, medium, or high from the drop-down
menu. The default is medium.
Router Life Time Router lifetime value or the time in seconds that the
advertisement messages exist on the router. The
default is 1800 seconds.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 67
Networking
Configuring LAN Settings 3
IPv6 Prefix Length The prefix length variable is a decimal value that
indicates the number of contiguous, higher-order
bits of the address that make up the network
portion of the address.
Prefix Lifetime Prefix lifetime, or the length of time over which the
requesting router is allowed to use the prefix.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 68
Networking
Configuring LAN Settings 3
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 69
4
Wireless Networks
Wireless Security
Wireless networks are convenient and easy to install. Because wireless
networking operates by sending information over radio waves, it can be more
vulnerable to intruders than a traditional wired network.
Wireless devices have a default wireless network name or SSID. This is the
name of your wireless network, and can be up to 32 characters in length.
For wireless products such as access points, routers, and gateways, you are
asked for a password when you want to change their settings. These
devices have a default password. The default password is often cisco.
Hackers know these default values and may try to use them to access your
wireless device and change your network settings. To prevent unauthorized
access, customize the device password so that it is difficult to guess.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 70
Wireless Networks
4
Cisco routers and gateways give you the ability to enable MAC address
filtering. You can prevent or permit the specified devices to access the
wireless network. The MAC address is a unique series of numbers and
letters assigned to every networking device.
• Enable encryption.
To protect the information as it passes over the airwaves, enable the highest
level of encryption supported by your network equipment.
WEP is an older encryption standard and may be the only option available on
some older devices that do not support WPA.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 71
Wireless Networks
Basic Wireless Settings 4
Basic Wireless Settings
Wireless Networks on Your Device
Your device provides four virtual wireless networks, or four SSIDs (Service Set
Identifier): ciscosb1, ciscosb2, ciscosb3, and ciscosb4. These are the default
names or SSIDs of these networks, but you can change these names to more
meaningful names. These tables describe the default settings of these networks.
Enabled Yes No No No
VLAN 1 1 1 1
Enabled Yes No No No
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 72
Wireless Networks
Basic Wireless Settings 4
SSID ciscosb1_2.4 ciscosb2_2.4 ciscosb3_2.4 ciscosb4_2.
Name for G or G or G or 4G or
RV134W ciscosb1_5G ciscosb2_5G ciscosb3_5G ciscosb4_5G
VLAN 1 1 1 1
STEP 1 In the Radio field, check Enable to turn on the wireless radio. By default, there is
only one wireless network enabled, ciscosb1.
STEP 2 In the Wireless Network Mode field, select one of these options from the
drop-down list: (For the RV132W and RV134W 2.4G option.)
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 73
Wireless Networks
Basic Wireless Settings 4
G/N-Mixed Select this option if you have Wireless-G and
Wireless-N devices in your network.
STEP 3 If you chose the default setting B/G/N-Mixed, the wireless bandwidth in the
Wireless Band Selection should be set at 20MHz (default). If you choose N-Only,
or G/N Mixed, in the Wireless Band Selection field, select the wireless bandwidth
on your network (20MHz or 20/40MHz).
STEP 4 Optional and applicable to configure the RV134W 5G Wireless Channel Width
settings.
STEP 5 In the Wireless Channel Width field, select 80MHZ (Default for RV134W).
STEP 6 In the U-APSD (WMM Power Save) field, check Enable to enable the
Unscheduled Automatic Power Save Delivery (U-APSD) feature, also referred to as
WMM Power Save, which allows the radio to conserve power.
STEP 7 (Optional) In the Wireless Table, configure the settings of the four wireless
networks.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 74
Wireless Networks
Basic Wireless Settings 4
Editing Wireless Network Settings
The Wireless Table on the Basic Settings page lists the settings of the four
wireless networks supported on the device.
STEP 1 Check the box for the networks that you want to configure.
Wireless Isolation with SSID Check this box to enable wireless isolation
within the SSID.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 75
Wireless Networks
Basic Wireless Settings 4
Configuring the Security Mode
You can configure one of the following security modes for wireless networks:
Configuring WEP
The WEP security mode offers weak security with a basic encryption method that
is not as secure as WPA. WEP may be required if your network devices do not
support WPA.
NOTE If you do not have to use WEP, we recommend that you use WPA2. If you are using
the Wireless-N only mode, you must use WPA2.
STEP 1 Select Wireless > Basic Settings. In the Wireless Table, check the box for the
network you want to configure.
STEP 2 Click Edit Security Mode. The Security Settings page appears.
STEP 3 In the Select SSID field, select the SSID for which to configure the security
settings.
STEP 5 In the Authentication Type field, select one of the following options:
In both cases, the wireless client must provide the correct shared key (password)
to access the wireless network.
STEP 7 (Optional) In the Passphrase field, enter an alphanumeric phrase (longer than eight
characters for optimal security) and click Generate Key to generate four unique
WEP keys in the WEP Key fields.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 76
Wireless Networks
Basic Wireless Settings 4
If you want to provide your key, enter it directly in the Key 1 field (recommended).
The length of the key should be 5 ASCII characters (or 10 hexadecimal characters)
for 64-bit WEP and 13 ASCII characters (or 26 hexadecimal characters) for 128-bit
WEP. Valid hexadecimal characters are 0 to 9 and A to F.
STEP 8 In the TX Key field, select which key to use as the shared key that devices must
use to access the wireless network.
• The WPA2 Personal, and WPA2 Personal Mixed, WPA2 Enterprise and WPA2
Enterprise Mixed security modes offer strong security to replace WEP.
STEP 1 In the Wireless Table (Wireless > Basic Settings), check the box for the network
you want to configure.
STEP 2 Click Edit Security Mode. The Security Settings page appears.
STEP 3 In the Select SSID field, select the SSID for which to configure the security
settings.
STEP 4 From the Security Mode menu, select one of the two WPA2 Personal options.
STEP 5 In the Security Key field, enter an alphanumeric phrase (8–63 ASCII characters or
64 hexadecimal digits). The password strength meter shows how secure the key
is: below minimum, weak, strong, very strong, or secure. We recommend using a
security key that registers on the strength meter as secure.
STEP 6 To show the security key as you are entering it, check the Unmask Password box.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 77
Wireless Networks
Basic Wireless Settings 4
STEP 7 In the Key Renewal field, enter the duration of time (600–7200 seconds) between
key renewals. The default value is 3600.
STEP 8 Click Save to save your settings. Click Back to go back to the Basic Settings
page.
The WPA2 Enterprise and WPA2 Enterprise Mixed security modes allow you to
use the RADIUS server authentication.
STEP 1 In the Wireless Table (Wireless > Basic Settings), check the box for the network
you want to configure.
STEP 3 In the Select SSID field, select the SSID for which to configure the security
settings.
STEP 4 From the Security Mode menu, select one of the two WPA2 Enterprise options.
STEP 5 In the RADIUS Server field, enter the IP address of the RADIUS server.
STEP 6 In the RADIUS Port field, enter the port used to access the RADIUS server.
STEP 8 In the Key Renewal field, enter the duration of time (600–7200 seconds) between
key renewals. The default value is 3600.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 78
Wireless Networks
Basic Wireless Settings 4
Configuring MAC Filtering
You can use MAC Filtering to permit or deny access to the wireless network based
on the MAC (hardware) address of the requesting device. For example, you can
enter the MAC addresses of a set of computers and only allow those computers to
access the network. You can configure MAC Filtering for each network or SSID.
STEP 1 In the Wireless Table (Wireless > Basic Settings), check the box for the network
you want to configure.
STEP 2 Click Edit MAC Filtering. The Wireless MAC Filter page appears.
STEP 3 In the Edit MAC Filtering field, check the Enable box to enable MAC Filtering for
this SSID.
STEP 4 In the Connection Control field, select the type of access to the wireless network:
STEP 5 To show computers and other devices on the wireless network, click Show Client
List.
STEP 6 In the Save to MAC Address Filter List filed, check the box to add the device to
the list of devices to be added to the MAC Address Table.
STEP 7 Click Add to MAC to add the selected devices in the Client List Table to the MAC
Address Table.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 79
Wireless Networks
Configuring Advanced Wireless Settings 4
Configuring Time of Day Access
To further protect your network, you can restrict access to it by specifying when
users can access the network.
STEP 1 In the Wireless Table (Wireless > Basic Settings), check the box for the network
you want to configure.
STEP 2 Click Time of Day Access. The Time of Day Access page appears.
STEP 3 In the Active Time field, check Enable to enable Time of Day Access.
STEP 4 In the Start Time and Stop Time fields, specify the time during the day, when
access to the network is allowed.
STEP 1 Select Wireless > Advanced Settings. The Advanced Settings page appears.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 80
Wireless Networks
Configuring Advanced Wireless Settings 4
Basic Rate The Basic Rate setting is not the rate of transmission but
a series of rates at which the Services Ready Platform
can transmit. The device advertises its basic rate to the
other wireless devices in your network, so they know
which rates will be used. The Services Ready Platform
will also advertise that it will automatically select the
best rate for transmission.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 81
Wireless Networks
Configuring Advanced Wireless Settings 4
CTS Protection The device automatically uses CTS (Clear-To-Send)
Mode Protection Mode when your Wireless-N and Wireless-G
devices are experiencing severe problems and are not
able to transmit to the device in an environment with
heavy 802.11b traffic.
DTIM Interval This value, between 1 and 255, indicates the interval of
the Delivery Traffic Indication Message (DTIM). A DTIM
field is a countdown field informing clients of the next
window for listening to broadcast and multicast
messages.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 82
Wireless Networks
Configuring WPS 4
RTS Threshold If you encounter inconsistent data flow, enter only minor
reductions. The default value of 2347 is recommended.
Configuring WPS
Configure WPS to allow WPS-enabled devices to easily and securely connect to
the wireless network. Refer to your client device documentation for additional
instructions on setting up WPS on your client device.
To configure WPS:
STEP 1 Select Wireless > WPS. The Wi-Fi Protected Setup page appears.
STEP 2 Click Edit to change the wireless network on which to enable WPS.
STEP 3 Configure the WPS on client devices in one of the following three ways:
- Click or press the WPS button on the client device and click the WPS icon
on this page.
- Enter the WPS PIN number of the client and click Register.
- A client device requires a PIN number from this router, use the router PIN
number indicated.
PIN Lifetime — The lifetime of the key. If the time expires, a new key is
negotiated.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 83
Wireless Networks
Configuring WPS 4
Preshared Key — Choose “Add Client to existing network (Use Existing
PSK)” or “Reconfigure network (Generate New PSK)”.
After you configure WPS, the following information appears at the top of the WPS
page: Wi-Fi Protected Setup Status, Network Name (SSID), and Security.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 84
5
Firewall
You can secure your network by creating and applying the rules that the device
uses to selectively block and allow inbound and outbound Internet traffic. You can
then specify how and to what devices the rules apply. To do so, you must define
the following:
• Services or traffic types that the router should allow or block. For example,
web browsing, VoIP, other standard and custom services that you define.
• Keywords (in a domain name or URL of a web page) that the router should
allow or block.
• Rules for allowing or blocking inbound and outbound Internet traffic for
specified services on specified schedules.
• Port triggers that signal the router to allow or block access to specified
services as defined by a port number.
• Reports and alerts that you want the router to send to you.
You can, for example, establish restricted-access policies based on the time-of-
day, web addresses, and web address keywords. You can block Internet access
by applications and services on the LAN, such as chat rooms or games. You can
block specific groups of PCs on your network from being accessed by the WAN
or public DMZ network.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 85
Firewall
Basic Firewall Settings 5
Inbound (WAN to LAN/DMZ) rules restrict access to traffic entering your network,
selectively allowing only specific outside users to access specific local resources.
By default, all access from the insecure WAN is blocked from accessing the
secure LAN, except in response to requests from the LAN or DMZ. To allow
outside devices to access services on the secure LAN, you must create a firewall
rule for each service.
If you want to allow incoming traffic, you must make the router's WAN port IP
address known to the public. This is called “exposing your host.” How you make
your address known depends on how the WAN ports are configured for the
device. You may use the IP address if a static address is assigned to the WAN
port, or if your WAN address is dynamic, a DDNS (Dynamic DNS) name can be
used.
Outbound (LAN/DMZ to WAN) rules restrict access to traffic leaving your network,
by selectively allowing only specific local users to access specific outside
resources. The default outbound rule is to allow access from the secure zone
(LAN) to either the public DMZ or insecure WAN. To block hosts on the secure LAN
from accessing services on the outside (insecure WAN), you must create a firewall
rule for each service.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 86
Firewall
Basic Firewall Settings 5
Web Access Select the type of web access that can be used to
connect to the firewall: HTTP or Redirect HTTP
traffic to HTTPS or HTTPS (secure HTTP).
Remote Web Access Check Enable to enable remote web access and
select connection either HTTP or HTTPS.
https://<remote-ip>:<remote-port>, or https://
168.10.1.11:443
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 87
Firewall
Basic Firewall Settings 5
SIP ALG Check Enable to allow Session Initiation Protocol
(SIP) traffic to traverse the firewall.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 88
Firewall
Basic Firewall Settings 5
Block Cookies Check to block cookies. Cookies are used to store
session information by the websites that usually
require a login. However, several websites use
cookies to store tracking information and browsing
habits. Enabling this option filters out cookies from
being created by a website.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 89
Firewall
Schedule Management Configuration 5
!
CAUTION When remote web is enabled, the router is accessible to anyone who knows its IP
address. Because a malicious WAN user can reconfigure the device and misuse it,
it is highly recommended that you change the administrator and any guest
passwords before continuing.
STEP 3 In the Name field, enter a unique name to identify the schedule. This name is
available on the Firewall Rule Configuration page in the Select Schedule list. (See
Access Rules Configuration.)
STEP 4 In the Scheduled Days section, select if you want to apply the schedule to All
Days or Specific Days. If you select Specific Days, check the box next to the days
that you want to include in the schedule.
STEP 5 In the Scheduled Time of Day section, select the time when you want the
schedule to apply. If you select Specific Time, enter the start and end times.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 90
Firewall
Services Management Configuration 5
The Services Management page allows you to create custom services against
which firewall rules can be defined. Once defined, the new service appears in the
List of Available Custom Services table.
STEP 3 In the Service Name field, enter the service name for identification and
management purposes.
STEP 4 In the Protocol field, select the Layer 4 protocol that the service uses from the
drop-down list:
- TCP
- UDP
- ICMP
- ICMPv6
- Other
STEP 5 In the Start Port field, enter the first TCP or UDP port of the range that the service
uses.
STEP 6 In the End Port field, enter the last TCP or UDP port of the range that the service
uses.
STEP 7 If you select the ICMP Type field, enter the ICMP protocol type.
STEP 8 If you select the other protocol, enter the protocol number.
To edit an entry, select the entry and click Edit. Make your changes, and then click
Save.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 91
Firewall
Access Rules Configuration 5
Access Rules Configuration
Configuring the Default Outbound Policy
The Access Rules page allows you to configure the default outbound policy for
the traffic that is directed from the secure network (LAN) to the non-secure
network (dedicated WAN/optional).
The default inbound policy for traffic flowing from the non-secure zone to the
secure zone is always blocked and cannot be changed.
NOTE Internet access policies override access rules, when both are configured on the
device.
NOTE Ensure that IPv6 support is enabled on the device to configure an IPv6 firewall.
STEP 3 Check the box in the row of the rule that you want to move up or down and click
the up or down arrow to move the rule up or down one line, or select the desired
position of the rule in the drop-down list and click Move to.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 92
Firewall
Access Rules Configuration 5
Adding Access Rules
All configured firewall rules on the device are displayed in the Access Rules
Table. This list also indicates whether the rule is enabled (active) and gives a
summary of the From/To zone as well as the services and users the rule affects.
STEP 3 In the Connection Type field, select the source of originating traffic:
• Outbound (LAN > WAN) - Select this option to create an outbound rule.
• Inbound (WAN > LAN) - Select this option to create an inbound rule.
• Inbound (WAN > DMZ) - Select this option to create an inbound rule.
• Inter-VLAN (VLAN > VLAN) - Select this option to create an inter-VLAN rule.
• Inter-VLAN (VLAN >DMZ) - Select this option to create an inter - VLAN rule.
STEP 5 From the Services drop-down list, select the service to allow or block for this rule.
Select All Traffic to allow the rule to apply to all applications and services, or
select a single application to block:
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 93
Firewall
Access Rules Configuration 5
• Network News Transport Protocol (NNTP)
• Telnet
• STRMWORKS
• Telnet (command)
• Telnet Secondary
• Telnet SSL
• Voice (SIP)
STEP 6 In the Source IP field, select the users to which the firewall rule applies:
• Any—The rule applies to traffic originating on any host in the local network.
STEP 7 From the Source IP drop-down list choose the source IP addresses to which the
rule blocks or allows packets from.
• Single Address — Enter a single IP address to which the rule applies in the
Start field.
STEP 8 From the Destination IP drop-down list choose the destination IP addresses to
which the rule blocks or allows packets to.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 94
Firewall
Internet Access Policy Configuration 5
• Address Range — Enter a range of IP addresses to which the rule applies to
in the Start and Finish fields
STEP 9 To log details for all packets that match this rule, select Always from the drop-
down list. For example, if an outbound rule for a schedule is selected as Block
Always, for every packet that tries to make an outbound connection for that
service, a message with the packet's source address and destination address
(and other information) is recorded in the log.
NOTE When traffic is going from the LAN or DMZ to the WAN, the system requires
rewriting the source or destination IP address of incoming IP packets as they pass
through the firewall.
STEP 10 Rule Status - Check Enable to enable the new access rule.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 95
Firewall
Internet Access Policy Configuration 5
STEP 5 From the Action drop-down list, select the type of access restriction you need:
• Always allow—Always allow Internet traffic. You can refine this to block
specified endpoints from Internet traffic; see Step 7. You can also allow all
Internet traffic except for certain websites; see Step 8.
STEP 7 (Optional) Apply the access policy to specific PCs to allow or block traffic coming
from specific devices:
a. In the Apply Access Policy to the Following PCs table, click Add Row.
b. From the Type drop-down list, select how to identify the PC (by MAC address,
by IP address, or by providing a range of IP addresses).
c. In the Value field, depending on what you chose in the previous step, enter the
one of the following:
• The starting and ending IP addresses of the range of addresses to block (for
example, 192.168.1.2-192.168.1.253).
a. In the Website Domain Name & Keyword table, click Add Row.
b. From the Type drop-down list, select how to block a website (by specifying
the domain name or by specifying a keyword that appears in the URL).
c. In the Value field, enter the Domain Name, URL or Keyword used to block the
website.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 96
Firewall
One-to-One NAT Configuration 5
For example, to block the example.com URL, select URL Address from the drop-
down list and enter example.com in the Value field. To block a URL that has the
keyword “example” in the URL, select Keyword from the drop-down list and enter
example in the Value field.
STEP 3 In the Private Range Begin field, enter the starting IP address in the private (LAN)
IP address range.
STEP 4 In the Public Range Begin field, enter the starting IP address in the public (WAN)
IP address range.
STEP 5 In the Range Length, enter the number of public IP addresses that should be
mapped to private addresses.
STEP 6 In the Service field, select the service for which the rule applies. Services for one-
to-one NAT allow you to configure the service to be accepted by the private IP
(LAN) address when traffic is sent to the corresponding public IP address.
Configured services on private IP addresses in the range are accepted when
traffic is available on the corresponding public IP address.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 97
Firewall
Single Port Forwarding Configuration 5
Single Port Forwarding Configuration
Port forwarding is used to redirect traffic from the Internet from one port on the
WAN to another port on the LAN. Common services are available, or you can
define a custom service and associated ports to forward.To add a single port
forwarding rule:
STEP 1 Select Firewall > Single Port Forwarding. A preexisting list of applications is
displayed.
STEP 2 In the Application field, enter the name of the application for which to configure
port forwarding.
STEP 3 In the External Port field, enter the port number that triggers this rule when a
connection request from outgoing traffic is made.
STEP 4 In the Internal Port field, enter the port number used by the remote system to
respond to the request it receives.
STEP 5 From the Protocol drop-down list, select a protocol (TCP, UDP, or TCP & UDP)
STEP 7 In the IP Address field, enter the IP address of the host on the LAN side to which
the specific IP traffic will be forwarded. For example, you can forward the HTTP
traffic to port 80 of the IP address of a web server on the LAN side.
STEP 8 In the Enable field, check the Enable box to enable the rule.
STEP 2 In the Application field, enter the name of the application for which to configure
port forwarding.
STEP 3 In the Start field, specify the port number that begins the range of ports to
forward.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 98
Firewall
Port Range Triggering Configuration 5
STEP 4 In the End field, specify the port number that ends the range of ports to forward.
STEP 5 From the Protocol drop-down list, select a protocol (TCP, UDP, or TCP & UDP)
STEP 7 In the IP Address field, enter the IP address of the host on the LAN side to which
the specific IP traffic will be forwarded.
STEP 8 In the Enable field, check the Enable box to enable the rule.
NOTE Port triggering is not appropriate for servers on the LAN since there is a
dependency on the LAN device making an outgoing connection before incoming
ports are opened.
Some applications require that, when external devices connect to them, they
receive data on a specific port or range of ports in order to function properly. The
router must send all incoming data for that application only on the required port or
range of ports. The gateway has a list of common applications and games with
corresponding outbound and inbound ports to open. You can also specify a port
triggering rule by defining the type of traffic (TCP or UDP) and the range of
incoming and outgoing ports to open when enabled.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 99
Firewall
Attack Protection Configuration 5
To add a port triggering rule:
STEP 2 In the Application field, enter the name of the application for which to configure
port forwarding.
STEP 3 In the Triggered Range fields, enter the port number or range of port numbers that
will trigger this rule when a connection request from outgoing traffic is made. If the
outgoing connection uses only one port, enter the same port number in both
fields.
STEP 4 In the Forwarded Range fields, enter the port number or range of port numbers
used by the remote system to respond to the request it receives. If the incoming
connection uses only one port, then specify the same port number in both fields.
STEP 6 In the Enable field, check the Enable box to enable the rule.
STEP 2 Check the following and enter a numeric range for each:
• SYN Flood Detect Rate: Enter the maximum number of SYN packets per
second that will cause the security appliance to determine that a SYN Flood
Intrusion is occurring. Enter a value from 0 to 10000 SYN packets per second.
The default value is 128 SYN packets per seconds. A value of zero (0)
indicates that the SYN Flood Detect feature is disabled.
• Echo Storm: Enter the number of pings per second that will cause the
security appliance to determine that an echo storm intrusion event is
occurring. Enter a value from 0 to 10000 ping packets per second. The
default value is 100 ping packets per seconds. A value of zero (0) indicates
that the Echo Storm feature is disabled.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 100
Firewall
Session Settings Configuration 5
• ICMP Flood: Enter the number of ICMP packets per second, including PING
packets, that will cause the security appliance to determine that an ICMP
flood intrusion event is occurring. Enter a value from 0 to 10000 ICMP
packets per second. The default value is 100 ICMP packets per seconds. A
value of zero (0) indicates that the ICMP Flood feature is disabled.
• Block UDP Flood: Check to prevent the security appliance from accepting
more than 150 simultaneous, active UDP connections per second from a
single computer on the LAN and enter a value from 0 -10000, default = 1000.
• Block TCP Flood: Check to drop all invalid TCP packets and enter a value
from 0 - 10000, default = 200. This feature protects your network from a SYN
flood attack, in which an attacker sends a succession of SYN (synchronize)
requests to a target system.
STEP 2 In the TCP Session Timeout field, enter the time, in seconds, after which inactive
TCP sessions are removed from the session table. Most TCP sessions normally
terminate when the RST or FIN flags are detected. This value ranges from 18000
through 432000 seconds. The default is 86,400 seconds (24 hours).
STEP 3 In the UDP Timeout field, enter the time, in seconds, after which inactive UDP
sessions are removed from the session table. This value ranges from 90 through
360 seconds. The default is 180 seconds (3 minutes).
STEP 4 In the ICMP Timeout field, enter the time, in seconds, after which inactive ICMP
sessions are removed from the session table. This value ranges from 15 through
60 seconds. The default is 30 seconds.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 101
6
VPN
STEP 1 Choose VPN > Site-to-Site IPsec VPN > Basic VPN Setup.
STEP 2 In the New Connection Name field, enter a name for the VPN tunnel.
STEP 3 In the Pre-Shared Key field, enter the pre-shared key, or password, which will be
exchanged between the two routers. It must be between 8 and 49 characters.
STEP 4 In the Protocol field select the protocol name from the drop-down menu
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 102
VPN
Site-to-Site IPsec VPN 6
• Local WAN (Internet) IP Address— Is generated automatically.
• Remote LAN Subnet Mask—The private network (LAN) subnet mask of the
remote endpoint.
NOTE The remote WAN and remote LAN IP addresses cannot exist on the same subnet.
For example, a remote LAN IP address of 192.168.1.100 and a local LAN IP address
of 192.168.1.115 causes a conflict when traffic is routed over the VPN. The third
octet must be different so that the IP addresses are on different subnets. For
example, a remote LAN IP address of 192.168.1.100 and a local LAN IP address of
192.168.2.100 is acceptable.
To configure advanced VPN parameters, choose VPN > Site-to-Site IPsec VPN >
Advanced VPN Setup.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 103
VPN
Site-to-Site IPsec VPN 6
NAT Traversal
Network address translation (NAT) traversal is a computer networking
methodology with the goal to establish and maintain Internet protocol connections
across gateways that implement network address translation (NAT).
STEP 1 To enable NAT traversal, in the NAT Traversal field, check Enable.
STEP 1 On the Advanced VPN Setup page, in the IKE Policy Table click Add Row.
STEP 2 In the Policy Name field, enter a unique name for the IKE policy.
STEP 3 In the Exchange Mode field, choose one of the following modes for the policy:
STEP 4 In the Local Identifier and Remote Identifier fields, indicate if you want to identify
your device and the remote router by one of the following:
• DER ASN1 DN: the Distinguished Name of the certificate. When you choose
this option, please input the Subject Name of the device certificate. The
string format is “C=US/ST=sjc/L=cisco/0=cisco/OU=smb/CN=RV134W”.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 104
VPN
Site-to-Site IPsec VPN 6
STEP 5 In the IKE SA Parameters section, configure parameters to define the strength
and mode for negotiating Security Association (SA) between your device and the
remote router:
• Pre-Shared Key: the VPN peers use a pre-shared key to authenticate each
other.
• Certificate: the VPN peers use a certificate to authenticate each other. When
the Authentication Method is Certificate:
- The Local/Remote Identifier can be set to “DER ASN1 DN” with the value
of the Distinguished Name of the certificate.
- The Local/Remote Identifier can also be set to one of Local WAN IP,
FQDN, USER FQDN, as long as the SubjectAltName of the certificate has
the same type/value as the Identifier. That also means if the CSR of the
certificate is generated by the device (under the menu VPN > Site-to-Site
IPSec VPN > Certificate Management > Generate CSR), the “IP Address”,
“Domain Name”, or “Email Address” should be filled with the correct
value.
c. In the Diffie-Hellman (DH) Group field, specify the DH Group algorithm used
when exchanging a pre-shared key. The DH Group sets the strength of the
algorithm in bits. Ensure that the DH Group is configured identically on both
sides of the IKE policy.
d. In the SA-Lifetime field, enter the interval, in seconds, after which the Security
Association becomes invalid.
e. To enable the Dead Peer Detection feature, check the Enable box. Dead Peer
Detection (DPD) is used to detect if the peer is alive. If the peer is detected as
dead, the device deletes the IPsec and IKE Security Association. If you enable
this feature, also enter these settings:
• Failure Count—This field shows the number of failure counts. The default
setting is 3. The device will consider the peer is dead if it does not receive
DPD response from the peer for this number of times.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 105
VPN
Site-to-Site IPsec VPN 6
• DPD Action - Select Terminate if you want to end the session or Reconnect
to reconnect.
NOTE (For RV132W only) If you have a VPN connection already configured, you cannot
add another without deleting the existing VPN connection.
STEP 1 Choose VPN > Site-to-Site IPsec VPN > Advanced VPN Setup. In the VPN Policy
Table, click Add Row.
a. In the Policy Name field, enter a unique name to identify the policy.
• Manual Policy—All parameters (including the keys) for the VPN tunnel are
manually entered for each end point. No third-party server or organization is
involved.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 106
VPN
Site-to-Site IPsec VPN 6
g. Redundant Remote Identifier Type—Select the redundant remote identifier
type from the drop down list: Local Wan IP, IP Address, FQDN, User-FDQN, or
DER ASN1 DN.
STEP 4 In the Local Traffic Selection and Remote Traffic Selection sections:
• In the Local IP and Remote IP fields, indicate how many endpoints will be
part of the VPN policy:
- Single—Limits the policy to one host. Enter the IP address of the host that
will be part of the VPN in the IP Address field.
NOTE Do not use overlapping subnets for remote or local traffic selectors. Using these
subnets would require adding static routes on the router and the hosts to be used.
For example, avoid:
STEP 5 Split DNS—Allow the router to find the DNS server of the remote router without
going through the ISP (Internet). If you enable Split DNS, also enter these settings:
Domain Name Server 1-2, Domain 1-6. Domain Name Server1-2 will resolve the
Domain Name 1-6.
STEP 6 Manual Policy Parameters—For a Manual policy type, enter the settings in the
Manual Policy Parameters section:
• Protocol —Select the protocol from the drop down list: ESP or AH.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 107
VPN
Site-to-Site IPsec VPN 6
• Key-In, Key-Out—Enter the encryption key of the inbound and outbound
policy. The length of the key depends on the encryption algorithm chosen:
- 3DES—24 characters
- AES-128—16 characters
- AES-192—24 characters
- AES-256—32 characters
• Key-In, Key Out—Enter the integrity key (for ESP with Integrity-mode) for
the inbound and outbound policy. The length of the key depends on the
algorithm chosen:
- MD5—16 characters
- SHA-1—20 characters
- SHA2-256—32 characters
STEP 7 For an Auto policy type, enter the settings in the Auto Policy Parameters section.
SA-Lifetime—Enter the duration of the Security Association in seconds. After the
specified number of seconds, the Security Association is renegotiated. The
default value is 3600 seconds. The minimum value is 30 seconds.
• PFS Key Group—Check the Enable box to enable Perfect Forward Secrecy
(PFS) to improve security. While slower, this protocol helps to prevent
eavesdroppers by ensuring that a Diffie-Hellman exchange is performed for
every phase-2 negotiation.
• Select IKE Policy—Choose the IKE policy that will define the
characteristics of the SA negotiation.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 108
VPN
Site-to-Site IPsec VPN 6
STEP 8 Click Save.
TIP You may find it helpful to create a worksheet listing the LAN IP address, LAN subnet,
and netmask for each site, When configuring at a spoke site, you will need the
network addresses of the main site and all other spoke sites. When configuring the
at the hub site, you will need the network addresses of all of the spoke sites.
STEP 1 On the Advanced VPN Setup page, in the VPN Policy Table, click Add Row.
STEP 2 To configure the VPN settings for hub site, configure the following features:
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 109
VPN
Site-to-Site IPsec VPN 6
Remote Endpoint Select IP Address from the drop-down list and
enter the IP address.
Local Traffic Section > Select Subnet from the drop-down list.
Local IP
STEP 1 On the Advanced VPN Setup page, in the VPN Policy Table, click Add Row.
To configure the VPN settings for each spoke site, configure the following features:
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 110
VPN
Site-to-Site IPsec VPN 6
Interface Select the Internet interface from drop-down list.
Local Traffic Section > Select Subnet from the drop-down list.
Local IP
STEP 3 Now the subnet 192.168.75.0/24 on Spoke1 can communicate with subnet
192.168.74.0/24 on Spoke2 via Hub.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 111
VPN
Site-to-Site IPsec VPN 6
Certificate Management
A digital certificate certifies the ownership of a public key by the named subject of
the certificate. This allows others (relying parties) to rely upon signatures or
assertions made by the private key that corresponds to the public key that is
certified. In this model of trust relationships, a CA is a trusted third party that is
trusted by both the subject (owner) of the certificate and the party relying upon
the certificate. CAs are characteristic of many public key infrastructure (PKI)
schemes.
The table has a self-signed local certificate by default. All imported CA certificates
and local certificates, as well as the generated CSR, are also shown in the table.
The default local certificate is self-signed, and may be exported, but not deleted. It
is used only by HTTPS GUI access. All other local certificates can be deleted and
exported. The CA certificates can be deleted but not exported. The CSRs can be
deleted and exported. The “Action” column also has an “Import” button for the
CSRs. It is used to import the local certificate that the CA issues based on this
CSR.
To import a certificate:
STEP 1 Select VPN > Certificate Management. In the Certificate Management table,
click Import Certificate.
STEP 3 Browse and locate certificate. The RV132W/RV134W only support PEM format
certificate. Please make sure the certificate format is PEM and file extension name
is .pem.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 112
VPN
Configuring PPTP 6
Certificate Generator
The Certificate Request Generator collects information and generates a private
key file and a certificate request. You can choose to generate a self-signed
certificate or a Certificate Signing Request (CSR) for an external certificate
authority to sign.
To generate a certificate:
STEP 1 Select VPN > Certificate Management. In the Certificate Management table,
click Generate CSR.
Configuring PPTP
Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables the
secure transfer of data from a remote client to a business network by creating a
secure VPN connection across public networks, such as the Internet.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 113
VPN
Configuring PPTP 6
Configuring the PPTP Server
To configure the PPTP VPN server (For the RV134W only):
d. To encrypt the data passing through the PPTP VPN connection, check Enable
to enable MPPE Encryption. The MPPE encryption for the PPTP server
support is 128 bit.
STEP 2 Enter the username and password that will authenticate the PPTP user. Enter
values that are between 1 to 64 characters long.
STEP 4 Click on the Import button to access the user configuration page (under menu
Administration > Users). At the bottom of the page, import the.csv file with the
username/password pairs.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 114
VPN
Configuring VPN Passthrough 6
Configuring VPN Passthrough
VPN passthrough allows VPN traffic that originates from VPN clients to pass
through the device.
STEP 2 Check the Enable check box to choose the type of traffic to allow to pass through
the device.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 115
7
Quality of Service (QoS)
Bandwidth Management
You can use the device bandwidth management feature to manage the bandwidth
of the traffic flowing from the secure network (LAN) to the insecure network
(WAN).
Configuring Bandwidth
You can limit the bandwidth to reduce the rate at which the device transmits data.
You can also use a bandwidth profile to limit the outbound traffic, which prevents
the LAN users from consuming all of the bandwidths of the Internet link.
STEP 2 In the Global Settings, in the WAN QoS field, check Enable.
STEP 3 In the Bandwidth Table, enter the upstream bandwidth you want to allocate to
each of the available interfaces.:
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 116
Quality of Service (QoS)
Bandwidth Management 7
Configuring QoS Binding Policy
In the QoS Binding Table, you can configure QoS policy for upstream traffic.
STEP 2 Enter information in the following fields to add or edit policy settings:
Protocol Select the protocol from the drop-down list. (TCP &
UCP, TCP or UCP).
Source Port Select the source port from the drop down list. It
can be any port, a single port or port range.
Destination Port Select the destination port from the drop down list.
It can be any port, a single port or port range.
Source IP Select the source IP from the drop down list. It can
be any IP address, a single IP address or an IP
address range.
MAC Address Select the type of MAC address from the drop
down list. It can be Any or Single MAC address.
This is the MAC address of the source of this traffic.
Available SSIDs Select the available SSIDs from the drop-down list.
This is the SSID of the source of this traffic.
Rate Limit (Kbit/Sec): Enter the rate limit in Kbits per second.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 117
Quality of Service (QoS)
Bandwidth Management 7
Remarking Check Enable to enable remarking on the Class of
Service (CoS) or Differentiated Services Code
Point (DSCP).
To edit the settings of an entry in the table, check the relevant box and click Edit.
When you are done making changes, click Save.
To delete an entry from the table, check the relevant box and click Delete. Click
Save.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 118
Quality of Service (QoS)
Configuring QoS Port-Based Settings 7
Configuring QoS Port-Based Settings
You can configure QoS settings for every port on your device. It supports four
priority queues that allow traffic prioritization for each port.
STEP 2 For each port in the QoS Port-Based Settings table, enter this information:
Trust Mode Select one of the following options from the drop-
down menu:
To restore the default port-based QoS settings, click Restore Default and save
your changes.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 119
Quality of Service (QoS)
Configuring CoS Settings 7
Configuring CoS Settings
Use the link to the QoS Port-Based Settings Page to map the CoS priority setting
to the QoS queue.
STEP 2 For each CoS priority level in the CoS Settings Table, select a priority value from
the Traffic Forwarding Queue drop-down menu.
These values mark traffic types with higher or lower traffic priority depending on
the type of traffic.
To restore the default port-based QoS settings, click Restore Default and click
Save.
STEP 2 Select whether only to list RFC values or to list all DSCP values in the DSCP
Settings Table by clicking the relevant button.
STEP 3 For each DSCP value in the DSCP Settings Table, select a priority level from the
Queue drop-down menu.
To restore the default DSCP settings, click Restore Default and Save.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 120
8
Administration
Password Complexity
Password strength and complexity is a preventative measure used in resisting
guessing and brute-force attacks. The strength of a password is a function of
length, complexity, and unpredictability.
Using strong passwords lowers overall risk of a security breach. You can enforce a
minimum password complexity requirement for password changes.
• Uppercase letters.
• Lowercase letters.
• Numbers.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 121
Administration
Configuring User Accounts 8
The new password must Check Enable to require that new passwords differ
be different than the from the current password.
current one
Maximum Password Age Enter the number of days after which the password
expires (1–365). The default is 180 days.
The guest account has read-only access. You can set and change the username
and password for both the administrator and guest accounts.
STEP 2 In the Account Activation field, check the boxes for the accounts that you want to
activate. (The admin account must be active.)
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 122
Administration
Configuring User Accounts 8
New Password Enter the new password.
Ensure that the data in the CSV file is arranged as shown in the following tables:
NOTE The names of the columns are case-sensitive. Do not change the order or the
names of the columns.
STEP 1 In the Import User Name & Password field, click Browse.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 123
Administration
Session Timeout Configuration 8
NOTE You may download the user template to create your own list of user name and
passwords. To download the template, click Download in the Download User
template field.
STEP 2 In the Web Administrator Inactivity Timeout field, enter the number, in minutes,
before a session times out due to inactivity. Select Never to allow the
administrator to stay logged in permanently.
STEP 3 In the Web Guest Inactivity Timeout field, enter the number, in minutes, before a
session times out due to inactivity. Select Never to allow the administrator to stay
logged in permanently.
STEP 4 In the SSH Inactivity Timeout field, enter the number, in minutes, before a session
times out due to inactivity. Select Never to allow the administrator to stay logged in
permanently
To update the Pre-Login Banner Text fields enter the login banner text in the text
box. It is displayed on the CLI before user login.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 124
Administration
Configuring TR-069 Settings 8
To update the Post-Login Banner Text fields, enter the login banner text in the text
box. It is displayed on the CLI after user login.
NOTE The TR069 and GUI management can not work simultaneously. After configuring
the TR069 and saving the settings, logout of the web GUI. Thereafter, the CPE can
initiate the connection to the ACS.
STEP 1 Click Administration > TR-069 Settings. The TR-069 Settings page opens.
STEP 2 In the TR-069 Settings area, click Enable to enable the TR-069 client, or click
Disable to disable it.
STEP 4 In the Inform area, check Enable to enable Inform or Disable to disable it.
STEP 5 In the Inform Interval field, enter the number in seconds (Default setting is 300).
STEP 6 In the ACS area, specify the settings of the ACS remote management server:
• ACS URL: Click the ACS URL drop down list to choose ACS URL protocol -
HTTP:// or HTTPS:// and enter the URL.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 125
Administration
Configuring TR-069 Settings 8
• ACS side CA certificate file show: Click to show trusted CA certificate list.
• ACS certificate file select: Click to select drop down list of trusted CA.
• CPE certificate file import: Click to import CPE CA certificate file content.
• CPE certificate file select: Click to select drop down list of CPE CA.
STEP 7 In the Display SOAP messages on the serial console, check Enable to display
SOAP messages or Disable to disable it.
STEP 8 Download Request: (Optional) Specify the type of download request and then
click Send to send the corresponding download request to the TR-069 server.
STEP 9 Check Connection Request Authentication and enter the following information:
• Connection Request port: Enter the port for connection request. It’s 7547
by default.
STEP 10 In the Bind Interface field, select Auto to bind the TR-069 service with the current
active interface, or select one of the interfaces to bind it with. Click Save to save
your settings.
STEP 11 Click Export Data Model to export the TR-069 model of the device.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 126
Administration
Diagnostics 8
Diagnostics
Your device provides several diagnostic tools to help you troubleshoot network
problems.
Network Tools
Use the following diagnostic utilities to access the configuration of the RV132W/
RV134W and monitor the overall network health.
You can use the Ping or Trace utility to test connectivity between this router and
another device in the network. To use Ping or Trace:
STEP 2 In the IP Address / Domain Name field, enter the device IP address or a fully
qualified domain name such as www.cisco.com to ping.
STEP 3 Click Ping. The ping results appear. These results tell you if the device is
reachable. Or click Traceroute. The Traceroute results appear.
You can use the Lookup tool to find out the IP address of the host (for example, a
Web, FTP, or Mail server) on the Internet.
To retrieve the IP address of a Web, FTP, Mail or any other server on the Internet,
type the Internet name in the text box and click Look up. If the host or domain
entry exists, you will see a response with the IP address. An Unknown Host
message indicates that the specified Internet name does not exist.
STEP 2 In the Internet Name field, enter the Internet name of the host.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 127
Administration
Diagnostics 8
Packet Capture
Packet capture is a computer networking term for intercepting a data packet that
is crossing or moving over a specific computer network.
To start a packet capture, from the Select a layer 2 interface for this service
drop-down menu select your connection type (LAN, DSL WAN or ETH WAN).
Port Mirroring
Port mirroring monitors network traffic by sending copies of all incoming and
outgoing packets from one port to a monitoring port. You can use port mirroring as
a diagnostic or debugging tool, when fending off an attack or viewing user traffic
from LAN to WAN to see if users are accessing information or websites they are
not supposed to.
The LAN host (PC) should use a static IP address to avoid any issues with port
mirroring. DHCP leases can expire for a LAN host and can cause port mirroring to
fail if a static IP address is not configured for the LAN host.
STEP 2 From the Mirror Destination Port drop-down menu, select a mirror port. If you use
a port for mirroring, do not use it for any other traffic.
STEP 3 In the Mirror Source Port field, select the ports to mirror.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 128
Administration
Logging Configuration 8
Remote Support Key Settings
The support key is used by Cisco support engineers to get more information on
the device during troubleshooting. The default key is “key001”. Please include the
key when you open a support case with Cisco and want the support engineer to
access your device remotely. To setup a remote support key, enter the name of the
key in the Remote Support Key field.
Logging Configuration
Configure logs to monitor activity that indicates the health and performance of
your device.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 129
Administration
Logging Configuration 8
STEP 4 Configure the following settings:
Remote Log Server Enter the IP address of the log server that will
maintain logs.
Log Severity Select the severity of events for which you want to
maintain and send logs to a specific server/email
address. All log types that are higher in severity
than the selected log type are automatically
included and cannot be excluded. For example, if
you select Error logs, Emergency, Alert, and Critical
are also selected.
• Alert—Action is needed.
• Notification—System is functioning
properly, but a system notice occurred.
• Information—Device information.
To edit an entry in the Logging Setting Table, select the entry and click Edit. Make
your changes, and then click Save.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 130
Administration
Logging Configuration 8
Configuring E-Mail Settings
You can configure your device to send logs by email. We recommend that you set
up a separate email account for sending and receiving logs.
You must first set up the severity of logs you want to capture; see Configuring Log
Settings.
The minimum email log severity of logs that you want to capture appears. To
change this setting, click Configure Severity.
E-mail Server Address Enter the address of the SMTP server. This is the
mail server associated with the email account that
you have setup (for example,
mail.companyname.com).
E-mail Server Port Enter the SMTP server port. If your email provider
requires a special port for email, enter it here.
Otherwise, use the default (25).
Return E-mail Address Enter the return email address that the device will
send messages to if logs from the router to the
send-to email address are undeliverable.
Send to E-mail Address Enter an email address to which to send logs (for
1, (Address 2, optional), example, logging@companyname.com).
(Address 3, optional)
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 131
Administration
Discovery Bonjour Configuration 8
E-mail Authentication Enter the email authentication password (for
Password example, the password used to access the email
account you have set up to which to send logs).
STEP 4 In the Send E-Mail Logs by Schedule section, configure the following settings:
Unit Select the unit of time for the logs (Never, Hourly,
Daily, or Weekly). If you select Never, logs are not
sent.
Email alert when WAN up/down Check Enable to receive an email alert
when the WAN is up or down.
Email alert when VPN up/down Check Enable to receive an email alert
when the VPN is up or down.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 132
Administration
Discovery Bonjour Configuration 8
STEP 3 To enable Bonjour for a VLAN listed in the Bonjour Interface Control Table, check
the corresponding Enable Bonjour box.
You can enable Bonjour on specific VLANs. Enabling Bonjour on a VLAN allows
devices on the VLAN to discover the Bonjour services available on the router (such
as HTTP/HTTPS).
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 133
Administration
LLDP Properties Configuration 8
LLDP Properties Configuration
LLDP is a neighbor discovery protocol that is used for network devices to
advertise their information to other devices on the network. This protocol runs
over the data-link layer, which allows two systems running different network layer
protocols to learn about each other.
STEP 1 Select Administration > Time Settings. The current time is displayed.
Adjust for Daylight If supported for your region, check the Adjust for
Savings Time Daylight Savings Time box.
Daylight Saving Mode If you select By date, enter the specific date when
daylight saving mode starts.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 134
Administration
Download and Backup Configuration File 8
Daylight Saving Offset Select the offset from Coordinated Universal Time
(UTC) from the drop-down menu.
Set Date and Time Choose if you want the date and time on the device
to set manually or automatically.
NTP Server To use the default NTP servers, click the Use
Default button.
Enter Date and Time If you select Manual, enter the date and time in the
Enter Date and Time fields.
When the firewall is working as configured, you can back up the configuration for
future restoration. During backup, your settings are saved as a file on your PC. You
can restore the firewall settings from this file.
!
CAUTION During a restore operation, do not try to go online, turn off the firewall, shut down
the PC, or use the firewall until the operation is complete. This should take about a
minute. When the test light turns off, wait a few more seconds before using the
firewall.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 135
Administration
Download and Backup Configuration File 8
Backing Up the Configuration Settings
STEP 2 Select the configuration from the Configuration Download & Clear settings:
Mirror configuration Select this option if the device must back up the
Startup Configuration after 24 hours of operation
without any change in the startup configuration.
STEP 3 To download a backup file based on the selected configuration option, click
Download.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 136
Administration
Download and Backup Configuration File 8
Configuration Upload
STEP 2 In the Configuration Upload field, select the configuration to upload (Startup
Configuration or Backup Configuration).
The device uploads the configuration file and uses the settings it contains to
update the Startup Configuration. The device then restarts and uses the new
configuration.
Copy the Startup Configuration to the Backup Configuration to ensure that you
have a backup copy in case you forget your username and password and get
locked out of Device Manager. To get back into Device Manager, reset the device
to factory default.
The Backup Configuration file remains in memory and allows the backed up
configuration information to be copied to the Startup Configuration, which restores
all of the settings.
STEP 2 In the Copy field, select the source and destination configurations from the drop-
down menus.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 137
Administration
Firmware Upgrade 8
The router allows you to generate an encryption key to protect the backup files.
STEP 3 In the box, enter the seed phrase used to generate the key.
Firmware Upgrade
You can upgrade to a newer version of the firmware for the router by using the
Administration > Firmware Upgrade page.
!
CAUTION During a firmware upgrade, do not try to go online, turn off the device, shut down
the PC, or interrupt the process in any way until the operation is complete. This
process takes about a minute, including the reboot process. Interrupting the
upgrade process at specific points when the flash memory is being written to may
corrupt it and render the router unusable.
Upgrading Firmware
To update the router with a newer version of the firmware.
STEP 2 In the Firmware Upgrade section, click Download to download the latest version
of the firmware.
STEP 3 You can also upgrade the firmware by clicking on Browse to locate and upload the
latest firmware files from a specific location:
STEP 4 (Optional) To reset the device to factory default settings after the firmware is
upgraded, check Reset all configurations/settings to factory defaults.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 138
Administration
Firmware Upgrade 8
!
CAUTION Resetting the device to factory default settings erases all of your configuration
settings.
After the new firmware image is validated, the new image is written to flash, and
the device is automatically rebooted with the new firmware.
STEP 2 There are 2 ways to access the firmware recovery mode. You can select any of
the following options to access the recovery mode.
• If the firmware is corrupt and the router is unable to boot normally, the router
will automatically go into recovery mode after the device is powered on. The
PWR LED will turn red. Usually, the original configuration will be restored
after the new firmware is uploaded.
• To enter the recovery mode manually, connect the console cables (baud rate
115200)to the router. Power on the router and the boot up log will be
displayed on the console terminal. Press any key to stop the normal startup.
The PWR LED will turn red. Usually, the original configuration is restored after
the new firmware is uploaded.
• To delete the original configurations on the router, press the reset button and
power on the router.
STEP 3 Connect the PC to the LAN1 port. Configure the PC’s static address as
192.168.1.100.
STEP 4 Recover the firmware to the router via Web UI. For example, you can enter “http://
192.168.1.1” in the browser, then choose the image like (for RV132W)
“RV132W_FW_ANNEX_A_1.0.0.10.bin” or (for RV134W)
“RV134W_FW_ANNEX_A_1.0.0.10.bin”, and press Recover & Reboot. Wait for
several minutes until the router reboots itself once the upload is completed and is
flashing.
STEP 5 After the router will starts up normally, the PWR will be on and green.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 139
Administration
Reboot 8
Reboot
To reboot the router:
!
CAUTION During a restore operation, do not try to go online, turn off the router, shut down the
PC, or use the router until the operation is complete. This should take about a
minute. When the test light turns off, wait a few more seconds before using the
router.
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 140
9
Where to Go From Here
Support
Cisco Open Source Requests If you wish to receive a copy of the source code
to which you are entitled under the applicable
free/open source license(s) (such as the GNU
Lesser/General Public License), please send
your request to: external-opensource-
requests@cisco.com
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 141