No mac support if above 10.5, No ssl vpn for workstations above windows 32bit so xp and vista work but no one is using that anymore not even small business's. Pros: Well site to site vpn works, but not very well when using dynamic dns.Ĭons: Every feature you'd want and sounds great in this router should have a star next to it. It has NAT on the WAN2 interface, but forcibly disables it when enabling DMZ mode. It can handle dynamic public IPs, just not with certificates.
FREE VPN CLIENT FOR CISCO RV320 MANUAL
The device can handle AES-256, it just doesn't allow it on manual IPSec keying or non-IPSec tunnels. All of the features that I need are available on the device, they just don't all inter-operate, which seems like lazy firmware programming to me. Overall Review: Admittedly, the configuration I wanted to go with is not the standard config. So unless all hosts involved in the tunnel have static public IP addresses, there is no secure tunneling option available through this device. Not surprisingly, the encryption available on the PPTP tunnel is also weak encryption. IPSec with manual keying only supports 3DES encryption, which might as well be clear text. Further, Windows requires certificates for all IKE tunnels, so no IPSec tunneling to home users either. The device only supports IKEv1, which does not support mobile connectivity without certificates and the RV320's certificate based IKE tunnel requires the remote host to have a static IP. Second, IPSec functionality is extremely limited. This is a perfectly valid way to go, but why not make NAT togglable on the DMZ interface? Why force the user away from other valid setups? So if you want to hide multiple public facing devices behind a single public address, you have to setup a VLAN and use port forwarding for public traffic and firewall rules to isolate the VLANs. įirst, enabling DMZ mode on the WAN2 interface disables NAT on that interface. Most of all, X.509 certificate administration is as easy as it can be.Ĭons: There are two very important limitations on advertised features that are not documented anywhere in print or on device. It has a simple, user friendly interface on the firewall, DHCP and DNS servers, easy setup for VLAN, DHCP relay and MAC filtering, so on. Pros: This device is an extremely excellent selection for basic features. Routing Information Protocol (RIP) v1, v2, and RIP for IPv6 (RIPng)Īdditional Information Date First Available Protocols can be bound to a specific WAN port for load balancing
Point-to-Point Protocol over Ethernet (PPPoE) Strong security: Proven stateful packet inspection (SPI) firewall and hardware encryptionĮasy to set up and use with wizard-based configurationĭynamic Host Configuration Protocol (DHCP) server, DHCP client, DHCP relay agent SSL VPN and site-to-site VPN enable highly secure connectivity, making the Cisco RV320 perfect for remote employees and multiple offices Internet Key Exchange (IKE) with certificateĭual Gigabit Ethernet WAN ports for load balancing and/or business continuityĪffordable, high-performance Gigabit Ethernet ports, enabling large file transfers and multiple usersĭual USB ports for storage and 3G/4G modem failover
VPN pass-through PPTP, Layer 2 Tunneling Protocol (L2TP), IPsec IPsec NAT traversal Supported for gateway-to-gateway and client-to-gateway tunnels SSL VPN 10 SSL VPN tunnels for remote client accessĪdvanced Encryption Standard (AES) encryption: AES-128, AES-192, AES-256 RV320-K9-NA Model Brandĭenial of service (DoS), ping of death, SYN flood, land attack, IP spoofing, email alert for hacker attackīlocking Java, cookies, ActiveX, HTTP proxyĬontent filtering Static URL blocking or keyword blockingĢ5 IPsec site-to-site tunnels for branch office connectivityĢ5 IPsec VPN tunnels via Cisco VPN client and third-party clients such as "TheGreenBow" for remote access VPN connectivity