This guide will show you how to configure a wireless mesh network using an RV345P router, a CBW140AC access point, and two CBW142ACM mesh extenders.
This article uses the Web User Interface (UI) to set up the mesh wireless network. If you prefer to use the mobile application, which is recommended for easy wireless setup, click to jump to the article that uses the mobile application.
All of your research has come together and you have purchased your Cisco equipment, how exciting! In this scenario, we are using an RV345P router. This router provides Power over Ethernet (PoE) which allows you to plug the CBW140AC into the router instead of a switch. The CBW140AC and the CBW142ACM mesh extenders will be used to create a wireless mesh network.
This advanced router also gives the option for additional features.
If you want to use these features, you will need to purchase a license. Routers and licenses are registered online, which will be covered in this guide.
If you are unfamiliar with some of the terms used in this document or want more details about Mesh Networking, check out the following articles:
Now that you own Cisco equipment, you need to get a Cisco.com Account, sometimes referred to as a Cisco Connection Online Identification (CCO ID). There is no charge for an account.
If you already have an account, you can jump to the next section of this article.
Go to Cisco.com. Click the person icon and then Create an account.
Enter the required details to create the account and click Register. Follow the instructions to complete the registration process.
If you have any issues, click to jump to the Cisco.com Account Registration Help Page.
A router is essential in a network because it routes packets. It enables a computer to communicate with other computers that are not on the same network or subnet. A router accesses a routing table to determine where packets should be sent. The routing table lists destination addresses. Static and dynamic configurations can both be listed on the routing table in order to get packets to their specific destination.
Your RV345P comes with default settings that are optimized for many small businesses. However, your network demands, or Internet Service Provider (ISP) might require you to modify a few of these settings. After you contact your ISP for the requirements, you can make changes using the Web User Interface (UI).
Are you ready? Let’s get to it!
Connect the Ethernet cable from one of the RV345P LAN (Ethernet) ports to the Ethernet port on the computer. You will need an adapter if your computer doesn’t have an Ethernet port. The terminal must be in the same wired subnetwork as the RV345P to perform the initial configuration.
Be sure to use the power adapter that is supplied with the RV345P. Using a different power adapter could damage the RV345P or cause USB dongles to fail. The power switch is on by default.
Connect the power adapter to the 12VDC port of the RV345P, but don’t plug it into power yet.
Make sure the modem is turned off.
Use an Ethernet cable to connect your cable or DSL modem to the WAN port on the RV345P.
Plug the other end of the RV345P adapter into an electrical outlet. This will power on the RV345P. Plug the modem back in so it can power up as well. The power light on the front panel is solid green when the power adapter is connected properly, and the RV345P is finished booting.
The prep work is done, now it’s time to get to some configurations! To launch the Web UI, follow these steps.
If your computer is configured to become a Dynamic Host Configuration Protocol (DHCP) client, an IP address in the 192.168.1.x range is assigned to the PC. DHCP automates the process of assigning IP addresses, subnet masks, default gateways, and other settings to computers. Computers must be set to participate in the DHCP process to obtain an address. This is done by selecting to obtain an IP address automatically in the properties of TCP/IP on the computer.
Open a web browser such as Safari, Internet Explorer, or Firefox. In the address bar, enter the default IP address of the RV345P, 192.168.1.1.
The browser might issue a warning that the website is untrusted. Continue to the website. If you are not connected, jump down to Troubleshooting the Internet Connection.
When the sign-in page appears, enter the default username cisco and the default password cisco.
Click Login.
For detailed information, click How to access the web-based setup page of Cisco RV340 series VPN routers.
Click Login. The Getting Started page appears. If the navigation pane isn’t open, you can open it by clicking on the menu icon.
Now that you have confirmed the connection and logged in to the router, jump to the Initial Configuration section of this article.
Dang it, if you are reading this you are probably having trouble connecting to the Internet or the Web UI. One of these solutions should help.
On your connected Windows OS, you can test your network connection by opening the command prompt. Enter ping 192.168.1.1 (the default IP address of the router). If the request times out, you are not able to communicate with the router.
If connectivity is not happening, you can check out this Troubleshooting article.
Some other things to try:
We recommend that you go through the Initial Setup Wizard steps listed in this section. You can change these settings at any time.
Click Initial Setup Wizard from the Getting Started Page.
This step confirms the cables are connected. Since you confirmed this already, click Next.
This step covers basic steps to make sure your router is connected. Since you have already confirmed this, click Next.
The next screen displays your options for assigning IP addresses to your router. You need to select DHCP in this scenario. Click Next.
You will be prompted to set your router time settings. This is important because it enables precision when reviewing logs or troubleshooting events. Select your Time Zone and then click Next.
You will select what MAC addresses to assign to devices. Most often, you will use the default address. Click Next.
The following page is a summary of the selected options. Review and click Next if satisfied.
For the next step, you will select a password to use when logging into the router. The standard for passwords is to contain at least 8 characters (both upper and lower case) and include numbers. Enter a password that conforms with the strength requirements. Click Next. Take note of your password for future logins.
Click the save icon.
If you want more information on these settings, you can read Configure DHCP WAN Settings on the RV34x Router.
Your RV345P has Power over Ethernet (PoE) enabled by default, but you have the ability to make some adjustments to them. If you need to customize the settings, check out Configure Power over Ethernet (PoE) Settings on the RV345P Router.
After completing the Initial Setup Wizard, you can set a static IP address on the router by editing the VLAN settings.
This process is only needed if your router IP address needs to be assigned a specific address in your existing network. If you don’t need to edit an IP address, you can move to the next section of this article.
On the left-hand menu, click LAN > VLAN Settings.
Select the VLAN that contains your routing device, then click the edit icon.
Enter your desired static IP address and click Apply in the upper-right hand corner.
If your router is not the DHCP server/device assigning IP addresses, you can use the DHCP Relay feature to direct DHCP requests to a specific IP address. The IP address is likely to be the router connected to the WAN/Internet.
This is an important step, don’t skip it!
Choose Administration > File Management.
In the System Information area, the following sub-areas describe the following:
Under the Manual Upgrade section, click on the Firmware Image radio button for File Type.
On the Manual Upgrade page, click on the radio button to select cisco.com. There are a few other options for this, but this is the easiest way to do an upgrade. This process installs the latest upgrade file directly from the Cisco Software Downloads webpage.
Click Upgrade.
Click Yes in the confirmation window to continue.
Once the upgrade has been completed, a notification window will pop-up to inform you that the router will be Restarting with a countdown of the estimated time for the process to finish. Following this, you will be logged out.
Log back into the web-based utility to verify that the router firmware has been upgraded, scroll to System Information. The Current Firmware Version area should now display the upgraded firmware version.
Since updates are so important and you are a busy person, it makes sense to configure automatic updates from here on out!
Log into the web-based utility and choose System Configuration > Automatic Updates.
From the Check Every drop-down list, choose how often the router should check for updates.
In the Notify via area, check the Email to checkbox to receive updates through email. The Admin GUI checkbox is enabled by default and cannot be disabled. A notification will appear in the web-based configuration once an update is available.
If you want to set up email server settings, click here to learn how.
Enter an email address in the Email to address field.
Under the Automatically Update area, check the Notify checkboxes of the kind of updates you want to be notified about. The options are:
From the Automatic Update drop-down list, choose a time of the day you want the automatic update to be done. Some options may vary according to the type of update you have chosen. Security Signature is the only option to have an immediate update. It is recommended that you set a time when your office is closed so service isn’t interrupted at an inconvenient time.
The status displays the currently running version of the firmware or security signature.
Click Apply.
To save the configuration permanently, go to the Copy/Save Configuration page or click the save icon at the upper portion of the page.
Awesome, your basic settings on your router are complete! Now you have some configuration options to explore.
Of course, you want your network to be safe. There are some simple options, such as having a complex password, but if you want to take steps for an even more secure network check out this section on security.
This RV Security License features protect your network from attacks from the Internet:
The RV Security License provides Web Filtering. Web Filtering is a feature that allows you to manage access to inappropriate websites. It can screen a client’s web access requests to determine whether to allow or deny that website.
Another Security option is Cisco Umbrella. Click here if you would like to jump to the Umbrella section instead.
If you don’t want either security license, click to jump to the VPN section of this document.
To purchase the RV Security License, you need a Smart Account.
By authorizing the activation of this Smart Account, you agree that you are authorized to create accounts and manage product and service entitlements, license agreements, and user access to accounts on behalf of your organization. Cisco Partners may not authorize account creation on behalf of customers.
The creation of a new Smart Account is a one-time event and management from that point forward is provided through the tool.
When you access your general Cisco account using your Cisco.com Account, or CCO ID (the one you created at the beginning of this document), you may be greeted by a message to create a Smart Account.
If you haven’t seen this pop-up, you can click to be taken to the Smart Account creation page. You may need to log in with your Cisco.com Account credentials.
For additional detail on the steps involved in requesting your Smart Account, click here.
Be sure to take note of your account name along with other registration details.
Quick Tip: If you are required to enter a domain and you do not have one, you can enter your email address in the form of name@domain.com. Common domains are gmail, yahoo, etc. depending on your company or provider.
You must purchase a license from your Cisco distributor or your Cisco partner. To locate a Cisco partner, click here.
The table below displays the part number for the license.
Type | Product ID | Description |
---|---|---|
RV Security License | LS-RV34X-SEC-1YR= | RV Security: 1 year: Dynamic Web Filter, Application Visibility, Client Identification and Statistics, Gateway Antivirus, and Intrusion Prevention System IPS. |
The license key is not entered into your router directly but will be assigned to your Cisco Smart Account after you order the license. The amount of time it takes for the license to show up on your account depends on when the partner accepts the order and when the reseller links the licenses to your account, which is usually 24-48 hours.
Navigate to your Smart License account page, then click Smart Software License page > Inventory > Licenses.
Access Cisco Software and navigate to Smart Software Licensing.
Enter your Username or email and Password to log into your Smart Account. Click Log in.
Navigate to Inventory > Licenses and verify that the RV-Series Security Services License is listed on your Smart Account. If you do not see the license listed, contact your Cisco partner.
Navigate to Inventory > General. Under Product Instance Registration Tokens click on New Token.
A Create Registration Token window will appear. The Virtual Account area displays the virtual account under which the registration token will be created. On the Create Registration Token page, complete the following:
You have now successfully generated a product instance registration token.
Click the arrow icon in the Token column, to copy the token to the clipboard press ctrl + c on your keyboard.
Click the Actions drop-down menu, choose Copy to copy the token to the clipboard or Download… to download a text file copy of the token from which you may copy.
Navigate to License and verify the Registration Status is showing as Unregistered and License Authorization Status is showing as Evaluation Mode.
Navigate to System Configuration > Time and verify the Current Date and Time and Time Zone are reflecting correctly as per your time zone.
Navigate to License. Paste the copied token in step 6 on the text box under the License tab by selecting ctrl + v on your keyboard. Click Register.
The registration may take a few minutes. Do not leave the page as the router attempts to contact the license server.
You should now have successfully registered and authorized your RV345P Series router with a Smart License. You will get a notification on the screen Registration completed successfully. Also, you will be able to see that the Registration Status is showing as Registered and License Authorization Status is showing as Authorized.
To view more detail of the Registration Status of the license, hover your pointer over the Registered status. A dialog message appears with the following information:
On the License page verify the Security-License status is showing Authorized. You may also click on the Choose License button to verify the Security-License is enabled.
To Refresh License State or Deregister the license from the router, click on the Smart Licensing Manager Actions drop-down menu and select an action item.
Now that you have your license on the router, you need to complete the steps in the next section.
You have 90 days after activation to use web filtering at no cost. After the free trial, if you want to continue using this feature, you need to purchase a license. Click to go back to that section.
Log into the web-based utility and choose Security > Application Control > Web Filtering.
Select the On radio button.
Click the add icon.
Enter a Policy Name, Description, and the Enable checkbox.
Check the Web Reputation checkbox to enable filtering based on a web reputation index.
From the Device Type drop-down list, select the source/destination of the packets to be filtered. Only one option can be chosen at a time. The options are:
From the OS Type drop-down list, choose an Operating System (OS) to which the policy should be applicable. Only one option can be chosen at a time. The options are:
Scroll down to the Schedule section and select the option that best fits your needs.
Click the edit icon.
In the Filtering Level column, click a radio button to quickly define the filtering extent that would best fit the network policies. The options are High, Moderate, Low, and Custom. Click on any of the filtering levels below to know the specific pre-defined sub-categories filtered to each of their enabled Web Content Category. Pre-defined filters cannot be altered any further and are greyed out.
Enter the web content that you want to filter. Click on the plus icon if you want more detail on one section.
To view all Web Content sub-categories and descriptions, you can click the Expand button.
Click Collapse to collapse the sub-categories and descriptions.
To return to the default categories, click Restore to Default Categories.
Click Apply to save the configuration and to return to the Filter page to continue the setup.
Other options include URL Lookup and the message that shows when a requested page has been blocked.
Click Apply.
To save the configuration permanently, go to the Copy/Save Configuration page or click the save icon at the upper portion of the page.
To verify that a website or URL has been filtered or blocked, launch a web browser or open a new tab in your browser. Enter the domain name you have block listed or have filtered to be blocked or denied.
In this example, we used www.facebook.com.
You should now have successfully configured web filtering on your RV345P Router. Since you are using the RV Security License for web filtering, you probably don’t need Umbrella. If you also want Umbrella, click here. If you have enough security, click to skip to the next section.
If you’ve purchased a license but it is not appearing in your virtual account, you have two options:
Ideally, you wouldn’t have to do either, but if you arrive at this crossroad we’re happy to help! To make the process as expedient as possible, you will need the credentials in the table above as well as those outlined below.
Information Required | Locating the information |
---|---|
License Invoice | This should be emailed to you after completing the purchase of the licenses. |
Cisco Sales Order number | You may need to go back to the reseller to get this. |
Screenshot of your Smart Account license page | Taking a screenshot captures the contents of your screen for sharing with our team. If you’re unfamiliar with screenshots you can use the below methods. |
Once you have a token, or if you are troubleshooting, it is recommended that you take a screenshot to capture the contents of your screen.
Given the differences in the procedure required to capture a screenshot, see below for links specific to your operating system.
Umbrella is a simple, yet very effective cloud security platform from Cisco.
Umbrella operates in the cloud and performs many security-related services. From emergent threat to post-event investigation. Umbrella discovers and prevents attacks across all ports and protocols.
Umbrella uses DNS as its main vector for defense. When users enter a URL in their browser bar and hit Enter, Umbrella participates in the transfer. That URL passes to Umbrella’s DNS resolver, and if a security warning associates with the domain, the request is blocked. This telemetry data transfers and is analyzed in microseconds, adding nearly no latency. Telemetry data uses logs and instruments tracking billions of DNS requests throughout the world. When this data is pervasive, correlating it across the globe enables rapid response to attacks as they begin. See Cisco’s privacy policy here for more information: full policy, summary version. Think of telemetry data as data derived from tools and logs.
Visit Cisco Umbrella to learn more and to create an account. If you run into any issues, check here for documentation, and here for Umbrella Support options.
After logging into your Umbrella Account, from the Dashboard screen click on Admin > API Keys.
Anatomy of the API Keys Screen (with pre-existing API key)
Click on the Add API Key button in the upper-right hand corner or click the Create API Key button. They both function the same.
Select Umbrella Network Devices and then click the Create button.
Open a text editor such as notepad then click the copy icon to the right of your API and API Secret Key, a pop-up notification will confirm the key is copied to your clipboard. One at a time, paste your secret and API key into the document, labeling them for future reference. In this case, its label is “Umbrella network devices key”. Then save the text file to a secure location that's easy to access later.
After you’ve copied the key and secret key to a safe location, from the Umbrella API screen click the checkbox to confirm to complete acknowledgment of the temporary viewing of the secret key, then click the Close button.
Now that we’ve created API keys within Umbrella, you can take those keys and install them on your RV345P.
After logging into your RV345P router, click on Security > Umbrella in the sidebar menu.
The Umbrella API screen has a range of options, begin enabling Umbrella by clicking the Enable checkbox.
On by default, the box Block LAN DNS Queries is selected. This neat feature automatically creates access control lists on your router which will prevent DNS traffic from going out to the Internet. This feature forces all domain translation requests to be directed through the RV345P and is a good idea for most users.
The next step plays out in two different ways. They both depend on the setup of your network. If you use a service like DynDNS or NoIP, you leave the default naming scheme of “Network”. You will need to log into those accounts to ensure Umbrella interfaces with those services as it provides protection. For our purposes we’re relying on “Network Device”, so we click on the bottom radio button.
Click Getting Started.
Enter the API Key and Secret Key to the text boxes.
After entering your API and Secret Key, click the Next button.
In the next screen, select the organization you wish to associate with the router. Click Next.
Select the policy to apply to traffic routed by the RV345P. For most users, the default policy will provide enough coverage.
Assign a name to the device so it may be designated in Umbrella reporting. In our setup, we have named it RV345P-Lab.
The next screen will validate your chosen settings and provide an update when associated successfully. Click OK.
Congratulations, you are now protected by Cisco Umbrella. Or are you? Let’s be sure by double-checking with a live example, Cisco has created a website dedicated to determining this as quickly as the page loads. Click here or type https://InternetBadGuys.com into the browser bar.
If Umbrella is configured correctly, you will be greeted by a screen similar to this.
Are you worried that someone would attempt unauthorized access to the network by unplugging an Ethernet cable from a network device and connecting to it? In this case, it is important to register a list of allowed hosts to directly connect to the router with their respective IP and MAC addresses. Instructions can be found in the article Configure IP Source Guard on the RV34x Series Router.
A Virtual Private Network (VPN) connection allows users to access, send, and receive data to and from a private network by means of going through a public or shared network such as the Internet but still ensuring a secure connection to an underlying network infrastructure to protect the private network and its resources.
A VPN tunnel establishes a private network that can send data securely using encryption and authentication. Corporate offices mostly use VPN connection since it is both useful and necessary to allow their employees to have access to their private network even if they are outside the office.
The VPN allows a remote host to act as if they were located on the same local network. The router supports up to 50 tunnels. A VPN connection can be set up between the router and an endpoint after the router has been configured for Internet connection. The VPN client is entirely dependent on the settings of the VPN router to be able to establish a connection.
If you are not sure which VPN best fits your needs, check out Cisco Business VPN Overview and Best Practices.
If you are not planning on setting up a VPN, you can click to jump to the next section.
Generally, every router supports Network Address Translation (NAT) in order to conserve IP addresses when you want to support several clients with the same Internet connection. However, Point-to-Point Tunneling Protocol (PPTP) and Internet Protocol Security (IPsec) VPN do not support NAT. This is where the VPN Passthrough comes in. A VPN Passthrough is a feature that allows VPN traffic generated from VPN clients connected to this router to pass through this router and connect to a VPN endpoint. The VPN Passthrough allows PPTP and IPsec VPN only to pass through to the Internet, which is initiated from a VPN client, and then reach the remote VPN gateway. This feature is commonly found on home routers that support NAT.
By default, IPsec, PPTP, and L2TP Passthrough are enabled. If you want to view or adjust these settings, select VPN > VPN Passthrough. View or adjust as needed.
There are several advantages to using Cisco AnyConnect:
Access the router web-based utility and choose VPN > SSL VPN.
Click the On radio button to enable Cisco SSL VPN Server.
The following configuration settings are mandatory:
Make sure that the IP address range does not overlap with any of the IP addresses on the local network.
Click Apply.
The following configuration settings are optional:
Click Apply.
Click the Group Policies tab.
Click the add icon under the SSL VPN Group Table to add a group policy.
Click on a radio button to choose the IE Proxy Policy to enable Microsoft Internet Explorer (MSIE) proxy settings to establish VPN tunnel. The options are:
In the Split Tunneling Settings area, check the Enable Split Tunneling checkbox to allow Internet destined traffic to be sent unencrypted directly to the Internet. Full Tunneling sends all traffic to the end device where it is then routed to destination resources, eliminating the corporate network from the path for web access.
Click on a radio button to choose whether to include or exclude traffic when applying the split tunneling.
In the Split Network Table, click the add icon to add a split Network exception.
Enter the IP address of the network in the field provided.
In the Split DNS Table, click the add icon to add a split DNS exception.
Enter the Domain name in the field provided and then click Apply.
The router comes with 2 AnyConnect server licenses by default. This means that once you have AnyConnect client licenses, you can establish 2 VPN tunnels simultaneously with any other RV340 series router.
In short, the RV345P router does not need a license, but all clients will need one. AnyConnect client licenses allow desktop and mobile clients to access the VPN network remotely.
This next section details how to get licenses for your clients.
A VPN client is software that is installed and ran on a computer that wishes to connect to the remote network. This client software must be set up with the same configuration as that of the VPN server such as the IP address and authentication information. This authentication information includes the username and the pre-shared key that will be used to encrypt the data. Depending on the physical location of the networks to be connected, a VPN client can also be a hardware device. This usually happens if the VPN connection is used to connect two networks that are in separate locations.
The Cisco AnyConnect Secure Mobility Client is a software application for connecting to a VPN that works on various operating systems and hardware configurations. This software application makes it possible for remote resources of another network to become accessible as if the user is directly connected to his network, but in a secure way.
Once the router is registered and configured with AnyConnect, the client can install licenses on the router from your available pool of licenses that you purchase, which is detailed in the next section.
You must purchase a license from your Cisco distributor or your Cisco partner. When ordering a license, you must provide your Cisco Smart Account ID or Domain ID in the form of name@domain.com.
If you don’t have a Cisco distributor or partner, you can locate one here.
At the time of writing, the following Product SKUs can be used to purchase additional licenses in bundles of 25. Note that there are other options for the AnyConnect client licenses as outlined in the Cisco AnyConnect Ordering Guide, however, the Product ID listed would be the minimum requirement for full functionality.
Please note, the AnyConnect client license Product SKU listed first, provides licenses for a term of 1 year, and requires a minimum purchase of 25 licenses. Other product SKUs which are applicable to the RV340 series routers are also available with varying subscription levels, as follows:
When your client sets up one of the following, you should send them these links:
Click on the AnyConnect Secure Mobility Client icon.
In the AnyConnect Secure Mobility Client window, enter the gateway IP address and the gateway port number separated by a colon (:), and then click Connect.
The software will now show that it is contacting the remote network.
Enter your server username and password in the respective fields and then click OK.
As soon as the connection is established, the Login Banner will appear. Click Accept.
The AnyConnect window should now indicate the successful VPN connection to the network.
If you are now using AnyConnect VPN, you can skip past other VPN options and move to the next section.
An IPsec VPN allows you to securely obtain remote resources by establishing an encrypted tunnel across the Internet. The RV34X series routers work as IPsec VPN servers and support the Shrew Soft VPN Client. This section will show you how to configure your router and the Shrew Soft Client to secure a connection to a VPN.
You can download the latest version of the Shrew Soft VPN client software here: https://www.shrew.net/download/vpn
We will start by configuring the Client-to-Site VPN on the RV345P.
Navigate to VPN > Client-to-Site.
Add a Client-to-Site VPN profile.
Select the Cisco VPN Client option.
Check the Enable box to make the VPN Client Profile active. We will also configure the Group Name, select the WAN interface, and enter a Pre-shared Key.
Leave the User Group Table blank for now. This is for the User Group on the router, but we have not configured it yet. Make sure the Mode is set to Client. Enter the Pool Range for Client LAN. We will use 172.16.10.1 through 172.16.10.10.
Here is where we configure the Mode Configuration settings. Here are the settings we will use:
After clicking Save, we can see the Profile in the IPsec Client-to-Site Groups list.
Configure a User Group to use for Authenticating VPN client users. Under System Configuration > User Groups, click on the plus icon to add a User Group.
Enter a Group Name.
Under Services > EzVPN/3rd Party, click Add to link this User Group to the Client-to-Site Profile that was configured earlier.
You should now see the Client-to-Site Group Name in the list for EzVPN/3rd Party.
After you Apply the User Group configuration, you will see it in the User Groups list and it will show the new User Group will be used with the Client-to-Site Profile you created earlier.
Configure a new User in System Configuration > User Accounts. Click on the plus icon to create a new user.
Enter the new User Name along with the New Password. Verify that the Group is set to the new User Group you just configured. Click Apply when finished.
The new User will show up in the list of Local Users.
This completes the configuration on the RV345P Series Router. Next, you will configure the Shrew Soft VPN client.
Perform the following steps.
Open the Shrew Soft VPN Access Manager and click Add to add a Profile. In the VPN Site Configuration window that appears, configure the General tab:
Configure the Client tab. In this example, we kept the default settings.
Under Name Resolution > DNS, check the Enable DNS box and leave the Obtain Automatically boxes checked.
Under Name Resolution > WINS tab, check the Enable WINS box and leave the Obtain Automatically box checked.
Click Authentication > Local Identity.
Under Authentication > Remote Identity. In this example, we kept the default settings.
Under Authentication > Credentials, configure the following:
For the Phase 1 tab. In this example, the default settings were kept:
In this example, the defaults for the Phase 2 tab were kept the same.
For the Policy tab example, we used the following settings:
Since we configured Split-Tunneling on the RV345P, we don’t need to configure it here.
When finished, click Save.
You are now ready to test the connection. In VPN Access Manager, highlight the connection profile and click on the Connect button.
In the VPN Connect window that comes up, enter the Username and Password using the credentials for the User Account you created on the RV345P (step 13 & 14). When finished, click Connect.
Verify the tunnel is connected. You should see tunnel enabled.
There are some other options for using a VPN. Click on the following links for more information:
A Virtual Local Area Network (VLAN) allows you to logically segment a Local Area Network (LAN) into different broadcast domains. In scenarios where sensitive data may be broadcast on a network, VLANs can be created to enhance security by designating a broadcast to a specific VLAN. VLANs can also be used to enhance performance by reducing the need to send broadcasts and multicasts to unnecessary destinations. You can create a VLAN, but this has no effect until the VLAN is attached to at least one port, either manually or dynamically. Ports must always belong to one or more VLANs.
You may want to refer to VLAN Best Practices and Security Tips for additional guidance.
If you do not want to create VLANs, you can skip to the next section.
Navigate to LAN > VLAN Settings.
Click the add icon to create a new VLAN.
Enter the VLAN ID that you want to create and a Name for it. The VLAN ID range is from 1-4093.
Uncheck the Enabled box for both Inter-VLAN Routing and Device Management if desired. Inter-VLAN routing is used to route packets from one VLAN to another VLAN.
In general, this is not recommended for guest networks as you will want to isolate guest users it leaves VLANs less secure. There are times when it may be necessary for VLANs to route between each other. If this is the case, check out Inter-VLAN Routing on an RV34x Router with Targeted ACL Restrictions to configure specific traffic that you allow between VLANs.
Device Management is the software that allows you to use your browser to log into the Web UI of the RV345P, from the VLAN, and manage the RV345P. This should also be disabled on Guest networks.
In this example, we did not enable either the Inter-VLAN Routing or Device Management to keep the VLAN more secure.
The private IPv4 address will auto-populate in the IP Address field. You can adjust this if you choose. In this example, the subnet has 192.168.2.100-192.168.2.149 IP addresses available for DHCP. 192.168.2.1-192.168.2.99, and 192.168.2.150-192.168.2.254 are available for static IP addresses.
The subnet mask under Subnet Mask will auto-populate. If you make changes, this will automatically adjust the field.
For this demonstration, we will be leaving the Subnet Mask as 255.255.255.0 or /24.
Select a Dynamic Host Configuration Protocol (DHCP) Type. The following options are:
Disabled – Disables the DHCP IPv4 server on VLAN. This is recommended in a test environment. In this scenario, all IP addresses would need to be manually configured and all communication would be internal.
Server - This is the most often used option.
Click Apply to create the new VLAN.
16 VLANs can be configured on the RV345P, with one VLAN for the Wide Area Network (WAN). VLANs that are not on a port should be Excluded. This keeps the traffic on that port exclusively for the VLAN/VLANs the user specifically assigned. It is considered a best practice.
Ports can be set to be an Access Port or a Trunk Port:
One VLAN assigned its own port:
Two or more VLANs that share one port:
Select the VLAN IDs to edit.
In this example, we have selected VLAN 1 and VLAN 200.
Click Edit to assign a VLAN to a LAN port and specify each setting as Tagged, Untagged, or Excluded.
In this example, on LAN1 we assigned VLAN 1 as Untagged and VLAN 200 as Excluded. For LAN2 we assigned VLAN 1 as Excluded and VLAN 200 as Untagged.
Click Apply to save the configuration.
You should now have successfully created a new VLAN and configured VLANs to ports on the RV345P. Repeat the process to create the other VLANs. For example, VLAN300 would be created for Marketing with a subnet of 192.168.3.x and VLAN400 would be created for Accounting with a subnet of 192.168.4.x.
If you would like a certain device to be reachable to other VLANs, you can give that device a static local IP address and create an access rule to make it accessible. This only works if Inter-VLAN routing is enabled. There are other situations where a static IP may be useful. For more information on setting static IP addresses, check out Best Practices for Setting Static IP Addresses on Cisco Business Hardware.
If you don’t need to add a static IP address, you can move to the next section of this article.
Navigate to LAN > Static DHCP. Click on the plus icon.
Add the Static DHCP information for the device. In this example, the device is a printer.
A digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows relying parties to depend upon signatures or assertions made by the private key that corresponds to the public key that is certified. A router can generate a self-signed certificate, a certificate created by a network administrator. It can also send out requests to Certificate Authorities (CA) to apply for a digital identity certificate. It is important to have legitimate certificates from third party applications.
A Certificate Authority (CA) is used for authentication. Certificates can be purchased from any number of third-party sites. It is an official way to prove that your site is secure. Essentially, the CA is a trusted source that verifies that you are a legitimate business and can be trusted. Depending on your needs, a certificate at a minimal cost. You get checked out by the CA, and once they verify your information, they will issue the certificate to you. This certificate can be downloaded as a file on your computer. You can then go into your router (or VPN server) and upload it there.
Log in to the web-based utility of the router and choose Administration > Certificate.
Click Generate CSR/Certificate. You will be brought to the Generate CSR/Certificate page.
Fill in the boxes with the following:
You should now have successfully created a certificate on the RV345P router.
In the Certificate Table, check the checkbox of the certificate you want to export and click the export icon.
A message indicating the success of the download will appear below the Download button. A file will begin to download in your browser. Click Ok.
You should now have successfully exported a certificate on the RV345P Series Router.
Click on Import Certificate....
Once successful, you will automatically be taken to the main Certificate page. The Certificate Table will populate with the recently imported certificate.
You should now have successfully imported a certificate on your RV345P router.
Perhaps you want to configure a backup mobile network using a dongle and your RV345P router. If this is the case, you should read Configure a Mobile Network Using a Dongle and an RV34x Series Router.
Congratulations, you have completed the configuration of your RV345P router! You will now configure your Cisco Business Wireless devices.
Start by plugging an Ethernet cable from the PoE port on your CBW140AC to a PoE port on the RV345P. The first 4 ports on the RV345P can supply PoE, so any of them can be used.
Check the status of the indicator lights. The access point will take about 10 minutes to boot. The LED will blink green in multiple patterns, alternating rapidly through green, red, and amber before turning green again. There may be small variations in the LED color intensity and hue from unit to unit. When the LED light is blinking green, proceed to the next step.
The PoE Ethernet uplink port on the Primary AP can ONLY be used to provide an uplink to the LAN, and NOT to connect to any other Primary capable or mesh extender devices.
If your access point isn’t new, out of the box, make sure it is reset to factory default settings for the CiscoBusiness-Setup SSID to show up in your Wi-Fi options. For assistance with this, check out How to Reboot and Reset to Factory Default Settings on RV345x Routers.
You can set up the Access Point using the mobile application or the Web UI. This article uses the Web UI for setup, which gives more options for configuration but is a little more complicated. If you would like to use the mobile application for the next sections, click to access the mobile application instructions.
If you have trouble connecting, refer to the Wireless Troubleshooting Tips section of this article.
On your PC, click the Wi-Fi icon and choose CiscoBusiness-Setup wireless network. Click Connect.
If your access point isn’t new, out of the box, make sure it is reset to factory default settings for the CiscoBusiness-Setup SSID to show up in your Wi-Fi options.
Enter the passphrase cisco123 and click Next.
You will get the following screen. Since you can configure only one device at a time, click No.
Only one device can be connected to the CiscoBusiness-Setup SSID. If a second device attempts to connect, it will not be able to. If you are unable to connect to the SSID and have validated the password, some other device may have made the connection. Restart the AP and try again.
Once connected, the web browser should auto-redirect to the CBW AP setup wizard. If not, open a web browser, such as Internet Explorer, Firefox, Chrome, or Safari. In the address bar, type http://ciscobusiness.cisco and press Enter. Click Start on the webpage.
Create an admin account by entering the following:
You can choose to show the password by checking the checkbox next to Show Password. Click Start.
Do not use cisco, or variations of it in the username or password fields. If you do, you will get an error message as shown below.
Set Up Your Primary AP by entering the following:
Mesh should be enabled only if you plan to create a mesh network. By default, it is disabled.
(Optional) You can enable Static IP for your CBW140AC for management purposes. If not, the interface gets an IP address from your DHCP server. To configure static IP, enter the following:
Click Next.
By default, this option is disabled.
Create Your Wireless Networks by entering the following:
Click Next.
Wi-Fi protected Access (WPA) version 2 (WPA2), is the current standard for Wi-Fi security.
Confirm the settings and click Apply.
Click OK to apply the settings.
You will see the following screen while the configurations are being saved and the system reboots. This might take 10 minutes.
During the reboot, the LED in the access point will go through multiple color patterns. When the LED is blinking green, proceed to the next step. If the LED does not get past the red flashing pattern, it indicates that there is no DHCP server in your network. Ensure that the AP is connected to a switch or a router with a DHCP server.
Go to the wireless options on your PC and choose the network that you configured. Click Connect.
The CiscoBusiness-Setup SSID will disappear after reboot.
Open a web browser and type in https://[IP address of the CBW AP]. Alternatively, you can type https://ciscobusiness.cisco in the address bar and press enter.
Click Login.
Log in using the credentials that were configured. Click OK.
You will be able to access the Web UI page of the AP.
If you have any issues, check out the following tips:
You are in the home stretch of setting up this network, you just need to add your mesh extenders!
Plug the two Mesh Extenders into the wall in the locations you have selected. Write down the MAC Address of each mesh extender.
Wait about 10 minutes for the Mesh Extenders to boot up.
Enter the Primary Access Points (APs) IP address on the web browser. Click Login to access the Primary AP.
Enter your User Name and Password credentials to access the Primary AP. Click OK.
Navigate to Wireless Settings > Mesh . Make sure the Mesh is Enabled. Click Apply.
If Mesh was not already enabled, the WAP may need to perform a reboot. A pop-up will appear to do a reboot. Confirm. This will take about 10 minutes. During a reboot, the LED will blink green in multiple patterns, alternating rapidly through green, red, and amber before turning green again. There may be small variations in the LED color intensity and hue from unit to unit.
Navigate to Wireless Settings > WLAN Users > Local MAC Addresses. Click Add MAC Address.
Enter the MAC address and Description of the Mesh Extender. Select the Type as Allow list. Select the Profile Name from the drop-down menu. Click Apply.
Be sure to save all your configurations by pressing the save icon on the top-right pane of the screen.
Repeat for each mesh extender.
Don’t skip this important step! There are a few ways to update software, but the steps listed below are recommended as the easiest to execute when you use the Web UI.
To view and update the current software version of your Primary AP, perform the following steps.
Click the gear icon at the top-right corner of the web interface, and then click Primary AP Information.
Compare the version that is running to the latest software version. Close the window once you know if you need to update the software.
If you are running the latest version of software, you can jump to the Create WLANs section.
Choose Management > Software Update from the menu.
The Software Update window is displayed with the current software version number listed at the top.
You can update the CBW AP software and the Current configurations on the Primary AP will not be deleted.
From the Transfer Mode drop-down list, choose Cisco.com.
To set the Primary AP to automatically check for software updates, choose Enabled in the Automatically Check for Updates drop-down list. This is enabled by default.
When a software check is done and if a newer latest or recommended software update is available on Cisco.com, then:
Click Save. This saves the entries or changes you have made in both Transfer Mode and Automatically Check For Updates.
The Last Software Check field displays the timestamp of the last automatic or manual software check. You can view the notes of displayed releases by clicking the question mark icon next to it.
You can manually run a software check anytime by clicking Check Now.
To proceed with the software update, click Update.
The Software Update Wizard appears. The wizard takes you through the following three tabs in sequence:
Follow the instructions in the wizard. You can go back to any tab at any time before you click Confirm.
Click Confirm.
This section allows you to create Wireless Local Area Networks (WLANs).
A WLAN can be created by navigating to Wireless Settings > WLANs. Then select Add new WLAN/RLAN.
Under the General tab, enter the following information:
The following fields were left as default in this example, but explanations are listed in case you would like to configure them differently.
Click Apply.
You will be taken to the WLAN Security tab.
In this example, the following options were left as the default:
WPA2 Personal is a method used for securing your network with the use of a PSK authentication. The PSK is configured separately both on the Primary AP, under the WLAN security policy, and on the client. WPA2 Personal does not rely on an authentication server on your network.
The following fields were entered in this scenario:
Click Apply. This will automatically activate the new WLAN.
Be sure to save your configurations by clicking the save icon on the top right panel of the Web UI screen.
To view the WLAN you created, select Wireless Settings > WLANs. You will see the number of Active WLANs raised to 2, and the new WLAN is displayed.
Repeat these steps for other WLANs you want to create.
You now have all basic configurations set and are ready to roll. You have some options, so feel free to jump to any of the following sections:
A guest WLAN gives guest access to your Cisco Business Wireless network.
Log into the Web UI of the Primary AP. Open a web browser and enter www.https://ciscobusiness.cisco. You may receive a warning before proceeding. Enter your credentials. You can also access it by entering the IP address of the Primary AP.
A Wireless Local Area Network (WLAN) can be created by navigating to Wireless Settings > WLANs. Then select Add new WLAN/RLAN.
Under the General tab, enter the following information:
WLAN ID – Select a number for the WLAN
Type – Select WLAN
Profile Name – When you enter a name, the SSID will auto-populate with the same name. The name must be unique and should not exceed 31 characters.
The following fields were left as default in this example, but explanations are listed in case you would like to configure them differently.
SSID – The profile name also acts as the SSID. You can change this if you would like. The name must be unique and should not exceed 31 characters.
Enable – This should be left enabled for the WLAN to work.
Radio Policy – Typically you would want to leave this as All so that 2.4GHz and 5GHz clients can access the network.
Broadcast SSID – Usually you would want the SSID to be discovered so you would want to leave this as Enabled.
Local Profiling – You would only want to enable this option to view the Operating System that is running on the Client or to see the User name.
Click Apply.
You will be taken to the WLAN Security tab. In this example, the following options were selected.
In this example, the Guest WLAN with an enabled Social login access type will be created. Once the user connects to this guest WLAN, they will be redirected to the Cisco default login page where they can find the login buttons for Google and Facebook. The user can log in using their Google or Facebook account to obtain Internet access.
On this same tab, select an Access Type from the drop-down menu. In this example, Social Login was selected. This is the option that allows guests to use their Google or Facebook credentials to authenticate and get access to the network.
Other options for Access Type include:
Local User Account – The default option. Choose this option to authenticate guests using the username and password which you can specify for guest users of this WLAN, under Wireless Settings > WLAN Users. This is an example of the default Internal Splash Page.
You can customize this by navigating to Wireless Settings > Guest WLANs. From here you can enter a Page Headline and Page Message. Click Apply. Click Preview.
Web Consent – Allows guests access to the WLAN upon acceptance of displayed terms and conditions. Guest users can access the WLAN without entering a username and password.
Email Address – Guest users will need to enter their email address to access the network.
RADIUS – Use this with an external authentication server.
WPA2 Personal – Wi-Fi Protected Access 2 with Pre-shared Key (PSK)
Click Apply.
Be sure to save your configurations by clicking the save icon on the top right panel of the Web UI screen.
You have now created a guest network that is available on your CBW network. Your guests will appreciate the convenience.
Profiling is a subset of features that enable enacting organizational policy. It allows you to match and prioritize traffic types. Like rules make decisions about how to rank or drop the traffic. The Cisco Business Mesh Wireless system features client and application profiling. The act of accessing a network as a user begins with many exchanges of information, among that information is the type of traffic. Policy interrupts traffic flow to direct the path, much like a flow-chart. Other types of policy features include - guest access, access control lists, and QoS.
Navigate to the menu on the left-hand side of the screen if you don’t see the left-hand menu bar.
The Monitoring menu loads by default when signing into the device. You will need to click Wireless Settings.
The image below is similar to what you will see when your click the Wireless Settings link.
Click the edit icon to the left of the Wireless Local Area Network you want to enable the application on.
Since you recently added the WLAN, your Edit WLAN page may appear similar to the below:
Navigate to the Traffic Shaping tab by clicking on it.
Your screen may appear as follows:
Toward the bottom of the page, you will find the Application Visibility Control feature. This is disabled by default. Click the dropdown and select Enabled.
Click the Apply button.
This setting must be enabled, otherwise the feature will not function.
Click the cancel button to close the WLAN sub-menu. Then click the Monitoring menu on the left-hand menu bar. Once you are able, click the Applications menu item.
If you’ve had no traffic to any source, your page will be blank as shown below.
This page will display the following information:
You can click on the tabs to sort from largest to smallest, which can help identify the largest consumers of network resources.
This feature is very powerful for managing your WLAN resources on a granular level. Below are some of the more common groups and application types. Your list is likely to include many more, including the following groups and examples:
Shown here is an example of what the page will look like when populated.
Each table heading is clickable for sorting which is especially useful for Data Usage and Throughput fields.
Click the row for the type of traffic you would like to manage.
Click the Action drop-down box to select how you will treat that traffic type.
For this example, we’re leaving this option at Mark.
Action to take on traffic
Click the drop-down box in the DSCP field to select from the following options.
Below are the DSCP options for the traffic to be marked. These options progress from fewer resources to more resources available to the traffic type you are editing.
As a web convention, traffic has migrated toward SSL browsing, which prevents you from seeing what's inside the packets as they move from your network into the WAN. As such, a large majority of web traffic will be using SSL. Setting SSL traffic for a lower priority may affect your browsing experience.
Now select the individual SSID you would like this policy to run or click Select All.
Now click Apply to begin this policy.
Two cases where this could apply:
You did it! Application profiling is a very powerful tool that can be further enabled by also enabling Client Profiling, as is detailed in the next section.
Upon connecting to a network, devices exchange client profiling information. By default, Client Profiling is disabled. This information may include:
Statistics about these clients include the amount of data used and throughput.
Tracking client profiles enables greater control over the wireless local area network. Or you could use it as a function of another feature. Such as using application throttling device types that don't carry mission-critical data for your business.
Once enabled, client details for your network can be found on the Monitoring section of the Web UI.
Click Wireless Settings.
The below is similar to what you will see when your click the Wireless Settings link:
Decide which WLAN you want to use for the application and click the edit icon to the left of it.
A pop-up menu may appear similar to the below. This important message may temporarily affect service on your network. Click Yes to move forward.
Toggle client profiling by clicking the Local Profiling toggle button.
Click Apply.
Click the Monitoring section menu item on the left-hand side. You will see the client data begin to appear in the Dashboard of the Monitoring tab.
You now have now completed the setup of your secure network. What a great feeling, now ake a minute to celebrate and then get to work!
We want the best for our customers, so you have any comments or suggestions regarding this topic, please send us an email to the Cisco Content Team.
If you would like to read other articles and documentation, check out the support pages for your hardware:
Revision | Publish Date | Comments |
---|---|---|
1.0 |
12-Apr-2021 |
Initial Release |