🔐 Secure Your Network, Elevate Your Business!
The Linksys Systems RV 110W Wireless-N VPN Firewall is a versatile networking solution designed for small to medium-sized businesses. It features an integrated 4-port Fast Ethernet switch, advanced QoS support for optimal traffic management, and a user-friendly browser-based setup for easy configuration. With robust VPN security, it ensures safe remote access, making it an essential tool for modern business connectivity.
Item Weight | 0.61 Pounds |
Connectivity Technology | Wired^Wireless |
Control Method | Remote |
Data Transfer Rate | 90 Megabits Per Second |
Frequency | 5 GHz |
Wireless Compability | 802.11bgn |
Controller Type | Switch |
Compatible Devices | Personal Computer, Printer |
LAN Port Bandwidth | 10/100 megabits_per_second |
Security Protocol | WPS |
Operating System | Cisco IOS |
Number of Ports | 4 |
Additional Features | QoS, WPS |
J**U
Nice
Awesome interested and vendor interoperability
A**A
Five Stars
i like it
E**O
Bueno
A los dos meses las entradas Ethernet dejaron de funcionar
A**R
Works fine as well
I wonder why I have received a different model from the product shown under product details (i.e. RV110W-A-NA-K9). However, I have received a RV042 instead. Works fine as well.
J**R
Good router, if somewhat un-intuitive interface
When my company announced that it was opening another small branch office, I thought I'd be smart and pick up a cheapo Linksys router and set up a site-to-site VPN, only to find that any recent firmware specifically disables this feature. So much for being smart, and I wasn't comfortable running DD-WRT in a production environment. Home, yes, work, no. So the search was on to find another cheapo router that supported site-to-site VPN, and I landed here.What I got was a small box that does everything I need a branch office router to do: routing, basic firewall services, and a really strong wireless signal. Setup was, for the most part, as easy as could be. If you've ever set up a router, of any brand, you won't even need the manual to get up and running with basic services. It wasn't until I went to set up the VPN that I ran into problems.First of all, site-to-site VPN is only available in the (at this writing) latest firmware, version 1.2.0.9, first released in March '12. But the router shipped - in February '13 - with an older revision, which I find puzzling. It took me some time to figure out that I wasn't doing anything wrong, it was the router running year-out-of-date firmware that was wrong. Once I downloaded the firmware, I finally had the setup option I was looking for. Except.There's nothing that explicitly says "Phase 2 Negotiation options" or anything similar. Phase 1, sure. That's configured in a separate IKE policy setup from the actual VPN connection. But the Phase 2 config is done in the connection setup, in a section that makes it look like you're just manually configuring Phase 1 instead of using the IKE policy. It's needlessly confusing, and not explained in any manual. What makes it even worse is this router has a limit of a single VPN tunnel anyway, so there's no need to separate the IKE and IPSec configs in the first place. A single page with all the options would be far easier. Or Cisco could, and I can't believe I'm saying this about Cisco, improve their documentation. But after tweaking settings for a couple of hours, I managed to get it successfully connected back to a Sonicwall NSA2400 at the home office, and it's been working flawlessly ever since. It did keep throwing back errors about unable to complete Phase 2 negotiation, but the connection remained live and those messages vanished after a few hours and haven't returned.But other than that hitch, I have no gripes. Some other reviewers have complained that the antennas aren't detachable, and they're not, but I don't see that as a problem. The signal is VERY strong, reaching not only to the far corners of the warehouse with full bars, but outside the office and up the street a couple hundred yards before finally dropping off. For the money, I'm very pleased.
M**S
Didn't work as advertised
I purchased an RV110W in April 2011 to use in a small business. We had two needs: (1) allow for VPN users to remote into the network, (2) allow a specific and restricted range of external IP addresses to RDP to a specific internal server. These were hard requirements.After some research, I purchased this based upon reviews and the Cisco name. Some of the reviews (off-Amazon) said that the device had a few problems but then said that new firmware addressed these. None of the problems were related to either of my needs, so I didn't think twice about it.It's too bad I didn't.Despite working on configuration, testing, updating firmware, and so on...repeatedly...I was never able to get the NAT to work in a secure fashion via the access (firewall) rules that displayed on the device. Well, to be honest, it worked for a few hours, then stopped. Resetting the entire device to factory defaults and recreating the access rules, NAT, and so on got it working again...for a few hours. This was true even when I was running what is currently the latest firmware release (1.2.0.9).I had two friends who are much more experienced with these things review my general network setup and the RV110W's configuration. Both reviewed the settings and agreed that it should work, after having eliminated other potential problems (such as Windows firewall rules on the server, other devices that might be causing issues, and so on). They each spent several hours helping me...and still, no joy.Questions about this and the strange warning messages I saw in the RV110W's logs after the NAT stopped working in conjunction with access rules were posted to the Cisco support forums.These returned one answer from a Cisco employee: "Don't use both ACL and Port forward on the Small Business routers the forward will be enough to get the traffic through the firewall." (So...I got no answer to what the strange warning messages meant, no explanation of why you can't use access rules and NAT in tandem, no explanation of why it worked for a few hours then filed, and...well, all I got was a "if it doesn't work when you try that, then don't try it again" from them. Thanks.)To be honest, when I did what they asked and set up a NAT with no firewall rules it worked...which is OK if I am willing to accept that my server would be exposed to every script kiddie out there who discovered I have a device globally responding on RDP.But I'm not.What I expected was a "proven firewall" with "access rules support" that "helps keep business assets safe".I didn't get it...not if I wanted to use a NAT, I guess.So for this reason, it gets two stars.And as a coda: when I bought a similar product from a competitor, it worked exactly as expected.
C**E
Almost perfect for an small office
I was really happy to find a router with these features. While overall I am quite happy with this device for my small office, there are some features that are just missing or not quite up to task.ProsReally good throughput on a 50Mb Internet connection.Interface is easy to get up to speed and manage.Good selection of Firewall Options.Wi-Fi range and throughput have been good.Built in VPNConsThe QuickVPN is just not a very good client. It forces you to use Windows Firewall and does not allow you to use a Third Party FirewallYou can't point your VPN clients to use the internal DNS. This means if you try to use DNS name resolution for your internal servers or devices it will not work. This is a major oversight as you can't expect your users to always remember IP addresses to access the share drives or printers, or if they have mapped drives they will not work unless you do it by IP. It amazes me a networking company like Cisco would overlook something so simple yet so important.Does not play well with third part VPN. Since we had the above mentioned issues with QuickVPN we decided to just use out OpenVPN server. Well, Cisco will not allow it to work even if you forward the ports and allow the traffic.OverallIt is a good firewall and router, but it is a poor VPN device with far too basic of features for any good use. If you just want to be secure the VPN will work, but if you want to actually work you will have to manipulate it in ways that are nor really best practice to make it work for your users.
Trustpilot
4 days ago
1 day ago