Rv340 Vpn Client To Site
Cisco RV340 Dual WAN Gigabit VPN Router
List Price:
Our Price: $233.59
Overview:
Today, secure networking is imperative for every business, even the smallest one.
To configure the Client-to-Site, follow these steps: Step 1 Click VPN Client-to-Site. Step 2 Click Add and the IPsec Client-to-Site Groups table will be displayed. Step 3 To add a Client to Site connection, click Add. Step 4 In the Add a New Group section, select an option (Cisco VPN Client or 3rd Party Client). Jul 21, 2017 RV340 Dual-WAN VPN Router-Product Views Front Panel View. The front panel shows the model number, the Reset button and several LEDs for Power, VPN, Diagnostics, LAN, WAN, and USB.
The RV340 Series security router provides business users with advanced connectivity and secure high-speed access for the growing demand and usage of digital services.
The Cisco RV340 Series routers connect small businesses securely to the Internet. The routers protect employees from threats such as viruses, network attacks, unwanted content, and malicious websites. All that without compromising the online experience.
Rv340 Vpn Client To Site Software
Implementing advanced Unified Threat Management (UTM) features on a high-performing router platform creates one of the most desirable small business connectivity solutions.
Standard are dual WAN ports, business class firewall, and flexible VPN options. Integrated Wi-Fi-5, 16- port LAN switch, and PoE LAN orts are available in model variants.
For cloud-based security, an easy-to-configure Cisco Umbrella™ integration is available.
Security
IT security is a priority for business of all sorts and sizes. With the size of an office or a remote office typically being rather small, IT staff is less likely to be available and offer user support. Any office environment requires the same functionality as the corporate office in terms of security that may include firewall, VPN, IPS, blocking applications and web protection.
The Cisco 340 Series offers comprehensive security and best-in-class performance.
- Firewall: Stateful, scalable, and flexible.
- UTM features (your choice of on prem or in the cloud) — Unified security features provide reliable and highly secure Internet connectivity with cloud application detection and policies.
- Secure connectivity: Flexible VPN functionality with support of Cisco AnyConnect® Secure Mobility Client.
- Hardware-accelerated performance: Dual core ARM-based architecture with embedded hardware-accelerated VPN.
- Dual-WAN with load-balancing and 3G/4G failover brings resiliency and increased bandwidth.
- Partner- or customer-centric single pane-of-glass network management with the integration into FindIT Manager or web UI.
- Automated software updates to keep the firmware current.
The security features include an on-board UTM feature set and a cloud-based Cisco Umbrella integration. These features can be used independently from each other and require a software license. When the Cisco Umbrella integration is activated, the on-board web security is turned off. All other security features will work.
Cisco Umbrella is a cloud-based web security service that delivers automatic protection from malicious or compromised websites, phishing, C2 Callbacks, and malware. With Cisco Umbrella, you gain visibility and enforcement at the DNS layer, so you can block requests to malicious domains and IPs before a connection to your network or endpoints is ever made. And because it’s built into the foundation of the Internet and delivered from the cloud, Umbrella is the simplest security product to deploy and delivers powerful, effective protection. The router integration allows for easy setup, enhanced visibility and reporting, and a small business–friendly branch license for Cisco Umbrella.
The on-board UTM security features include: Intrusion prevention, gateway antivirus, application identification, client identification, on-board web security. These features protect your network from attacks from the Internet and at the same allow for setting policies for corporate usage of the Internet by limiting Internet surfing to appropriate site categories and eliminating unwanted network traffic, hence boosting employee productivity and overall network performance.
Licensing
To operate the router no license is required. It will work with full performance and all VPN features are turned on.
- The customer can add advanced security features to the router using a license. The license will enable IPS, Antivirus, Web Security, App ID, and Client ID. The licensed security features can be trialed at no cost for 90 days.
- To integrate the router into Cisco Umbrella as a “network device type,” and to have the advantage of detailed security reporting for all hosts behind the router, a Cisco Umbrella license is required. For customers using only the RV routers, an affordable Cisco Umbrella branch license is available.
RV Security License (LS-RV34X-SEC-1YR=)
Enables dynamic web filter, Internet security and Application Visibility, Client Identification, IPS, and Antivirus.
Umbrella RV Branch License (UMB-BRAN-RV)
1-Year Cisco RV-Branch license. Uses Cisco Umbrella Licensing.
Features and Benefits:
- Dual WAN
High resiliency and load balancing for reliable Internet connectivity. - Integrated switch
4- or 16-port*integrated gigabit switch to connect the devices directly to the router. PoE+* for powering connected phones and access point from the router. (RV340, RV340W: 4 Ports, RV345 16 Ports, RV345P: 16 Ports and PoE) - Integrated WiFi-5
Provides connectivity for all wireless devices. Wi-Fi-5 allows router to communicate with multiple devices simultaneously, decreases the time each device has to wait for a signal, and dramatically speeds up the wireless network. (RV340W only) - 3G/4G failover via USB modem
Provides high reliability and connectivity when broadband connection is down. - Enhanced VPN functionality
Protects employees and their data. Enterprise class, easy to set up. Encrypt all your traffic between sites. Flexible options. IPSec IKEv2, IKev1, Anyconnect SSL, L2TP. - Support for the Cisco AnyConnect Secure Mobility Client
Ideal for remote access by mobile devices. - Dynamic web filtering
Enables business efficiency and security while connecting to the Internet, allows Internet access policies for end devices and Internet applications to help ensure performance and security. - Client identification
Identifies the type of connected devices and allows setting policies. Application visibility Generates reports of Internet applications being used by clients and allows setting policies. - Cisco Umbrella integration
The Umbrella integration allows One-Click configuration for Cisco Umbrella cloud-based web security service. - Intrusion Prevention System (IPS)
Blocking network connections that are determined too risky for the organization. - Antivirus
Antivirus delivers deep extensive protection against all types of viruses. - Cisco Plug and Play (PnP)
Cloud-based Zero Touch Deployment. Improve operational efficiency with a simple, secure, and integrated method for device onboarding. - Automatic software download and update
Keeps the router constantly up-to-date without user intervention. Quickest way to mitigate 0-Day vulnerabilities.
Specifications:
| Product Specifications | |
|---|---|
| WAN ports | 2 RJ-45 Gigabit Ethernet |
| LAN ports | 4 RJ-45 Gigabit Ethernet (LAN 1, 2, 3, 4 and LAN 9, 10, 11, 12 are PoE 802.3at, max 30W per port up to 120W total |
| Console/serial | 1 RJ-45 port for future use. Port is disabled |
| USB | 2 for external 3G/4G modem or flash drive (USB-3, USB-2) |
| Firewall | Stateful packet inspection, up to 980 Mbps throughput for TCP and UDP |
| Quality of Service (QoS) | Traffic Classes, WAN Queuing, WAN Policing, WAN Bandwidth Management, Assign detailed QoS (Class of Service (CoS)/Differentiated Services Code Point (DSCP)/policies) settings per application or end device |
| Web Security | Dynamic web filtering: Cloud based, more than 80 categories, more than 450 million domains classified |
| Application Visibility | Application identification: Assign policies to Internet applications 500 unique Apps |
| Client Identification | Identifies and categorizes clients dynamically. Assigns policies based on end device category and operating system. |
| Intrusion Prevention System | IDS/IPS inspects network packets, logs and/or blocks a wide range of network attacks. It delivers increased network availability, faster remediation, and comprehensive threat protection. HTTP/FTP/SMTP/POP3/IMAP |
| Antivirus | Protection from viruses, trojans, spyware, and identity theft by inspecting traffic going through the router. HTTP/FTP/SMTP/POP3/IMAP |
| Cisco Umbrella | First line of defense for threats on the Internet. Prevention for user and malware-initiated connections. Protection against Malware, C2 callbacks, and phishing. Proxy inspection for risky domains. |
| IPSec | IKEv1 and IKEv2 50 simultaneous connections (any combination of remote access and site-to-site), up to 650 Mbps throughput |
| IPsec remote access | Yes (remote access from any standards-based IPsec client and Cisco IPsec VPN EasyVPN) |
| Layer 2 Tunneling Protocol (L2TP) over IPsec | Yes |
| Generic Routing Encapsulation (GRE) over IPsec | Yes |
| Cisco SSL VPN (Cisco AnyConnect) | Maximum 50 SSL VPN tunnels and up to 33Mbps throughput. Also requires Cisco AnyConnect end user licenses to use on the end device. Ideal for mobile devices. |
| Point-to-Point Tunneling Protocol (PPTP) | 25 connections, up to 100 Mbps throughput |
| Teleworker mode (Cisco IPsec VPN) | Router acts as a client to connect to central VPN gateway in teleworker mode |
| VPN pass-through | IPSec, PPTP, L2TP |
| Management protocols | Web browser (HTTP/HTTPS) Simple Network Management Protocol (SNMP) v1, v2c, and v3 Representational State Transfer (REST) API NETCONF |
| Management Platform | FindIT Network Manager |
| Firmware upgrade options | Via local PC, USB stick, or from Cisco.com via web browser. Unattended automatic firmware upgrade. |
| LAN | |
| VLAN | Up to 32 VLANs |
| Port Security | Yes, 802.1X |
| Link aggregation | Yes (static, no LACP) |
| IPv6 | Dual stack, 6rd, 6in4, Dual stack lite |
| WAN | DHCP client, static IP, PPPoE, PPPTP, L2TP, transparent bridge |
| Routing | Static routing, IGMP proxy, Inter-VLAN routing, Routing Information Protocol RIPv1,v2, RIPng |
| Network Address Translation (NAT) | Port Forwarding Port Address Translation (PAT) One-to-one NAT VPN NAT traversal Session Initiation Protocol (SIP) Application-Level Gateway (ALG), FTP ALG |
| NAT max sessions | >40000 |
| NAT max connections per second | 3000 |
| DynDNS | ChangeIP.com, DynDNS.com, No-IP.com, dnsomatic |
| IPv6 transition | Dual Stack |
| Hardware DMZ | Yes (when enabled, one LAN port will be DMZ port) |
| DMZ host | Yes |
| System | |
| CPU | ARM-based architecture, dual core, hardware flow engine 900 Mhz |
| RAM | 1 GB DDR3 |
| Flash | 256 MB |
| Wireless | |
| Standards | IEEE 802.11ac, 802.11n, 802.11g, 802.11b, 802.11a, 802.1X (security authentication), 802.1Q (VLAN), 802.11i (WPA2 security), 802.11e (wireless QoS) |
| Antennas | 4 external fixed paddle antennas (RV340W) |
| 802.1X supplicant | Yes |
| SSID-to-VLAN mapping | Yes |
| Auto channel selection | Yes |
| WPA/WPA2 | Yes, including enterprise authentication |
| Access control | Yes, MAC filtering |
| Rouge access point detection | No |
| QoS | Wi-Fi Multimedia (WMM) with unscheduled automatic power save |
| Wireless Peformance | |
| Wireless throughput | PHY data rate: 2.4 GHz: 450 Mbps 964-QAM), 600 Mbps (256-QAM) 5 GHz: 1.7 Gbps (256-QAM), 2.1 Gbps (1024-QAM) Total: Up to 2.7 Gbps (real-world throughput will vary) |
| Recommended user support | Up to 50 users at 2.4 GHz and 124 users at 5 GHz simultaneously |
| Captive Portal for guest access | Yes |
| Wireless Parameters | |
| Frequency | Dual concurrent radios (2.4 and 5 GHz) |
| WLAN | 802.11n/ac 4x4 MU-MIMO with 4 partial streams at 5GHz 3x3 MIMO with 3 spatial streams at 2.4 GHz 20 MHz, 40 MHz and 80 MHZ channels for 802.11ac 20 MHz and 40 MHz channels for 802.11n PHY data rate: 2.4 GHz: 450 Mbps (64-QAM), 600 Mbps (256-QAM) 5 GHz: 1.7 Gbps (256-QAM), 2.1 Gbps (1024-QAM) Total: up to 2.7 Gbps 802.11 Dynamic Frequency Selection (DFS) MU-MIMO up to 3 clients simultaneously |
| Data rates supported | 802.11 a/b/g:
802.11ac:
|
| Frequency band and operating channels | A (A regulatory domain):
E (E regulatory domain):
C (C regulatory domain):
|
| Transmitter output power | 2.4 GHz
5 GHz
|
| Wireless isolation | Wireless isolation between clients |
| Antenna gain in dBi | 2.4 GHz: 3 dBi each antenna 5 GHz: 5 dBi each antenna |
| Receiver sensitivity | 2.4 GHz
5 GHz
|
| Wireless Distribution System (WDS) | No |
| Product Dimensions | |
| Dimension | 280 x 44 x 315 mm (11 x 1.75 x 12.40 in) |
| Package Dimensions | 375 x 505 x 80 mm (14.76 x 19.88 x 3.15 in) |
| Product Weight Device Only | 1150 g (2.53 lb) |
| Packaging Weight | 2400 g (5.29 lb) |
| MTBF | 50000 hours |
| Rack mountable | Yes |
| Included accessories | Power supply, power cord, Ethernet cable |
| Fan | No |
| Power Supply | AC 100-240V/1A DC 12V/3A |
| Certification | FCC Class B, CE Class B, UL, cUL, CB, CCC, BSMI, KC, Anatel |
| Operating temperature | 0° to 40°C (32° to 104°F) |
| Storage temperature | 0° to 70°C (32° to 158°F) |
| Operating humidity | 10% to 85% noncondensing |
| Storage humidity | 5% to 90% noncondensing |
Documentation:
Download the Cisco RV340, RV345, RV345P, and RV340W Dual WAN Security VPN Router Data Sheet (.PDF)
Pricing Notes:
- Pricing and product availability subject to change without notice.
Cisco RV340 Dual WAN Gigabit VPN Router
List Price:
Our Price: $233.59
Objective
In a Client-to-Site Virtual Private Network (VPN) connection, clients from the Internet can connect to the server to access the corporate network or Local Area Network (LAN) behind the server but still maintains the security of the network and its resources. This feature is very useful since it creates a new VPN tunnel that would allow teleworkers and business travelers to access your network by using a VPN client software without compromising privacy and security.
The objective of this document is to show you how to configure Client-to-Site VPN connection on the RV34x Series Router.
Applicable Devices
- RV34x Series

Software Version
- 1.0.01.16
Configure Client-to-Site VPN
Step 1. Log in to the router web-based utility and choose VPN > Client-to-Site.
Step 2. Click the Add button under IPSec Client-to-Site Tunnels section.
Step 3. In the Add a New Tunnel area, click the Cisco VPN Client radio button.
Step 4. Check the Enable check box to enable the configuration.
Step 5. Enter a group name in the field provided. This will serve as identifier for all the member of this group during the Internet Key Exchange (IKE) negotiations.
Note: Enter characters between A to Z or 0 to 9. Spaces and special characters are not allowed for the group name. In this example, TestGroup is used.
Step 6. Click on the drop-down list to choose the Interface. The options are:
- WAN1
- WAN2
- USB1
- USB2
Note: In this example, WAN1 is chosen. This is the default setting.
Step 7. In the IKE Authentication Method area, choose an authentication method to be used in IKE negotiations in IKE-based tunnel. The options are:
- Pre-shared Key — IKE peers authenticate each other by computing and sending a keyed hash of data that includes the Pre-shared Key. If the receiving peer is able to create the same hash independently using its Pre-shared key, it knows that both peers must share the same secret, thus authenticating the other peer. Pre-shared keys do not scale well because each IPSec peer must be configured with the Pre-shared key of every other peer with which it establishes a session.
- Certificate — The digital certificate is a package that contains information such as a certificate identity of the bearer: name or IP address, the serial number expiration date of the certificate, and a copy of the public key of the certificate bearer. The standard digital certificate format is defined in the X.509 specification. X.509 version 3 defines the data structure for certificates.
Note: In this example, Pre-shared Key is chosen. This is the default setting.
Step 8. Enter a pre-shared key in the field provided. This will be the authentication key among your group of IKE peers.
Step 9. (Optional) Check the Enable check box for the Minimum Pre-shared Key Complexity to view the Pre-shared Key Strength Meter and determine the strength of your key. The strength of your key are defined as follows:
- Red— The password is weak.
- Orange— The password is fairly strong.
- Green — The password is strong.
Note: You can check the Enable check box in the Show Pre-shared Key field to check your password in plain text.
Step 10. (Optional) Click on the plus icon in the User Group table to add a group.
Step 11. (Optional) Choose from the drop-down list whether the user group is for admin or for guests. If you created your own user group with user accounts, you can select it. In this example, we will be selecting TestGroup.
Note: TestGroup is a user group that we have created in System Configuration >User Groups.
Note: In this example, TestGroup is chosen. You can also check the box beside the user group and then click the Delete button if you want to delete a user group.
Step 12. Click on a radio button to choose a Mode. The options are:
- Client — This option allows the client to request for an IP address and the server supplies the IP addresses from the configured address range.
- Network Extension Mode (NEM) — This option allows clients to propose their subnet for which VPN services need to be applied on traffic between LAN behind server and subnet proposed by client.
Note: In this example, Client is chosen.
Step 13. Enter the starting IP address in the Start IP field. This will be the first IP address in the pool that can be assigned to a client.
Note: In this example, 192.168.100.1 is used.
Step 14. Enter the ending IP address in the End IP field. This will be the last IP address in the pool that can be assigned to a client.
Note: In this example, 192.168.100.100 is used.
Step 15. (Optional) Under the Mode Configuration area, enter the IP address of the primary DNS server in the field provided.
Note: In this example, 192.168.1.1 is used.
Rv340 Vpn Client To Site Download
Step 16. (Optional) Enter the IP address of the secondary DNS server in the field provided.
Note: In this example, 192.168.1.2 is used.
Step 17. (Optional) Enter the IP address of the primary WINS server in the field provided.
Note: In this example, 192.168.1.1 is used.
Step 18. (Optional) Enter the IP address of the secondary WINS server in the field provided.
Rv340 Vpn Client To Site Free
Note: In this example, 192.168.1.2 is used.
Step 19. (Optional) Enter the default domain to be used in the remote network in the field provided.

Note: In this example, sample.com is used.
Step 20. (Optional) In the Backup Server 1 field, enter the IP address or the domain name of the backup server. This will be where the device can start the VPN connection in case the primary IPSec VPN server fails. You can enter up to three backup servers in the fields provided. The Backup Server 1 has the highest priority among the three servers and the Backup Server 3 has the lowest.
Note: In this example, Example.com is used for Backup Server 1.
Step 21. (Optional) Check the Split Tunnel check box to enable split tunnel. Split Tunneling allows you to access the resources of a private network and the Internet at the same time.
Step 22. (Optional) Under the Split Tunnel Table, click the plus icon to add an IP address for split tunnel.
Step 23. (Optional) Enter the IP address and netmask of the split tunnel in the fields provided.
Note: In this example, 192.168.1.0 and 255.255.255.0 are used. You can also check the box and click on the Add, Edit, and Delete buttons to add, edit, or delete a split tunnel, respectively.
Step 24. (Optional) Check the Split DNS check box to enable split DNS. Split DNS allows you to create separate DNS servers for internal and external networks to maintain security and privacy of network resources.
Step 25. (Optional) Click the plus icon under the Split DNS Table to add a domain name for split DNS.
Step 26. (Optional) Enter the domain name of the split DNS in the field provided.
Note: In this example, labsample.com is used. You can also check the box and click on the Add, Edit, and Delete buttons to add, edit, or delete a split DNS, respectively.
Step 27. Click Apply.
Conclusion
You should now have successfully configured Client-to-Site connection on the RV34x Series Router.
Click on the following articles to learn more on the following topics:
View a video related to this article...
