Linksys RVL200 Firmware Version: v1.1.12 .1 SSL VPN & Active Directory

Posted on 2011-10-18
Last Modified: 2012-05-12
I would like to have my users remotely log in into our network with their active directory account.
I have a changed the time and date on the router to match the active directory server but still do not know the proper steps to have my end users log in remotely and have their mapped drives and other small progams work with our network.

I need to know what i put on the linksys switch for the user account what username and passwords they would need put into the linksys login screen to allow for the SSL VPN to work propoerly.

These are the only instructions that i was able to find for the RVL200

Active Directory Authentication
Server Address: Enter the IP address or Domain Name of the Active Directory server in the Server Address field.
Active Director Domain: Enter the Active Directory domain name in the Active Directory Domain field.

Active Directory Troubleshooting
If your users are unable to connect via Active Directory, verify the following:
1.The time settings between the Active Directory server and the RVL200 must be synchronized. Kerberos authentication, used by Active Directory to authentication clients, permits a maximum of a 15-minute time difference the Windows server and the client (RVL200).
2.Confirm that your Windows server is configured for Active Directory authentication. If you are using Window NT4.0 server, then your server only supports NT Domain authentication. Typically, Windows 2000 and 2003 servers are also configured for NT Domain authentication to support legacy Windows clients.
Question by:kheaney
    LVL 5

    Accepted Solution


    Author Comment

    Do i have the from 56 on? Or just the part about active directory?

    Author Comment

    Do i follow from page 56 and beyond or just the section on active directory log in?
    LVL 23

    Assisted Solution

    It's on page 41 of that PDF to setup AD as the authentication server.  If you require further assistance I would suggest getting with Linksys...especailly if page 41 looks confusing to you.  Better to do it right.

    Author Closing Comment

    Thanks guys....

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Better Security Awareness With Threat Intelligence

    See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

    Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
    Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
    Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now