Cisco Systems RV215W Network Router User Manual


 
Configuring Networking
Configuring the WAN Settings
Cisco RV215W Wireless-N VPN Firewall Administration Guide 36
6
E-mail Setting
When the bandwidth data limit is reached, an email message can be sent to the
administrator. To set up the target email address, check the Email to check box
and click Email Address. For more information, see Configuring E-mail Settings.
When enabled by checking the box, email is sent when:
Mobile network usage has exceeded a given percentage.
The device fails over to the backup pathway and recovers.
At every interval specified while a mobile network link is active.
Setting Failover and Recovery
While both an Ethernet and a mobile network link might be available, only one
connection can be used to establish a WAN link at a time. When a WAN connection
fails, the device attempts to bring up a connection on another interface. This
feature is called Failover. When the primary WAN connection is restored, it drops
the backup connection. This feature is called Recovery.
STEP 1 Choose Networking > WAN > Failover & Recovery.
STEP 2 Choose if your primary network connection is an ethernet WAN connection or a
mobile network connection using a 3G USB dongle.
STEP 3 Click the Failover to Secondary Enable radio button to enable the device to
failover from the primary network connection and restore connectivity using the
secondary connection.
For example, your primary connection is an Ethernet WAN connection and the
WAN link goes down. The device attempts to restore the connection using a 3G
mobile network link on the USB interface. If Failover to Secondary Enable is not
enabled, the secondary connection is disabled.
STEP 4 Click the Recovery back to Primary Enable radio button to enable the device to
automatically revert to the primary connection and drop the secondary
connection. The WAN > Mobile Network Connect Mode must be set to Auto to
revert to a primary connection automatically.
STEP 5 In the Failover Check Interval field, enter the time (in seconds) after which the
device must attempt to detect the presence of traffic on the secondary
connection.