background image

26

Chapter 5: Configuring the Wireless-B Broadband Router
The Administration Tab - Log

Wireless-B Broadband Router

To back up or restore a configuration, click the 

Backup and Restore

 button and the screen in Figure 5-29 will 

appear. 

To back up a configuration, click the 

Backup

 button. To restore a configuration, click the 

Browse

 button to find 

the file, then click the 

Restore

 button.

Change these settings as described here and click the 

Save Settings 

button to apply your changes or 

Cancel 

Changes

to cancel your changes. 

The Administration Tab - Log

The Router can keep logs of all traffic for your Internet connection. To disable the Log function, select 

No

. To 

monitor traffic between the network and the Internet, select 

Yes

. When you wish to view the logs, click 

Incoming Log

 or 

Outgoing Log

, depending on which you wish to view.

Logviewer IP Address. Logviewer IP Address uses a logviewer program installed in a PC. Enter the IP Address of 
the PC running the logviewer. The logviewer program is included on the Setup CD-ROM.

Change these settings as described here and click the 

Save Settings 

button to apply your changes or 

Cancel 

Changes

to cancel your changes. 

Figure 5-30: Administration Tab - Log

Figure 5-31: Log Table

Figure 5-29: Backup & Restore

Summary of Contents for BEFW11S4

Page 1: ...A Division of Cisco Systems Inc Model No Broadband Router Wireless B BEFW11S4 User Guide WIRELESS GHz 2 4802 11b ...

Page 2: ...ructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one of the following measures Reorient o...

Page 3: ...ion to these symbols there are definitions for technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents This exclamation point means there is a caution or warning and is something that could damag...

Page 4: ...Tab MAC Address Clone 14 The Setup Tab Advanced Routing 15 The Wireless Tab Basic Wireless Settings 16 The Wireless Tab Wireless Security 17 The Wireless Tab Wireless Network Access 19 The Wireless Tab Advanced Wireless Settings 20 The Security Tab VPN Passthrough 22 The Applications and Gaming Tab Port Range Forwarding 23 The Applications and Gaming Tab Port Triggering 24 The Applications and Gam...

Page 5: ...etworks 45 Appendix C Upgrading Firmware 48 Appendix D Windows Help 49 Appendix E Finding the MAC Address and IP Address for Your Ethernet Adapter 50 Windows 98 or Me Instructions 50 Windows 2000 or XP Instructions 50 For the Router s Web based Utility 51 Appendix F Glossary 52 Appendix G Specifications 58 Appendix H Warranty Information 59 Appendix I Regulatory Information 60 Appendix J Contact I...

Page 6: ...ection Type 12 Figure 5 9 Optional Settings 12 Figure 5 10 Setup Tab MAC Address Clone 14 Figure 5 11 Setup Tab Advanced Routing 15 Figure 5 12 Setup Tab Routing Table 15 Figure 5 13 Wireless Tab Basic Wireless Settings 16 Figure 5 14 WPA Pre Shared Key 17 Figure 5 15 WPA Radius 17 Figure 5 16 Wireless Tab Radius 17 Figure 5 17 Wireless Tab WEP 18 Figure 5 18 Wireless Tab Wireless Network Access 1...

Page 7: ... 26 Figure 5 31 Log Table 26 Figure 5 32 Administration Tab Firmware Upgrade 27 Figure 5 33 Administration Tab Factory Defaults 28 Figure 5 34 Status Tab Router 29 Figure 5 35 Status Tab Local Network 30 Figure 5 36 Status Tab DHCP Active IP Table 30 Figure C 1 Upgrade Firmware 48 Figure E 1 IP Configuration Screen 50 Figure E 2 MAC Address Adapter Address 50 Figure E 3 MAC Address Physical Addres...

Page 8: ... computers can share all kinds of files music digital pictures and documents Keep all your digital music on one computer and listen to it anywhere in the house Organize all of your family s digital pictures in one place to simplify finding the ones you want and easing backup to CD R Play head to head computer games within the household or against Internet opponents Utilize extra free space on one ...

Page 9: ...Wireless B Broadband Router Appendix A Troubleshooting This appendix describes some problems and solutions as well as frequently asked questions regarding installation and use of the Wireless B Broadband Router Appendix B Wireless Security This appendix explains the risks of wireless networking and some solutions to reduce the risks Appendix C Upgrading Firmware This appendix instructs you on how ...

Page 10: ... for the Router Appendix H Warranty Information This appendix supplies the warranty information for the Router Appendix I Regulatory Information This appendix supplies the regulatory information regarding the Router Appendix J Contact Information This appendix provides contact information for a variety of Linksys resources including Technical Support ...

Page 11: ...r PC to a wired LAN and doubles the effective wireless transmission range for two Linksys wireless adapter PCs Since the Wireless B Broadband Router is able to forward data within its BSS the effective transmission range in an infrastructure LAN is doubled Roaming Infrastructure mode also supports roaming capabilities for mobile users More than one BSS can be configured as an Extended Service Set ...

Page 12: ...joy USB connectivity The Router will also communicate with the wireless PrintServer WPS11 and bridges WET11 When you wish to connect your wired network with your wireless network the Wireless B Broadband Router s LAN port can be connected to any of Linksys s switches such as the EZXS55W or EZXS88W With these and many other Linksys products your networking options are limitless Go to the Linksys we...

Page 13: ...restore the defaults from the Password tab in the Web based Utility Internet The Internet port is where you will connect your broadband Internet connection 1 2 3 4 These ports 1 2 3 4 connect the Broadband Router to your networked PCs and other Ethernet network devices Power The Power port is where you will connect the power adapter Important Resetting the Broadband Router will erase all of your s...

Page 14: ...e diagnosis is complete Wireless B Green The Wireless B LED lights up when there is a wireless connection If the LED is blinking the Broadband Router is actively sending or receiving data over the network 1 2 3 4 Green These numbered LEDs corresponding with the numbered ports on the Broadband Router s back panel serve two purposes If the LED is lit up solid the Broadband Router is connected to a d...

Page 15: ...n connect the other end of the Ethernet cable to your Cable or DSL Broadband modem See Figure 4 1 4 Connect your network PCs or Ethernet devices to one of the Broadband Router s numbered ports with a standard Ethernet network cable See Figure 4 2 5 Connect the AC Power Adapter to the Broadband Router s Power Socket and the other end into an electrical outlet Only use the power adapter supplied wit...

Page 16: ...he Password from its default There are six main tabs Setup Wireless Security Applications Gaming Administration and Status Additional tabs will be available after you click one of the main tabs To access the web based utility launch Internet Explorer or Netscape Navigator and enter the Router s default IP address 192 168 1 1 in the Address field Then press Enter A password request page shown in Fi...

Page 17: ...ovide you with the IP Address you need to specify here Subnet Mask This is the Router s Subnet Mask as seen by users on the Internet including your ISP Your ISP will provide you with the Subnet Mask Default Gateway Your ISP will provide you with the Default Gateway Address which is the ISP server s IP address Static DNS 1 3 Your ISP will provide you with at least one DNS Domain Name System Server ...

Page 18: ...ress User Name and Password Enter the User Name and Password provided by your ISP Connect on Demand Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time Max Idle Time If your Internet connection has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as so...

Page 19: ... performed through the Wireless tab Router IP This presents both the Router s IP Address and Subnet Mask as seen by your network Network Address Server Settings DHCP The settings allow you to configure the Router s Dynamic Host Configuration Protocol DHCP server function The Router can be used as a DHCP server for your network A DHCP server automatically assigns an IP address to each computer on y...

Page 20: ...annot be greater than 253 In order to determine the DHCP IP Address range add the starting IP address e g 100 to the number of DHCP users By default as shown in Figure 6 9 add 100 to 50 and the range is 192 168 1 100 to 192 168 1 149 DHCP Address Range The range of DHCP addresses is displayed here Client Lease Time The Client Lease Time is the amount of time a network user will be allowed connecti...

Page 21: ...s with your ISP you may assign the MAC address you have currently registered with your ISP to the Router with the MAC Address Clone feature See Figure 5 10 MAC Clone Service To have the MAC Address cloned select Enable from the drop down menu otherwise leave it on the default Disable MAC Address Enter the MAC Address registered with your ISP here Click the Clone button to clone the MAC address Cha...

Page 22: ...RIP messages select None Receive RIP Version To receive RIP messages select the protocol you want RIP1 or RIP2 If you don t want to receive RIP messages select None Static Routing To set up a static route between the Router and another network select a number from the Select Entry drop down list A static route is a pre determined pathway that network information must travel to reach a specific hos...

Page 23: ...wireless network It is case sensitive and must not exceed 32 characters use any of the characters on the keyboard Make sure this setting is the same for all points in your wireless network For added security you should change the default SSID linksys to a unique name Wireless Channel Select the appropriate channel from the list provided to correspond with your network settings All devices in your ...

Page 24: ...DIUS server s IP Address and port number along with a key shared between the Router and the server Then select a level of WEP encryption and either generate a WEP key through the Passphrase or select a WEP key and a enter the WEP key manually WEP Encryption Level An acronym for Wired Equivalent Privacy WEP is an encryption method used to protect your wireless data communications WEP uses 64 bit or...

Page 25: ...yption they may decrease network performance To enable WEP select 64 bits 10 hex digits see Figure 5 17 or 128 bits 26 hex digits To disable WEP encryption keep the default setting No Encryption Passphrase Instead of manually entering WEP keys you can enter a passphrase This passphrase is used to generate one or more WEP keys It is case sensitive and should not be longer than 16 alphanumeric chara...

Page 26: ...ess network To restrict access to the network select Restrict Access Click the Wireless Client MAC Address button and the screen in Figure 5 19 will appear Select the MAC Address from the list and click the Select box then click the Select button Click the Refresh button if you want to refresh the screen Click the Close button to return to the previous screen When finished making your changes on t...

Page 27: ... Network Card High network traffic areas should use the shorter preamble type Select the appropriate preamble type Long Preamble default or Short Preamble Authentication Type The default is set to Auto default which allows either Open System or Shared Key authentication to be used With Open System authentication the sender and the recipient do NOT use a WEP key for authentication With Shared Key a...

Page 28: ...nce if you wish to filter the PC with the IP address of 192 168 1 5 enter 5 into both fields on one line 192 168 1 5 192 168 1 5 Filter Port Range To filter users by network port number select a protocol then enter a network port number or a range of network ports Enter the port numbers you want to filter in the port numbers fields Users connected to the Router will no longer be able to access any...

Page 29: ...ement secure exchange of packets at the IP layer To allow IPSec tunnels to pass through the Router click the radio button beside Enabled IPSec Passthrough is enabled by default Click Disabled to disable the function PPPoE Passthrough Point to Point Protocol over Ethernet allows your PC s to use the PPPoE client software provided by your ISP Some ISPs may request that you use this feature To allow ...

Page 30: ...the information on each line for the criteria required Descriptions of each criteria are described here Application In this field enter the name you wish to give the application Each name can be up to 12 characters Start End This is the port range Enter the number that starts the port range under Start and the number that ends the range under End Protocol Enter the protocol used for this applicati...

Page 31: ...hanges or click the Cancel Changes button to undo your changes The Applications and Gaming Tab UPnP Forwarding UPnP Forwarding The UPnP Forwarding screen provides options for customization of port services for common applications See Figure 5 26 When users send this type of request to your network via the Internet the Gateway will forward those requests to the appropriate computer Any computer who...

Page 32: ... the network s administrator to manage specific Router functions for access and security Local Router Access You can change the Router s password from here Enter a new Router password and then type it again in the Re enter to confirm field to confirm Remote Router Access This feature allows you to access the Router from a remote location via the Internet Remote Upgrade allows you to upgrade your f...

Page 33: ...The Administration Tab Log The Router can keep logs of all traffic for your Internet connection To disable the Log function select No To monitor traffic between the network and the Internet select Yes When you wish to view the logs click Incoming Log or Outgoing Log depending on which you wish to view Logviewer IP Address Logviewer IP Address uses a logviewer program installed in a PC Enter the IP...

Page 34: ...m the Management screen of the Administration tab To upgrade your firmware Download the firmware from Linksys s website at www linksys com Enter the location of the firmware s file or click the Browse button to find the file Then click the Upgrade button to upgrade the firmware For more information about upgrading firmware refer to Appendix C Upgrading Firmware Figure 5 32 Administration Tab Firmw...

Page 35: ...ettings button Any settings you have saved will be lost when the default settings are restored This feature is disabled by default Click the Cancel Changes button to cancel your changes Figure 5 33 Administration Tab Factory Defaults IMPORTANT Restoring the Router s factory default settings will erase all of your settings WEP Encryption Wireless and LAN settings etc and replace them with the facto...

Page 36: ...on Internet IP Address The Router s Internet IP Address is displayed here Subnet Mask and Default Gateway The Router s Subnet Mask and Default Gateway address are displayed here for DHCP and static IP connections Primary DNS and Secondary DNS Shown here are the DNS Domain Name System IP addresses currently used by the Router DHCP Release Available for a DHCP connection click the DHCP Release butto...

Page 37: ...it appears on your local Ethernet network Subnet Mask When the Router is using a Subnet Mask it is shown here DHCP Server If you are using the Router as a DHCP server that will be displayed here DHCP Client Table Clicking this button will open a screen to show you which PCs are utilizing the Router as a DHCP server You can delete PCs from that list and sever their connections by checking a Delete ...

Page 38: ...n the network connected to the Router Make sure that each IP address is unique for each PC or network device 4 Click the Gateway tab and in the New Gateway prompt enter 192 168 1 1 which is the default IP address of the Router Click the Add button to accept the entry 5 Click the DNS tab and make sure the DNS Enabled option is selected Enter the Host and Domain names e g John for Host and home for ...

Page 39: ...hat is not used by any other computer on the network connected to the Router 6 Enter the Subnet Mask 255 255 255 0 7 Enter the Default Gateway 192 168 1 1 Router s default IP address 8 Toward the bottom of the window select Use the following DNS server addresses and enter the Preferred DNS server and Alternative DNS server provided by your ISP Contact your ISP or go on its website to find the info...

Page 40: ... for Your Ethernet Adapter If you need to clone the MAC address of your Ethernet adapter onto the Router see the System section of Chapter 5 Configuring the Wireless B Broadband Router for details 2 Make sure you are using the right Internet connection settings Contact your ISP to see if your Internet connection type is DHCP Static IP Address or PPPoE commonly used by DSL consumers Please refer to...

Page 41: ...ould enter 100 in the field provided Check Appendix E Finding the MAC Address and IP Address for Your Ethernet Adapter for details on getting an IP address 6 Check the Enable option for the port services you want to use Consider the example below Customized External Port TCP UDP IP Address Enable Application Web server 80 to 80 X X 192 168 1 100 X FTP server 21 to 21 X 192 168 1 101 X SMTP outgoin...

Page 42: ...the Internet using DeMilitarized Zone DMZ hosting This option is available when an application requires too many ports or when you are not sure which port services to use Make sure you disable all the forwarding entries if you want to successfully use DMZ hosting since forwarding has priority over DMZ hosting In other words data that enters the Router will be checked first by the forwarding settin...

Page 43: ...Double click Internet Options 2 Click the Connections tab 3 Click the LAN settings button and remove anything that is checked 4 Click the OK button to go back to the previous screen 5 Click the option Never dial a connection This will remove any dial up pop ups for PPPoE users For Netscape 4 7 or higher 1 Start Netscape Navigator and click Edit Preferences Advanced and Proxies 2 Make sure you have...

Page 44: ... the Router 2 Enter the password if asked The default password is admin 3 On the Setup screen select the option Keep Alive and set the Redial Period option at 20 seconds 4 Click the Save Settings button 5 Click the Status tab and click the Connect button 6 You may see the login status display as Connecting Press the F5 key to refresh the screen until you see the login status display as Connected C...

Page 45: ...is working correctly You can remove the Router to verify a direct connection Manually configure the TCP IP settings with a DNS address provided by your ISP Make sure that your browser is set to connect directly and that any dial up is disabled For Internet Explorer click Tools Internet Options and then the Connection tab Make sure that Internet Explorer is set to Never dial a connection For Netsca...

Page 46: ...wing fix click ICQ menu preference connections tab and check I am behind a firewall or proxy Then set the firewall time out to 80 seconds in the firewall setting The Internet user can then send a file to a user behind the Router I set up an Unreal Tournament Server but others on the LAN cannot join What do I need to do If you have a dedicated Unreal Tournament server running you need to create a s...

Page 47: ...ware upgrades All Linksys firmware upgrades are posted on the Linksys website at www linksys com where they can be downloaded for free To upgrade the Router s firmware use the System tab of the Router s web based utility If the Router s Internet connection is working well there is no need to download a newer firmware version unless that version contains new features that you would like to use Down...

Page 48: ...s What are the advanced features of the Router The Router s advanced features include Advanced Wireless settings Filters Port Forwarding Routing and DDNS How do I get mIRC to work with the Router Under the Port Forwarding tab set port forwarding to 113 for the PC on which you are using mIRC Can the Router act as my DHCP server Yes The Router has DHCP server software built in Can I run an applicati...

Page 49: ...y transmitting data Achieving these functions simultaneously requires a dynamic RF networking technology that links access points and nodes In such a system the user s end node undertakes a search for the best possible access to the system First it evaluates such factors as signal strength and quality as well as the message load currently being carried by each access point and the distance of each...

Page 50: ...d a chip or chipping code The longer the chip the greater the probability that the original data can be recovered Even if one or more bits in the chip are damaged during transmission statistical techniques embedded in the radio can recover the original data without the need for retransmission To an unintended receiver DSSS appears as low power wideband noise and is rejected ignored by most narrowb...

Page 51: ...t away in small increments to determine the maximum range in your environment You may also try using different channels as this may eliminate interference affecting only one channel I have excellent signal strength but I cannot see my network WEP is probably enabled on the Router but not on your wireless adapter or vice versa Verify that the same WEP keys and levels 64 or 128 are being used on all...

Page 52: ...eriodically For information on implementing these security features refer to Chapter 5 Configuring the Wireless B Broadband Router Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking products first listen for beacon messages These messages can be easily decrypted and contain much of the network s inf...

Page 53: ...esses This makes it harder for a hacker to access your network with a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can only provide enough security to make a hacker s job more difficult There are several ways that WEP can be maximized 1 Use the highest level of encryptio...

Page 54: ...ey shared between the Router and the server Last enter a Group Key Renewal period which instructs the Router how often it should change the encryption keys RADIUS WEP used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router First enter the RADIUS server s IP Address and port number along with a key shared between the Router and the server T...

Page 55: ...ctions 1 Download the firmware from Linksys s website at www linksys com 2 Go to the Firmware Upgrade screen from the Web Utility s Administration tab and the Upgrade Firmware screen shown in Figure C 1 will appear 3 Enter the location of the firmware s file or click the Browse button to find the file 4 Then click the Upgrade button to upgrade the firmware Figure C 1 Upgrade Firmware ...

Page 56: ...col all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing shared resources Net...

Page 57: ...e OK button 2 When the IP Configuration screen appears select the Ethernet adapter you have connected to the Router via a CAT 5 Ethernet network cable See Figure E 1 3 Write down the Adapter Address as shown on your computer screen see Figure E 2 This is the MAC address for your Ethernet adapter and is shown as a series of numbers and letters The MAC address Adapter Address is what you will use fo...

Page 58: ...igure E 3 shows the Ethernet adapter s IP address as 192 168 1 100 Your computer may show something different For the Router s Web based Utility The MAC Address Clone screen is located on the Setup tab MAC Clone Service To enable the function so you can clone a MAC address select Enable from the drop down list For MAC address cloning enter the 12 digit MAC address in the MAC Address fields provide...

Page 59: ... Adapter This is a device that adds network functionality to your PC Ad hoc A group of wireless devices communicating directly with each other peer to peer without the use of an access point Backbone The part of a network that connects most of the systems and networks together and handles the most data Bandwidth The transmission capacity of a given device or network Beacon Interval The frequency i...

Page 60: ... domain name Default Gateway A device that forwards Internet traffic from your local area network DHCP Dynamic Host Configuration Protocol A protocol that lets one device on a local network known as a DHCP server assign temporary IP addresses to the other network devices typically computers DMZ Demilitarized Zone Removes the Router s firewall protection from one PC allowing it to be seen from the ...

Page 61: ...P File Transfer Protocol A standard protocol for sending files between computers over a TCP IP network and the Internet Full Duplex The ability of a networking device to receive and transmit data simultaneously Gateway A system that interconnects networks Half Duplex Data transmission that can occur in two directions over a single line but only one direction at a time Hardware The physical aspect ...

Page 62: ... computers or devices connected for the purpose of data sharing storage and or transmission between users NNTP Network News Transfer Protocol The protocol used to connect to Usenet groups on the Internet Node A network junction or connection point typically a computer or work station OFDM Orthogonal Frequency Division Multiplexing A type of modulation technology that separates the data stream into...

Page 63: ...a CTS Clear To Send message before sending data Server Any computer whose function in a network is to provide user access to files printing communications and other services SMTP Simple Mail Transfer Protocol The standard e mail protocol on the Internet SNMP Simple Network Management Protocol A widely used network monitoring and control protocol Software Instructions for the computer A series of i...

Page 64: ...etwork protocol for transmitting data that does not require acknowledgement from the recipient of the data that is sent Upgrade To replace existing software or firmware with a newer version Upload To transmit a file over a network URL Uniform Resource Locator The address of a file located on the Internet VPN Virtual Private Network A security measure to protect data as it leaves one network and go...

Page 65: ...ion Four 10 100 RJ 45 Switched ports Speed 10 100Mbps Half Duplex 20 200 Full Duplex Cabling Type UTP Category 5 or better LEDs Power Internet Ethernet Wireless B Warranty 1 Year Limited Dimensions 7 31 x 6 16 x 1 88 186 mm x 154 mm x 48 mm Unit Weight 16 oz 0 45 kg Power External 12V DC 1A Certifications FCC CE WiFi UPnP Operating Temp 0ºC to 40ºC 32ºF to 104ºF Storage Temp 20ºC to 70ºC 4ºF to 15...

Page 66: ...NS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except by Linksys ...

Page 67: ... the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult a dealer or an experienced radio TV technician for assistance FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 20cm between the...

Page 68: ...äiden direktiivien muiden ehtojen mukainen Linksys Group déclare le Routeur d accès sans fil B est conforme aux conditions essentielles et aux dispositions relatives à la directive 1999 5 EC Belgique Dans le cas d une utilisation privée à l extérieur d un bâtiment au dessus d un espace public aucun enregistrement n est nécessaire pour une distance de moins de 300m Pour une distance supérieure à 30...

Page 69: ...rking with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 261 8868 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorization department f...

Reviews: