background image

57

Appendix A: Troubleshooting
Frequently Asked Questions

EtherFast Cable/DSL VPN Router with 4-Port 10/100 Switch

I am not able to access the Router’s Web-based Utility.  What can I do?

You may have to remove the proxy settings on your Internet browser, e.g., Netscape Navigator or Internet 
Explorer.  Or remove the dial-up settings on your browser.  Check with your browser documentation, and make 
sure that your browser is set to connect directly and that any dial-up is disabled. Make sure that your browser is 
set to connect directly and that any dial-up is disabled. For Internet Explorer, click 

Tools

Internet Options

, and 

then the 

Connection

 tab. Make sure that Internet Explorer is set to 

Never dial a connection

. For Netscape 

Navigator, click 

Edit

Preferences

Advanced

, and 

Proxy

. Make sure that Netscape Navigator is set to

 Direct 

connection to the Internet

.

What is DMZ Hosting?

Demilitarized Zone (DMZ) allows one IP address (computer) to be exposed to the Internet.  Some applications 
require multiple TCP/IP ports to be open.  You should set your computer with a static IP if you want to use DMZ 
Hosting. To get the network adapter’s IP address, see “Appendix C: Finding the MAC Address and IP Address for 
Your Ethernet Adapter.”

If DMZ Hosting is used, does the exposed user share the public IP with the Router?

No.

Does the Router pass PPTP packets or actively route PPTP sessions?

The Router allows PPTP packets to pass through.

Is the Router cross-platform compatible?

Any platform that supports Ethernet and TCP/IP is compatible with the Router.

How many ports can be simultaneously forwarded?

Theoretically, the Router can establish 520 sessions at the same time, but you can only forward 10 ranges of 
ports.

Does the Router replace a modem? Is there a cable or DSL modem in the Router?

No, this version of the Router must work in conjunction with a cable or DSL modem.

Which modems are compatible with the Router?

The Router is compatible with virtually any cable or DSL modem that supports Ethernet.

Summary of Contents for Linksys BEFVP41 v2

Page 1: ...A Division of Cisco Systems Inc Model No WIRED with 4 Port 10 100 Switch Cable DSL VPN Router BEFVP41 v2 User Guide EtherFast ...

Page 2: ... technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents This exclamation point means there is a Caution or Warning and is something that could damage your property or the Router word definition ...

Page 3: ...w the Router 7 The Back Panel 7 The Front Panel 8 Chapter 4 Connecting the Router 9 Overview 9 Connection Instructions 10 Chapter 5 Configuring the Router 11 Obtain an IP Automatically DHCP 13 Static IP 13 PPPoE 14 RAS 14 PPTP 14 Heart Beat Signal 15 Chapter 6 Using The Router s Web based Utility 16 Overview 16 Navigating the Utility 16 Accessing the Utility 18 The Setup tab 18 The Security tab 28...

Page 4: ...ss for Your Ethernet Adapter 60 Windows 98 or Me Instructions 60 Windows 2000 or XP Instructions 60 For the Router s Web based Utility 61 Appendix D Windows Help 62 Appendix E Maximizing VPN Security 63 Appendix F Creating a VPN Tunnel between two VPN Routers 65 Appendix G SNMP Functions 66 Appendix H Glossary 67 Appendix I Specifications 71 Appendix J Warranty Information 73 Appendix K Regulatory...

Page 5: ...Basic DHCP Setup 13 Figure 5 4 Basic Static IP Setup 13 Figure 5 5 Basic PPPoE Setup 14 Figure 5 6 The Registration URL 15 Figure 6 1 The Router s IP Address 18 Figure 6 2 Router Login 18 Figure 6 3 Setup tab Basic Setup 18 Figure 6 4 DHCP Connection type 19 Figure 6 5 Static IP Connection type 19 Figure 6 6 PPPoE Connection type 20 Figure 6 7 RAS Connection type 21 Figure 6 8 PPTP Connection type...

Page 6: ...b UPnP Forwarding 36 Figure 6 25 Applications Gaming tab DMZ 38 Figure 6 26 Administration tab Management 39 Figure 6 27 Administration tab Log 40 Figure 6 28 Administration tab Diagnostics 41 Figure 6 29 Administration tab Factory Defaults 42 Figure 6 30 Administration tab Firmware Upgrade 42 Figure 6 31 Status tab Gateway 43 Figure 6 32 Status tab Local Network 44 Figure 6 33 DHCP Active IP Tabl...

Page 7: ...100 Switch The four ports in the back of the Router are all auto detecting meaning that the Router can tell if you re connecting a straight through or cross over cable making this easier to use than ever Finally adding VPN network security to the Router allows you to secure data not just behind the Router but as it is transmitted over the Internet VPNs or Virtual Private Networks create virtual tu...

Page 8: ...ing the Router s Web based Utility This chapter describes the Web based Utility and the features available so you can use and alter advanced configuration settings Appendix A Troubleshooting This appendix describes some possible problems and solutions as well as frequently asked questions regarding installation and use of the Router Appendix B Upgrading Firmware This appendix explains how you can ...

Page 9: ...endix gives a brief glossary of terms frequently used in networking Appendix I Specifications This appendix provides the technical specifications for the Router Appendix J Warranty Information This appendix supplies the warranty information for the Router Appendix K Regulatory Information This appendix supplies the regulatory information regarding the Router Appendix L Contact Information This app...

Page 10: ...the Internet the firewall will no longer protect that data At this point your data becomes open to hackers using a variety of methods to steal not only the data you are transmitting but also your network login and security data Some of the most common methods are as follows 1 MAC Address Spoofing Packets transmitted over a network either your local network or the Internet are preceded by a packet ...

Page 11: ...t between the two networks VPN was created as a cost effective alternative to using a private dedicated leased line for a private network Using industry standard encryption and authentication techniques IPSec short for IP Security the VPN creates a secure connection that in effect operates as if you were directly connected to your local network Virtual Private Networking can be used to create secu...

Page 12: ...xample of a computer to VPN Router VPN In her hotel room a traveling businesswoman dials up her ISP Her notebook computer has VPN client software that is configured with her office s VPN settings She accesses the VPN client software that supports IPSec and connects to the VPN Router at the central office As VPNs utilize the Internet distance is not a factor Using the VPN the businesswoman now has ...

Page 13: ... ways If the Router is having problems connecting to the Internet press the Reset button for just a second with a paper clip or a pencil tip This is similar to pressing the Reset button on your PC to reboot it If you are experiencing extreme problems with the Router and have tried all other troubleshooting measures press and hold in the Reset button for 30 seconds This will restore the factory def...

Page 14: ...ed on If the LED is flashing the Router is running a diagnostic test Ethernet Green The Ethernet LED serves two purposes If the LED is continuously lit the Router is connected to a device through the corresponding port 1 2 3 or 4 If the LED is flashing the Router is actively sending or receiving data over that port Internet Green The Internet LED lights up when the Router is connected to your cabl...

Page 15: ... your PCs Configure the Router with the setting s provided by your Internet Service Provider ISP The installation technician from your ISP should have left the setup information with you after installing your broadband connection If not you can call your ISP to request the information Once you have the setup information for your specific type of Internet connection then you can begin installation ...

Page 16: ...ernet port on a network device e g a PC print server hub or switch Repeat this step to connect more PCs or other network devices to the Router 3 Connect your cable or DSL modem s Ethernet cable to the Router s Internet port 4 Power on the cable or DSL modem 5 Connect the included power adapter to the Router s Power port and then plug the power adapter into an electrical outlet The Power LED on the...

Page 17: ...ing properly the network cable is connected and the Router s LED is lit up for the port where you re connected Figure 5 2 Router Login screen Figure 5 1 Router s IP Address for Basic Setup Note The directions included in this Chapter are meant for quick configuration of the Router and do not include all you need to know to use all of the Router s functions Complete directions on all of the Router ...

Page 18: ...iffer depending on what kind of connection type you select Proceed to the instructions for the connection type you are using When you are finished with the Setup tab proceed to step 5 IMPORTANT If you have previously enabled an Internet Sharing Proxy Service on any of your PCs you must disable it now If you are running Netscape Navigator click Edit Preference Advanced Proxies Direct Connection to ...

Page 19: ...he setting and start over When you are finished then proceed to step 5 Static IP If your ISP says that you are connecting through a static or fixed IP address from your ISP perform these steps A Select Static IP as the Connection Type B Enter the IP Address C Enter the Subnet Mask D Enter the Gateway Address E Enter the DNS in the 1 2 and or 3 fields You need to enter at least one DNS address F Cl...

Page 20: ... the settings or click the Cancel Changes button to clear the settings and start over F When you are finished click the Status tab and then click the Connect button to start the connection Proceed to step 5 RAS RAS is a service used in Singapore only If you are using a RAS connection check with your ISP for the necessary setup information When you are finished with the Setup tab proceed to step 5 ...

Page 21: ...ne so click the Apply button and then the Continue button to save your Setup settings Close the web browser 6 Reset the power on your cable or DSL modem 7 Restart your computers so that they can obtain the Router s new settings If you need advanced setting information please refer to Chapter 6 Using the Router s Web based Utility or the Linksys support website at support linksys com Congratulation...

Page 22: ...ssword is admin To secure the Router change the Password from its default Navigating the Utility There are six main tabs Setup Security Access Restrictions Applications Gaming Administration and Status Additional screens will be available from the main tabs Setup Basic Setup Enter the Internet connection and network settings on this screen DDNS To enable the Router s Dynamic Domain Name System DDN...

Page 23: ...ding Use this screen to alter UPnP forwarding settings DMZ To allow one local user to be exposed to the Internet for use of special purpose services use this screen Administration Management On this screen alter the Router s password access privileges and UPnP settings Log You can view or save even email activity logs from this screen Diagnostics From this screen you can test network performance a...

Page 24: ... and Password Leave the User name field blank and enter admin in the Password field Then click the OK button When finished making your changes on a screen click the Save Settings button to save the changes or click the Cancel Changes button to undo your changes The Setup tab The Setup tab is the first tab you see when you access the Web based Utility This tab is divided into four screens Basic Set...

Page 25: ...on Select Manual if you do not want the Router to regulate this packet size otherwise leave it set at Automatic and enter the value desired You should leave this value in the 1200 to 1500 range Most DSL users should use the default of 1400 Connection Type Static IP If you are required to use a permanent IP address then select Static IP This information can be obtained from your ISP IP Address This...

Page 26: ...th your ISP after a specified period of time Max Idle Time If you have been disconnected due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again If you wish to activate Connect on Demand click the radio button If you want your Internet connection to remain on at all times enter 0 in the Max Idle Time f...

Page 27: ...o button If you want your Internet connection to remain on at all times enter 0 in the Max Idle Time field Otherwise enter the number of minutes you want to have elapsed before your Internet access disconnects Keep Alive Option and Redial Period This option keeps your RAS enabled Internet access connected indefinitely even when it sits idle To use this option click the radio button next to Keep Al...

Page 28: ...lly re establish your connection as soon as you attempt to access the Internet again If you wish to activate Connect on Demand click the radio button If you want your Internet connection to remain on at all times enter 0 in the Max Idle Time field Otherwise enter the number of minutes you want to have elapsed before your Internet access disconnects Keep Alive Option and Redial Period This option k...

Page 29: ...n If you want your Internet connection to remain on at all times enter 0 in the Max Idle Time field Otherwise enter the number of minutes you want to have elapsed before your Internet access disconnects Keep Alive Option and Redial Period This option keeps your PPPoE enabled Internet access connected indefinitely even when it sits idle To use this option click the radio button next to Keep Alive T...

Page 30: ...addresses This value must be 192 168 1 2 or greater because the default IP address for the Router is 192 168 1 1 Number of Address Optional Enter the maximum number of PCs that you want the DHCP server to assign IP addresses to This number cannot be greater than 253 In order to determine the DHCP IP Address range add the starting IP address e g 100 to the number of DHCP users By default add 100 to...

Page 31: ...l Changes button to undo your changes MAC Address Clone The Router s MAC address is a 12 digit code assigned to a unique piece of hardware for identification like a social security number If your ISP requires MAC address registration find your adapter s MAC address by following the instructions in Appendix C Finding the MAC Address and IP Address for Your Ethernet Adapter MAC Clone Service To use ...

Page 32: ... the protocol you want RIP1 or RIP2 Static Routing If the Router is connected to more than one network it may be necessary to set up a static route between them A static route is a pre determined pathway that network information must travel to reach a specific host or network To create a static route alter the following settings Select Entry Select the number of the static route from the drop down...

Page 33: ...te network or host Hop Count This determines the maximum number of steps between network nodes that data packets will travel A node is any device on the network such as PCs print servers routers etc Interface Select LAN or Internet depending on the location of the static route s final destination Show Routing Table Click the Show Routing Table button to open a screen displaying how data is routed ...

Page 34: ...equests This keeps your network from being pinged or detected and reinforces your network security by hiding your network ports so it is more difficult for intruders to work their way into your network Click the box beside this option to enable it When finished making your changes on this screen click the Save Settings button to save these changes or click the Cancel Changes button to undo your ch...

Page 35: ... not have to match the name used at the other end of the tunnel Local Secure Group and Remote Secure Group A Local Secure Group is a computer s on your network that can access the tunnel A Remote Secure Group is a computer s on the remote end of the tunnel that can access the tunnel Under Local Secure Group and Remote Secure Group you may choose one of three options Subnet IP Address and IP Range ...

Page 36: ...evice at the other end of the tunnel The remote VPN device can be another VPN Router a VPN Server or a computer with VPN client software that supports IPSec The FQDN is the host name and domain name for a specific computer on the Internet for example vpn myvpnserver com Any If you select Any for the Remote Security Gateway the VPN device at the other end of the tunnel will accept a request from an...

Page 37: ...urself Enter your key into the Encryption KEY field Then enter an Authentication KEY into that field These fields must both match the information that is being entered in the fields at the other end of the tunnel Up to 24 alphanumeric characters are allowed to create the Encryption Key Up to 20 alphanumeric characters are allowed to create the Authentication Key The Inbound SPI and Outbound SPI fi...

Page 38: ...use it is more secure Group There are two Diffie Hellman Groups to choose from 768 bit and 1024 bit Diffie Hellman refers to a cryptographic technique that uses public and private keys for encryption and decryption Key Lifetime In the Key Lifetime field you may optionally select to have the key expire at the end of a time period of your choosing Enter the number of seconds you d like the key to be...

Page 39: ...utton to select which PCs will be affected by the policy You can enter the PC by MAC Address or IP Address You can also enter a range of IP Addresses if you wish this policy to affect a group of PCs After making your changes click the Save Settings button to apply your changes or Cancel Changes to cancel your changes Days Times When will this policy be in effect On every day At certain times Selec...

Page 40: ...rver using Port Range Forwarding complete the following fields Application Enter the name of the application Start and End Enter the number or range of external port s used by the server or Internet application Check with the Internet application software documentation for more information Protocol Select the protocol TCP or UDP or select Both IP Address Enter the IP address of the server that you...

Page 41: ...ange For each application list the triggered port number range Check with the Internet application documentation for the port number s needed Start Port Enter the starting port number of the Triggered Range End Port Enter the ending port number of the Triggered Range Forwarded Range For each application list the forwarded port number range Check with the Internet application documentation for the ...

Page 42: ... TFTP Trivial File Transfer Protocol A version of the TCP IP FTP protocol that has no directory or password capability Finger A UNIX command widely used on the Internet to find out information about a particular user such as a telephone number whether the user is currently logged on and the last time the user was logged on The person being fingered must have placed his or her profile on the system...

Page 43: ...the server in the Ext Port column Check with the Internet application documentation for more information TCP or UDP Select the protocol UDP or TCP for each application You cannot select both protocols Int Port Enter the number of the internal port used by the server in the Int Port column Check with the Internet application software documentation for more information IP Address Enter the IP addres...

Page 44: ...To use this feature select Enable To disable DMZ hosting select Disable DMZ Host IP Address To expose one PC enter the computer s IP address To get the IP address of a computer refer to Appendix C Finding the MAC Address and IP Address for Your Ethernet Adapter Deactivate DMZ by entering a 0 in the field When finished making your changes on this tab click the Save Settings button to save these cha...

Page 45: ...eway Access This feature allows you to access the Router from a remote location via the Internet Remote Administration This feature allows you to manage the Router from a remote location via the Internet To enable Remote Administration click the Enabled radio button Administration Port Enter the port number you will use to remotely access the Router SNMP The Router supports Simple Network Manageme...

Page 46: ...ll mail server name e g mail domain com of your mail server Email address for alert logs This is the email address where you would like the email alerts sent Return email address Your mail server may require a return email address Enter that here If you re unsure as to what address to enter enter the same email address for Email address for alert logs Log To access activity logs select the Yes rad...

Page 47: ...een 1 and 4 and should be entered here Ping Interval How long in milliseconds would you like the Router to wait between pings This number can be between 0 and 9999 milliseconds Ping Timeout How long should the Router wait before it times out after an unsuccessful test An unsuccessful test is determined when a location does not respond to a ping This number can be between 0 and 9999 milliseconds St...

Page 48: ... Before upgrading the firmware download the Router s firmware upgrade file from the Linksys website www linksys com Then extract the file File Path In the field provided enter the name of the extracted firmware upgrade file or click the Browse button to find this file Upgrade After you have selected the appropriate file click the Upgrade button located at the bottom of the screen and follow the on...

Page 49: ... Address of the Router s Internet interface is displayed here Current Time As selected from the Setup tab this will show the proper time in your time zone Internet Connection PPP Login The status of your Internet connection is displayed here Internet IP Address Lease Your current IP address is shown here Subnet Mask and Default Gateway The Router s Subnet Mask and Default Gateway addresses are dis...

Page 50: ...own here DHCP Server If the Router is being utilized as a DHCP server will be displayed here DHCP Client Table Click the DHCP Clients Table button to view a list of PCs that have been assigned IP addresses by the Router The DHCP Active IP Table screen lists the DHCP Server IP Address Client Hostnames IP Addresses and MAC Addresses To delete a DHCP Client select the box beside their information and...

Page 51: ...Click Start Settings and open the Control Panel Double click Network B In The following network components are installed box select the TCP IP associated with your Ethernet adapter If you only have one Ethernet adapter installed you will only see one TCP IP line with no association to an Ethernet adapter Highlight it and click the Properties button C In the TCP IP properties window select the IP a...

Page 52: ...erties window I Restart the computer if asked The following instructions assume you are running Windows XP with the default interface If you are using the Classic interface where the icons and menus look like previous Windows versions please follow the instructions for Windows 2000 A Click Start and select the Control Panel B Click the Network and Internet Connections icon and then select the Netw...

Page 53: ... you cannot open a webpage try the ping command from a different computer to verify that your original computer is not the cause of the problem If you do NOT get a reply there may be a problem with the connection Try the ping command from a different computer to verify that your original computer is not the cause of the problem 3 I cannot get an Internet connection through the Router A Refer to Pr...

Page 54: ...ange the Router s IP address to another subnet to avoid a conflict between the VPN IP address and your local IP address For example if your VPN server assigns an IP address 192 168 1 X X is a number from 1 to 254 and your network PC s IP address is 192 168 1 X X is the same number used in the VPN IP address the Router will have difficulties routing information to the right location If you change t...

Page 55: ...osting or use other Internet applications If you want to play online games or use Internet applications most will work without doing any port forwarding or DMZ hosting There may be cases when you want to host an online game or Internet application This would require you to set up the Router to deliver incoming packets or data to a specific computer This also applies to the Internet applications yo...

Page 56: ...cessfully use DMZ hosting since forwarding has priority over DMZ hosting In other words data that enters the Router will be checked first by the forwarding settings If the port number that the data enters from does not have port forwarding then the Router will send the data to whichever PC or network device you set for DMZ hosting Follow these steps to set DMZ hosting A Access the Router s Web bas...

Page 57: ...the gateway for the Internet connection the computer does not need any proxy settings to gain access Please follow these directions to verify that you do not have any proxy settings and that the browser you use is set to connect directly to the network For Microsoft Internet Explorer 5 0 or higher A Click Start Settings and Control Panel Double click Internet Options B Click the Connections tab C ...

Page 58: ...ddress settings for the computer you are using IP Address 192 168 1 50 Subnet Mask 255 255 255 0 Gateway 192 168 1 1 C Perform the upgrade using the TFTP program or the Router s Web based Utility through Firmware Upgrade screen of the Administration tab 14 My DSL service s PPPoE is always disconnecting PPPoE is not actually a dedicated or always on connection The DSL ISP can disconnect the service...

Page 59: ... asked The default password is admin C Click the Applications Gaming Port Triggering tab D Enter any name you want to use for the Application Name E Enter the Start and End Ports of the Triggered Port Range Check with your Internet application provider for more information on which outgoing port services it is using 17 When I enter a URL or IP address I get a time out error or am prompted to retry...

Page 60: ... protocol For more information on SNMP see Appendix G SNMP Functions What is the maximum number of IP addresses that the Router will support The Router will support up to 253 IP addresses Does the Router support IPSec Pass Through Yes it is a built in feature that the Router automatically enables Where is the Router installed on the network In a typical environment the Router is installed between ...

Page 61: ...ndows operating systems Does the Router support ICQ send file Yes with the following fix click ICQ menu preference connections tab and check I am behind a firewall or proxy Then set the firewall time out to 80 seconds in the firewall setting The Internet user can then send a file to a user behind the Router I set up an Unreal Tournament Server but others on the network cannot join What do I need t...

Page 62: ...of your Ethernet adapter as a temporary measure Please look at the Network Control Panel in your Ethernet adapter s Advanced Properties tab Make sure that your proxy setting is disabled in the browser Check our website at www linksys com for more information If all else fails in the installation what can I do Reset the Router Reset your cable or DSL modem by powering the unit off and then on Obtai...

Page 63: ...one DMZ allows one IP address computer to be exposed to the Internet Some applications require multiple TCP IP ports to be open You should set your computer with a static IP if you want to use DMZ Hosting To get the network adapter s IP address see Appendix C Finding the MAC Address and IP Address for Your Ethernet Adapter If DMZ Hosting is used does the exposed user share the public IP with the R...

Page 64: ...ions may be possible depending on the specifics of your VPNs How big is the Router s memory buffer It includes a 1MB buffer and 512KB flash How can I check whether I have static or DHCP IP Addresses Consult your ISP to obtain this information How do I get mIRC to work with the Router Under the Port Range Forwarding tab set port forwarding to 113 for the PC on which you are using mIRC If your quest...

Page 65: ...r s firmware follow these instructions 1 Download the Router s firmware upgrade file from the Linksys website www linksys com 2 Extract the file on your computer 3 Click the Administration tab and then the Firmware Upgrade tab of the Router s Web based Utility 4 On the Upgrade Firmware screen enter the location of the extracted firmware upgrade file or click the Browse button to find this file 5 C...

Page 66: ... Run In the Open field enter winipcfg Then press the Enter key or the OK button 2 When the IP Configuration screen appears select the Ethernet adapter you have connected to the Router via a CAT 5 Ethernet network cable 3 Write down the Adapter Address as shown on your computer screen This is the MAC address for your Ethernet adapter and is shown as a series of numbers and letters The MAC address A...

Page 67: ... what you will use for MAC address cloning or MAC filtering The example shows the Ethernet adapter s IP address as 192 168 1 100 Your computer may show something different For the Router s Web based Utility For MAC filtering enter the 12 digit MAC address in this format XXXXXXXXXXXX WITHOUT the hyphens For MAC address cloning enter the 12 digit MAC address in the MAC Address fields provided two di...

Page 68: ...ommunicate over a wired or wireless network Your PCs will not be able to utilize networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folders or files over your network Windows Help provides complete instructions on utilizing shared resources Network Neighborhood My Network Places Other PCs on your ne...

Page 69: ...FS Perfect Forward Secrecy not only are the IP headers encrypted but the secret keys used to secure the tunnel are encrypted as well All of this protection actually comes at a lower cost than most VPN endpoint software packages The VPN Router will allow the users on your network to secure their data over the Internet without having to purchase the extra client licenses that other VPN hardware manu...

Page 70: ... encryption and SHA authentication whenever possible 5 Manage your pre shared keys Change pre shared keys regularly Data transmission over the Internet is a hole in network security that is often overlooked With VPN maximized along with the use of a firewall router and wireless security you can secure your data even when it leaves your network ...

Page 71: ...ocal network s IP Address scheme 8 Select IP Addr from the pull down menu beside Remote Secure Group Then enter the IP Address and Subnet Mask for this group This would be the IP Address scheme for the remote network the network on the other side of the tunnel 9 Select IP Addr from the pull down menu beside Remote Security Gateway This would be the remote endpoint s IP Address as seen from the Int...

Page 72: ... Router to the workstation console used to oversee the network The Router then returns information contained in a MIB Management Information Base which is a data structure that defines what is obtainable from the device and what can be controlled turned off on etc SNMP functions such as statistics configuration and device information are not available without third party Management Software The Ro...

Page 73: ... A device that connects a computer to the cable television network which in turn connects to the Internet DDNS Dynamic Domain Name System Allows the hosting of a website FTP server or e mail server with a fixed domain name e g www xyz com and a dynamic IP address DHCP Dynamic Host Configuration Protocol A networking protocol that allows administrators to assign temporary IP addresses to network co...

Page 74: ...nects networks with different incompatible communications protocols Hardware The physical aspect of computers telecommunications and other information technology devices HTTP HyperText Transport Protocol The communications protocol used to connect to servers on the World Wide Web IEEE The Institute of Electrical and Electronics Engineers An independent institute that develops networking standards ...

Page 75: ...Protocol 3 A standard mail server commonly used on the Internet Port The connection point on a computer or networking device used for plugging in cables or adapters PPPoE Point to Point Protocol over Ethernet A type of broadband connection that provides authentication username and password in addition to data transport PPTP Point to Point Tunneling Protocol A VPN protocol that allows the Point to ...

Page 76: ...unicate over a network Telnet A user command and TCP IP protocol used for accessing remote PCs TFTP Trivial File Transfer Protocol A version of the TCP IP FTP protocol that has no directory or password capability Throughput The amount of data moved successfully from one node to another in a given time period UDP User Datagram Protocol A network protocol for transmitting data that does not require ...

Page 77: ...BaseTX Protocol CSMA CD VPN Encryption DES 56 bit 3DES 168 bit VPN Authentication MD5 SHA Ports Internet One 10Base T RJ 45 Port Local Network Four 10 100 RJ 45 Ports Cabling Type 10BaseT UTP Category 3 or better 100BaseTX UTP Category 5 or better Speed Mbps Internet 10 Local Network 10 100 Half Duplex Mode 20 200 Full Duplex Mode LEDs Power Ethernet 1 4 Internet Topology Star ...

Page 78: ...s 7 31 x 6 06 x 1 88 186 mm x 154 mm x 48 mm Unit Weight 12 8 oz 0 36 kg Power External 5V DC 2 1 A Certifications FCC Class B CE Mark Operating Temp 0ºC to 45ºC 32ºF to 113ºF Storage Temp 20ºC to 70ºC 4ºF to 158ºF Operating Humidity 0 to 90 Non Condensing Storage Humidity 5 to 90 Non Condensing ...

Page 79: ...REPRESENTATIONS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered excep...

Page 80: ...Reorient or relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult a dealer or an experienced radio TV technician for assistance FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed ...

Page 81: ...ions essentielles et aux dispositions relatives à la directive 1999 5 EC Belgique Dans le cas d une utilisation privée à l extérieur d un bâtiment au dessus d un espace public aucun enregistrement n est nécessaire pour une distance de moins de 300m Pour une distance supérieure à 300m un enregistrement auprès de l IBPT est requise Pour une utilisation publique à l extérieur de bâtiments une licence...

Page 82: ...elephone company will provide advance notice in order for you to make the necessary modifications in order to maintain uninterrupted service In the event this equipment should fail to operate properly disconnect the unit from the telephone line Try using another FCC approved device in the same telephone jack If the trouble persists call the telephone company repair service bureau If the trouble do...

Page 83: ...ore about networking with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 261 8868 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorizati...

Reviews: