background image

69

Chapter 5: Using the Linksys Parental Control Service
Family Settings

Wireless-G ADSL Gateway with 2 Phone Ports

Web Browsing Restrictions

On the 

Web Browsing Restrictions

 screen, click 

Web Site Categories

 if you want to block and allow Web sites by 

category. Click 

Blocked & Allowed Web sites

 if you want to block and allow specific Web sites.

Web Site Categories

. On the 

Web Site Categories

 screen there are 16 categories listed:

Adult Content

Alcohol, Drugs, Tobacco

Anonymizers

Criminal/Illegal Skills

Gambling

Games

General Interest

Hate/Discrimination

Lingerie, Swimsuits

Nudity

Personals & Dating

Sex Education

Unknown

Violence

Weapons

Web Communications

Click a category title for an online description of the category. Click the checkbox of a category to allow or 
block access. A checkmark indicates an allowed category, while a stop sign indicates a blocked category. If 
you want to reset the category blocking to the default settings for a specific age category, click the 
appropriate age category in the 

Reset to

 row. If you want to block all categories, click 

Block All

. If you want 

to allow all categories, click 

Allow All

To cancel your changes, click 

Undo Changes

. Click the 

Cancel

 button to cancel your changes and return to 

the previous screen. Click the 

Save

 button to save your changes.

Figure 5-23: Web Site Categories

Figure 5-22: Web Browsing Restrictions

Summary of Contents for Linksys WAG54GP2

Page 1: ...A Division of Cisco Systems Inc Model No ADSL Gateway Wireless G WAG54GP2 User Guide WIRELESS GHz 2 4802 11g with 2 Phone Ports ...

Page 2: ...so each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents This exclamation point means there is a caution or warning and is something that could damage your property or the Wireless G ADSL Gateway with 2 Phone Ports This checkmark means there i...

Page 3: ... Configuring the Gateway 11 Overview 11 How to Access the Web based Utility 13 The Setup Tab 14 The Wireless Tab 28 The Security Tab 33 The Access Restrictions Tab 38 The Applications and Gaming Tab 41 The Administration Tab 45 The Status Tab 51 The Voice Tab 54 Chapter 5 Using the Linksys Parental Control Service 55 Overview 55 Introduction 55 Signing up for the Linksys Parental Control Service 5...

Page 4: ...Computer and the Gateway93 Introduction 93 Environment 93 How to Establish a Secure IPSec Tunnel 94 Appendix C Finding the MAC Address and IP Address for Your Ethernet Adapter104 Windows 98 or Me Instructions 104 Windows 2000 or XP Instructions 105 Appendix D Upgrading Firmware 106 Appendix E Windows Help 107 Appendix F Glossary 108 Appendix G Specifications 113 Appendix H Warranty Information 115...

Page 5: ...etup Tab RFC 2364 PPPoA 21 Figure 4 8 Basic Setup Tab Bridged Mode Only 22 Figure 4 9 Basic Setup Tab DNS Proxy and Optional Settings 23 Figure 4 10 Basic Setup Tab Network Setup 24 Figure 4 11 Setup Tab DDNS DynDNS org 25 Figure 4 12 Setup Tab DDNS TZO com 25 Figure 4 13 Setup Tab Advanced Routing 26 Figure 4 14 Routing Table 27 Figure 4 15 PVC Selection Table 27 Figure 4 16 Wireless Tab Wireless...

Page 6: ...igure 4 38 Applications and Gaming Tab DMZ 43 Figure 4 39 Applications and Gaming Tab QOS 43 Figure 4 40 Administration Tab Management 45 Figure 4 41 Administration Tab Reporting 48 Figure 4 42 System Log 48 Figure 4 43 Administration Tab Diagnostics 49 Figure 4 44 Administration Tab Backup Restore 49 Figure 4 45 Administration Tab Factory Defaults 49 Figure 4 46 Administration Tab Firmware Upgrad...

Page 7: ... Member 65 Figure 5 18 All Settings 66 Figure 5 19 Online Reporting 66 Figure 5 20 Maturity Level 67 Figure 5 21 Time Restrictions 68 Figure 5 22 Web Browsing Restrictions 69 Figure 5 23 Web Site Categories 69 Figure 5 24 Blocked Allowed Web Sites 70 Figure 5 25 E mail Restrictions 71 Figure 5 26 E mail Settings 71 Figure 5 27 Instant Messaging Restrictions 72 Figure 5 28 Password 72 Figure 5 29 S...

Page 8: ...re C 14 Preshared Key 98 Figure C 15 New Preshared Key 98 Figure C 16 Tunnel Setting Tab 99 Figure C 17 Connection Type Tab 99 Figure C 18 Properties Screen 99 Figure C 19 IP Filter List Tab 100 Figure C 20 Filter Action Tab 100 Figure C 21 Authentication Methods Tab 100 Figure C 22 Preshared Key 101 Figure C 23 New Preshared Key 101 Figure C 24 Tunnel Setting Tab 101 Figure C 25 Connection Type 1...

Page 9: ...ol Every device on an IP based network including computers print servers and Gateways requires an IP address to identify its location or address on the network This applies to both the Internet and network connections There are two ways of assigning an IP address to your network devices You can assign static IP addresses or use the Gateway to assign IP addresses dynamically Static IP Addresses A s...

Page 10: ...ion is enabled If you already have a DHCP server running on your network you must disable one of the two DHCP servers If you run more than one DHCP server on your network you will experience network errors such as conflicting IP addresses To disable DHCP on the Gateway see the DHCP section in Chapter 4 Configuring the Gateway What is a VPN A VPN or Virtual Private Network is a connection between t...

Page 11: ...require additional third party VPN client software applications that support IPSec to be installed Computer using VPN client software that supports IPSec to VPN Gateway The following is an example of a computer to VPN Gateway VPN In her hotel room a traveling businesswoman dials up her ISP Her notebook computer has VPN client software that is configured with her office s VPN settings She accesses ...

Page 12: ... destination or when you have to connect to your company s network when you are out on the road How is your data protected That is when a VPN can help VPNs secure data moving outside of your network as if it were still within that network When data is sent out across the Internet from your computer it is always open to attacks You may already have a firewall which will help protect data moving aro...

Page 13: ...ation he can now perform a man in the middle attack This attack is performed when data is being transmitted from one network to another by rerouting the data to a new destination Even though the data is not received by its intended recipient it appears that way to the person sending the data These are only a few of the methods hackers use and they are always developing more Without the security of...

Page 14: ... to your network Ethernet 1 4 The Ethernet ports connect to your computer and other network devices Reset Button There are two ways to Reset the Gateway s factory defaults Either press the Reset Button for approximately ten seconds or restore the defaults from the Factory Defaults screen of the Administration tab in the Gateway s Web Based Utility Power The Power port is where you will connect the...

Page 15: ...indication of any network activity Wireless Green The Wireless LED lights up whenever there is a successful wireless connection If the LED is blinking the Gateway is actively sending or receiving data to or from one of the devices on the network Phone 1 and 2 Green The Phone LEDs light up when a phone is connected to the corresponding port on the back panel DSL Green The DSL LED lights up whenever...

Page 16: ...ed by your Internet Service Provider ISP The installation technician from your ISP should have left the setup information for your modem with you after installing your broadband connection If not you can call your ISP to request that data After you have the setup information you need for your specific type of Internet connection you can begin installation and setup of the Gateway If you want to us...

Page 17: ...ght up steady when the self test is complete If the LED flashes for one minute or longer see Appendix A Troubleshooting 6 Power on one of your computers that is connected to the Gateway Figure 3 3 Connecting your phones Figure 3 1 Connecting your networking devices Figure 3 4 Connecting the power NOTE You should always plug the Gateway s power adapter into a power strip with surge protection IMPOR...

Page 18: ...eless connection make sure the computer s wireless adapter has its SSID set to linksys the Gateway s default setting and that Wireless Security is disabled After you have accessed the Gateway you can change the Gateway and this computer s adapter settings to match the your usual network settings The Gateway s hardware installation is now complete Go to Chapter 4 Configuring the Gateway NOTE You sh...

Page 19: ...Administration Status and Voice Additional tabs will be available after you click one of the main tabs Setup Basic Setup Enter the Internet connection and network settings on this screen DDNS To enable the Gateway s Dynamic Domain Name System DDNS feature complete the fields on this screen Advanced Routing On this screen you can alter Dynamic Routing and Static Routing configurations Wireless Basi...

Page 20: ...pplications on your network Port Range Forwarding To set up public services or other specialized Internet applications on your network click this tab Port Triggering To set up triggered ranges and forwarded ranges for Internet applications click this tab DMZ To allow one local user to be exposed to the Internet for use of special purpose services use this screen QoS This allows prioritization of a...

Page 21: ...out the DSL connection Vocie This screen provides status information about the voice features Voice Voice Authentication This screen is used by your ISP to set voice configuration How to Access the Web based Utility To access the web based utility launch Internet Explorer or Netscape Navigator and enter the Gateway s default IP address 192 168 1 1 in the Address field Then press Enter A password r...

Page 22: ...button to save your changes or Cancel Changes to cancel your changes Internet Setup PVC Connection Select a PVC connection number from the drop down menu Then select the Enable Now to enable the connection Internet Connection Type The Gateway supports six types or Encapsulations RFC 1483 Bridged RFC 1483 Routed RFC 2516 PPPoE RFC 2364 PPPoA IPoA and Bridged Mode Only Each Basic Setup screen and av...

Page 23: ...divide the DSL line rate by 424 to get the maximum rate at which the sender can send cells Enter the rate in this field Scr Sustain Cell Rate Rate The average cell rate that can be transmitted this value is normally less than the PCR value Enter the rate in the field if required by your service provider Autodetect Select Enable to have the settings automatically entered or select Disable to enter ...

Page 24: ...Secondary DNS Optional Your ISP will provide you with at least one DNS Domain Name System Server IP Address PPPoE Session To connect using a PPPoE Session select Enable from the drop down menu Configure the Service Name User Name and Password settings provided by your ISP Enter the domain name in the Match Domain Name field Connect on Demand If you want the Router to end the Internet connection af...

Page 25: ...cally entered or select Disable to enter the values manually Virtual Circuit These fields consist of two items VPI Virtual Path Identifier and VCI Virtual Channel Identifier Your ISP will provide the correct settings for these fields DSL Modulation Select from the drop down menu Multimode T1 413 G dmt or G lite The default value is Multimode Your ISP may provide custom setting for this field IP Se...

Page 26: ... to have the settings automatically entered or select Disable to enter the values manually Virtual Circuit These fields consist of two items VPI Virtual Path Identifier and VCI Virtual Channel Identifier Your ISP will provide the correct settings for these fields DSL Modulation Select from the drop down menu Multimode T1 413 G dmt or G lite The default value is Multimode Your ISP may provide custo...

Page 27: ...divide the DSL line rate by 424 to get the maximum rate at which the sender can send cells Enter the rate in this field Scr Sustain Cell Rate Rate The average cell rate that can be transmitted this value is normally less than the PCR value Enter the rate in the field if required by your service provider Autodetect Select Enable to have the settings automatically entered or select Disable to enter ...

Page 28: ...nnection If the connection is down the Router will automatically re establish your connection Second PPPoE To use a second PPPoE select Enable from the drop down menu Configure the Service Name User Name and Password settings Enter the domain name in the Match Domain Name field Connect on Demand If you want the Router to end the Internet connection after it has been inactive for a period of time s...

Page 29: ...These fields consist of two items VPI Virtual Path Identifier and VCI Virtual Channel Identifier Your ISP will provide the correct settings for these fields DSL Modulation Select from the drop down menu Multimode T1 413 G dmt or G lite The default value is Multimode Your ISP may provide custom setting for this field PPPoA Settings Follow the instructions in the section for your type of encapsulati...

Page 30: ...der divide the DSL line rate by 424 to get the maximum rate at which the sender can send cells Enter the rate in this field Scr Sustain Cell Rate Rate The average cell rate that can be transmitted this value is normally less than the PCR value Enter the rate in the field if required by your service provider Autodetect Select Enable to have the settings automatically entered or select Disable to en...

Page 31: ...tion select Auto Network Setup The Network Setup section changes the settings on the network connected to the Router s Ethernet ports Wireless Setup is performed through the Wireless tab Router IP This presents both the Router s IP Address and Subnet Mask as seen by your network Network Address Server Settings DHCP The settings allow you to configure the Router s Dynamic Host Configuration Protoco...

Page 32: ...ir current dynamic IP address Enter the amount of time in minutes that the user will be leased this dynamic IP address After the time is up the user will be automatically assigned a new dynamic IP address The default is 0 minutes which means one day Static DNS 1 3 The Domain Name System DNS is how the Internet translates domain or website names into Internet addresses or URLs Your ISP will provide...

Page 33: ...from the drop down menu To disable DDNS Service select Disabled DynDNS org Enter the User Name Password and Host Name of the account you set up with DynDNS org in the spaces provided The Gateway s current Internet IP Address and DDNS service connection status will be displayed beneath TZO com Enter the Email Address TZO Password Key and Domain Name of the service you set up with TZO The Gateway s ...

Page 34: ...e RIP messages select the protocol you want RIP1 or RIP2 If you don t want to receive RIP messages select Disable Static Routing If the Gateway is connected to more than one network it may be necessary to set up a static route between them A static route is a pre determined pathway that network information must travel to reach a specific host or network To create a static route change the followin...

Page 35: ...estination Enter the destination Internet IP Address and Network Mask where this PVC will send data Source Enter the source IP Address and Network Mask where this PVC will originate Source Mac Enter the source MAC Address of the network PC where the data originates Protocol Enter the data s protocol either TCP UDP or ALL Dst Port Enter the destination port number where this PVC will send data Src ...

Page 36: ...ed 32 alphanumeric characters which may be any keyboard character Linksys recommends that you change the default SSID linksys to a unique name of your choice Wireless Channel Select the appropriate channel from the list provided to correspond with your network settings between 1 and 11 in North America All devices in your wireless network must use the same channel in order to function correctly Li...

Page 37: ... for the Gateway turn to Appendix B Wireless Security If you want to disable wireless security select Disable from the drop down menu for Security Mode WPA Pre Shared Key Enter a WPA Shared Key of 8 32 characters Then enter a Group Key Renewal period which instructs the Gateway how often it should change the encryption keys WPA RADIUS This option features WPA used in coordination with a RADIUS ser...

Page 38: ...sphrase This passphrase is used to generate one or more WEP keys It is case sensitive and should not be longer than 32 alphanumeric characters This Passphrase function is compatible with Linksys wireless products only and cannot be used with Windows XP Zero Configuration If you want to communicate with non Linksys wireless products or Windows XP Zero Configuration make a note of the WEP key genera...

Page 39: ...ct Restrict Access then select Prevent to prevent access or Permit only to permit access Click the Edit MAC Address Access List button and the screen will appear Select the MAC Address from the list and click Wireless Client MAC List When finished making your changes on this tab click the Save Settings button to save these changes or click the Cancel Changes button to undo your changes Figure 4 20...

Page 40: ...requency interval of the beacon A beacon is a packet broadcast by the Gateway to synchronize the wireless network DTIM Interval The default value is 3 This value between 1 and 255 indicates the interval of the Delivery Traffic Indication Message DTIM A DTIM field is a countdown field informing clients of the next window for listening to broadcast and multicast messages When the Gateway has buffere...

Page 41: ... Applets Java is a programming language for websites If you deny Java Applets you run the risk of not having access to Internet sites created using this programming language To enable Java Applet filtering click Enabled Filter ActiveX ActiveX is a programming language for websites If you enable ActiveX filtering you may not have access to Internet sites created using this programming language To e...

Page 42: ... Point Tunneling Protocol PPTP used to enable the operation of a VPN over the Internet To allow L2TP Passthrough click the Enable button To disable L2TP Passthrough click the Disable button IPSec VPN Tunnel The VPN Gateway creates a tunnel or channel between two endpoints so that the data or information between these endpoints is secure To establish this tunnel select the tunnel you wish to create...

Page 43: ...be selected if the VPN device at the other end of the tunnel is using the same type of authentication Or both ends of the tunnel may choose to Disable authentication In the Manual Key Management screen MD5 the default has been selected Key Management Select Auto IKE or Manual from the drop down menu The two methods are described below Auto IKE Select Auto IKE and enter a series of numbers or lette...

Page 44: ...ludes more authentication requirements than Aggressive mode Main mode is recommended because it is more secure No matter which mode is selected the VPN Gateway will accept both Main and Aggressive requests from the remote VPN device Encryption Select the length of the key used to encrypt decrypt ESP packets There are two choices DES and 3DES 3DES is recommended because it is more secure Authentica...

Page 45: ...Check the box next to Anti replay to enable the Anti replay protection This feature keeps track of sequence numbers as packets arrive ensuring security at the IP packet level Keep Alive If you select this option the Gateway will periodically check your Internet connection If you are disconnected then the Gateway will automatically re establish your connection Check this box to block unauthorized I...

Page 46: ...rols account you will need an active Internet connection Enable Disable If you want to use the Linksys Parental Control feature click the Enable radio button If you want to disable the Linksys Parental Control feature click the Disable radio button Sign Up for Parental Control Service To sign up for a free trial of the Linksys Parental Control Service click this link You will be automatically take...

Page 47: ...mmary button The summaries are listed on this screen with their name and settings To return to the Internet Access tab click the Close button Enter Policy Name Policies are created from the fields presented here To create an Internet Access policy 1 Enable the policy by selecting Enable next to Status 2 Enter a Policy Name in the field provided Select Internet Access as the Policy Type 3 Click the...

Page 48: ... Service name as well as the Protocol and Port Range used by the service 6 By selecting the appropriate setting next to Days and Time choose when Internet access will be filtered 7 Click the Save Settings button to activate the policy Internet Access can also be filtered by URL Address the address entered to access Internet sites by entering the address in one of the Website Blocking by URL Addres...

Page 49: ...k via the Internet the Gateway will forward those requests to the appropriate computer Any computer whose port is being forwarded should have its DHCP client function disabled and should have a new static IP address assigned to it because its IP address may change when using the DHCP function Choose or enter the Application in the field Then enter the External and Internal Port numbers in the fiel...

Page 50: ...or each application TCP UDP or Both IP Address Enter the IP Address for the application Click Enable to enable that application When finished making your changes on this tab click the Save Settings button to save these changes or click the Cancel Changes button to undo your changes Port Triggering Port Triggering is used for special applications that can request a port to be opened on demand For t...

Page 51: ...ic which may involve demanding real time applications such as Internet phone calls or videoconferencing QoS Enable Disable To utilize QoS on the Gateway select Enable Otherwise keep the default Disable Application based QoS Application based QoS manages information as it is transmitted and received Depending on the settings of the QoS screen this feature will assign information a high or low prior...

Page 52: ...nloaded at the same time POP3 uses the SMTP messaging protocol Specific Port You can add three additional applications by entering their respective port numbers in the Specific Port fields Advanced QoS This setting allows you to specify traffic queue priority Fragment packet s size of AF and BE traffic to be equal to the size of EF traffic Select this option to fragmentize the packet sizes for AF ...

Page 53: ...via the Internet Remote Username Enter the default admin You should change the default username for increased security Remote Password You should set your own password for increased security Re enter to confirm Re enter the Gateway s new Password to confirm it Management Port Enter the port number you will use to remotely access the Gateway Allowed IP Specify the IP address es allowed to remotely ...

Page 54: ...write access to the Gateway s SNMP information SNMP v3 Rw User Enter the user name of the user with read write access Authentication Protocol Select the method used to authenticate the read write user Authentication Password Enter the actual password that will authenticate the read write user Privacy Password Enter a second password for added security This will be associated with the DES privacy p...

Page 55: ...ctions within a common framework The Gateway is the CPE which uses this protocol TR 069 To enable this feature select Enable ACS URL Enter the URL of the ACS Your ISP will provide you with the ACS URL ACS Username Enter the username to connect to the ACS Your ISP will provide you with your ACS Username ACS Password Enter the password to connect to the ACS Your ISP will provide you with your ACS Pa...

Page 56: ...lerts E Mail Alerts To enable E Mail Alerts click Enabled Denial of Service Thresholds Enter the thresholds of events you want to receive SMTP Mail Server Enter the IP Address of the SMTP server in the field E Mail Address for Alert Logs Enter the e mail address for alert logs in the field Return E Mail address Enter the address for the return e mail To view the logs click the View Logs button Whe...

Page 57: ...ore The Backup Restore tab allows you to back up and restore the Gateway s configuration file To back up the Gateway s configuration file click the Backup button Then follow the on screen instructions To restore the Gateway s configuration file click the Browse button to locate the file and follow the on screen instructions After you have selected the file click the Restore button Factory Defaults...

Page 58: ...ile you downloaded and extracted Click the Upgrade button and follow the instructions there Reboot This tab allows you to do a soft or hard reboot of your Gateway Reboot Mode To reboot your Gateway select Hard or Soft Choose hard to power cycle the Gateway or soft to restart it without a power cycle To begin the reboot process click the Save Settings button When a screen appears asking you if you ...

Page 59: ... Release button to delete your Gateway s current IP address Click the Refresh button if you want to Refresh your screen Local Network The Local Network information that is displayed is the local Mac Address IP Address Subnet Mask and DHCP Server Start IP Address and End IP Address To view the DHCP Clients Table click the DHCP Clients Table button DHCP Clients Table Click the DHCP Clients Table but...

Page 60: ...ess clients connected to the Gateway Click the Refresh button if you want to Refresh your screen Click the Close button to close the screen DSL Connection The DSL Connection information that is displayed is the Status Downstream Rate and Upstream Rate The PVC Connection information that is displayed is Encapsulation Multiplexing QoS Pcr Rate Scr Rate Autodetect VPI VCI and PVC Status Click the Ref...

Page 61: ...eway The Status Tab Wireless G ADSL Gateway with 2 Phone Ports Voice The Voice screen displays Information Line 1 Status and Line 2 Status status Click the Refresh button if you want to Refresh your screen Figure 4 52 Status Tab Voice ...

Page 62: ... ADSL Gateway with 2 Phone Ports The Voice Tab Voice Authentication The Voice Authentication feature is used by your ISP for configuring the Gateway s voice features Login to these features is accomplished on this screen Figure 4 53 Voice Tab Voice Authentication ...

Page 63: ... through based on who s logged in You can also manually block or allow specific websites based on your own judgment To protect your family from unsolicited messages you can set up e mail and Instant Message filters You select who can send messages to and receive messages from your family If your children are spending too much time online you can set time restrictions by hour and day of the week To...

Page 64: ...rental Controls Billing and Support Center Refer to the Managing Linksys Parental Controls section Web based Utility If you are using the Router s Web based Utility go to the Access Restrictions tab Parental Control screen Click the Enable radio button and then the Save Settings button Then click the Sign up for Parental Control Service button You will be automatically taken to a website where you...

Page 65: ...scroll down the entire agreement before you can accept the Agreement Then click the Accept button If you do not want to accept the Agreement click the Cancel button 2 The Sign Up screen will appear Enter a User Name and Password for your account Enter the Password again in the Confirm Password field Then enter your e mail address in the Email field service e mail notifications will be sent to this...

Page 66: ...ary City State Prov and Zip Code fields Select your country from the Country drop down menu Your phone number is optional In the Billing Information section select your credit card from the Credit Card drop down menu Complete the Credit Card Number field From the Expiration Date drop down menus select the month and year your credit card expires In the Full Name on Card field enter the complete nam...

Page 67: ...age and you will see the Congratulations screen If you want to create user profiles for your family members now click the Create Profiles button For additional instructions proceed to step 4 of the Managing Linksys Parental Controls section If you want to access the Internet immediately click the Sign in and Surf button For more information go to the Using the Linksys Parental Control Service sect...

Page 68: ...y 2 Click the Access Restrictions tab 3 Click the Manage Account button on the Parental Controls screen This screen also lists the status of your Parental Controls account 4 The login screen will appear For future reference create a bookmark through your web browser Complete the Name E mail address and Password fields 5 Then click the Go button The Support Center screen will appear Figure 5 8 Pare...

Page 69: ... to the following Subscribe to Service Click Subscribe to Service to sign up for your Parental Controls subscription before your free trial period expires The Purchase Linksys Parental Control Service screen will appear Follow these instructions 1 Select a subscription option 2 Complete the Billing Contact Info and Billing Information sections Fields marked with an asterisk must be filled out 3 Cl...

Page 70: ...nter the new password in the Confirm Password field 3 Complete the Email field the e mail address you enter will receive service administration notices only 4 Click the Save button to save your changes or click the Cancel button to cancel changes Reconnect Router If the Router has lost its connection to the Parental Control Service or if you have reset the Router back to its factory default settin...

Page 71: ...y You can click a column heading to sort entries To view the activities during a specific time period use the Day Range drop down menu Click the Refresh button to update the report To delete specific entries click the checkbox next to specific entries and then click the Delete button To save all reports to your computer click the Download button The reports will be saved as a tab delimited text fi...

Page 72: ...dress You can click a column heading to sort entries To view the activities during a specific time period use the Day Range drop down menu Click the Refresh button to update the report To delete specific entries click the checkbox next to specific entries and then click the Delete button To save all reports to your computer click the Download button The reports will be saved as a tab delimited tex...

Page 73: ...Youth 12 15 Mature Teen 16 17 Adult and Family Manager Read the online category descriptions to learn what types of restrictions are enabled for each category or refer to the Maturity Level section 3 Click the Back button to return to the previous screen Click the Cancel button to cancel your change Click the Finish button to save this new family member profile the default restrictions of the age ...

Page 74: ...to monitor There are three categories Web Browsing Restrictions E mail and Instant Messaging For each category you have three levels of monitoring available Click the radio button next to your choice in each category Web Browsing Restrictions Select one of the following No reporting of Web sites visited Report only blocked Web sites or Report all Web sites visited E mail Select one of the followin...

Page 75: ...ondents Internet access is allowed from 3 PM to 10 PM on weekdays and from 8 AM to 10 PM on weekends Mature Teen 16 17 Web browsing is limited to Youth categories plus games lingerie and swimsuits nudity and web communication sites E mail and instant messaging services are prohibited Internet access is allowed from 3 PM to 11 PM on weekdays and from 8 AM to 11 PM on weekends Adult All services are...

Page 76: ... All Day row To block Internet access for an entire day click the day of the week in the Block All Day row If you want to reset the Time Restrictions to the default settings for a specific age category click the appropriate age category in the Reset to row If you want to always block Internet access click Always Block If you want to always allow Internet access click Always Allow To cancel your ch...

Page 77: ... Personals Dating Sex Education Unknown Violence Weapons Web Communications Click a category title for an online description of the category Click the checkbox of a category to allow or block access A checkmark indicates an allowed category while a stop sign indicates a blocked category If you want to reset the category blocking to the default settings for a specific age category click the appropr...

Page 78: ...the Add button To remove an allowed Web site select the name of the Web site in the Allow Web Sites field and then click the Remove button To add a blocked Web site enter the name of the Web site in the Block this Web site field Then click the Add button To remove a blocked Web site select the name of the Web site in the Blocked Web Sites field and then click the Remove button Click the Cancel but...

Page 79: ...4 Enter the family member s e mail address 5 Complete the Incoming Mail Server and Account Name fields If you are not sure click the words Click here of Click here to use suggested names Suggestions will automatically appear in the Incoming Mail Server and Account Name fields 6 Enter the approved contact s e mail address Click the Add Address button to add the approved contact To remove an approve...

Page 80: ...en Name field 3 Click the Add button to add the approved contact To remove an approved contact click the contact s name in the Instant Messaging Correspondents field and then click the Remove button Click the Cancel button to cancel your changes Click the Save button to save your changes Password To access the Internet the designated family member must use his or her password You can change this p...

Page 81: ...r changes Using the Parental Control Service When the Linksys Parental Control Service is actively managing your family s Internet activities you must sign in with the Linksys Parental Control Service before you can access the Internet Follow these instructions 1 Open your web browser 2 If you are using Internet Explorer 5 5 or higher you will see a warning screen It will ask you if you want to in...

Page 82: ...y while a separate Status screen will appear in the upper right corner of your desktop 4 Depending on your profile the Linksys Parental Control Service will permit or deny Internet access as well as regulate e mail or Instant Messaging activities If you enabled the pop up screen then it will appear You can click the Status Page button to return to the Welcome to Parental Controls screen and see wh...

Page 83: ...ion The login screen for the Parental Control Billing Support Center will appear Preferences To change your preferences for the Status screen click Preferences You will have these three choices Enabled Enables the Status screen Disabled Disables the Status screen Force to top Enables the Status screen and forces it to appear at the top of your current window About Parental Controls Click About Par...

Page 84: ...by any other computer on the network connected to the Gateway Make sure that each IP address is unique for each computer or network device 4 Click the Gateway tab and in the New Gateway prompt enter 192 168 1 1 which is the default IP address of the Gateway Click the Add button to accept the entry 5 Click the DNS tab and make sure the DNS Enabled option is selected Enter the Host and Domain names ...

Page 85: ...tocol TCP IP Click the Properties button 5 Enter a unique IP address that is not used by any other computer on the network connected to the Gateway 6 Enter the Subnet Mask 255 255 255 0 7 Enter the Default Gateway 192 168 1 1 Gateway s default IP address 8 Toward the bottom of the window select Use the following DNS server addresses and enter the Preferred DNS server and Alternative DNS server pro...

Page 86: ...onnection Try the ping command from a different computer to verify that your original computer is not the cause of the problem 3 I am not getting an IP address on the Internet with my Internet connection Refer to Problem 2 I want to test my Internet connection to verify that you have connectivity 1 Make sure you are using the right Internet connection settings Contact your ISP to see if your Inter...

Page 87: ...ing any number from 1 to 254 Note that each IP address must be unique within the network Your VPN may require port 500 UDP packets to be passed to the computer that is connecting to the IPSec server Refer to Problem 7 I need to set up online game hosting or use other Internet applications for details Check the Linksys international website for more information at www linksys com international 6 I ...

Page 88: ...teps to set up online game hosting or use a certain Internet application 1 Access the Gateway s web interface by going to http 192 168 1 1 or the IP address of the Gateway Go to the Applications and Gaming Port Range Forwarding tab 2 Enter any name you want to use for the Customized Application 3 Enter the External Port range of the service you are using For example if you want to host Unreal Tour...

Page 89: ...rgot my password or the password prompt always appears when I am saving settings to the Gateway Reset the Gateway to factory default by pressing the Reset button for 10 seconds and then releasing it If you are still getting prompted for a password when saving settings then perform the following steps 1 Access the Gateway s web based utility by going to http 192 168 1 1 or the IP address of the Gat...

Page 90: ...the latest firmware for the Gateway 4 To upgrade the firmware follow the steps in the Administration section found in Chapter 4 Configuring the Gateway 13 The firmware upgrade failed and or the Power LED is flashing The upgrade could have failed for a number of reasons Follow these steps to upgrade the firmware and or make the Power LED stop flashing If the firmware upgrade failed use the TFTP pro...

Page 91: ...sername and password is admin 3 Look for the MTU option and select Manual In the Size field enter 1492 4 Click the Save Settings button to continue If your difficulties continue change the Size to different values Try this list of values one value at a time in this order until your problem is solved 1462 1400 1362 1300 16 The Power LED flashes continuously The Power LED lights up when the device i...

Page 92: ...No TCP IP is the only protocol standard for the Internet and has become the global standard for communications IPX a NetWare communications protocol used only to route messages from one node to another and AppleTalk a communications protocol used on Apple and Macintosh networks can be used for network to network connections but those protocols cannot connect from the Internet to a network Do the G...

Page 93: ...005 The computers on your network need to have clientport 2700x added to the HL shortcut command line the x would be 6 7 8 and on up This lets multiple computers connect to the same server One problem Version 1 0 1 6 won t let multiple computers with the same CD key connect at the same time even if on the same network not a problem with 1 0 1 3 As far as hosting games the HL server does not need t...

Page 94: ...connection to the Internet What is DMZ Hosting Demilitarized Zone DMZ allows one IP address computer to be exposed to the Internet Some applications require multiple TCP IP ports to be open It is recommended that you set your computer with a static IP if you want to use DMZ Hosting To get the IP address see Appendix D Finding the MAC Address and IP Address for Your Ethernet Adapter If DMZ Hosting ...

Page 95: ...e complies with the 802 11g standard The 802 11g standard states a maximum data transfer rate of 54Mbps and an operating frequency of 2 4GHz What IEEE 802 11b and 802 11g features are supported The product supports the following IEEE 802 11b and IEEE 802 11g functions CSMA CA plus Acknowledge protocol Multi Channel Roaming Automatic Rate Selection RTS CTS feature Fragmentation Power Management Wha...

Page 96: ...de available worldwide This presents a truly revolutionary opportunity to place convenient high speed wireless capabilities in the hands of users around the globe What is Spread Spectrum Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable secure mission critical communications systems It is designed to trade off bandwidth efficiency for ...

Page 97: ...aluable identifier for the network How do I reset the Gateway Press the Reset button on the back panel for about ten seconds This will reset the Gateway to its default settings How do I resolve issues with signal loss There is no way to know the exact range of your wireless network without testing Every obstacle placed between the Gateway and a wireless computer will create signal loss Lead glass ...

Page 98: ...ructure the type of construction and the building materials used may have an adverse impact on signal quality and speed The placement and orientation of the wireless devices 2 Interference Any device operating in the 2 4 GHz spectrum may cause network interference with a 802 11b g wireless device Some devices that may prove troublesome include 2 4 GHz cordless phones microwave ovens adjacent publi...

Page 99: ... WEP keys etc are stored in its firmware Your network administrator is the only person who can change network settings If a hacker gets a hold of the administrator s password he too can change those settings So make it harder for a hacker to get that information Change the administrator s password regularly SSID There are several things to keep in mind about the SSID A Disable Broadcast B Make it ...

Page 100: ...ess security concerns This is overstating WEP s ability Again this can only provide enough security to make a hacker s job more difficult There are several ways that WEP can be maximized A Use the highest level of encryption possible B Use a Shared Key C Use multiple WEP keys D Change your WEP key regularly Implementing encryption will have a negative impact on your network s performance If you ar...

Page 101: ...shooting in Windows 2000 http support microsoft com support kb articles Q257 2 25 asp Environment The IP addresses and other specifics mentioned in this appendix are for illustration purposes only Windows 2000 or Windows XP IP Address 140 111 1 2 User ISP provides IP Address this is only an example Subnet Mask 255 255 255 0 WAG54G WAN IP Address 140 111 1 1 User ISP provides IP Address this is onl...

Page 102: ...xt button 5 Click the Finish button making sure the Edit check box is checked Step 2 Build Filter Lists Filter List 1 win Router 1 In the new policy s properties screen verify that the Rules tab is selected Deselect the Use Add Wizard check box and click the Add button to create a new rule 2 Make sure the IP Filter List tab is selected and click the Add button The IP Filter List screen should appe...

Page 103: ...1 0 and Subnet mask 255 255 255 0 These are the Gateway s default settings If you have changed these settings enter your new values 4 If you want to enter a description for your filter click the Description tab and enter the description there 5 Click the OK button Then click the OK or Close button on the IP Filter List window Filter List 2 Router win 6 The New Rule Properties screen will appear Se...

Page 104: ...fic IP Subnet and enter the IP Address 192 168 1 0 and Subnet mask 255 255 255 0 Enter your new values if you have changed the default settings In the Destination address field select My IP Address 9 If you want to enter a description for your filter click the Description tab and enter the description there 10 Click the OK or Close button and the New Rule Properties screen should appear with the I...

Page 105: ...filter list win Router 2 Click the Filter Action tab and click the filter action Require Security radio button Then click the Edit button 3 From the Security Methods tab verify that the Negotiate security option is enabled and deselect the Accept unsecured communication but always respond using IPSec check box Select Session key Perfect Forward Secrecy and click the OK button Figure C 12 Security ...

Page 106: ...k the Edit button 5 Change the authentication method to Use this string to protect the key exchange preshared key and enter the preshared key string such as XYZ12345 Click the OK button 6 This new Preshared key will be displayed Click the Apply button to continue if it appears on your screen otherwise proceed to the next step Figure C 13 Authentication Methods Figure C 14 Preshared Key Figure C 15...

Page 107: ...ress radio button Then enter the WAN IP Address 8 Select the Connection Type tab and click All network connections Then click the OK or Close button to finish this rule Tunnel 2 Router win 9 In the new policy s properties screen make sure that win Router is selected and deselect the Use Add Wizard check box Then click the Add button to create the second IP filter Figure C 16 Tunnel Setting Tab Fig...

Page 108: ...e Security Then click the Edit button From the Security Methods tab verify that the Negotiate security option is enabled and deselect the Accept unsecured communication but always respond using IPSec check box Select Session key Perfect Forward Secrecy and click the OK button 12 Click the Authentication Methods tab and verify that the authentication method Kerberos is selected Then click the Edit ...

Page 109: ...hown in the example This is a sample key string Yours should be a key that is unique but easy to remember Then click the OK button 14 This new Preshared key will be displayed Click the Apply button to continue if it appears on your screen otherwise proceed to the next step 15 Click the Tunnel Setting tab click the radio button for The tunnel endpoint is specified by this IP Address and enter the W...

Page 110: ...elect All network connections Then click the OK or Close button to finish 17 From the Rules tab click the OK or Close button to return to the secpol screen Step 4 Assign New IPSec Policy In the IP Security Policies on Local Computer window right click the policy named to_Router and click Assign A green arrow appears in the folder icon Figure C 25 Connection Type Figure C 26 Rules Figure C 27 Local...

Page 111: ...y Router fields 7 Select fromtwo different types of encryption DES or 3DES 3DES is recommended because it is more secure You may choose either of these but it must be the same type of encryption that is being used by the VPN device at the other end of the tunnel Or you may choose not to encrypt by selecting Disable 8 Select from two types of authentication MD5 and SHA SHA is recommended because it...

Page 112: ...Start and Run In the Open field enter winipcfg Then press the Enter key or the OK button 2 When the IP Configuration screen appears select the Ethernet adapter you have connected to the Gateway via a CAT 5 Ethernet network cable 3 Write down the Adapter Address as shown on your computer screen This is the MAC address for your Ethernet adapter and is shown in hexadecimal as a series of numbers and ...

Page 113: ...e Physical Address as shown on your computer screen it is the MAC address for your Ethernet adapter This appears as a series of numbers and letters The MAC address Physical Address is what you will use for MAC filtering The exampleshown displays the Ethernet adapters s MAC address as 00 00 00 00 00 00 Your computer will show something different The example shown displays the Ethernet adapter s IP ...

Page 114: ...se instructions Upgrade from WAN To upgrade the Gateway s firmware from the WAN Enter the URL for the firmware in the URL field then click the Upgrade button and follow the instructions there Upgrade from LAN 1 Click the Browse button to find the firmware upgrade file that you downloaded from the Linksys website and then extracted 2 Double click the firmware file you downloaded and extracted Click...

Page 115: ...ocol all computers follow to communicate over a network This is true for wireless networks as well Your computers will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing shared ...

Page 116: ...a device and cause it to start executing instructions Broadband An always on fast Internet connection Browser An application program that provides a way to look at and interact with all the information on the World Wide Web Byte A unit of data that is usually eight bits long Cable Modem A device that connects a computer to the cable television network which in turn connects to the Internet Daisy C...

Page 117: ...at specifies how data is placed on and retrieved from a common transmission medium Firewall A set of related programs located at a network gateway server that protects the resources of a network from users from other networks Firmware The programming code that runs a networking device FTP File Transfer Protocol A protocol used to transfer files over a TCP IP network Full Duplex The ability of a ne...

Page 118: ...ocess by automatically generating the WEP encryption keys for Linksys products Ping Packet INternet Groper An Internet utility used to determine whether a particular IP address is online POP3 Post Office Protocol 3 A standard mail server commonly used on the Internet Port The connection point on a computer or networking device used for plugging in cables or adapters Power over Ethernet PoE A techn...

Page 119: ...s code that determines the size of the network Switch 1 A data switch that connects computing devices to host computers allowing a large number of devices to share a limited number of ports 2 A device for making breaking or changing the connections in an electrical circuit TCP Transmission Control Protocol A network protocol for transmitting data that requires acknowledgement from the recipient of...

Page 120: ...ct data as it leaves one network and goes to another over the Internet WAN Wide Area Network The Internet WEP Wired Equivalent Privacy A method of encrypting network data transmitted on a wireless network for greater security WLAN Wireless Local Area Network A group of computers and associated devices that communicate with each other wirelessly WPA Wi Fi Protected Access a wireless security protoc...

Page 121: ...witch Cabling Type UTP CAT 5 or better Phone Cable POTS Data Rate Up to 54Mbps wireless Up to 8Mbps downstream ADSL G 992 1 Up to 800kbps upstream ADSL G 992 1 Transmit Power 18 dBm on 802 11b and 15dBm on 802 11g LEDs Power Ethernet 1 4 Wireless G WLAN Phone 1 2 DSL Internet Security Features WEP WPA RADIUS WEP Key Bits 64 128 Dimensions 6 69 x 6 69 x 1 22 170 mm x 130 mm x 31 mm Unit Weight 0 90...

Page 122: ...114 Appendix H Specifications Wireless G ADSL Gateway with 2 Phone Ports Storage Temp 20ºC to 70ºC Operating Humidity 10 to 85 Non Condensing Storage Humidity 5 to 90 Non Condensing ...

Page 123: ...NTATIONS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except by Li...

Page 124: ... equipment off and on the user is encouraged to try to correct the interference by one of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help This device co...

Page 125: ...cense for the system according to the Canadian regulations IMPORTANT NOTE IC Radiation Exposure Statement This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment End users must follow the specific operating instructions for satisfying RF exposure compliance To maintain compliance with IC RF exposure compliance requirements please avoid direct contact to ...

Page 126: ...ut networking with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 823 3002 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorization depa...

Reviews: