background image

95

Appendix J: Regulatory Information

Wireless-G VPN Broadband Router

An FCC compliant telephone cord and modular plug is provided with this equipment. This equipment is designed 
to be connected to the telephone network or premises wiring using a compatible modular jack, which is FCC Part 
68 compliant. Connection to the telephone network should be made by using the standard modular telephone 
jack.

The REN is useful to determine the quantity of devices that may be connected to the telephone line and still have 
all of those devices ring when your telephone number is called.  In most, but not all areas, the sum of RENs 
should not exceed 5.  To be certain of the number of devices that may be connected to the line, as determined by 
the total RENs, contact the telephone company to determine the maximum REN for the calling area.

If this equipment causes harm to the telephone network, the telephone company may discontinue your service 
temporarily.  If advance notice is not practical, the telephone company will notify the customer as soon as 
possible.  Also, you will be advised of your right to file a complaint with the FCC if you believe it is necessary.

The telephone company may make changes in its facilities, equipment, operations, or procedures that could 
affect the operation of the equipment.  If this happens, the telephone company will provide advance notice in 
order for you to make the necessary modifications in order to maintain uninterrupted service.

In the event this equipment should fail to operate properly, disconnect the unit from the telephone line. Try using 
another FCC approved device in the same telephone jack.  If the trouble persists, call the telephone company 
repair service bureau.  If the trouble does not persist and appears to be with this unit, disconnect the unit from 
the telephone line and discontinue use of the unit until it is repaired.  Please note that the telephone company 
may ask that you disconnect the equipment from the telephone network until the problem has been corrected or 
until you are sure that the equipment is not malfunctioning. The user must use the accessories and cables 
supplied by the manufacturer to get optimum performance from the product.

No repairs may be done by the customer. If trouble is experienced with this equipment, please contact your 
authorized support provider for repair and warranty information.  If the trouble is causing harm to the telephone 
network, the telephone company may request you remove the equipment from the network until the problem is 
resolved.  This equipment cannot be used on telephone company provided coin service.  Connection to Party Line 
Service is subject to state tariffs.

SAFETY NOTICES

Caution: To reduce the risk of fire, use only No.26 AWG or larger telecommunication line  cord.

Do not use this product near water, for example, in a wet basement or near a swimming pool.

Avoid using this products (other than a cordless type) during an electrical storm.  There may be a remote risk of 
electric shock from lightning.

Summary of Contents for Linksys WRV54G

Page 1: ...A Division of Cisco Systems Inc Model No VPN Broadband Router Wireless G WRV54G User Guide WIRELESS GHz 2 4802 11g ...

Page 2: ... Guide In addition to these symbols there are definitions for technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents WRV54G EU QI 31014NC KL This exclamation point means there is a Caution or Wa...

Page 3: ...the Wireless G Broadband Router 11 Overview 11 Wired Connection to a PC 12 Wireless Connection to a PC 12 Chapter 5 Configuring the PCs 14 Overview 14 Configuring Windows 98 and Millennium PCs 14 Configuring Windows 2000 PCs 15 Configuring Windows XP PCs 16 Chapter 6 Configuring the Router 17 Overview 17 How to Access the Web based Utility 19 The Setup Tab 19 The Wireless Tab 26 The Security Tab 3...

Page 4: ...and the Router 70 Introduction 70 Environment 70 How to Establish a Secure IPSec Tunnel 71 Windows 98 or Me Instructions 81 Windows 2000 or XP Instructions 82 Chapter 10 SNMP Functions 83 Chapter 11 Upgrading Firmware 84 Chapter 12 Windows Help 85 Chapter 13 Glossary 86 Chapter 14 Specifications 92 Chapter 15 Regulatory Information 93 Chapter 16 Warranty Information 96 Chapter 17 Contact Informati...

Page 5: ...ss G or Wireless B devices to the network There s also a built in 4 port full duplex 10 100 Switch to connect your wired Ethernet devices Connect four PCs directly or daisy chain out to more hubs and switches to create as big a network as you need Finally the Router function ties it all together and lets your whole network share a high speed cable or DSL Internet connection To protect your data an...

Page 6: ...er This chapter explains how to use the Web Based Utility to configure the settings on the Router Appendix A Troubleshooting This appendix describes some problems and solutions as well as frequently asked questions regarding installation and use of the Wireless G VPN Broadband Router Appendix B Wireless Security This appendix explains the risks of wireless networking and some solutions to reduce t...

Page 7: ...Appendix H Glossary This appendix gives a brief glossary of terms frequently used in networking Appendix I Specifications This appendix provides the technical specifications for the Router Appendix J Warranty Information This appendix supplies the warranty information for the Router Appendix K Regulatory Information This appendix supplies the regulatory information regarding the Router Appendix L ...

Page 8: ...network including PCs print servers and routers requires an IP address to identify its location or address on the network This applies to both the Internet and LAN connections There are two ways of assigning an IP address to your network devices You can assign static IP addresses or use the Router to assign IP addresses dynamically Static IP Addresses A static IP address is a fixed IP address that...

Page 9: ... Server function is enabled If you already have a DHCP server running on your network you must disable one of the two DHCP servers If you run more than one DHCP server on your network you will experience network errors such as conflicting IP addresses To disable DHCP on the Router see the DHCP section in Chapter 6 The Router s Web based Utility Why do I need a VPN Computer networking provides a fl...

Page 10: ...ransmitted from one network to another by rerouting the data to a new destination Even though the data is not received by its intended recipient it appears that way to the person sending the data These are only a few of the methods hackers use and they are always developing more Without the security of your VPN your data is constantly open to such attacks as it travels over the Internet Data trave...

Page 11: ... Manager Microsoft 2000 and XP allows the VPN Router to create a VPN tunnel using IPSec refer to Appendix C Configuring IPSec between a Windows 2000 or XP PC and the VPN Router Other versions of Microsoft operating systems require additional third party VPN client software applications that support IPSec to be installed VPN Router to VPN Router An example of a VPN Router to VPN Router VPN would be...

Page 12: ...igured with her office s VPN settings She accesses the VPN client software that supports IPSec and connects to the VPN Router at the central office As VPNs utilize the Internet distance is not a factor Using the VPN the businesswoman now has a secure connection to the central office s network as if she were physically connected For additional information and instructions about creating your own VP...

Page 13: ...ct the power adapter Reset Button There are two ways to Reset the Router s factory defaults Either press the Reset Button for approximately ten seconds or restore the defaults from the Password tab in the Router s Web Based Utility With these and many other Linksys products your networking options are limitless Go to the Linksys website at www linksys com for more information about products that w...

Page 14: ...nosis If this LED stays on for an abnormally long period of time refer to Appendix A Troubleshooting Internet Green The Internet LED lights whenever there is a successful wireless connection If the LED is flickering the Router is actively sending or receiving data to or from one of the devices on the network Wireless G Green The Wireless G LED lights whenever there is a successful wireless connect...

Page 15: ... s provided by your Internet Service Provider ISP The installation technician from your ISP should have left the setup information for your modem with you after installing your broadband connection If not you can call your ISP to request that data Once you have the setup information you need for your specific type of Internet connection you can begin installation and setup of the Router If you wan...

Page 16: ...l will light up green as soon as the power adapter is connected properly The Power LED will flash for a few seconds then it will light up steady when the self test is complete If the LED flashes for one minute or longer see Appendix A Troubleshooting 7 Power on one of your PCs that is connected to the Router Wireless Connection to a PC If you want to use a wireless connection to access the Router ...

Page 17: ...ashes for one minute or longer see Appendix A Troubleshooting 5 Power on one of the PCs on your wireless network s 6 For initial access to the Router through a wireless connection make sure the PC s wireless adapter has its SSID set to linksys g the Router s default setting and its WEP encryption is disabled After you have accessed the Router you can change the Router and this PC s adapter setting...

Page 18: ...ws operating system you are using Make sure that an Ethernet or wireless adapter also known as a network adapter has been successfully installed in each PC you will configure Once you ve configured your computers continue to Chapter 6 Using the Router s Web Based Utility Configuring Windows 98 and Millennium PCs 1 Click the Start button Select Settings and click the Control Panel icon Double click...

Page 19: ...sing the Router s Web Based Utility Configuring Windows 2000 PCs 1 Click the Start button Select Settings and click the Control Panel icon Double click the Network and Dial up Connections icon 2 Select the Local Area Connection icon for the applicable Ethernet adapter usually it is the first Local Area Connection listed Double click the Local Area Connection Click the Properties button See Figure ...

Page 20: ...ick the Network Connections icon 2 Select the Local Area Connection icon for the applicable Ethernet adapter usually it is the first Local Area Connection listed Double click the Local Area Connection Click the Properties button See Figure 5 6 3 Make sure the box next to Internet Protocol TCP IP is checked Highlight Internet Protocol TCP IP and click the Properties button See Figure 5 7 4 Select O...

Page 21: ...ilable after you click one of the main tabs Setup Basic Setup Enter the Internet connection and network settings on this screen DDNS To enable the Router s Dynamic Domain Name System DDNS feature complete the fields on this screen MAC Address Clone If you need to clone a MAC address onto the Router use this screen Advanced Routing On this screen you can alter Network Address Translation NAT Dynami...

Page 22: ...rnet applications click this tab UPnP Forwarding Use this screen to alter UPnP forwarding settings DMZ To allow one local user to be exposed to the Internet for use of special purpose services use this screen Administration Management On this screen alter router access privileges and UPnP settings Log If you want to view or save activity logs click this tab Diagnostics Use this screen to check the...

Page 23: ...k the OK button The Setup Tab The Basic Setup Tab The first screen that appears is the Basic Setup tab See Figure 6 2 This tab allows you to change the Router s general settings Change these settings as described here and click the Save Settings button to save your changes or Cancel Changes to cancel your changes Internet Setup Internet Connection Type The Router supports four connection types Aut...

Page 24: ...e PPPoE If they do you will have to enable PPPoE User Name and Password Enter the User Name and Password provided by your ISP Connect on Demand Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time Max Idle Time If your Internet connection has been terminated due to inactivity Connect on Demand enables the Router to auto...

Page 25: ...er the number of minutes you want to have elapsed before your Internet connection terminates Keep Alive Option Redial Period If you select this option the Router will periodically check your Internet connection If you are disconnected then the Router will automatically re establish your connection To use this option click the radio button next to Keep Alive To use this option click the radio butto...

Page 26: ... disable DHCP remember to assign a static IP address to the Router Start IP Address Enter a value for the DHCP server to start with when issuing IP addresses This value must be 192 168 1 2 or greater because the default IP address for the Router is 192 168 1 1 Number of Address Enter the maximum number of PCs that you want the DHCP server to assign IP addresses to This number cannot be greater tha...

Page 27: ...ame Password and Host Name Enter the User Name Password and Host Name of the account you set up with DynDNS org Internet IP Address The Router s current Internet IP Address is displayed here Because it is dynamic it will change Status The status of the DDNS service connection is displayed here When finished making your changes on this tab click the Save Settings button to save these changes or cli...

Page 28: ...er s MAC address It is recommended that the PC registered with the ISP is used to open the MAC Address Clone tab When finished making your changes on this tab click the Save Settings button to save these changes or click the Cancel Changes button to undo your changes Advanced Routing Tab The Advanced Routing screen allows you to configure the dynamic routing and static routing settings See Figure ...

Page 29: ...d to route to the Router s entire network rather than just to the Router Subnet Mask The Subnet Mask also known as the Network Mask determines which portion of an IP address is the network portion and which portion is the host portion Take for example a network in which the Subnet Mask is 255 255 255 0 This determines by using the values 255 that the first three numbers of a network IP address ide...

Page 30: ...work Name SSID into the field The SSID is the network name shared among all devices in a wireless network The SSID must be identical for all devices in the wireless network It is case sensitive and must not exceed 32 alphanumeric characters which may be any keyboard character For added security Linksys recommends that you change the default SSID linksys to a unique name of your choice Wireless Cha...

Page 31: ...used when the Router sends data Make sure the receiving device is using the same key WEP Encryption Select the level of WEP encryption you wish to use 64 bit 10 hex digits or 128 bit 26 hex digits Higher encryption levels offer higher levels of security but due to the complexity of the encryption they may decrease network performance Passphrase Instead of manually entering WEP keys you can enter a...

Page 32: ...screen in Figure 6 15 will appear Select the MAC Address from the list and click the Select button To prevent access click the Prevent from accessing button then click Select MAC Address from the list From the screen in Figure 6 14 select the MAC Address from the list and click the Select button Click the Refresh button if you want to refresh the screen Click the Close button to return to th previ...

Page 33: ... the beacon A beacon is a packet broadcast by the Router to synchronize the wireless network DTIM Interval The default value is 3 This value between 1 and 255 milliseconds indicates the interval of the Delivery Traffic Indication Message DTIM A DTIM field is a countdown field informing clients of the next window for listening to broadcast and multicast messages When the Router has buffered broadca...

Page 34: ...to Internet sites created using this programming language To enable Java Applet filtering click Enabled Filter ActiveX ActiveX is a programming language for websites If you deny ActiveX you run the risk of not having access to Internet sites created using this programming language To enable ActiveX filtering click Enabled Filter Multicast Multicasting allows for multiple transmissions to specific ...

Page 35: ...2TP Passthrough click the Disabled button VPN Tunnel The VPN Router creates a tunnel or channel between two endpoints so that the data or information between these endpoints is secure To establish this tunnel select the tunnel you wish to create in the Select Tunnel Entry drop down box It is possible to create up to 100 simultaneous tunnels Then click Enabled to enable the tunnel Once the tunnel i...

Page 36: ... methods are described below Auto IKE Select Auto IKE and enter a series of numbers or letters in the Pre shared Key field Check the box next to PFS Perfect Forward Secrecy to ensure that the initial key exchange and IKE proposals are secure Based on this word which MUST be entered at both ends of the tunnel if this method is used a key is generated to scramble encrypt the data being transmitted o...

Page 37: ...P packets There are two choices DES and 3DES 3DES is recommended because it is more secure Authentication Select the method used to authenticate ESP packets There are two choices MD5 and SHA SHA is recommended because it is more secure Group There are two Diffie Hellman Groups to choose from 768 bit and 1024 bit Diffie Hellman refers to a cryptographic technique that uses public and private keys f...

Page 38: ...tication Type To enable EAP TLS click EAP TLS To enable EAP TTLS click EAP TTLS To enable EAP MD5 click EAP MD5 To disable authentication click Disable WEP Settings Click the WEP Settings button to edit the settings and Figure 6 21 will appear Dynamic WEP Key Length Select 64 or 128 bits from the drop down menu Key Renewal Timeout Enter the time in seconds for key renewal Port Inactivity Timeout E...

Page 39: ...must be exactly 10 hexadecimal characters in length If you are using 128 bit WEP encryption then the key must be exactly 26 hexadecimal characters in length Valid hexadecimal characters are 0 9 and A F When finished making your changes on this tab click the Save Settings button to save these changes or click the Cancel Changes button to undo your changes The Access Restrictions Tab Access Restrict...

Page 40: ...ppropriate setting next to Days and Time choose when Internet access will be filtered 6 Lastly click the Save Settings button to activate the policy To create an Inbound Traffic Policy 1 Enter a Policy Name in the field provided Select Inbound Traffic as the Policy Type 2 Enter the IP Address from which you want to block Select the Protocol TCP UDP or Both Enter the port number or select Any Enter...

Page 41: ...t to your network via the Internet the Router will forward those requests to the appropriate PC Any PC whose port is being forwarded must have its DHCP client function disabled and must have a new static IP address assigned to it because its IP address may change when using the DHCP function Application Enter the name you wish to give each application Start and End Enter the starting and ending nu...

Page 42: ...hen the requested data returns through the Router the data is pulled back to the proper computer by way of IP address and port mapping rules Application Enter the name you wish to give each application Start Port and End Port Enter the starting and ending Triggered range numbers and the Forwarded Range numbers of the port you wish to forward Protocol Select the type of protocol you wish to use for...

Page 43: ...in the field Then enter the External and Internal Port numbers in the fields Select the type of protocol you wish to use for each application TCP UDP or Both Enter the IP Address in the field Click Enabled to enable UPnP Forwarding for the chosen application When finished making your changes on this tab click the Save Settings button to save these changes or click the Cancel Changes button to undo...

Page 44: ...Disabled DMZ Host IP Address To expose one PC enter the computer s IP address To get the IP address of a computer refer to Appendix D Finding the MAC Address and IP Address for Your Ethernet Adapter Deactivate DMZ by entering a 0 in the field Hardware DMZ This feature allows a user to use LAN Port 4 as a DMZ Port To use this feature select Enabled To disable DMZ select Disabled Hardware DMZ IP Add...

Page 45: ...ment This feature allows you to manage the Router from a remote location via the Internet To enable Remote Management click Enabled Mangagement Port Select the port number you will use to remotely access the Router from the drop down menu SNMP Simple Network Management Protocol SNMP is a popular network monitoring and management protocol To enable SNMP click Enabled To disable SNMP click Disabled ...

Page 46: ...s to disable Internet access When enabled this feature allows you to prohibit any and all Internet connections When finished making your changes on this tab click the Save Settings button to save these changes or click the Cancel Changes button to undo your changes Log The Log tab shown in Figure 6 31 provides you with a log of all incoming and outgoing URLs or IP addresses for your Internet conne...

Page 47: ...Messages Deny Policies Allow Policies Content Filtering Data Inspection authorized Login or Configuration Changes When finished making your changes on this tab click the Save Settings button to save these changes or click the Cancel Changes button to undo your changes Diagnostics Ping Test See Figure 6 32 Ping Test Parameters Ping Target IP Enter the IP Address that you want to ping in the field N...

Page 48: ...nges on this tab click the Save Settings button to save these changes or click the Cancel Changes button to undo your changes Firmware Upgrade See Figure 6 34 To upgrade the Router s firmware 1 Click the Browse button to find the firmware upgrade file that you downloaded from the Linksys website and then extracted 2 Double click the firmware file you downloaded and extracted Click the Upgrade butt...

Page 49: ...net Connections See Figure 6 35 Information The information displayed is the Hardware Version Software Version MAC Address Local MAC Address and System Up Time WAN Connections The WAN Connections displayed are the Network Access WAN IP Address Subnet Mask Default Gateway and DNS Click the Refresh button if you want to Refresh your screen Figure 6 35 Router ...

Page 50: ...ubnet Mask DHCP Server and DHCP Client Lease Info To view the DHCP Clients Table click the DHCP Clients button See Figure 6 36 The DHCP Active IP Table Figure 6 37 displays the computer name IP Address MAC Address and the expiration time Click the Close button to return to the Local Network screen Figure 6 37 DHCP Active IP Table Figure 6 36 Local Network ...

Page 51: ... if you want to Refresh your screen System Performance The System Peformance information that is displayed is the Wireless Internet and or LAN information for the IP Address MAC Address Connection Status Packets Received Packets Sent Bytes Received Bytes Sent Error Packes Received and Dropped Packets Received See Figure 6 39 Click the Refresh button if you want to Refresh your screen Figure 6 39 S...

Page 52: ... on the network connected to the Router Make sure that each IP address is unique for each PC or network device 4 Click the Gateway tab and in the New Gateway prompt enter 192 168 1 1 which is the default IP address of the Router Click the Add button to accept the entry 5 Click the DNS tab and make sure the DNS Enabled option is selected Enter the Host and Domain names e g John for Host and home fo...

Page 53: ... Click the Properties button 5 Enter a unique IP address that is not used by any other computer on the network connected to the Router 6 Enter the Subnet Mask 255 255 255 0 7 Enter the Default Gateway 192 168 1 1 Router s default IP address 8 Toward the bottom of the window select Use the following DNS server addresses and enter the Preferred DNS server and Alternative DNS server provided by your ...

Page 54: ... original computer is not the cause of the problem If you do NOT get a reply there may be a problem with the connection Try the ping command from a different computer to verify that your original computer is not the cause of the problem 3 I am not getting an IP address on the Internet with my Internet connection Refer to Problem 2 I want to test my Internet connection to verify that you have conne...

Page 55: ...l IP address For example if your VPN server assigns an IP address 192 168 1 X X is a number from 1 to 254 and your local LAN IP address is 192 168 1 X X is the same number used in the VPN IP address the Router will have difficulties routing information to the right location If you change the Router s IP address to 192 168 2 1 that should solve the problem Change the Router s IP address through the...

Page 56: ...applications most will work without doing any port forwarding or DMZ hosting There may be cases when you want to host an online game or Internet application This would require you to set up the Router to deliver incoming packets or data to a specific computer This also applies to the Internet applications you are using The best way to get the information on what port services to use is to go to th...

Page 57: ...nters from does not have port forwarding then the Router will send the data to whichever PC or network device you set for DMZ hosting Follow these steps to set DMZ hosting 1 Access the Router s web based utility by going to http 192 168 1 1 or the IP address of the Router Go to the Applications and Gaming DMZ tab 2 Disable or remove the entries you have entered for forwarding Keep this information...

Page 58: ... To start over I need to set the Router to factory default Hold the Reset button for 10 seconds and then release it This will return the password forwarding and other settings on the Router to the factory default settings In other words the Router will revert to its original factory configuration 12 I need to upgrade the firmware In order to upgrade the firmware with the latest features you need t...

Page 59: ...play as Connected Click the Save Settings button to continue If the connection is lost again follow steps 1 6 to re establish connection 15 I can t access my e mail web or VPN or I am getting corrupted data from the Internet The Maximum Transmission Unit MTU setting may need to be adjusted By default the MTU is set at 1500 For most DSL users it is strongly recommended to use MTU 1492 If you are ha...

Page 60: ... your browser is set to connect directly and that any dial up is disabled For Internet Explorer click Tools Internet Options and then the Connection tab Make sure that Internet Explorer is set to Never dial a connection For Netscape Navigator click Edit Preferences Advanced and Proxy Make sure that Netscape Navigator is set to Direct connection to the Internet Frequently Asked Questions What is th...

Page 61: ...the following fix click ICQ menu preference connections tab and check I am behind a firewall or proxy Then set the firewall time out to 80 seconds in the firewall setting The Internet user can then send a file to a user behind the Router I set up an Unreal Tournament Server but others on the LAN cannot join What do I need to do If you have a dedicated Unreal Tournament server running you need to c...

Page 62: ...rmware upgrades All Linksys firmware upgrades are posted on the Linksys website at www linksys com where they can be downloaded for free To upgrade the Router s firmware use the System tab of the Router s web based utility If the Router s Internet connection is working well there is no need to download a newer firmware version unless that version contains new features that you would like to use Do...

Page 63: ...ssions at the same time but you can only forward 10 ranges of ports What are the advanced features of the Router The Router s advanced features include Advanced Wireless settings Filters Port Forwarding Routing and DDNS What is the maximum number of VPN sessions allowed by the Router The maximum number depends on many factors At least one IPSec session will work through the Router however simultan...

Page 64: ...ontinuously while moving freely throughout an area greater than that covered by a single access point Before using the roaming function the workstation must make sure that it is the same channel number with the access point of dedicated coverage area To achieve true seamless connectivity the wireless LAN must incorporate a number of different functions Each node and access point for example must a...

Page 65: ...S And what are their differences Frequency Hopping Spread Spectrum FHSS uses a narrowband carrier that changes frequency in a pattern that is known to both transmitter and receiver Properly synchronized the net effect is to maintain a single logical channel To an unintended receiver FHSS appears to be short duration impulse noise Direct Sequence Spread Spectrum DSSS generates a redundant bit patte...

Page 66: ...Lead glass metal concrete floors water and walls will inhibit the signal and reduce range Start with the Router and your wireless PC in the same room and move it away in small increments to determine the maximum range in your environment You may also try using different channels as this may eliminate interference affecting only one channel I have excellent signal strength but I cannot see my netwo...

Page 67: ...eive those transmission Wireless networks are easy to find Hackers know that in order to join a wireless network your wireless PC will typically first listen for beacon messages These are identifying packets transmitted from the wireless network to announce its presence to wireless nodes looking to connect These beacon frames are unencrypted and contain much of the network s information such as th...

Page 68: ... IP addresses usernames passwords instant message conversations emails account information and any data transmitted wirelessly can easily be seen by someone outside of your network because it is often broadcast in clear text Simply put any information transmitted on a wireless network leaves both the network and individual users vulnerable to attack All a hacker needs is a packet sniffer software ...

Page 69: ...analyzing about a day s worth of network traffic mostly in the case of business networks Over time the hacker can build up a table of network data and be able to decrypt all of your wireless transmissions This type of attack is more effective with networks that transmit more data such as businesses Man in the Middle Attacks A hacker doesn t need to log into your network as a user he can appear as ...

Page 70: ...ember that access points transmit indiscriminately in a radius placing an access point at the edge of the physical network area reduces network performance and leaves an opening for any hacker smart enough to discover where the router is transmitting This is an invitation for a man in the middle attack as described in the previous section To perform this type of attack the hacker has to be physica...

Page 71: ...at while SSIDs are good for segmenting networks they fall short with regards to security Hackers can usually find them quite easily 6 MAC addresses Enable MAC address filtering if your wireless products allow it MAC address filtering will allow you to provide access to only those wireless nodes with certain MAC addresses This makes it harder for a hacker using a random MAC address or spoofing faki...

Page 72: ...First nodes in your wireless network are identified with a common WEP key Second these WEP keys encrypt and decrypt data sent over your wireless network So a higher level of security ensures that hackers will have a harder time breaking into your network Setting one static WEP key on your wireless network leaves your network open the threats even as you think it is protecting you While it is true ...

Page 73: ...to use a WEP Passphrase it can be a maximum of 16 alphanumeric characters This passphrase may not work with non Linksys products due to possible incompatibility with other vendors passphrase generators The WEP Key can be generated using your Passphrase or you can enter it manually If you wish to enter the WEP Key manually type the key into the appropriate Key field on the left The WEP key must con...

Page 74: ...ttp support microsoft com support kb articles Q252 7 35 asp Microsoft KB Q257225 Basic IPSec Troubleshooting in Windows 2000 http support microsoft com support kb articles Q257 2 25 asp Environment The IP addresses and other specifics mentioned in this appendix are for illustration purposes only Windows 2000 or Windows XP IP Address 140 111 1 2 User ISP provides IP Address this is only an example ...

Page 75: ...or your policy for example to_router Then click Next 4 Deselect the Activate the default response rule check box and then click the Next button 5 Click the Finish button making sure the Edit check box is checked Step 2 Build Filter Lists Filter List 1 win router 1 In the new policy s properties screen verify that the Rules tab is selected as shown in Figure C 2 Deselect the Use Add Wizard check bo...

Page 76: ...ss field select A specific IP Subnet and fill in the IP Address 192 168 1 0 and Subnet mask 255 255 255 0 These are the Router s default settings If you have changed these settings enter your new values 5 If you want to enter a description for your filter click the Description tab and enter the description there 6 Click the OK button Then click the OK for Windows XP or Close for Windows 2000 butto...

Page 77: ...pecific IP Subnet and enter the IP Address 192 168 1 0 and Subnet mask 255 255 255 0 Enter your new values if you have changed the default settings In the Destination address field select My IP Address 10 If you want to enter a description for your filter click the Description tab and enter the description there 11 Click the OK button and the New Rule Properties screen should appear with the IP Fi...

Page 78: ... 2 Click the Filter Action tab as in Figure C 11 and click the filter action Require Security radio button Then click the Edit button 3 From the Security Methods tab shown in Figure C 12 verify that the Negotiate security option is enabled and deselect the Accept unsecured communication but always respond using IPSec check box Select Session key Perfect Forward Secrecy and click the OK button Figu...

Page 79: ...and click the Edit button 5 Change the authentication method to Use this string to protect the key exchange preshared key as shown in Figure C 14 and enter the preshared key string such as XYZ12345 Click the OK button 6 This new Preshared key will be displayed in Figure C 15 Click the OK or Close button to continue Figure C 14 Preshared Key Figure C 13 Authentication Methods Figure C 15 New Presha...

Page 80: ... the Router s WAN IP Address 8 Select the Connection Type tab as shown in Figure C 17 and click All network connections Then click the OK or Close button to finish this rule Tunnel 2 router win 9 In the new policy s properties screen shown in Figure C 18 make sure that win router is selected and deselect the Use Add Wizard check box Then click the Add button to create the second IP filter Figure C...

Page 81: ... win as shown in Figure C 19 11 Click the Filter Action tab and select the filter action Require Security as shown in Figure C 20 Then click the Edit button 12 Click the Authentication Methods tab and verify that the authentication method Kerberos is selected as shown in Figure C 21 Then click the Edit button Figure C 19 IP Filter List Tab Figure C 20 Filter Action Tab Figure C 21 Authentication M...

Page 82: ...as shown in Figure C 22 This is a sample key string Yours should be a key that is unique but easy to remember Then click the OK button 14 This new Preshared key will be displayed in Figure C 23 Click the OK button to continue 15 From the Tunnel Setting tab shown in Figure C 24 click the radio button for The tunnel endpoint is specified by this IP Address and enter the Windows 2000 XP computer s IP...

Page 83: ...click the OK for Windows XP or Close for Windows 2000 button to finish 17 From the Rules tab shown in Figure C 26 click the OK button to return to the secpol screen Step 4 Assign New IPSec Policy In the IP Security Policies on Local Computer window shown in Figure C 27 right click the policy named to_router and click Assign A green arrow appears in the folder icon Figure C 25 Connection Type Figur...

Page 84: ...y Gateway fields 7 Select fromtwo different types of encryption DES or 3DES 3DES is recommended because it is more secure You may choose either of these but it must be the same type of encryption that is being used by the VPN device at the other end of the tunnel Or you may choose not to encrypt by selecting Disable 8 Select from two types of authentication MD5 and SHA SHA is recommended because i...

Page 85: ...Me 2000 or XP Windows 98 or Me Instructions 1 Click Start and Run In the Open field enter winipcfg Then press the Enter key or the OK button 2 When the IP Configuration screen appears select the Ethernet adapter you have connected to the Router via a CAT 5 Ethernet network cable See Figure D 1 3 Write down the Adapter Address as shown on your computer screen see Figure D 2 This is the MAC address ...

Page 86: ... press the Enter key 3 Write down the Physical Address as shown on your computer screen Figure D 3 it is the MAC address for your Ethernet adapter This appears as a series of numbers and letters The MAC address Physical Address is what you will use for MAC address cloning or MAC filtering The example in Figure E 3 shows the Ethernet adapter s IP address as 192 168 1 100 Your computer may show some...

Page 87: ...he workstation console used to oversee the network The Router then returns information contained in a MIB Management Information Base which is a data structure that defines what is obtainable from the device and what can be controlled turned off on etc SNMP functions such as statistics configuration and device information are not available without third party Management Software The Router is comp...

Page 88: ...ty s Firmware Upgrade tab from the Administration tab Follow these instructions 1 Click the Browse button to find the firmware upgrade file that you downloaded from the Linksys website and then extracted 2 Double click the firmware file you downloaded and extracted Click the Upgrade button and follow the instructions there Figure F 1 Upgrade Firmware ...

Page 89: ...r protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing shared resour...

Page 90: ...rk Adapter This is a device that adds network functionality to your PC Ad hoc A group of wireless devices communicating directly with each other peer to peer without the use of an access point Backbone The part of a network that connects most of the systems and networks together and handles the most data Bandwidth The transmission capacity of a given device or network Beacon Interval The frequency...

Page 91: ...ed domain name Default Gateway A device that forwards Internet traffic from your local area network DHCP Dynamic Host Configuration Protocol A protocol that lets one device on a local network known as a DHCP server assign temporary IP addresses to the other network devices typically computers DMZ Demilitarized Zone Removes the Router s firewall protection from one PC allowing it to be seen from th...

Page 92: ...FTP File Transfer Protocol A standard protocol for sending files between computers over a TCP IP network and the Internet Full Duplex The ability of a networking device to receive and transmit data simultaneously Gateway A system that interconnects networks Half Duplex Data transmission that can occur in two directions over a single line but only one direction at a time Hardware The physical aspec...

Page 93: ...of computers or devices connected for the purpose of data sharing storage and or transmission between users NNTP Network News Transfer Protocol The protocol used to connect to Usenet groups on the Internet Node A network junction or connection point typically a computer or work station OFDM Orthogonal Frequency Division Multiplexing A type of modulation technology that separates the data stream in...

Page 94: ...r a CTS Clear To Send message before sending data Server Any computer whose function in a network is to provide user access to files printing communications and other services SMTP Simple Mail Transfer Protocol The standard e mail protocol on the Internet SNMP Simple Network Management Protocol A widely used network monitoring and control protocol Software Instructions for the computer A series of...

Page 95: ... network protocol for transmitting data that does not require acknowledgement from the recipient of the data that is sent Upgrade To replace existing software or firmware with a newer version Upload To transmit a file over a network URL Uniform Resource Locator The address of a file located on the Internet VPN Virtual Private Network A security measure to protect data as it leaves one network and ...

Page 96: ...r better Data Rate Up to 54Mbps wireless up to 100 Mbps LAN Transmit Power 19dBm LEDs Power Internet Ethernet 1 2 3 4 Wireless G DMZ Security Features WEP 802 1x Authentication WEP Key Bits 64 128 Dimensions 186 mm x 175 mm x 48 mm Unit Weight 0 57 kg Power External 5V DC 2 5A Certifications FCC IC 03 CE Operating Temp 0ºC to 40ºC Storage Temp 20ºC to 70ºC Operating Humidity 10 to 85 Non Condensin...

Page 97: ...relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult a dealer or an experienced radio TV technician for assistance FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated...

Page 98: ...elles et aux dispositions relatives à la directive 1999 5 EC Belgique Dans le cas d une utilisation privée à l extérieur d un bâtiment au dessus d un espace public aucun enregistrement n est nécessaire pour une distance de moins de 300m Pour une distance supérieure à 300m un enregistrement auprès de l IBPT est requise Pour une utilisation publique à l extérieur de bâtiments une licence de l IBPT e...

Page 99: ...y modifications in order to maintain uninterrupted service In the event this equipment should fail to operate properly disconnect the unit from the telephone line Try using another FCC approved device in the same telephone jack If the trouble persists call the telephone company repair service bureau If the trouble does not persist and appears to be with this unit disconnect the unit from the telep...

Page 100: ...IED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except by Linksys b has not been installed operated re...

Page 101: ...oduct you can e mail us at Austria support at linksys com Belguim support be linksys com Denmark support dk linksys com France support fr linksys com Germany support de linksys com Italy support it linksys com Netherlands support nl linksys com Norway support no linksys com Portugal support pt linksys com Spain support es linksys com Sweden support se linksys com Switzerland support ch linksys com...

Reviews: