background image

38

Chapter 6: Configuring the Wireless-G Broadband Router
The Setup Tab - MAC Address Clone

Wireless-G Broadband Router

The Setup Tab - MAC Address Clone

A MAC address is a 12-digit code assigned to a unique piece of hardware for identification. Some ISPs will 
require you to register a MAC address in order to access the Internet.  If you do not wish to re-register the MAC 
address with your ISP, you may assign the MAC address you have currently registered with your ISP to the Router 
with the MAC Address Clone feature.

Enable/Disable

. To have the MAC Address cloned, click the radio button beside 

Enable

.

User Defined Entry

. Enter the MAC Address registered with your ISP here.

Clone Your PC’s MAC Address

. Clicking this button will clone the MAC address.

Change these settings as described here and click the 

Save Settings 

button to apply your changes or 

Cancel 

Changes

to cancel your changes.

Figure 6-13: Setup Tab - MAC Address Clone

Summary of Contents for WRT54G

Page 1: ...A Division of Cisco Systems Inc Model No Broadband Router Wireless G WRT54G User Guide WIRELESS GHz 2 4802 11g ...

Page 2: ...is Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents This exclamation point means there is a caution or warning and is something that could damage your property or the Wireless G Broadband Router This checkmark means there is a note o...

Page 3: ... Another Router 10 Chapter 5 Setting up the Wireless G Broadband Router 12 Overview 12 Using the Setup Wizard 12 Using SecureEasySetup to Configure Your Notebook 29 Chapter 6 Configuring the Wireless G Broadband Router 32 Overview 32 The Setup Tab Basic Setup 33 The Setup Tab DDNS 37 The Setup Tab MAC Address Clone 38 The Setup Tab Advanced Routing 39 The Wireless Tab Basic Wireless Settings 40 Th...

Page 4: ...Network 57 The Status Tab Wireless 58 Appendix A Troubleshooting 59 Common Problems and Solutions 59 Frequently Asked Questions 67 Appendix B Wireless Security 74 Security Precautions 74 Security Threats Facing Wireless Networks 74 Appendix C Upgrading Firmware 77 Appendix D Windows Help 78 Appendix E Finding the MAC Address and IP Address for Your Ethernet Adapter 79 Windows 98SE or Me Instructio...

Page 5: ... to a PC Screen 14 Figure 5 7 Setup Wizard s Connect the Network Cable to the Router Screen 15 Figure 5 8 Setup Wizard s Power on the Router Screen 15 Figure 5 9 Setup Wizard s Check the Router s Status Screen 16 Figure 5 10 Setup Wizard s Configure Cable or DHCP Settings Screen 16 Figure 5 11 Setup Wizard s Configure DSL PPPoE Settings Screen 17 Figure 5 12 Setup Wizard s Advanced Internet Settin...

Page 6: ...34 Setup Wizard s Welcome Start Wizard Screen 29 Figure 5 35 SecureEasySetup Welcome Screen 29 Figure 5 36 Configure Wireless Settings 1 Screen 30 Figure 5 37 Configure Wireless Settings 2 Screen 30 Figure 5 38 Your Wireless Settings Screen 31 Figure 6 1 Password Screen 32 Figure 6 2 Setup Tab Basic Setup 33 Figure 6 3 DHCP Connection Type 33 Figure 6 4 Static IP Connection Type 33 Figure 6 5 PPPo...

Page 7: ...ard 49 Figure 6 32 Applications and Gaming Tab Port Triggering 50 Figure 6 33 Applications and Gaming Tab DMZ 51 Figure 6 34 Applications and Gaming Tab QOS 51 Figure 6 35 Administration Tab Management 53 Figure 6 36 Administration Tab Log 53 Figure 6 37 Administration Tab Diagnostics 54 Figure 6 38 The Ping Test 54 Figure 6 39 The Traceroute Test 54 Figure 6 40 Administration Tab Factory Defaults...

Page 8: ... Ethernet cables which is why the network is called wired PCs equipped with wireless cards or adapters can communicate without cumbersome cables By sharing the same wireless settings within their transmission radius they form a wireless network This is sometimes called a WLAN or Wireless Local Area Network The Wireless G Broadband Router bridges wireless networks of both 802 11b and 802 11g standa...

Page 9: ...reless G Broadband Router s Setup Wizard to configure its settings It also covers the instructions for using the Router s SecureEasySetup feature to create your wireless network Chapter 6 Configuring the Wireless G Broadband Router This chapter explains how to use the Web based Utility to configure the settings on the Wireless G Broadband Router Appendix A Troubleshooting This appendix describes s...

Page 10: ... Appendix F Glossary This appendix gives a brief glossary of terms frequently used in networking Appendix G Specifications This appendix provides the technical specifications for the Router Appendix H Warranty Information This appendix supplies the warranty information for the Router Appendix I Regulatory Information This appendix supplies the regulatory information regarding the Router Appendix J...

Page 11: ... Wireless G Broadband Router which serves as the main point of communications in a wireless network The Router transmits data to PCs equipped with wireless network adapters which can roam within a certain radial range of the Router You can arrange the Router and multiple access points to work in succession to extend the roaming range and you can set up your wireless network to communicate with you...

Page 12: ...l also communicate with the Wireless PrintServer WPS54G and Wireless Ethernet Bridges WET54G WET11 When you wish to connect your wireless network with your wired network you can use the Wireless G Broadband Router s four LAN ports To add more ports any of the Wireless G Broadband Router s LAN ports can be connected to any of Linksys s switches such as the SD205 or SD208 With these and many other L...

Page 13: ... defaults from the Administration tab Factory Defaults in the Router s Web based Utility Internet The Internet port is where you will connect your broadband Internet connection 1 2 3 4 These ports 1 2 3 4 connect the Router to your networked PCs and other Ethernet network devices Power The Power port is where you will connect the power adapter IMPORTANT Resetting the Router will erase all of your ...

Page 14: ...ower Green The Power LED lights up and will stay on while the Router is powered on When the Router goes through its self diagnostic mode during every boot up this LED will flash When the diagnostic is complete the LED will be solidly lit DMZ Green The DMZ LED indicates when the DMZ function is being used This LED will remain lit as long as DMZ is enabled WLAN Green The WLAN LED lights up whenever ...

Page 15: ...tion for Connection to Another Router Hardware Installation for Connection to Your Broadband Modem 1 Power down your network devices 2 Locate an optimum location for the Router The best place for the Router is usually at the center of your wireless network with line of sight to all of your mobile stations 3 Fix the direction of the antennas Try to place the Router in a position that will best cove...

Page 16: ... and the other end into an electrical outlet Only use the power adapter supplied with the Router Use of a different adapter may result in product damage Now that the hardware installation is complete proceed to Chapter 5 Setting up the Wireless G Broadband Router for directions on how to configure the Router Figure 4 2 Connecting Your Network Devices Figure 4 3 Connecting the Power IMPORTANT Make ...

Page 17: ...p section there is a setting called Local IP Address which is set to 192 168 1 1 Change this to 192 168 2 1 4 Click the Save Settings button to save your change and then exit the Web based Utility 5 Power down your network devices Now you will begin the hardware installation of Router 6 Locate an optimum location for the Router The best place for the Router is usually at the center of your wireles...

Page 18: ...ling 10 Connect the AC power adapter to the Router s Power port and the other end into an electrical outlet Only use the power adapter supplied with the Router Use of a different adapter may result in product damage Now that the hardware installation is complete proceed to Chapter 5 Setting up the Wireless G Broadband Router for directions on how to configure the Router IMPORTANT Make sure you use...

Page 19: ...e select the appropriate language and then click the Next button 3 On the following Welcome screen click the Click Here to Start button if this is the first time you are running the Setup Wizard These are your other choices Wireless Setup If you have a computer displaying the SecureEasySetup logo then click Wireless Setup and proceed to the section at the end of this chapter Using SecureEasySetup ...

Page 20: ...greement click the Next button if you accept or click the Cancel button to end the installation 5 The Setup Wizard will ask you to disconnect your broadband modem from your PC After you have done so click the Next button Figure 5 3 Setup Wizard s License Agreement Screen Figure 5 4 Setup Wizard s Disconnect the Modem from the PC Screen ...

Page 21: ...ou to connect your broadband modem to the Router After you have done so click the Next button 7 The Setup Wizard will ask you to connect a network cable to your PC After you have done so click the Next button Figure 5 5 Setup Wizard s Connect the Modem to the Router Screen Figure 5 6 Setup Wizard s Connect a Network Cable to a PC Screen ...

Page 22: ...nd of the network cable to the Router Then you can also connect additional PCs to the Router After you have done so click the Next button 9 The Setup Wizard will ask you to power on the Router After you have done so click the Next button Figure 5 7 Setup Wizard s Connect the Network Cable to the Router Screen Figure 5 8 Setup Wizard s Power on the Router Screen ...

Page 23: ...et connection type you will see the Advanced Internet Settings screen and you will be asked to select your Internet connection type Static IP PPTP L2TP or Telstra Proceed to the appropriate section for your Internet connection type Cable or DHCP Host Name Enter the Host Name if required by your ISP otherwise leave this field blank Domain Name Enter the Domain Name if required by your ISP otherwise...

Page 24: ...d of time select Connect on Demand and designate the number of minutes you want that period of inactivity to last Click the Next button to continue or the Back button to return to the previous screen Static IP Connection If you are required to use a permanent IP address to connect to the Internet select Static IP from the drop down menu IP Address Enter the IP address provided by your ISP Subnet M...

Page 25: ...ck the Next button to continue or the Back button to return to the previous screen Keep Alive If you want the Router to periodically check your Internet connection select Keep Alive Then specify how often you want the Router to check the Internet connection If the connection is down the Router will automatically re establish your connection Connect on Demand If you want the Router to end the Inter...

Page 26: ...d be provided by your ISP Keep Alive If you want the Router to periodically check your Internet connection select Keep Alive Then specify how often you want the Router to check the Internet connection If the connection is down the Router will automatically re establish your connection Connect on Demand If you want the Router to end the Internet connection after it has been inactive for a period of...

Page 27: ...using this should be provided by your ISP Keep Alive If you want the Router to periodically check your Internet connection select Keep Alive Then specify how often you want the Router to check the Internet connection If the connection is down the Router will automatically re establish your connection Connect on Demand If you want the Router to end the Internet connection after it has been inactive...

Page 28: ...revious screen 13 There are two ways to configure the Router s wireless settings SecureEasySetup and manual configuration If you have other SecureEasySetup devices such as notebook adapters or printers then you can use the Router s SecureEasySetup feature to create your wireless network Proceed to the section Using the Router s SecureEasySetup Feature If you do not have other SecureEasySetup devic...

Page 29: ...ons on how to locate the SecureEasySetup hardware button If your device does not have a hardware button it most likely will have a software button Click the Next button for instructions to locate the software button or click the Close button to return to the Configure Wireless Settings screen You will see a screen with instructions on how to locate the SecureEasySetup software button Click the Clo...

Page 30: ...ecureEasySetup device When you have finished configuring the devices in your wireless network click the Next button to continue 3 The Setup Wizard will ask you to review your settings before it saves them Write down these settings if you need to manually configure any non SecureEasySetup devices Click the Yes button if you are satisfied with your settings or click the No button if you do not want ...

Page 31: ...er or click the Finish button to complete the Setup Wizard 5 The Congratulations screen will appear Click the Online Registration button to register the Router or click the Exit button to exit the Setup Wizard Congratulations The installation of the Wireless G Broadband Router is complete If you want to make advanced configuration changes proceed to Chapter 6 Configuring the Wireless G Broadband R...

Page 32: ...this channel to communicate From the Network Mode drop down menu select the wireless standards running on your network If you have both 802 11g and 802 11b devices in your network keep the default setting Mixed Mode If you have only 802 11g devices select G Only If you have only 802 11b devices select B Only If you want to disable your wireless network select Disable Enter a name for the Router in...

Page 33: ...namic encryption keys Select TKIP or AES for encryption Then enter a Passphrase that is 8 32 characters in length Encryption Select the type of algorithm you want to use TKIP or AES from the Encryption drop down menu Passphrase Enter a Passphrase also called a pre shared key of 8 32 characters in the Passphrase field The longer and more complex your Passphrase is the more secure your network will ...

Page 34: ...Bit Enter a passphrase or WEP key Passphrase Enter a passphrase in the Passphrase field so a WEP key is automatically generated The passphrase is case sensitive and should not be longer than 16 alphanumeric characters It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only If you have any non Linksys wireless products enter the WEP ...

Page 35: ...puter or click the Finish button to complete the Setup Wizard 6 The Congratulations screen will appear Click the Online Registration button to register the Router or click the Exit button to exit the Setup Wizard Congratulations The installation of the Wireless G Broadband Router is complete If you want to make advanced configuration changes proceed to Chapter 6 Configuring the Wireless G Broadban...

Page 36: ...describe the two steps you will take to configure your notebook Click the Next button to continue To exit the Wireless Setup Wizard click the Exit button If you need more information click the Help button Figure 5 35 SecureEasySetup Welcome Screen NOTE SecureEasySetup uses WPA Personal encryption If your current wireless devices do not support WPA Personal security then you cannot use SecureEasySe...

Page 37: ...lick the Next button to continue To exit the Wireless Setup Wizard click the Exit button If you need more information click the Help button 3 Click the on screen START button to continue To exit the Wireless Setup Wizard click the Exit button If you need more information click the Help button To return to the previous screen click the Back button Figure 5 37 Configure Wireless Settings 2 Screen Fi...

Page 38: ...ration settings click the Print button You may need these settings so you can manually configure any non SecureEasySetup devices you may have To exit the Wireless Setup Wizard click the Exit button If you need more information click the Help button To return to the previous screen click the Back button Congratulations The installation of the Wireless G Broadband Router is complete If you want to m...

Page 39: ...is admin To secure the Router change the Password from its default There are seven main tabs Setup Wireless Security Access Restrictions Applications Gaming Administration and Status Additional tabs will be available after you click one of the main tabs To access the Web based Utility launch Internet Explorer or Netscape Navigator and enter the Router s default IP address 192 168 1 1 in the Addres...

Page 40: ...utomatic Configuration DHCP which should be kept only if your ISP supports DHCP or you are connecting through a dynamic IP address Static IP If you are required to use a permanent IP address to connect to the Internet select Static IP Internet IP Address This is the Router s IP address when seen from the Internet Your ISP will provide you with the IP Address you need to specify here Subnet Mask Th...

Page 41: ...riod is 30 seconds PPTP Point to Point Tunneling Protocol PPTP is a service that applies to connections in Europe only Specify Internet IP Address This is the Router s IP address as seen from the Internet Your ISP will provide you with the IP Address you need to specify here Subnet Mask This is the Router s Subnet Mask as seen by users on the Internet including your ISP Your ISP will provide you w...

Page 42: ...ally re establish your connection To use this option click the radio button next to Keep Alive In the Redial Period field you specify how often you want the Router to check the Internet connection The default Redial Period is 30 seconds Optional Settings Some of these settings may be required by your ISP Verify with your ISP before making any changes Router Name In this field you can type a name o...

Page 43: ...1 100 Maximum Number of DHCP Users Enter the maximum number of PCs that you want the DHCP server to assign IP addresses to This number cannot be greater than 253 The default is 50 Client Lease Time The Client Lease Time is the amount of time a network user will be allowed connection to the Router with their current dynamic IP address Enter the amount of time in minutes that the user will be leased...

Page 44: ... service with a DDNS service provider www dyndns org or www TZO com DDNS Service From this pull down menu enter the DDNS service with which you have membership User Name Enter the User Name for your DDNS account Password Enter the Password for your DDNS account Host Name The is the DDNS URL assigned by the DDNS service Internet IP Address This is the Router s current IP Address as seen on the Inte...

Page 45: ...the MAC address with your ISP you may assign the MAC address you have currently registered with your ISP to the Router with the MAC Address Clone feature Enable Disable To have the MAC Address cloned click the radio button beside Enable User Defined Entry Enter the MAC Address registered with your ISP here Clone Your PC s MAC Address Clicking this button will clone the MAC address Change these set...

Page 46: ...h networks as well as data from the Internet Static Routing To set up a static route between the Router and another network select a number from the Static Routing drop down list A static route is a pre determined pathway that network information must travel to reach a specific host or network Enter the information described below to set up a new static route Click the Delete This Entry button to ...

Page 47: ...wireless network It is case sensitive and must not exceed 32 characters use any of the characters on the keyboard Make sure this setting is the same for all devices in your wireless network For added security you should change the default SSID linksys to a unique name Wireless Channel Select the appropriate channel from the list provided to correspond with your network settings All devices in your...

Page 48: ...and AES with dynamic encryption keys Select the type of algorithm TKIP or AES Enter a WPA Shared Key of 8 63 characters Then enter a Group Key Renewal period which instructs the Router how often it should change the encryption keys WPA RADIUS This option features WPA used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router First select the ...

Page 49: ...ption method which is not as secure as WPA To use WEP select a Default Transmit Key choose which Key to use and a level of WEP encryption 64 bits 10 hex digits or 128 bits 26 hex digits Then either generate a WEP key using the Passphrase or enter the WEP key manually Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your ch...

Page 50: ...e Prevent Clicking this button will block wireless access by MAC Address Permit Only Clicking this button will allow wireless access by MAC Address Edit MAC Address Filter List Clicking this button will open the MAC Address Filter List On this screen you can list users by MAC Address to whom you wish to provide or block access For easy reference click the Wireless Client MAC List button to display...

Page 51: ... set depending on the speed of your wireless network You can select from a range of transmission speeds or you can select Auto to have the Router automatically use the fastest possible data rate and enable the Auto Fallback feature Auto Fallback will negotiate the best possible connection speed between the Router and a wireless client The default value is Auto CTS Protection Mode CTS Clear To Send...

Page 52: ...ain at its default value of 2346 RTS Threshold Should you encounter inconsistent data flow only minor reduction of the default value 2347 is recommended If a network packet is smaller than the preset RTS threshold size the RTS CTS mechanism will not be enabled The Router sends Request to Send RTS frames to a particular receiving station and negotiates the sending of a data frame After receiving an...

Page 53: ...local servers from local networked computers Select Enabled to filter Internet NAT redirection or Disabled to disable this feature Filter IDENT Port 113 This feature keeps port 113 from being scanned by devices outside of your local network Select Enabled to filter port 113 or Disabled to disable this feature Change these settings as described here and click the Save Settings button to apply your ...

Page 54: ...the Close button Status Policies are disabled by default To enable a policy select the policy number from the drop down menu and click the radio button beside Enable You can create two kinds of policies one kind to manage Internet access and another kind to manage inbound traffic To create an Internet Access policy 1 Select a number from the Internet Access Policy drop down menu 2 To enable this p...

Page 55: ...es on the Port Services screen click the Apply button to save changes If you want to cancel your changes click the Cancel button To close the Port Services screen and return to the Access Restrictions screen click the Close button 9 If you want to block websites with specific URL addresses enter each URL in a separate field next to Website Blocking by URL Address 10 If you want to block websites u...

Page 56: ...such as web servers ftp servers e mail servers or other specialized Internet applications Specialized Internet applications are any applications that use Internet access to perform functions such as videoconferencing or online gaming Some Internet applications may not require any forwarding To forward a port enter the information on each line for the criteria required The criteria are described he...

Page 57: ... the trigger Triggered Range For each application list the triggered port number range Check with the Internet application documentation for the port number s needed Start Port Enter the starting port number of the Triggered Range End Port Enter the ending port number of the Triggered Range Forwarded Range For each application list the forwarded port number range Check with the Internet applicatio...

Page 58: ... Tab QoS Quality of Service QoS ensures better service to high priority types of network traffic which may involve demanding real time applications such as videoconferencing There are three types of QoS available Device Priority Application Priority and Ethernet Port Priority Enable Disable To limit outgoing bandwidth for the QoS policies in use select Enable Otherwise select Disable Upstream Band...

Page 59: ...te on a local machine they are typically uploaded to the web server using FTP HTTP HyperText Transport Protocol The communications protocol used to connect to servers on the World Wide Web Its primary function is to establish a connection with a web server and transmit HTML pages to the client web browser Telnet A terminal emulation protocol commonly used on Internet and TCP IP based networks It a...

Page 60: ...e to enable wireless access to the Router s web based utility or Disable to disable wireless access to the utility Remote Router Access To access the Router remotely from outside the network verify that Enable is selected Then enter the port number that will be open to outside access You will need to enter the Router s password when accessing the Router this way as usual UPnP When using UPnP featu...

Page 61: ... stop the test click the Stop button Click the Clear Log button to clear the screen Click the Close button to return to the Diagnostics screen Traceroute Test To test the performance of a connect click the Traceroute button Enter the address of the PC whose connection you wish to test and click the Traceroute button The Traceroute screen will then display the test results To stop the test click th...

Page 62: ...you are experiencing problems with the Router For more information about upgrading firmware refer to Appendix C Upgrading Firmware The Administration Tab Config Management This screen is used to back up or restore the Router s configuration file To back up the Router s configuration file click the Backup button Then follow the on screen instructions To restore the Router s configuration file click...

Page 63: ...he Router s MAC Address as seen by your ISP Router Name This is the specific name for the Router which you set on the Setup Tab Host Name If required by your ISP this would have been entered on the Setup Tab Domain Name If required by your ISP this would have been entered on the Setup Tab Configuration Type This shows the information required by your ISP for connection to the Internet This informa...

Page 64: ...here DHCP Server If you are using the Router as a DHCP server that will be displayed here Start IP Address For the range of IP Addresses used by devices on your local Ethernet network the beginning of that range is shown here End IP Address For the range of IP Addresses used by devices on your local Ethernet network the end of that range is shown here DHCP Clients Table Clicking this button will o...

Page 65: ...ess tab this will display the wireless mode Mixed G Only or Disabled used by the network SSID As entered on the Wireless tab this will display the wireless network name or SSID DHCP Server If you are using the Router as a DHCP server that will be displayed here Channel As entered on the Wireless tab this will display the channel on which your wireless network is broadcasting Encryption Function As...

Page 66: ...dress on a PC You can assign a static IP address to a PC by performing the following steps For Windows 98SE and Me 1 Click Start Settings and Control Panel Double click Network 2 In The following network components are installed box select the TCP IP associated with your Ethernet adapter If you only have one Ethernet adapter installed you will only see one TCP IP line with no association to an Eth...

Page 67: ...e you are running Windows XP with the default interface If you are using the Classic interface where the icons and menus look like previous Windows versions please follow the instructions for Windows 2000 1 Click Start and Control Panel 2 Click the Network and Internet Connections icon and then the Network Connections icon 3 Right click the Local Area Connection that is associated with the Etherne...

Page 68: ... original computer is not the cause of the problem If you do NOT get a reply there may be a problem with the connection Try the ping command from a different computer to verify that your original computer is not the cause of the problem 4 I am not getting an IP address on the Internet with my Internet connection Refer to Problem 3 I want to test my Internet connection to verify that you have conne...

Page 69: ...r you installed Follow these steps to set up port forwarding through the Router s web based utility We will be setting up web ftp and mail servers 1 Access the Router s web based utility by going to http 192 168 1 1 or the IP address of the Router Go to the Applications Gaming Port Range Forward tab 2 Enter any name you want to use for the Application 3 Enter the Start and End Port range of the se...

Page 70: ...ce that you want the port server to go to For example if the web server s Ethernet adapter IP address is 192 168 1 100 you would enter 100 in the field provided Check Appendix E Finding the MAC Address and IP Address for Your Ethernet Adapter for details on getting an IP address 6 Check the Enable option for the port services you want to use Consider the example below When you have completed the c...

Page 71: ...cess the Router s web based utility by going to http 192 168 1 1 or the IP address of the Router Enter the default password admin and click the Administration Management tab 2 Enter a different password in the Router Password field and enter the same password in the second field to confirm the password 3 Click the Save Settings button 10 I am a PPPoE user and I need to remove the proxy settings or...

Page 72: ...e pdf s instructions Set a static IP address on the PC refer to Problem 2 I need to set a static IP address Use the following IP address settings for the computer you are using IP Address 192 168 1 50 Subnet Mask 255 255 255 0 Gateway 192 168 1 1 Perform the upgrade using the TFTP program or the Administration tab of the Router s web based utility 14 My DSL service s PPPoE is always disconnecting ...

Page 73: ... time the device is not working properly Try to flash the firmware by assigning a static IP address to the computer and then upgrade the firmware Try using the following settings IP Address 192 168 1 50 and Subnet Mask 255 255 255 0 17 When I enter a URL or IP address I get a time out error or am prompted to retry Check if other PCs work If they do ensure that your workstation s IP settings are co...

Page 74: ... white For other SecureEasySetup devices refer to each wireless device s documentation to locate the button on that device I have devices that support WPA Personal security but do not have SecureEasySetup Can I still use SecureEasySetup Yes Print out the wireless security settings at the end of the SecureEasySetup process and then manually configure the settings for your non SecureEasySetup device...

Page 75: ...owing fix click ICQ menu preference connections tab and check I am behind a firewall or proxy Then set the firewall time out to 80 seconds in the firewall setting The Internet user can then send a file to a user behind the Router I set up an Unreal Tournament Server but others on the LAN cannot join What do I need to do If you have a dedicated Unreal Tournament server running you need to create a ...

Page 76: ...s All Linksys firmware upgrades are posted on the Linksys website at www linksys com where they can be downloaded for free To upgrade the Router s firmware use the Administration Firmware Upgrade tab of the Router s web based utility If the Router s Internet connection is working well there is no need to download a newer firmware version unless that version contains new features that you would lik...

Page 77: ... time but you can only forward 10 ranges of ports What are the advanced features of the Router The Router s advanced features include advanced wireless settings filters access restriction policies port forwarding advanced routing and DDNS How do I get mIRC to work with the Router Under the Port Forwarding tab set port forwarding to 113 for the PC on which you are using mIRC Can the Router act as m...

Page 78: ...Roaming Automatic Rate Selection RTS CTS feature Fragmentation Power Management What is ad hoc mode When a wireless network is set to ad hoc mode the wireless equipped computers are configured to communicate directly with each other The ad hoc wireless network will not communicate with any wired network What is infrastructure mode When a wireless network is set to infrastructure mode the wireless ...

Page 79: ...bilities in the hands of users around the globe What is Spread Spectrum Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable secure mission critical communications systems It is designed to trade off bandwidth efficiency for reliability integrity and security In other words more bandwidth is consumed than in the case of narrowband transmi...

Page 80: ...o know the exact range of your wireless network without testing Every obstacle placed between the Router and a wireless PC will create signal loss Lead glass metal concrete floors water and walls will inhibit the signal and reduce range Start with the Router and your wireless PC in the same room and move it away in small increments to determine the maximum range in your environment You may also tr...

Page 81: ...eriodically For information on implementing these security features refer to Chapter 6 Configuring the Wireless G Broadband Router Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking products first listen for beacon messages These messages can be easily decrypted and contain much of the network s inf...

Page 82: ...resses This makes it harder for a hacker to access your network with a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can only provide enough security to make a hacker s job more difficult There are several ways that WEP can be maximized 1 Use the highest level of encrypti...

Page 83: ...with a key shared between the device and the server Last enter a Group Key Renewal period which instructs the device how often it should change the encryption keys RADIUS WEP used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router or other device First enter the RADIUS server s IP Address and port number along with a key shared between the...

Page 84: ...irmware from Linksys s website at www linksys com 2 Extract the firmware file on your computer 3 Open the Router s Web based Utility and click the Administration tab 4 Click Firmware Upgrade and the Upgrade Firmware screen will appear 5 Enter the location of the firmware s file or click the Browse button to find the file 6 Then click the Upgrade button and follow the on screen instructions Figure ...

Page 85: ...or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing shared resou...

Page 86: ...nter key or the OK button 2 When the IP Configuration screen appears select the Ethernet adapter you have connected to the Router via a CAT 5 Ethernet network cable See Figure E 1 3 Write down the Adapter Address as shown on your computer screen see Figure E 2 This is the MAC address for your Ethernet adapter and is shown as a series of numbers and letters The MAC address Adapter Address is what y...

Page 87: ...l use for MAC address cloning or MAC filtering The example in Figure E 3 shows the Ethernet adapter s IP address as 192 168 1 100 Your computer may show something different For the Router s Web based Utility For MAC filtering enter the 12 digit MAC address in this format XXXXXXXXXXXX WITHOUT the hyphens See Figure E 4 For MAC address cloning enter the 12 digit MAC address in the MAC Address fields...

Page 88: ...of an access point AES Advanced Encryption Standard A security method that uses symmetric 128 bit block data encryption Backbone The part of a network that connects most of the systems and networks together and handles the most data Bandwidth The transmission capacity of a given device or network Beacon Interval Data transmitted on your wireless network that keeps the network synchronized Bit A bi...

Page 89: ... DHCP Dynamic Host Configuration Protocol A networking protocol that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited amount of time instead of assigning permanent IP addresses DMZ Demilitarized Zone Removes the Router s firewall protection from one PC allowing it to be seen from the Internet DNS Domain Name Server The IP ...

Page 90: ... resources of a network from users from other networks Firmware The programming code that runs a networking device Fragmentation Breaking a packet into smaller units when transmitting over a network medium that cannot support the original size of the packet FTP File Transfer Protocol A protocol used to transfer files over a TCP IP network Full Duplex The ability of a networking device to receive a...

Page 91: ...data to a group of destinations at once NAT Network Address Translation NAT technology translates IP addresses of a local area network to a different IP address for the Internet Network A series of computers or devices connected for the purpose of data sharing storage and or transmission between users NNTP Network News Transfer Protocol The protocol used to connect to Usenet groups on the Internet...

Page 92: ...l In User Service A protocol that uses an authentication server to control network access RJ 45 Registered Jack 45 An Ethernet connector that holds up to eight wires Roaming The ability to take a wireless device from one access point s range to another without losing the connection Router A networking device that connects multiple networks together RTS Request To Send A networking method of coordi...

Page 93: ...from the recipient of data sent TCP IP Transmission Control Protocol Internet Protocol A set of instructions PCs use to communicate over a network Telnet A user command and TCP IP protocol used for accessing remote PCs TFTP Trivial File Transfer Protocol A version of the TCP IP FTP protocol that has no directory or password capability Throughput The amount of data moved successfully from one node ...

Page 94: ...pting network data transmitted on a wireless network for greater security WINIPCFG A Windows 98 and Me utility that displays the IP address for a particular networking device WLAN Wireless Local Area Network A group of computers and associated devices that communicate with each other wirelessly WPA Wi Fi Protected Access a wireless security protocol using TKIP Temporal Key Integrity Protocol encry...

Page 95: ...One Power Port Buttons Reset SecureEasySetup Cabling Type Ethernet Network Cable LEDs Power DMZ WLAN LAN 1 4 Internet RF Power Output 18 dBm UPnP able cert Able Security Features Stateful Packet Inspection SPI Firewall Internet Policy Wireless Security Wi Fi Protected Access WPA WEP Wireless MAC Filtering Dimensions 7 32 x 1 89 x 7 87 W x H x D 186 mm x 48 mm x 200 mm Unit Weight 17 oz 0 482 kg Po...

Page 96: ...ix G Specifications Wireless G Broadband Router Operating Temp 0ºC to 40ºC 32ºF to 104ºF Storage Temp 20ºC to 70ºC 4ºF to 158ºF Operating Humidity 10 to 85 Non Condensing Storage Humidity 5 to 90 Non Condensing ...

Page 97: ... AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except by Linksys b ...

Page 98: ... if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the in...

Page 99: ...et aux dispositions relatives à la directive 1999 5 EC Belgique Dans le cas d une utilisation privée à l extérieur d un bâtiment au dessus d un espace public aucun enregistrement n est nécessaire pour une distance de moins de 300m Pour une distance supérieure à 300m un enregistrement auprès de l IBPT est requise Pour une utilisation publique à l extérieur de bâtiments une licence de l IBPT est req...

Page 100: ...rking with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 823 3002 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorization department f...

Reviews: