background image

61

Appendix B: Wireless Security
Security Threats Facing Wireless Networks

Wireless-G Travel Router with SpeedBooster

SSID.

 There are several things to keep in mind about the SSID: 

1. Disable Broadcast 

2. Make it unique 

3. Change it often 

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be 
more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast 
the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) 
Hackers know these defaults and can check these against your network. Change your SSID to something unique 
and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to 
start from the beginning in trying to break in.

MAC Addresses.

 Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only 

those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with 
a random MAC Address. 

WEP Encryption.

 Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security 

concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job 
more difficult.

There are several ways that WEP can be maximized:

1. Use the highest level of encryption possible 

2. Use “Shared Key” authentication

3. Change your WEP key regularly 

WPA. 

Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. 

WPA2

 is the 

newer version of Wi-Fi Protected Access with stronger encryption than WPA. WPA gives you a choice of two 
encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and 
incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption 
System), which utilizes a symmetric 128-Bit block data encryption. 

Important:

 Always remember that each 

device in your wireless network MUST use 
the same encryption method and encryption 
key or your wireless network will not function 
properly.

Summary of Contents for WTR54GS

Page 1: ...A Division of Cisco Systems Inc Model No Travel Router Wireless G WTR54GS ver2 1 User Guide WIRELESS with SpeedBooster ...

Page 2: ...nges or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment IMPORTANT NOTE FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 20cm between the radiator your body Th...

Page 3: ...so each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents This exclamation point means there is a caution or warning and is something that could damage your property or the Wireless G Travel Router with SpeedBooster This checkmark means there i...

Page 4: ...vel Router with SpeedBooster 10 Overview 10 How to Access the Web based Utility 11 The Setup Tab Basic Setup 11 The Setup Tab DDNS 16 The Setup Tab MAC Address Clone 17 The Setup Tab Advanced Routing 18 The Wireless Tab Basic Wireless Settings 19 The Wireless Tab Wireless Security 21 The Wireless Tab Wireless MAC Filter 23 The Wireless Tab Advanced Wireless Settings 24 The Security Tab Firewall 26...

Page 5: ...s 45 Frequently Asked Questions 53 Appendix B Wireless Security 60 Security Precautions 60 Security Threats Facing Wireless Networks 60 Appendix C Upgrading Firmware 63 Appendix D Windows Help 64 Appendix E Finding the MAC Address and IP Address for Your Ethernet Adapter 65 Windows 98SE or Me Instructions 65 Windows 2000 or XP Instructions 65 For the Router s Web based Utility 66 Appendix F Glossa...

Page 6: ...e 5 9 Static DHCP Client List 15 Figure 5 10 DHCP Client Table 15 Figure 5 11 DynDNS org 16 Figure 5 12 TZO com 17 Figure 5 13 Setup Tab MAC Address Clone 17 Figure 5 14 Setup Tab Advanced Routing 18 Figure 5 15 Setup Tab Advanced Routing Routing Table 18 Figure 5 16 Wireless Tab Basic Wireless Settings 19 Figure 5 17 Wireless Tab Wireless Security WEP 21 Figure 5 18 Wireless Tab Wireless Security...

Page 7: ...g Tab DMZ 36 Figure 5 35 Administration Tab Management 37 Figure 5 36 Administration Tab Log 39 Figure 5 37 Incoming Log 39 Figure 5 38 Administration Tab Diagnostics 40 Figure 5 39 Ping Test 40 Figure 5 40 Traceroute Test 40 Figure 5 41 Administration Tab Factory Defaults 41 Figure 5 42 Administration Tab Firmware Upgrade 41 Figure 5 43 Status Tab Router 42 Figure 5 44 Status Tab Local Network 43...

Page 8: ...re not only useful in homes and offices they can also be fun PCs on a wired network create a LAN or Local Area Network They are connected with Ethernet cables which is why the network is called wired PCs equipped with wireless cards or adapters can communicate without cumbersome cables By sharing the same wireless settings within their transmission radius they form a wireless network This is somet...

Page 9: ...gure the settings on the Wireless G Travel Router with SpeedBooster Appendix A Troubleshooting This appendix describes some problems and solutions as well as frequently asked questions regarding installation and use of the Wireless G Travel Router with SpeedBooster Appendix B Wireless Security This appendix explains the risks of wireless networking and some solutions to reduce the risks Appendix C...

Page 10: ...ications for the Router Appendix H Warranty Information This appendix supplies the warranty information for the Router Appendix I Regulatory Information This appendix supplies the regulatory information regarding the Router Appendix J Contact Information This appendix provides contact information for a variety of Linksys resources including Technical Support ...

Page 11: ...of the Router You can arrange the Router and multiple access points to work in succession to extend the roaming range and you can set up your wireless network to communicate with your Ethernet hardware as well If the wireless network is relatively small and needs to share resources only with the other computers on the wireless network then the Ad Hoc mode can be used Ad Hoc mode allows computers e...

Page 12: ...rs such as the Notebook Adapter WPC54GS for your laptop computers PCI Adapter WMP54GS for your desktop PC and USB Adapter WUSB54GS when you want to enjoy USB connectivity With these and many other Linksys products your networking options are limitless Go to the Linksys website at www linksys com for more information about products that work with the Wireless G Travel Router with SpeedBooster ...

Page 13: ...iagnostic is complete the LED will be solidly lit Wireless Green The WLAN LED flashes when there is a successful wireless connection Internet Green The Internet LED lights up when there is a connection made through the Internet port Ethernet Green If the LED is continuously lit the Router is successfully connected to a device through that port A flashing LED indicates network activity over that po...

Page 14: ...ecureEasySetup enabled wireless devices to automatically create a wireless connection The Power Plug and Slide The Router s Power Plug is located on the back panel and the Power Slide is located on the top panel Power Plug The Power plug is where you will connect the Router to the electrical outlet Power Slide Slide the Power Slide button in one direction to release the power plug and the other di...

Page 15: ...vanced users you may follow the instructions in this chapter and then configure the Router through its Web based Utility refer to Chapter 5 Configuring the Wireless G Travel Router with SpeedBooster Hardware Installation 1 Power down your network devices 2 Connect a standard Ethernet network cable from the Router s Internet port to your Internet connection Figure 4 1 Connecting to the Internet NOT...

Page 16: ...ect a standard Ethernet network cable from the Router s Ethernet port to your PC 4 Slide the Power Slide until the Power Plug is fully extended Then plug the Power Plug to an electrical outlet Now that the hardware installation is complete proceed to Chapter 5 Configuring the Wireless G Travel Router with SpeedBooster Figure 4 3 Connecting the Power Figure 4 2 Connecting to the PC ...

Page 17: ... two screens of the Utility Basic Setup On the Basic Setup screen enter the settings provided by your ISP Management Click the Administration tab and then the Management tab The Router s default password is admin To secure the Router change the Password from its default There are seven main tabs Setup Wireless Security Access Restrictions Applications Gaming Administration and Status Additional ta...

Page 18: ...sic Setup The first screen that appears displays the Setup tab This allows you to change the Router s general settings Internet Setup The Internet Setup section configures the Router to your Internet connection Most of this information can be obtained from your ISP Incoming Internet Type There are two options for Internet connection You can use a wired connection or a wireless connection The wirel...

Page 19: ... Router s IP address when seen from the Internet Your ISP will provide you with the IP Address you need to specify here Subnet Mask This is the Router s Subnet Mask as seen by users on the Internet including your ISP Your ISP will provide you with the Subnet Mask Default Gateway Your ISP will provide you with the Gateway Address which is the ISP server s IP address DNS 1 3 Your ISP will provide yo...

Page 20: ...atically re establish your connection as soon as you attempt to access the Internet again If you wish to activate Connect on Demand click the radio button In the Max Idle Time field enter the number of minutes you want to have elapsed before your Internet connection terminates Keep Alive Redial Period If you select this option the Router will periodically check your Internet connection If you are ...

Page 21: ... will automatically re establish your connection To use this option click the radio button next to Keep Alive In the Redial Period field you specify how often you want the Router to check the Internet connection The default Redial Period is 30 seconds Optional Settings Some of these settings may be required by your ISP Verify with your ISP before making any changes Host Name and Domain Name These ...

Page 22: ...d Then click the Enabled checkbox When you have finished your entries click the Save Settings button to save your changes Click the Cancel Changes button to cancel your changes To exit this screen click the Close button If you want to see a list of DHCP clients click the DHCP Client Table button On the DHCP Client Table screen you will see a list of DHCP clients with the following information Clie...

Page 23: ... the screen The Setup Tab DDNS The Router offers a Dynamic Domain Name System DDNS feature DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address It is useful when you are hosting your own website FTP server or other server behind the Router Before you can use this feature you need to sign up for DDNS service at one of two DDNS service providers DynDNS org or TZO com If...

Page 24: ...assigned to a unique piece of hardware for identification Some ISPs will require you to register a MAC address in order to access the Internet If you do not wish to re register the MAC address with your ISP you may assign the MAC address you have currently registered with your ISP to the Router with the MAC Address Clone feature MAC Address Clone Enabled Disabled To have the MAC Address cloned sel...

Page 25: ... remote network or host to which you want to assign a static route Enter the IP address of the host for which you wish to create a static route If you are building a route to an entire network be sure that the network portion of the IP address is set to 0 For example the Router s standard IP address is 192 168 16 1 Based on this address the address of the routed network is 192 168 16 with the last...

Page 26: ...ect the wireless standards running on your network If you have both 802 11g and 802 11b devices in your network keep the default setting Mixed If you have only 802 11g devices select Wireless G Only If you have only 802 11b devices select Wireless B Only Network Name SSID The SSID is the network name shared by all devices in a wireless network The SSID must be identical for all devices in the wire...

Page 27: ...tton on your wireless client When the SecureEasySetup process is complete the Basic Wireless Settings screen will appear and the Current Encryption and Status information will be updated Status The status of your wireless security is displayed here Reset Security If you already set up the network using the SecureEasySetup feature and you want to replace your current settings with new SecureEasySet...

Page 28: ...th non Linksys wireless products make a note of the WEP key generated in the Key 1 field and enter it manually in the wireless client After you enter the Passphrase click the Generate button to create WEP keys TX Key Select which WEP key 1 4 will be used when the Router sends data Make sure that the receiving device wireless client is using the same key WEP Keys 1 4 WEP keys enable you to create a...

Page 29: ...encryption method AES with dynamic encryption keys Enter a Passphrase of 8 63 characters Then enter a Key Renewal period which instructs the Router how often it should change the encryption keys WPA2 Mixed WPA2 Mixed gives you TKIP AES encryption Enter a Passphrase of 8 63 characters Then enter a Key Renewal period which instructs the Router how often it should change the encryption keys Figure 5 ...

Page 30: ...lock wireless access by MAC Address Permit ONLY PCs listed below to access the wireless network Clicking this radio button will allow wireless access by MAC Address Wireless Client List Wireless Client List Click the Wireless Client MAC List button to display a list of network users by MAC Address From the To Sort by drop down menu you can sort the table by Client Name IP Address MAC Address or Ex...

Page 31: ...ect the best rate for transmission The default setting is Default when the Router can transmit at all standard wireless rates 1 2Mbps 5 5Mbps 11Mbps 18Mbps and 24Mbps Other options are 1 2Mbps for use with older wireless technology and All when the Router can transmit at all wireless rates The Basic Rate is not the actual rate of data transmission If you want to specify the Router s rate of data t...

Page 32: ...performance Only minor reduction of the default value is recommended In most cases it should remain at its default value of 2346 RTS Threshold Should you encounter inconsistent data flow only minor reduction of the default value 2347 is recommended If a network packet is smaller than the preset RTS threshold size the RTS CTS mechanism will not be enabled The Router sends Request to Send RTS frames...

Page 33: ...w IP multicast packets to be forwarded to the appropriate computers Select Enable to filter multicasting or Disable to disable this feature Filter Internet NAT Redirection This feature uses port forwarding to block access to local servers from local networked computers Check the box to enable filter Internet NAT redirection or uncheck the box to disable this feature Web Filters Proxy Use of WAN pr...

Page 34: ...nd side of the screen The Security Tab VPN Use the settings on this tab to create VPN tunnels The Wireless G Travel Router creates a tunnel or channel between two endpoints so that the data or information between these endpoints is secure VPN Tunnel Establishing a Tunnel The Router creates a tunnel or channel between two endpoints so that the data or information between these endpoints is secure T...

Page 35: ...ualified Domain Name or Any Any If you select Any for the Remote Security Group the local VPN Router will accept a request from any IP address This setting should be chosen when the other endpoint is using DHCP or PPPoE on the Internet side Remote Security Gateway The Remote Security Gateway is the VPN device such as a second VPN Router on the remote end of the VPN tunnel Under Remote Security Gat...

Page 36: ... automatic or manual key management Automatic Key Management Select Auto IKE and enter a series of numbers or letters in the Pre shared Key field Check the box next to PFS Perfect Forward Secrecy to ensure that the initial key exchange and IKE proposals are secure In the example shown the word chappy is used Based on this word which MUST be entered at both ends of the tunnel if this method is used...

Page 37: ...different sequences Main mode is more common however some people prefer Aggressive mode because it is faster Main mode is for normal usage and includes more authentication requirements than Aggressive mode Main mode is recommended because it is more secure No matter which mode is selected the VPN Router will accept both Main and Aggressive requests from the remote VPN device If a user on one side ...

Page 38: ...hange the type of access days and times of a policy To activate a policy click the Enabled checkbox To delete a policy click its Delete button Click the Save Settings button to save your changes or click the Cancel Changes button to cancel your changes To return to the Internet Access Policy tab click the Close button To view the list of PCs for a specific policy click the PCs List button On the I...

Page 39: ... 7 You can filter access to various applications accessed over the Internet such as FTP or telnet by selecting up to three applications from the drop down menus under Applications The Blocked List menu offers a choice of ten preset applications For the preset applications you select the appropriate range of ports will automatically be displayed Click the button to add to the Blocked Services list ...

Page 40: ...omain name is a meaningful and easy to remember handle for an Internet address Finger A UNIX command widely used on the Internet to find out information about a particular user such as a telephone number whether the user is currently logged on and the last time the user was logged on The person being fingered must have placed his or her profile on the system in order for the information to be avai...

Page 41: ...TCP IP based networks It allows a user at a terminal or computer to log onto a remote device and run a program TFTP Trivial File Transfer Protocol A version of the TCP IP FTP protocol that has no directory or password capability Web The Internet Start End Port This is the port range Enter the port number or range of external ports used by the server or Internet application Check with the software ...

Page 42: ...t number range Check with the Internet application documentation for the port number s needed In the first field enter the starting port number of the Triggered Range In the second field enter the ending port number of the Triggered Range Forwarded Range For each application list the forwarded port number range Check with the Internet application documentation for the port number s needed In the f...

Page 43: ...ts of one computer exposing the computer to the Internet Any PC whose port is being forwarded must have its DHCP client function disabled and should have a new static IP address assigned to it because its IP address may change when using the DHCP function DMZ To expose one PC select Enabled then enter a WAN IP Address or Host IP Address in the field Wan IP Address The Internet IP address of the co...

Page 44: ...re enabled as well Otherwise keep the default setting Disabled Allow Remote IP Address If you want to be able to access the Router from any external IP address select Any IP Address If you want to specify an external IP address or range of IP addresses then select the second option and complete the fields provided Remote Management Port Enter the port number that will be open to outside access UPn...

Page 45: ...ck this button and follow the on screen instructions Restore Configurations To restore the Router s configuration click this button and follow the on screen instructions You must have previously backed up the Router s configuration Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes Help information is shown on t...

Page 46: ... traffic The Outgoing Log will display a temporary log of the LAN IP Addresses Destination URLs or IP Addresses and Service or Port Numbers for the outgoing Internet traffic The Security Log will display a temporary log of the Date and Time Direction Packets to and from Action and the Reason for the selected security options The DHCP Client Log will display a temporary log of the Date and Time DHC...

Page 47: ...r the IP address or URL that you want to ping Ping Test Click this button to begin the test A new screen will appear and display the test results Click the Close button to return to the Diagnostics screen Traceroute Test To test the performance of a connection enter the address of the PC whose connection you wish to test and click the Traceroute button Click the Close button to return to the Diagn...

Page 48: ... linksys com Then extract the file Please select a file to upgrade In the field provided enter the name of the extracted firmware upgrade file or click the Browse button to find this file Upgrade After you have selected the appropriate file click this button and follow the on screen instructions Help information is shown on the right hand side of the screen Note Do not restore the factory defaults...

Page 49: ...the Setup Tab Internet Connection Connection Type This indicates the type of Internet connection you are using Status The status of the connection is displayed here IP Address The Router s Internet IP Address is displayed here Subnet Mask and Default Gateway The Router s Subnet Mask and Default Gateway address are displayed here for DHCP and static IP connections DNS1 3 Shown here are the DNS Doma...

Page 50: ... network the beginning of that range is shown here End IP Address For the range of IP Addresses used by devices on your local Ethernet network the end of that range is shown here DHCP Client Table Clicking this button will open a screen showing you which PCs are utilizing the Router as a DHCP server On the DHCP Client Table screen you will see a list of DHCP clients PCs and other network devices w...

Page 51: ... the Wireless tab this displays the status of the Router s Wireless G networking mode Network Name SSID As entered on the Wireless tab this displays the wireless network name or SSID of your Wireless G network Channel As entered on the Wireless tab this displays the channel on which your wireless network is broadcasting Security The security mode will be displayed if one is selected SSID Broadcast...

Page 52: ...c IP address on a PC You can assign a static IP address to a PC by performing the following steps For Windows 98SE and Me 1 Click Start Settings and Control Panel Double click Network 2 In The following network components are installed box select the TCP IP associated with your Ethernet adapter If you only have one Ethernet adapter installed you will only see one TCP IP line with no association to...

Page 53: ...s assume you are running Windows XP with the default interface If you are using the Classic interface where the icons and menus look like previous Windows versions please follow the instructions for Windows 2000 1 Click Start and Control Panel 2 Click the Network and Internet Connections icon and then the Network Connections icon 3 Right click the Local Area Connection that is associated with the ...

Page 54: ...riginal computer is not the cause of the problem If you do NOT get a reply there may be a problem with the connection Try the ping command from a different computer to verify that your original computer is not the cause of the problem 4 I am not getting an IP address on the Internet with my Internet connection Refer to Problem 2 I want to test my Internet connection to verify that you have connect...

Page 55: ... you installed Follow these steps to set up port forwarding through the Router s web based utility We will be setting up web ftp and mail servers 1 Access the Router s web based utility by going to http 192 168 16 1 or the IP address of the Router Go to the Applications Gaming Port Range Forwarding tab 2 Enter any name you want to use for the custom Application 3 Enter the External Port range of t...

Page 56: ... device that you want the port server to go to For example if the web server s Ethernet adapter IP address is 192 168 16 100 you would enter 100 in the field provided Check Appendix E Finding the MAC Address and IP Address for Your Ethernet Adapter for details on getting an IP address 6 Check the Enabled option for the port services you want to use Consider the example below When you have complete...

Page 57: ...s 1 Access the Router s web based utility by going to http 192 168 16 1 or the IP address of the Router Enter the default password admin and click the Administrations Management tab 2 Enter a different password in the Router Password field and enter the same password in the second field to confirm the password 3 Click the Save Settings button 10 I am a PPPoE user and I need to remove the proxy set...

Page 58: ... the pdf s instructions Set a static IP address on the PC refer to Problem 1 I need to set a static IP address Use the following IP address settings for the computer you are using IP Address 192 168 16 50 Subnet Mask 255 255 255 0 Gateway 192 168 16 1 Perform the upgrade using the TFTP program or the Administration tab of the Router s web based utility 14 My DSL service s PPPoE is always disconnec...

Page 59: ...er this time the device is not working properly Try to flash the firmware by assigning a static IP address to the computer and then upgrade the firmware Try using the following settings IP Address 192 168 16 50 and Subnet Mask 255 255 255 0 17 When I enter a URL or IP address I get a time out error or am prompted to retry Check if other PCs work If they do ensure that your workstation s IP setting...

Page 60: ...ort however the Internet connection speed will vary depending on the speed of your broadband connection The Router also supports 100Mbps over the auto sensing Fast Ethernet 10 100 switch on the LAN side of the Router What is Network Address Translation and what is it used for Network Address Translation NAT translates multiple IP addresses on the private LAN to one public address that is sent out ...

Page 61: ...s with the same CD key connect at the same time even if on the same LAN not a problem with 1 0 1 3 As far as hosting games the HL server does not need to be in the DMZ Just forward port 27015 to the local IP address of the server computer How can I block corrupted FTP downloads If you are experiencing corrupted files when you download a file with your FTP client try using another FTP program The w...

Page 62: ...d then the Connection tab Make sure that Internet Explorer is set to Never dial a connection For Netscape Navigator click Edit Preferences Advanced and Proxy Make sure that Netscape Navigator is set to Direct connection to the Internet What is DMZ Hosting Demilitarized Zone DMZ allows one IP address computer to be exposed to the Internet Some applications require multiple TCP IP ports to be open I...

Page 63: ...02 11a standard The 802 11a standard states a maximum data transfer rate of 54Mbps and an operating frequency of 5GHz What is the IEEE 802 11b standard It is one of the IEEE standards for wireless networks The 802 11b standard allows wireless networking hardware from different manufacturers to communicate provided that the hardware complies with the 802 11b standard The 802 11b standard states a m...

Page 64: ...a wired network through a wireless access point What is roaming Roaming is the ability of a portable computer to communicate continuously while moving freely throughout an area greater than that covered by a single access point Before using the roaming function the user must make sure that the workstation uses the same channel number as the access point of the dedicated coverage area To achieve tr...

Page 65: ...louder and thus easier to detect provided that the receiver knows the parameters of the spread spectrum signal being broadcast If a receiver is not tuned to the right frequency a spread spectrum signal looks like background noise There are two main alternatives Direct Sequence Spread Spectrum DSSS and Frequency Hopping Spread Spectrum FHSS What is DSSS What is FHSS And what are their differences F...

Page 66: ... do I resolve issues with signal loss There is no way to know the exact range of your wireless network without testing Every obstacle placed between the Router and a wireless PC will create signal loss Lead glass metal concrete floors water and walls will inhibit the signal and reduce range Start with the Router and your wireless PC in the same room and move it away in small increments to determin...

Page 67: ...eriodically For information on implementing these security features refer to Chapter 5 Configuring the Wireless G Travel Router with SpeedBooster Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking products first listen for beacon messages These messages can be easily decrypted and contain much of th...

Page 68: ...vide access to only those wireless nodes with certain MAC Addresses This makes it harder for a hacker to access your network with a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can only provide enough security to make a hacker s job more difficult There are several ways ...

Page 69: ...er a Passphrase of 8 63 characters Then enter a Group Key Renewal period which instructs the Router how often it should change the encryption keys WPA2 Mixed Mode WPA2 Mixed Mode gives you TKIP AES encryption Enter a Passphrase of 8 63 characters Then enter a Group Key Renewal period which instructs the Router how often it should change the encryption keys Implementing encryption may have a negati...

Page 70: ... Linksys s website at www linksys com Then extract the firmware file 2 Click Firmware Upgrade from the Web Utility s Administration tab and the Upgrade Firmware screen will appear 3 Enter the location of the extracted firmware file or click the Browse button to find the file 4 Then click the Upgrade button and follow the on screen instructions Figure C 1 Administration Tab Firmware Upgrade Note Th...

Page 71: ... instructions or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizin...

Page 72: ...pcfg Then press the Enter key or the OK button 2 When the IP Configuration screen appears select the Ethernet adapter you have connected to the Router via a Category 5 Ethernet network cable 3 Write down the Adapter Address as shown on your computer screen This is the MAC address for your Ethernet adapter and is shown as a series of numbers and letters The MAC address Adapter Address is what you w...

Page 73: ...e MAC address Physical Address is what you will use for MAC address cloning or MAC filtering The example in Figure E 3 shows the Ethernet adapter s IP address as 192 168 1 100 Your computer may show something different For the Router s Web based Utility For MAC filtering enter the 12 digit MAC address For MAC address cloning enter the 12 digit MAC address in the MAC Address fields provided two dig...

Page 74: ...eless network Adapter A device that adds network functionality to your PC Ad hoc A group of wireless devices communicating directly with each other peer to peer without the use of an access point AES Advanced Encryption Standard A security method that uses symmetric 128 bit block data encryption Backbone The part of a network that connects most of the systems and networks together and handles the ...

Page 75: ... the hosting of a website FTP server or e mail server with a fixed domain name e g www xyz com and a dynamic IP address Default Gateway A device that forwards Internet traffic from your local area network DHCP Dynamic Host Configuration Protocol A networking protocol that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited am...

Page 76: ... and retrieved from a common transmission medium Finger A program that tells you the name associated with an e mail address Firewall A set of related programs located at a network gateway server that protects the resources of a network from users from other networks Firmware The programming code that runs a networking device Fragmentation Breaking a packet into smaller units when transmitting over...

Page 77: ...name and password system MAC Media Access Control Address The unique address that a manufacturer assigns to each networking device Mbps MegaBits Per Second One million bits per second a unit of measurement for data transmission mIRC An Internet Relay Chat program that runs under Windows Multicasting Sending data to a group of destinations at once NAT Network Address Translation NAT technology tran...

Page 78: ...over Ethernet PoE A technology enabling an Ethernet network cable to deliver both data and power PPPoE Point to Point Protocol over Ethernet A type of broadband connection that provides authentication username and password in addition to data transport PPTP Point to Point Tunneling Protocol A VPN protocol that allows the Point to Point Protocol PPP to be tunneled through an IP network This protoco...

Page 79: ...entifier Your wireless network s name Static IP Address A fixed address assigned to a computer or device that is connected to a network Static Routing Forwarding data in a network via a fixed path STUN Simple Traversal of UDP through NATs A protocol that enables specialized applications such as Internet phone calls video and audio to travel between your local network and the Internet STUN is a spe...

Page 80: ...o replace existing software or firmware with a newer version Upload To transmit a file over a network URL Uniform Resource Locator The address of a file located on the Internet VPN Virtual Private Network A security measure to protect data as it leaves one network and goes to another over the Internet WAN Wide Area Network The Internet WEP Wired Equivalent Privacy A method of encrypting network da...

Page 81: ...er Wireless Internet Ethernet SecureEasySetup Transmit Power 802 11g 12 5 dBm Typical Normal Temp Range 1 5dBm 802 11b 16 5dBm Normal Temp Range 1 5dBm Receiver Sensitivity 11Mbps 90dBm Typical 54Mbps 65dBm Typical Security features Stateful Packet Inspection SPI Firewall Internet Policy Wireless Security Wi Fi Protected Access WPA WEP Wireless MAC Filtering Dimensions 2 87 x 4 21 x 1 22 W x H x D...

Page 82: ...Wireless G Travel Router with SpeedBooster Operating Temp 0 C to 40 C 32 F to 104 F Storage Temp 20 C to 70 C 4 F to 158 F Operating Humidity 20 to 80 Non Condensing Storage Humidity 10 to 90 Non Condensing Warranty 3 Years Limited ...

Page 83: ...NTATIONS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except by Li...

Page 84: ...ient or relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult a dealer or an experienced radio TV technician for assistance FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and ...

Page 85: ...tielles et aux dispositions relatives à la directive 1999 5 EC Belgique Dans le cas d une utilisation privée à l extérieur d un bâtiment au dessus d un espace public aucun enregistrement n est nécessaire pour une distance de moins de 300m Pour une distance supérieure à 300m un enregistrement auprès de l IBPT est requise Pour une utilisation publique à l extérieur de bâtiments une licence de l IBPT...

Page 86: ...ut networking with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 823 3002 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorization depa...

Reviews: