background image

55

Appendix B: Wireless Security
Security Precautions

Wireless-G Broadband Router

Appendix B: Wireless Security

Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of 
Linksys products provide several network security features, but they require specific action on your part for 
implementation. So, keep the following in mind whenever you are setting up or using your wireless network.

Security Precautions

The following is a complete list of security precautions to take (at least steps 1 through 5 should be followed):

1. Change the default SSID. 

2. Disable SSID Broadcast. 

3. Change the default password for the Administrator account. 

4. Enable MAC Address Filtering. 

5. Change the SSID periodically. 

6. Use the highest encryption algorithm possible. Use WPA if it is available. Please note that this may reduce 

your network performance. 

7. Change the WEP encryption keys periodically. 

For information on implementing these security features, refer to “Chapter 6: Configuring the Wireless-G 
Broadband Router.”

Security Threats Facing Wireless Networks 

Wireless networks are easy to find. Hackers know that in order to join a wireless network, wireless networking 
products first listen for “beacon messages”. These messages can be easily decrypted and contain much of the 
network’s information, such as the network’s SSID (Service Set Identifier). Here are the steps you can take:

Change the administrator’s password regularly.

 With every wireless networking device you use, keep in mind 

that network settings (SSID, WEP keys, etc.) are stored in its firmware. Your network administrator is the only 
person who can change network settings. If a hacker gets a hold of the administrator’s password, he, too, can 
change those settings. So, make it harder for a hacker to get that information. Change the administrator’s 
password regularly.

NOTE:

 Some of these security features are available 

only through the network router or access point. Refer 
to the router or access point’s documentation for more 
information.

Summary of Contents for WRK54G

Page 1: ...A Division of Cisco Systems Inc Model No Broadband Router Wireless G WRK54G User Guide WIRELESS GHz 2 4802 11g ...

Page 2: ... this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents This exclamation point means there is a caution or warning and is something that could damage your property or the Wireless G Broadband Router This checkmark means there is a not...

Page 3: ... Router 10 Chapter 5 Configuring the Wireless G Broadband Router 12 Overview 12 The Setup Tab Basic Setup 13 The Setup Tab DDNS 18 The Setup Tab MAC Address Clone 19 The Setup Tab Advanced Routing 20 The Wireless Tab Basic Wireless Settings 21 The Wireless Tab Wireless Security 22 The Wireless Tab Wireless MAC Filter 25 The Wireless Tab Advanced Wireless Settings 26 The Security Tab Firewall 27 Th...

Page 4: ...ms and Solutions 40 Frequently Asked Questions 48 Appendix B Wireless Security 55 Security Precautions 55 Security Threats Facing Wireless Networks 55 Appendix C Upgrading Firmware 58 Appendix D Windows Help 59 Appendix E Finding the MAC Address and IP Address for Your Ethernet Adapter 60 Windows 98SE or Me Instructions 60 Windows 2000 or XP Instructions 60 For the Router s Web based Utility 61 Ap...

Page 5: ...nection Type 14 Figure 5 6 PPTP Connection Type 14 Figure 5 7 L2TP Connection Type 15 Figure 5 8 Telestra Cable Connection Type 15 Figure 5 9 Optional Settings 16 Figure 5 10 Router IP 16 Figure 5 11 Network Address Server Settings 17 Figure 5 12 Time Setting 17 Figure 5 13 Setup Tab DDNS DynDNS account 18 Figure 5 14 Setup Tab DDNS TZO account 18 Figure 5 15 Setup Tab MAC Address Clone 19 Figure ...

Page 6: ...nd Gaming Tab DMZ 32 Figure 5 37 Applications and Gaming Tab QOS 32 Figure 5 38 Applications and Gaming Tab QOS Adding an New Application 33 Figure 5 39 Administration Tab Management 35 Figure 5 40 Administration Tab Log 35 Figure 5 41 Administration Tab Diagnostics 36 Figure 5 42 The Ping Test 36 Figure 5 43 The Traceroute Test 36 Figure 5 44 Administration Tab Factory Defaults 37 Figure 5 45 Adm...

Page 7: ...ernet cables which is why the network is called wired PCs equipped with wireless cards or adapters can communicate without cumbersome cables By sharing the same wireless settings within their transmission radius they form a wireless network This is sometimes called a WLAN or Wireless Local Area Network The Wireless G Broadband Router bridges wireless networks of both 802 11b and 802 11g standards ...

Page 8: ... on the Wireless G Broadband Router Appendix A Troubleshooting This appendix describes some problems and solutions as well as frequently asked questions regarding installation and use of the Wireless G Broadband Router Appendix B Wireless Security This appendix explains the risks of wireless networking and some solutions to reduce the risks Appendix C Upgrading Firmware This appendix instructs you...

Page 9: ...ons for the Router Appendix H Warranty Information This appendix supplies the warranty information for the Router Appendix I Regulatory Information This appendix supplies the regulatory information regarding the Router Appendix J Contact Information This appendix provides contact information for a variety of Linksys resources including Technical Support ...

Page 10: ... Wireless G Broadband Router which serves as the main point of communications in a wireless network The Router transmits data to PCs equipped with wireless network adapters which can roam within a certain radial range of the Router You can arrange the Router and multiple access points to work in succession to extend the roaming range and you can set up your wireless network to communicate with you...

Page 11: ...l also communicate with the Wireless PrintServer WPS54G and Wireless Ethernet Bridges WET54G WET11 When you wish to connect your wireless network with your wired network you can use the Wireless G Broadband Router s four LAN ports To add more ports any of the Wireless G Broadband Router s LAN ports can be connected to any of Linksys s switches such as the SD205 or SD208 With these and many other L...

Page 12: ... defaults from the Administration tab Factory Defaults in the Router s Web based Utility Internet The Internet port is where you will connect your broadband Internet connection 1 2 3 4 These ports 1 2 3 4 connect the Router to your networked PCs and other Ethernet network devices Power The Power port is where you will connect the power adapter IMPORTANT Resetting the Router will erase all of your ...

Page 13: ...icates when the DMZ function is being used This LED will remain lit as long as DMZ is enabled WLAN Green The WLAN LED lights up whenever there is a successful wireless connection If the LED is flashing the Router is actively sending or receiving data over the network 1 2 3 4 Green These numbered LEDs corresponding with the numbered ports on the Router s back panel serve two purposes If the LED is ...

Page 14: ...tion for Connection to Another Router Hardware Installation for Connection to Your Broadband Modem 1 Power down your network devices 2 Locate an optimum location for the Router The best place for the Router is usually at the center of your wireless network with line of sight to all of your mobile stations 3 Fix the direction of the antennas Try to place the Router in a position that will best cove...

Page 15: ... and the other end into an electrical outlet Only use the power adapter supplied with the Router Use of a different adapter may result in product damage Now that the hardware installation is complete proceed to Chapter 5 Setting up the Wireless G Broadband Router for directions on how to configure the Router Figure 4 2 Connecting Your Network Devices Figure 4 3 Connecting the Power IMPORTANT Make ...

Page 16: ...p section there is a setting called Local IP Address which is set to 192 168 1 1 Change this to 192 168 2 1 4 Click the Save Settings button to save your change and then exit the Web based Utility 5 Power down your network devices Now you will begin the hardware installation of Router 6 Locate an optimum location for the Router The best place for the Router is usually at the center of your wireles...

Page 17: ...d Ethernet network cabling 10 Connect the AC power adapter to the Router s Power port and the other end into an electrical outlet Only use the power adapter supplied with the Router Use of a different adapter may result in product damage Now that the hardware installation is complete proceed to Chapter 5 Configuring the Wireless G Broadband Router IMPORTANT Make sure you use the power adapter that...

Page 18: ... password is admin To secure the Router change the Password from its default There are seven main tabs Setup Wireless Security Access Restrictions Applications Gaming Administration and Status Additional tabs will be available after you click one of the main tabs To access the Web based Utility launch Internet Explorer or Netscape Navigator and enter the Router s default IP address 192 168 1 1 in ...

Page 19: ...utomatic Configuration DHCP which should be kept only if your ISP supports DHCP or you are connecting through a dynamic IP address Static IP If you are required to use a permanent IP address to connect to the Internet select Static IP Internet IP Address This is the Router s IP address when seen from the Internet Your ISP will provide you with the IP Address you need to specify here Subnet Mask Th...

Page 20: ...riod is 30 seconds PPTP Point to Point Tunneling Protocol PPTP is a service that applies to connections in Europe only Specify Internet IP Address This is the Router s IP address as seen from the Internet Your ISP will provide you with the IP Address you need to specify here Subnet Mask This is the Router s Subnet Mask as seen by users on the Internet including your ISP Your ISP will provide you w...

Page 21: ... connection is down the Router will automatically re establish your connection Telestra Cable Telestra Cable is a service that applies to connections in Australia only If your ISP is Telstra then select Telestra Cable User Name and Password Enter the User Name and Password provided by your ISP Heart Beat Server This is the IP address that the Router has when seen from the Internet Your ISP will pr...

Page 22: ... host and domain name In most cases leaving these fields blank will work MTU MTU is the Maximum Transmission Unit It specifies the largest packet size permitted for Internet transmission The default setting Manual allows you to enter the largest packet size that will be transmitted The recommended size entered in the Size field is 1492 You should leave this value in the 1200 to 1500 range To have ...

Page 23: ...nter the maximum number of PCs that you want the DHCP server to assign IP addresses to This number cannot be greater than 253 The default is 50 Client Lease Time The Client Lease Time is the amount of time a network user will be allowed connection to the Router with their current dynamic IP address Enter the amount of time in minutes that the user will be leased this dynamic IP address After the t...

Page 24: ...r www dyndns org or www TZO com Select your DDNS service DynDNS or TZO from the DDNS Service pull down menu You may be asked for a User Name Password E mail Address Domain Name or Host Name Simply enter the appropriate information for your DDNS account The following information will also be displayed Internet IP Address This is the Router s current IP Address as seen on the Internet Status This di...

Page 25: ...the MAC address with your ISP you may assign the MAC address you have currently registered with your ISP to the Router with the MAC Address Clone feature Enable Disable To have the MAC Address cloned click the radio button beside Enable User Defined Entry Enter the MAC Address registered with your ISP here Clone Your PC s MAC Address Clicking this button will clone the MAC address Change these set...

Page 26: ...h networks as well as data from the Internet Static Routing To set up a static route between the Router and another network select a number from the Static Routing drop down list A static route is a pre determined pathway that network information must travel to reach a specific host or network Enter the information described below to set up a new static route Click the Delete This Entry button to ...

Page 27: ...wireless network It is case sensitive and must not exceed 32 characters use any of the characters on the keyboard Make sure this setting is the same for all devices in your wireless network For added security you should change the default SSID linksys to a unique name Wireless Channel Select the appropriate channel from the list provided to correspond with your network settings All devices in your...

Page 28: ...ersonal WPA gives you two encryption methods TKIP and AES with dynamic encryption keys Select the type of algorithm TKIP or AES Enter a WPA Shared Key of 8 63 characters Then enter a Group Key Renewal period which instructs the Router how often it should change the encryption keys WPA Enterprise This option features WPA used in coordination with a RADIUS server This should only be used when a RADI...

Page 29: ...change the encryption keys WPA2 Enterprise This option features WPA2 used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router First select the type of WPA algorithm you want to use AES or TKIP AES Enter the RADIUS server s IP Address and port number along with a key shared between the Router and the server Last enter a Key Renewal Timeout w...

Page 30: ...ption method which is not as secure as WPA To use WEP select a Default Transmit Key choose which Key to use and a level of WEP encryption 64 bits 10 hex digits or 128 bits 26 hex digits Then either generate a WEP key using the Passphrase or enter the WEP key manually Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your ch...

Page 31: ...e Prevent Clicking this button will block wireless access by MAC Address Permit Only Clicking this button will allow wireless access by MAC Address Edit MAC Address Filter List Clicking this button will open the MAC Address Filter List On this screen you can list users by MAC Address to whom you wish to provide or block access For easy reference click the Wireless Client MAC List button to display...

Page 32: ... clients it sends the next DTIM with a DTIM Interval value Its clients hear the beacons and awaken to receive the broadcast and multicast messages The default value is 1 Fragmentation Threshold This value specifies the maximum size for a packet before data is fragmented into multiple packets If you experience a high packet error rate you may slightly increase the Fragmentation Threshold Setting th...

Page 33: ...T Port 113 This feature keeps port 113 from being scanned by devices outside of your local network Select Enabled to filter port 113 or Disabled to disable this feature Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes The Security Tab VPN Passthrough Use the settings on this tab to allow VPN tunnels using IPSe...

Page 34: ...ou can create two kinds of policies one kind to manage Internet access and another kind to manage inbound traffic To create an Internet Access policy 1 Select a number from the Internet Access Policy drop down menu 2 To enable this policy click the radio button beside Enable 3 Enter a Policy Name in the field provided 4 Select Internet Access as the Policy Type 5 Click the Edit List button to sele...

Page 35: ...ng or port range Then click the Modify button To delete a service select it from the list on the right Then click the Delete button When you are finished making changes on the Port Services screen click the Apply button to save changes If you want to cancel your changes click the Cancel button To close the Port Services screen and return to the Access Restrictions screen click the Close button 9 I...

Page 36: ...he information on each line for the criteria required The criteria are described here Application In this field enter the name you wish to give the application Each name can be up to 12 characters Start End This is the port range Enter the number that starts the port range under Start and the number that ends the range under End Protocol Enter the protocol used for this application either TCP or U...

Page 37: ... the trigger Triggered Range For each application list the triggered port number range Check with the Internet application documentation for the port number s needed Start Port Enter the starting port number of the Triggered Range End Port Enter the ending port number of the Triggered Range Forwarded Range For each application list the forwarded port number range Check with the Internet applicatio...

Page 38: ...ancel Changes to cancel your changes The Applications and Gaming Tab QoS Two types of Quality of Service QoS are available Wireless QoS controls devices that are wirelessly communicating with the Router QoS controls devices plugged into the Router with an Ethernet cable Wireless QoS WMM Support Wireless QoS is also referred to as Wi Fi Multi Media WMM Select Enable to utilize WMM if you are using ...

Page 39: ...y Select from Port Range or MAC Address for the Router to use to set the bandwidth priority Port Range If you selected Port Range then this category will be available It allows you to enter the port range that the application will be using For example if you want to allocate bandwidth for FTP you can enter 21 21 If you need services for an application that uses from 1000 to 1250 you enter 1000 125...

Page 40: ...e or the entries you entered to be allocated Information This displays the Port Range or MAC Address entered when you added a new application If a pre configured application was selected there will be no valid entry shown in this section Remove This button allows you to remove the application entry To remove the entry click the Remove button Edit This button allows you to edit the application entr...

Page 41: ...e to enable wireless access to the Router s web based utility or Disable to disable wireless access to the utility Remote Router Access To access the Router remotely from outside the network verify that Enable is selected Then enter the port number that will be open to outside access You will need to enter the Router s password when accessing the Router this way as usual UPnP When using UPnP featu...

Page 42: ... stop the test click the Stop button Click the Clear Log button to clear the screen Click the Close button to return to the Diagnostics screen Traceroute Test To test the performance of a connect click the Traceroute button Enter the address of the PC whose connection you wish to test and click the Traceroute button The Traceroute screen will then display the test results To stop the test click th...

Page 43: ...you are experiencing problems with the Router For more information about upgrading firmware refer to Appendix C Upgrading Firmware The Administration Tab Config Management This screen is used to back up or restore the Router s configuration file To back up the Router s configuration file click the Backup button Then follow the on screen instructions To restore the Router s configuration file click...

Page 44: ...on the Setup Tab MAC Address This is the Router s MAC Address as seen by your ISP Router Name This is the specific name for the Router which you set on the Setup Tab Host Name If required by your ISP this would have been entered on the Setup Tab Domain Name If required by your ISP this would have been entered on the Setup Tab Configuration Type This shows the information required by your ISP for c...

Page 45: ...ange is shown here DHCP Clients Table Clicking this button will open a screen to show you which PCs are utilizing the Router as a DHCP server You can delete PCs from that list and sever their connections by checking a Delete box and clicking the Delete button The Status Tab Wireless The Wireless screen on the Status Tab displays the status of your wireless network Click the Refresh button to updat...

Page 46: ...dress on a PC You can assign a static IP address to a PC by performing the following steps For Windows 98SE and Me 1 Click Start Settings and Control Panel Double click Network 2 In The following network components are installed box select the TCP IP associated with your Ethernet adapter If you only have one Ethernet adapter installed you will only see one TCP IP line with no association to an Eth...

Page 47: ...e you are running Windows XP with the default interface If you are using the Classic interface where the icons and menus look like previous Windows versions please follow the instructions for Windows 2000 1 Click Start and Control Panel 2 Click the Network and Internet Connections icon and then the Network Connections icon 3 Right click the Local Area Connection that is associated with the Etherne...

Page 48: ... original computer is not the cause of the problem If you do NOT get a reply there may be a problem with the connection Try the ping command from a different computer to verify that your original computer is not the cause of the problem 4 I am not getting an IP address on the Internet with my Internet connection Refer to Problem 3 I want to test my Internet connection to verify that you have conne...

Page 49: ...r you installed Follow these steps to set up port forwarding through the Router s web based utility We will be setting up web ftp and mail servers 1 Access the Router s web based utility by going to http 192 168 1 1 or the IP address of the Router Go to the Applications Gaming Port Range Forward tab 2 Enter any name you want to use for the Application 3 Enter the Start and End Port range of the se...

Page 50: ...ce that you want the port server to go to For example if the web server s Ethernet adapter IP address is 192 168 1 100 you would enter 100 in the field provided Check Appendix E Finding the MAC Address and IP Address for Your Ethernet Adapter for details on getting an IP address 6 Check the Enable option for the port services you want to use Consider the example below When you have completed the c...

Page 51: ...cess the Router s web based utility by going to http 192 168 1 1 or the IP address of the Router Enter the default password admin and click the Administration Management tab 2 Enter a different password in the Router Password field and enter the same password in the second field to confirm the password 3 Click the Save Settings button 10 I am a PPPoE user and I need to remove the proxy settings or...

Page 52: ...e pdf s instructions Set a static IP address on the PC refer to Problem 2 I need to set a static IP address Use the following IP address settings for the computer you are using IP Address 192 168 1 50 Subnet Mask 255 255 255 0 Gateway 192 168 1 1 Perform the upgrade using the TFTP program or the Administration tab of the Router s web based utility 14 My DSL service s PPPoE is always disconnecting ...

Page 53: ... time the device is not working properly Try to flash the firmware by assigning a static IP address to the computer and then upgrade the firmware Try using the following settings IP Address 192 168 1 50 and Subnet Mask 255 255 255 0 17 When I enter a URL or IP address I get a time out error or am prompted to retry Check if other PCs work If they do ensure that your workstation s IP settings are co...

Page 54: ... white For other SecureEasySetup devices refer to each wireless device s documentation to locate the button on that device I have devices that support WPA Personal security but do not have SecureEasySetup Can I still use SecureEasySetup Yes Print out the wireless security settings at the end of the SecureEasySetup process and then manually configure the settings for your non SecureEasySetup device...

Page 55: ...owing fix click ICQ menu preference connections tab and check I am behind a firewall or proxy Then set the firewall time out to 80 seconds in the firewall setting The Internet user can then send a file to a user behind the Router I set up an Unreal Tournament Server but others on the LAN cannot join What do I need to do If you have a dedicated Unreal Tournament server running you need to create a ...

Page 56: ...s All Linksys firmware upgrades are posted on the Linksys website at www linksys com where they can be downloaded for free To upgrade the Router s firmware use the Administration Firmware Upgrade tab of the Router s web based utility If the Router s Internet connection is working well there is no need to download a newer firmware version unless that version contains new features that you would lik...

Page 57: ... time but you can only forward 10 ranges of ports What are the advanced features of the Router The Router s advanced features include advanced wireless settings filters access restriction policies port forwarding advanced routing and DDNS How do I get mIRC to work with the Router Under the Port Forwarding tab set port forwarding to 113 for the PC on which you are using mIRC Can the Router act as m...

Page 58: ...Roaming Automatic Rate Selection RTS CTS feature Fragmentation Power Management What is ad hoc mode When a wireless network is set to ad hoc mode the wireless equipped computers are configured to communicate directly with each other The ad hoc wireless network will not communicate with any wired network What is infrastructure mode When a wireless network is set to infrastructure mode the wireless ...

Page 59: ...bilities in the hands of users around the globe What is Spread Spectrum Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable secure mission critical communications systems It is designed to trade off bandwidth efficiency for reliability integrity and security In other words more bandwidth is consumed than in the case of narrowband transmi...

Page 60: ...o know the exact range of your wireless network without testing Every obstacle placed between the Router and a wireless PC will create signal loss Lead glass metal concrete floors water and walls will inhibit the signal and reduce range Start with the Router and your wireless PC in the same room and move it away in small increments to determine the maximum range in your environment You may also tr...

Page 61: ...eriodically For information on implementing these security features refer to Chapter 6 Configuring the Wireless G Broadband Router Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking products first listen for beacon messages These messages can be easily decrypted and contain much of the network s inf...

Page 62: ...akes it harder for a hacker to access your network with a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can only provide enough security to make a hacker s job more difficult There are several ways that WEP can be maximized 1 Use the highest level of encryption possible 2...

Page 63: ...ith a key shared between the device and the server Last enter a Group Key Renewal period which instructs the device how often it should change the encryption keys RADIUS WEP used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router or other device First enter the RADIUS server s IP Address and port number along with a key shared between the ...

Page 64: ...irmware from Linksys s website at www linksys com 2 Extract the firmware file on your computer 3 Open the Router s Web based Utility and click the Administration tab 4 Click Firmware Upgrade and the Upgrade Firmware screen will appear 5 Enter the location of the firmware s file or click the Browse button to find the file 6 Then click the Upgrade button and follow the on screen instructions Figure ...

Page 65: ...or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing shared resou...

Page 66: ...Then press the Enter key or the OK button 2 When the IP Configuration screen appears select the Ethernet adapter you have connected to the Router via a CAT 5 Ethernet network cable 3 Write down the Adapter Address as shown on your computer screen This is the MAC address for your Ethernet adapter and is shown as a series of numbers and letters The MAC address Adapter Address is what you will use fo...

Page 67: ...at you will use for MAC address cloning or MAC filtering The example to the right shows the Ethernet adapter s IP address as 192 168 1 100 Your computer may show something different For the Router s Web based Utility For MAC filtering enter the 12 digit MAC address in this format XXXXXXXXXXXX WITHOUT the hyphens For MAC address cloning enter the 12 digit MAC address in the MAC Address fields provi...

Page 68: ...of an access point AES Advanced Encryption Standard A security method that uses symmetric 128 bit block data encryption Backbone The part of a network that connects most of the systems and networks together and handles the most data Bandwidth The transmission capacity of a given device or network Beacon Interval Data transmitted on your wireless network that keeps the network synchronized Bit A bi...

Page 69: ... DHCP Dynamic Host Configuration Protocol A networking protocol that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited amount of time instead of assigning permanent IP addresses DMZ Demilitarized Zone Removes the Router s firewall protection from one PC allowing it to be seen from the Internet DNS Domain Name Server The IP ...

Page 70: ... resources of a network from users from other networks Firmware The programming code that runs a networking device Fragmentation Breaking a packet into smaller units when transmitting over a network medium that cannot support the original size of the packet FTP File Transfer Protocol A protocol used to transfer files over a TCP IP network Full Duplex The ability of a networking device to receive a...

Page 71: ...data to a group of destinations at once NAT Network Address Translation NAT technology translates IP addresses of a local area network to a different IP address for the Internet Network A series of computers or devices connected for the purpose of data sharing storage and or transmission between users NNTP Network News Transfer Protocol The protocol used to connect to Usenet groups on the Internet...

Page 72: ...l In User Service A protocol that uses an authentication server to control network access RJ 45 Registered Jack 45 An Ethernet connector that holds up to eight wires Roaming The ability to take a wireless device from one access point s range to another without losing the connection Router A networking device that connects multiple networks together RTS Request To Send A networking method of coordi...

Page 73: ...from the recipient of data sent TCP IP Transmission Control Protocol Internet Protocol A set of instructions PCs use to communicate over a network Telnet A user command and TCP IP protocol used for accessing remote PCs TFTP Trivial File Transfer Protocol A version of the TCP IP FTP protocol that has no directory or password capability Throughput The amount of data moved successfully from one node ...

Page 74: ...pting network data transmitted on a wireless network for greater security WINIPCFG A Windows 98 and Me utility that displays the IP address for a particular networking device WLAN Wireless Local Area Network A group of computers and associated devices that communicate with each other wirelessly WPA Wi Fi Protected Access a wireless security protocol using TKIP Temporal Key Integrity Protocol encry...

Page 75: ... One Power Port Buttons Reset Cabling Type Ethernet Network Cable LEDs Power DMZ WLAN LAN 1 4 Internet RF Power Output 18 dBm B 15 dBm G UPnP able cert Able Security Features Stateful Packet Inspection SPI Firewall Internet Policy Wireless Security Wi Fi Protected Access WPA WEP Wireless MAC Filtering Dimensions 7 32 x 1 89 x 7 87 W x H x D 186 mm x 48 mm x 200 mm Unit Weight 11 4 oz 0 323 kg Powe...

Page 76: ...ix G Specifications Wireless G Broadband Router Operating Temp 0ºC to 40ºC 32ºF to 104ºF Storage Temp 20ºC to 70ºC 4ºF to 158ºF Operating Humidity 10 to 85 Non Condensing Storage Humidity 5 to 90 Non Condensing ...

Page 77: ... AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except by Linksys b ...

Page 78: ...orient or relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult a dealer or an experienced radio TV technician for assistance FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed an...

Page 79: ...es et aux dispositions relatives à la directive 1999 5 EC Belgique Dans le cas d une utilisation privée à l extérieur d un bâtiment au dessus d un espace public aucun enregistrement n est nécessaire pour une distance de moins de 300m Pour une distance supérieure à 300m un enregistrement auprès de l IBPT est requise Pour une utilisation publique à l extérieur de bâtiments une licence de l IBPT est ...

Page 80: ...rking with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 823 3002 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorization department f...

Reviews: