background image

27

Chapter 6: Configuring the Wireless-G Broadband Router
The Security Tab - Firewall

Wireless-G Broadband Router

The Security Tab - Firewall

Firewall Protection

. This feature employs Stateful Packet Inspection (SPI) for a more detailed review of data 

packets entering your network environment.

Block WAN Requests

. Enable the Block WAN Request feature by checking the box beside 

Block Anonymous 

Internet Requests

 and you can prevent your network from being “pinged,” or detected, by other Internet users. 

The Block WAN Request feature also reinforces your network security by hiding your network ports. Both 
functions of the Block WAN Request feature make it more difficult for outside users to work their way into your 
network. This feature is enabled by default. Select 

Disabled

 to allow anonymous Internet requests.

Filter Multicast

. Multicasting allows for multiple transmissions to specific recipients at the same time. If 

multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate 
computers. Select 

Enabled

 to filter multicasting, or 

Disabled

 to disable this feature.

Filter Internet NAT Redirection

. This feature uses port forwarding to block access to local servers from local 

networked computers. Select 

Enabled

 to filter Internet NAT redirection, or 

Disabled

 to disable this feature.

Filter IDENT (Port 113)

. This feature keeps port 113 from being scanned by devices outside of your local 

network. Select 

Enabled

 to filter port 113, or 

Disabled

 to disable this feature.

Change these settings as described here and click the 

Save Settings 

button to apply your changes or 

Cancel 

Changes 

to cancel your changes.

The Security Tab - VPN Passthrough

Use the settings on this tab to allow VPN tunnels using IPSec, PPTP, or L2TP protocols to pass through the 
Router’s firewall.

IPSec Pass-through

. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure 

exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, click 

Enable

.

 

IPSec Pass-

Through is enabled by default. 

PPTP Pass-through

. Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be 

tunneled through an IP network. To allow PPTP tunnels to pass through the Router, click 

Enable

. PPTP Pass-

Through is enabled by default.

L2TP Pass-through

. Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the 

Internet on the Layer 2 level. To allow L2TP tunnels to pass through the Router, click 

Enable

. L2TP Pass-Through 

is enabled by default.

Figure 5-26: Security Tab - Firewall

Figure 5-27: Security Tab - VPN Passthrough

Summary of Contents for WRT54G-TM

Page 1: ...A Division of Cisco Systems Inc Model No Broadband Router Wireless G WRT54G TM User Guide WIRELESS GHz 2 4802 11g ...

Page 2: ...this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents This exclamation point means there is a caution or warning and is something that could damage your property or the Wireless G Broadband Router This checkmark means there is a note...

Page 3: ... Router 10 Chapter 5 Configuring the Wireless G Broadband Router 12 Overview 12 The Setup Tab Basic Setup 13 The Setup Tab DDNS 17 The Setup Tab MAC Address Clone 18 The Setup Tab Advanced Routing 19 The Wireless Tab Basic Wireless Settings 20 The Wireless Tab Wireless Security 21 The Wireless Tab Wireless MAC Filter 24 The Wireless Tab Advanced Wireless Settings 25 The Security Tab Firewall 27 Th...

Page 4: ...ms and Solutions 40 Frequently Asked Questions 47 Appendix B Wireless Security 54 Security Precautions 54 Security Threats Facing Wireless Networks 54 Appendix C Upgrading Firmware 57 Appendix D Windows Help 58 Appendix E Finding the MAC Address and IP Address for Your Ethernet Adapter 59 Windows 98SE or Me Instructions 59 Windows 2000 or XP Instructions 59 For the Router s Web based Utility 60 Ap...

Page 5: ...n Type 14 Figure 5 6 PPTP Connection Type 14 Figure 5 7 HeartBeat Signal Connection Type 15 Figure 5 8 Optional Settings 15 Figure 5 9 Router IP 16 Figure 5 10 Network Address Server Settings 16 Figure 5 11 Time Setting 16 Figure 5 12 Setup Tab DDNS 17 Figure 5 13 Setup Tab MAC Address Clone 18 Figure 5 14 Setup Tab Advanced Routing Gateway 19 Figure 5 15 Setup Tab Advanced Routing Router 19 Figur...

Page 6: ...plications and Gaming Tab DMZ 32 Figure 5 36 Applications and Gaming Tab QOS 32 Figure 5 37 Administration Tab Management 34 Figure 5 38 Administration Tab Log 34 Figure 5 39 Administration Tab Diagnostics 35 Figure 5 40 The Ping Test 35 Figure 5 41 The Traceroute Test 35 Figure 5 42 Administration Tab Factory Defaults 36 Figure 5 43 Administration Tab Firmware Upgrade 36 Figure 5 44 Administratio...

Page 7: ...Wireless G Broadband Router ...

Page 8: ...ith wireless cards or adapters can communicate without cumbersome cables By sharing the same wireless settings within their transmission radius they form a wireless network This is sometimes called a WLAN or Wireless Local Area Network The Wireless G Broadband Router bridges wireless networks of both 802 11b and 802 11g standards and wired networks allowing them to communicate with each other With...

Page 9: ... on the Wireless G Broadband Router Appendix A Troubleshooting This appendix describes some problems and solutions as well as frequently asked questions regarding installation and use of the Wireless G Broadband Router Appendix B Wireless Security This appendix explains the risks of wireless networking and some solutions to reduce the risks Appendix C Upgrading Firmware This appendix instructs you...

Page 10: ...ons for the Router Appendix H Warranty Information This appendix supplies the warranty information for the Router Appendix I Regulatory Information This appendix supplies the regulatory information regarding the Router Appendix J Contact Information This appendix provides contact information for a variety of Linksys resources including Technical Support ...

Page 11: ... Wireless G Broadband Router which serves as the main point of communications in a wireless network The Router transmits data to PCs equipped with wireless network adapters which can roam within a certain radial range of the Router You can arrange the Router and multiple access points to work in succession to extend the roaming range and you can set up your wireless network to communicate with you...

Page 12: ...l also communicate with the Wireless PrintServer WPS54G and Wireless Ethernet Bridges WET54G WET11 When you wish to connect your wireless network with your wired network you can use the Wireless G Broadband Router s four LAN ports To add more ports any of the Wireless G Broadband Router s LAN ports can be connected to any of Linksys s switches such as the SD205 or SD208 With these and many other L...

Page 13: ... defaults from the Administration tab Factory Defaults in the Router s Web based Utility Internet The Internet port is where you will connect your broadband Internet connection 1 2 3 4 These ports 1 2 3 4 connect the Router to your networked PCs and other Ethernet network devices Power The Power port is where you will connect the power adapter IMPORTANT Resetting the Router will erase all of your ...

Page 14: ... WLAN LED lights up whenever there is a successful wireless connection If the LED is flashing the Router is actively sending or receiving data over the network 1 2 3 4 Green These numbered LEDs corresponding with the numbered ports on the Router s back panel serve two purposes If the LED is continuously lit the Router is successfully connected to a device through that port A flashing LED indicates...

Page 15: ...tion for Connection to Another Router Hardware Installation for Connection to Your Broadband Modem 1 Power down your network devices 2 Locate an optimum location for the Router The best place for the Router is usually at the center of your wireless network with line of sight to all of your mobile stations 3 Fix the direction of the antennas Try to place the Router in a position that will best cove...

Page 16: ... and the other end into an electrical outlet Only use the power adapter supplied with the Router Use of a different adapter may result in product damage Now that the hardware installation is complete proceed to Chapter 5 Configuring the Wireless G Broadband Router for directions on how to configure the Router Figure 4 2 Connecting Your Network Devices Figure 4 3 Connecting the Power IMPORTANT Make...

Page 17: ...p section there is a setting called Local IP Address which is set to 192 168 0 1 Change this to 192 168 2 1 4 Click the Save Settings button to save your change and then exit the Web based Utility 5 Power down your network devices Now you will begin the hardware installation of Router 6 Locate an optimum location for the Router The best place for the Router is usually at the center of your wireles...

Page 18: ...ing 10 Connect the AC power adapter to the Router s Power port and the other end into an electrical outlet Only use the power adapter supplied with the Router Use of a different adapter may result in product damage Now that the hardware installation is complete proceed to Chapter 5 Configuring the Wireless G Broadband Router for directions on how to configure the Router IMPORTANT Make sure you use...

Page 19: ...is admin To secure the Router change the Password from its default There are seven main tabs Setup Wireless Security Access Restrictions Applications Gaming Administration and Status Additional tabs will be available after you click one of the main tabs To access the Web based Utility launch Internet Explorer or Netscape Navigator and enter the Router s default IP address 192 168 0 1 in the Addres...

Page 20: ...utomatic Configuration DHCP which should be kept only if your ISP supports DHCP or you are connecting through a dynamic IP address Static IP If you are required to use a permanent IP address to connect to the Internet select Static IP Internet IP Address This is the Router s IP address when seen from the Internet Your ISP will provide you with the IP Address you need to specify here Subnet Mask Th...

Page 21: ...riod is 30 seconds PPTP Point to Point Tunneling Protocol PPTP is a service that applies to connections in Europe only Specify Internet IP Address This is the Router s IP address as seen from the Internet Your ISP will provide you with the IP Address you need to specify here Subnet Mask This is the Router s Subnet Mask as seen by users on the Internet including your ISP Your ISP will provide you w...

Page 22: ...ally re establish your connection To use this option click the radio button next to Keep Alive In the Redial Period field you specify how often you want the Router to check the Internet connection The default Redial Period is 30 seconds Optional Settings Some of these settings may be required by your ISP Verify with your ISP before making any changes Router Name In this field you can type a name o...

Page 23: ...0 100 Maximum Number of DHCP Users Enter the maximum number of PCs that you want the DHCP server to assign IP addresses to This number cannot be greater than 253 The default is 50 Client Lease Time The Client Lease Time is the amount of time a network user will be allowed connection to the Router with their current dynamic IP address Enter the amount of time in minutes that the user will be leased...

Page 24: ... service with a DDNS service provider www dyndns org or www TZO com DDNS Service From this pull down menu enter the DDNS service with which you have membership User Name Enter the User Name for your DDNS account Password Enter the Password for your DDNS account Host Name The is the DDNS URL assigned by the DDNS service Internet IP Address This is the Router s current IP Address as seen on the Inte...

Page 25: ...the MAC address with your ISP you may assign the MAC address you have currently registered with your ISP to the Router with the MAC Address Clone feature Enable Disable To have the MAC Address cloned click the radio button beside Enable User Defined Entry Enter the MAC Address registered with your ISP here Clone Your PC s MAC Address Clicking this button will clone the MAC address Change these set...

Page 26: ...h networks as well as data from the Internet Static Routing To set up a static route between the Router and another network select a number from the Static Routing drop down list A static route is a pre determined pathway that network information must travel to reach a specific host or network Enter the information described below to set up a new static route Click the Delete This Entry button to ...

Page 27: ...wireless network It is case sensitive and must not exceed 32 characters use any of the characters on the keyboard Make sure this setting is the same for all devices in your wireless network For added security you should change the default SSID linksys to a unique name Wireless Channel Select the appropriate channel from the list provided to correspond with your network settings All devices in your...

Page 28: ...ersonal WPA gives you two encryption methods TKIP and AES with dynamic encryption keys Select the type of algorithm TKIP or AES Enter a WPA Shared Key of 8 63 characters Then enter a Group Key Renewal period which instructs the Router how often it should change the encryption keys WPA Enterprise This option features WPA used in coordination with a RADIUS server This should only be used when a RADI...

Page 29: ...change the encryption keys WPA2 Enterprise This option features WPA2 used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router First select the type of WPA algorithm you want to use AES or TKIP AES Enter the RADIUS server s IP Address and port number along with a key shared between the Router and the server Last enter a Key Renewal Timeout w...

Page 30: ...ption method which is not as secure as WPA To use WEP select a Default Transmit Key choose which Key to use and a level of WEP encryption 64 bits 10 hex digits or 128 bits 26 hex digits Then either generate a WEP key using the Passphrase or enter the WEP key manually Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your ch...

Page 31: ...e Prevent Clicking this button will block wireless access by MAC Address Permit Only Clicking this button will allow wireless access by MAC Address Edit MAC Address Filter List Clicking this button will open the MAC Address Filter List On this screen you can list users by MAC Address to whom you wish to provide or block access For easy reference click the Wireless Client MAC List button to display...

Page 32: ... set depending on the speed of your wireless network You can select from a range of transmission speeds or you can select Auto to have the Router automatically use the fastest possible data rate and enable the Auto Fallback feature Auto Fallback will negotiate the best possible connection speed between the Router and a wireless client The default value is Auto CTS Protection Mode CTS Clear To Send...

Page 33: ...lt value 2347 is recommended If a network packet is smaller than the preset RTS threshold size the RTS CTS mechanism will not be enabled The Router sends Request to Send RTS frames to a particular receiving station and negotiates the sending of a data frame After receiving an RTS the wireless station responds with a Clear to Send CTS frame to acknowledge the right to begin transmission The RTS Thr...

Page 34: ...al servers from local networked computers Select Enabled to filter Internet NAT redirection or Disabled to disable this feature Filter IDENT Port 113 This feature keeps port 113 from being scanned by devices outside of your local network Select Enabled to filter port 113 or Disabled to disable this feature Change these settings as described here and click the Save Settings button to apply your cha...

Page 35: ...the Close button Status Policies are disabled by default To enable a policy select the policy number from the drop down menu and click the radio button beside Enable You can create two kinds of policies one kind to manage Internet access and another kind to manage inbound traffic To create an Internet Access policy 1 Select a number from the Internet Access Policy drop down menu 2 To enable this p...

Page 36: ...es on the Port Services screen click the Apply button to save changes If you want to cancel your changes click the Cancel button To close the Port Services screen and return to the Access Restrictions screen click the Close button 9 If you want to block websites with specific URL addresses enter each URL in a separate field next to Website Blocking by URL Address 10 If you want to block websites u...

Page 37: ...such as web servers ftp servers e mail servers or other specialized Internet applications Specialized Internet applications are any applications that use Internet access to perform functions such as videoconferencing or online gaming Some Internet applications may not require any forwarding To forward a port enter the information on each line for the criteria required The criteria are described he...

Page 38: ... the trigger Triggered Range For each application list the triggered port number range Check with the Internet application documentation for the port number s needed Start Port Enter the starting port number of the Triggered Range End Port Enter the ending port number of the Triggered Range Forwarded Range For each application list the forwarded port number range Check with the Internet applicatio...

Page 39: ... Tab QoS Quality of Service QoS ensures better service to high priority types of network traffic which may involve demanding real time applications such as videoconferencing There are three types of QoS available Device Priority Application Priority and Ethernet Port Priority Enable Disable To limit outgoing bandwidth for the QoS policies in use select Enable Otherwise select Disable Upstream Band...

Page 40: ...te on a local machine they are typically uploaded to the web server using FTP HTTP HyperText Transport Protocol The communications protocol used to connect to servers on the World Wide Web Its primary function is to establish a connection with a web server and transmit HTML pages to the client web browser Telnet A terminal emulation protocol commonly used on Internet and TCP IP based networks It a...

Page 41: ...e to enable wireless access to the Router s web based utility or Disable to disable wireless access to the utility Remote Router Access To access the Router remotely from outside the network verify that Enable is selected Then enter the port number that will be open to outside access You will need to enter the Router s password when accessing the Router this way as usual UPnP When using UPnP featu...

Page 42: ... stop the test click the Stop button Click the Clear Log button to clear the screen Click the Close button to return to the Diagnostics screen Traceroute Test To test the performance of a connect click the Traceroute button Enter the address of the PC whose connection you wish to test and click the Traceroute button The Traceroute screen will then display the test results To stop the test click th...

Page 43: ...you are experiencing problems with the Router For more information about upgrading firmware refer to Appendix C Upgrading Firmware The Administration Tab Config Management This screen is used to back up or restore the Router s configuration file To back up the Router s configuration file click the Backup button Then follow the on screen instructions To restore the Router s configuration file click...

Page 44: ...he Router s MAC Address as seen by your ISP Router Name This is the specific name for the Router which you set on the Setup Tab Host Name If required by your ISP this would have been entered on the Setup Tab Domain Name If required by your ISP this would have been entered on the Setup Tab Configuration Type This shows the information required by your ISP for connection to the Internet This informa...

Page 45: ...here DHCP Server If you are using the Router as a DHCP server that will be displayed here Start IP Address For the range of IP Addresses used by devices on your local Ethernet network the beginning of that range is shown here End IP Address For the range of IP Addresses used by devices on your local Ethernet network the end of that range is shown here DHCP Clients Table Clicking this button will o...

Page 46: ...ess tab this will display the wireless mode Mixed G Only or Disabled used by the network SSID As entered on the Wireless tab this will display the wireless network name or SSID DHCP Server If you are using the Router as a DHCP server that will be displayed here Channel As entered on the Wireless tab this will display the channel on which your wireless network is broadcasting Encryption Function As...

Page 47: ...a PC You can assign a static IP address to a PC by performing the following steps For Windows 98SE and Me 1 Click Start Settings and Control Panel Double click Network 2 In The following network components are installed box select the TCP IP associated with your Ethernet adapter If you only have one Ethernet adapter installed you will only see one TCP IP line with no association to an Ethernet ada...

Page 48: ... the default interface If you are using the Classic interface where the icons and menus look like previous Windows versions please follow the instructions for Windows 2000 1 Click Start and Control Panel 2 Click the Network and Internet Connections icon and then the Network Connections icon 3 Right click the Local Area Connection that is associated with the Ethernet adapter you are using and selec...

Page 49: ...getting an IP address on the Internet with my Internet connection Refer to Problem 3 I want to test my Internet connection to verify that you have connectivity If you need to register the MAC address of your Ethernet adapter with your ISP please see Appendix E Finding the MAC address and IP Address for Your Ethernet Adapter If you need to clone the MAC address of your Ethernet adapter onto the Rou...

Page 50: ... IP address of the PC or network device that you want the port server to go to For example if the web server s Ethernet adapter IP address is 192 168 0 100 you would enter 100 in the field provided Check Appendix E Finding the MAC Address and IP Address for Your Ethernet Adapter for details on getting an IP address 6 Check the Enable option for the port services you want to use Consider the exampl...

Page 51: ...posing one PC to the Internet using DeMilitarized Zone DMZ hosting This option is available when an application requires too many ports or when you are not sure which port services to use Make sure you disable all the forwarding entries if you want to successfully use DMZ hosting since forwarding has priority over DMZ hosting In other words data that enters the Router will be checked first by the ...

Page 52: ...e browser you use is set to connect directly to the LAN For Microsoft Internet Explorer 5 0 or higher 1 Click Start Settings and Control Panel Double click Internet Options 2 Click the Connections tab 3 Click the LAN settings button and remove anything that is checked 4 Click the OK button to go back to the previous screen 5 Click the option Never dial a connection This will remove any dial up pop...

Page 53: ...of the Router 2 Enter the password if asked The default password is admin 3 On the Setup screen select the option Keep Alive and set the Redial Period option at 20 seconds 4 Click the Save Settings button 5 Click the Status tab and click the Connect button 6 You may see the login status display as Connecting Press the F5 key to refresh the screen until you see the login status display as Connected...

Page 54: ...is working correctly You can remove the Router to verify a direct connection Manually configure the TCP IP settings with a DNS address provided by your ISP Make sure that your browser is set to connect directly and that any dial up is disabled For Internet Explorer click Tools Internet Options and then the Connection tab Make sure that Internet Explorer is set to Never dial a connection For Netsca...

Page 55: ...owing fix click ICQ menu preference connections tab and check I am behind a firewall or proxy Then set the firewall time out to 80 seconds in the firewall setting The Internet user can then send a file to a user behind the Router I set up an Unreal Tournament Server but others on the LAN cannot join What do I need to do If you have a dedicated Unreal Tournament server running you need to create a ...

Page 56: ...s All Linksys firmware upgrades are posted on the Linksys website at www linksys com where they can be downloaded for free To upgrade the Router s firmware use the Administration Firmware Upgrade tab of the Router s web based utility If the Router s Internet connection is working well there is no need to download a newer firmware version unless that version contains new features that you would lik...

Page 57: ... only forward 10 ranges of ports What are the advanced features of the Router The Router s advanced features include advanced wireless settings filters access restriction policies port forwarding advanced routing and DDNS How do I get mIRC to work with the Router Under the Port Forwarding tab set port forwarding to 113 for the PC on which you are using mIRC Can the Router act as my DHCP server Yes...

Page 58: ... Rate Selection RTS CTS feature Fragmentation Power Management What is ad hoc mode When a wireless network is set to ad hoc mode the wireless equipped computers are configured to communicate directly with each other The ad hoc wireless network will not communicate with any wired network What is infrastructure mode When a wireless network is set to infrastructure mode the wireless network is config...

Page 59: ...bilities in the hands of users around the globe What is Spread Spectrum Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable secure mission critical communications systems It is designed to trade off bandwidth efficiency for reliability integrity and security In other words more bandwidth is consumed than in the case of narrowband transmi...

Page 60: ...o know the exact range of your wireless network without testing Every obstacle placed between the Router and a wireless PC will create signal loss Lead glass metal concrete floors water and walls will inhibit the signal and reduce range Start with the Router and your wireless PC in the same room and move it away in small increments to determine the maximum range in your environment You may also tr...

Page 61: ...eriodically For information on implementing these security features refer to Chapter 5 Configuring the Wireless G Broadband Router Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking products first listen for beacon messages These messages can be easily decrypted and contain much of the network s inf...

Page 62: ...akes it harder for a hacker to access your network with a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can only provide enough security to make a hacker s job more difficult There are several ways that WEP can be maximized 1 Use the highest level of encryption possible 2...

Page 63: ...ith a key shared between the device and the server Last enter a Group Key Renewal period which instructs the device how often it should change the encryption keys RADIUS WEP used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router or other device First enter the RADIUS server s IP Address and port number along with a key shared between the ...

Page 64: ...irmware from Linksys s website at www linksys com 2 Extract the firmware file on your computer 3 Open the Router s Web based Utility and click the Administration tab 4 Click Firmware Upgrade and the Upgrade Firmware screen will appear 5 Enter the location of the firmware s file or click the Browse button to find the file 6 Then click the Upgrade button and follow the on screen instructions Figure ...

Page 65: ...or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing shared resou...

Page 66: ...Enter key or the OK button 2 When the IP Configuration screen appears select the Ethernet adapter you have connected to the Router via a CAT 5 Ethernet network cable See Figure E 1 3 Write down the Adapter Address as shown on your computer screen see Figure E 2 This is the MAC address for your Ethernet adapter and is shown as a series of numbers and letters The MAC address Adapter Address is what ...

Page 67: ...l use for MAC address cloning or MAC filtering The example in Figure E 3 shows the Ethernet adapter s IP address as 192 168 0 100 Your computer may show something different For the Router s Web based Utility For MAC filtering enter the 12 digit MAC address in this format XXXXXXXXXXXX WITHOUT the hyphens See Figure E 4 For MAC address cloning enter the 12 digit MAC address in the MAC Address fields...

Page 68: ...of an access point AES Advanced Encryption Standard A security method that uses symmetric 128 bit block data encryption Backbone The part of a network that connects most of the systems and networks together and handles the most data Bandwidth The transmission capacity of a given device or network Beacon Interval Data transmitted on your wireless network that keeps the network synchronized Bit A bi...

Page 69: ... DHCP Dynamic Host Configuration Protocol A networking protocol that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited amount of time instead of assigning permanent IP addresses DMZ Demilitarized Zone Removes the Router s firewall protection from one PC allowing it to be seen from the Internet DNS Domain Name Server The IP ...

Page 70: ...asyKeySetup will use the currently security settings and share those with the T Mobile phone Encryption Encoding data transmitted in a network Ethernet A networking protocol that specifies how data is placed on and retrieved from a common transmission medium Finger A program that tells you the name associated with an e mail address Firewall A set of related programs located at a network gateway se...

Page 71: ...puters and networking products that make up your local network LEAP Lightweight Extensible Authentication Protocol A mutual authentication method that uses a username and password system MAC Media Access Control Address The unique address that a manufacturer assigns to each networking device Mbps MegaBits Per Second One million bits per second a unit of measurement for data transmission mIRC An In...

Page 72: ...wer over Ethernet PoE A technology enabling an Ethernet network cable to deliver both data and power PPPoE Point to Point Protocol over Ethernet A type of broadband connection that provides authentication username and password in addition to data transport PPTP Point to Point Tunneling Protocol A VPN protocol that allows the Point to Point Protocol PPP to be tunneled through an IP network This pro...

Page 73: ...Forwarding data in a network via a fixed path Subnet Mask An address code that determines the size of the network Switch 1 A data switch that connects computing devices to host computers allowing a large number of devices to share a limited number of ports 2 A device for making breaking or changing the connections in an electrical circuit TCP Transmission Control Protocol A network protocol for tr...

Page 74: ...k A security measure to protect data as it leaves one network and goes to another over the Internet WAN Wide Area Network The Internet WEP Wired Equivalent Privacy A method of encrypting network data transmitted on a wireless network for greater security WINIPCFG A Windows 98 and Me utility that displays the IP address for a particular networking device WLAN Wireless Local Area Network A group of ...

Page 75: ...d Ports One Power Port Buttons Reset Cabling Type Ethernet Network Cable LEDs Power DMZ WLAN LAN 1 4 Internet RF Power Output 18 dBm UPnP able cert Able Security Features Stateful Packet Inspection SPI Firewall Internet Policy Wireless Security Wi Fi Protected Access WPA WEP Wireless MAC Filtering Dimensions 7 32 x 1 89 x 7 87 W x H x D 186 mm x 48 mm x 200 mm Unit Weight 17 oz 0 482 kg Power Exte...

Page 76: ...ix G Specifications Wireless G Broadband Router Operating Temp 0ºC to 40ºC 32ºF to 104ºF Storage Temp 20ºC to 70ºC 4ºF to 158ºF Operating Humidity 10 to 85 Non Condensing Storage Humidity 5 to 90 Non Condensing ...

Page 77: ... AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except by Linksys b ...

Page 78: ... correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult a dealer or an experienced radio TV technician for assistance FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth ...

Page 79: ...red by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE This document contains important information for users with regards to the proper disposal and recycling of Linksys products Consumers are required to comply with this notice for all electronic products bearing the following symbol ...

Page 80: ...73 Appendix I Regulatory Information Wireless G Broadband Router ...

Page 81: ...74 Appendix I Regulatory Information Wireless G Broadband Router ...

Page 82: ...75 Appendix I Regulatory Information Wireless G Broadband Router ...

Page 83: ...76 Appendix I Regulatory Information Dual Band Wireless Access Point For more information visit www linksys com ...

Page 84: ...rking with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 823 3002 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorization department f...

Reviews: