background image

51

Chapter 7: Configuring the Router’s Web-Based Utility
Diagnostics

Dual-Band Wireless Access Point

Notification Qeue Length

Log queue Length. Enter the 

number

 of entries in the log queue in the field.

Log Time Threshold. Enter the 

time

 for the threshold in the field.

Alert Log

Select the alert log that you want to ______. Select Syn Flooding, IP Spoofing, Win Nuke, Ping of Death, or 
Unauthorized Login attempt.

General Log.

Select the ________. Select System Error Messages, Deny Policies, Allow Policies, Content Filtering, Data 
Inspection, authorized Login, or Configuration Changes.

When finished making your changes on this tab, click the 

Save Settings

 button to save these changes, or click 

the 

Cancel Changes

 button to undo your changes. 

Diagnostics

Ping Test 

Ping Test Parameters

Ping Target IP. Enter the IP Address that you want to ping in the field.

No. of Pings. Enter the number of times that you want to ping.

Ping Size. Enter the size of the ____.

Ping Interval. Enter the ping interval in Milliseconds.

Ping Timeout. Enter the time in Milliseconds.

Click the Start Test button to start the Ping Test. Click the Abort Test button to stop the test. Click the Clean Result 
button if _____. The results of the test will display in the window.

Figure 7-32: 

Summary of Contents for WRV54G - Wireless-G VPN Broadband Router Wireless

Page 1: ...sco Systems Inc Model No VPN Router Wireless G WRV54G Linksys is a registered trademark or trademark of Cisco Systems Inc and or its affiliates in the U S and certain other countries User Guide GHz 2...

Page 2: ...ccess Point 8 Hardware Installation 8 Chapter 5 Setting Up the Access Point 11 Setup Wizard 11 Chapter 6 Configuring the Access Point 15 Overview 15 The Setup Tab 16 The Password Tab 17 The Status Tab...

Page 3: ...Dual Band Wireless Access Point Appendix G Warranty Information 41 Appendix H Regulatory Information 42 Appendix I Contact Information 44...

Page 4: ...2 11 4 Figure 2 12 4 Figure 3 1 Back Panel 5 Figure 3 2 Front Panel 6 Figure 3 3 7 Figure 3 4 7 Figure 3 5 7 Figure 3 6 7 Figure 3 7 7 Figure 3 8 7 Figure 3 9 7 Figure 3 10 7 Figure 3 11 7 Figure 3 1...

Page 5: ...17 Figure 6 4 Password Tab 17 Figure 6 5 Status Tab 18 Figure 6 6 Help Tab 18 Figure 6 7 Filter Tab 19 Figure 6 8 Wireless Tab 20 Figure 6 9 21 Figure 6 10 21 Figure 6 11 21 Figure 6 12 21 Figure 6 13...

Page 6: ...s G or Wireless B devices to the network There s also a built in 4 port full duplex 10 100 Switch to connect your wired Ethernet devices Connect four PCs directly or daisy chain out to more hubs and s...

Page 7: ...etwork including PCs print servers and routers requires an IP address to identify its location or address on the network This applies to both the Internet and LAN connections There are two ways of ass...

Page 8: ...he Host Name and Domain Name usually cable ISPs require them These fields allow you to provide a host name and domain name for the Router and are usually left blank The values for the Router s LAN IP...

Page 9: ...l your changes If you require online help click the Help button The Setup Tab The first screen that appears displays the Setup tab This allows you to change the Access Point s general settings Change...

Page 10: ...orrectly WEP The WEP Encryption method is Disabled by default To enable WEP click the WEP Key Setting button For more information on WEP and wireless security refer to Appendix B Wireless Security Cli...

Page 11: ...s in this Web based Utility along with upgrading the Access Point s firmware and viewing this Guide click the Help tab The help files for the various tabs in this Web based Utility are listed by tab n...

Page 12: ...e the MAC Addresses for those PCs you wish to allow access to the Access Point in the MAC Address fields As long as Filtering is enabled PCs with MAC Addresses not entered in the MAC Address field wil...

Page 13: ...s transmissions The Wireless Tab Before making any changes to the Wireless tab please check your wireless settings on other systems as these changes will alter the effectiveness of the Access Point In...

Page 14: ...e default is set to Open System in which the sender and the recipient do NOT share a secret key Each party generates its own key pair and asks the receiver to accept the randomly generated key Once ac...

Page 15: ...configure your network settings based on the type of Windows operating system you are using Make sure that an Ethernet or wireless adapter also known as a network adapter has been successfully instal...

Page 16: ...the Router PCs and cable or DSL modem 2 Connect one end of an Ethernet network cable to one of the LAN ports labeled 1 4 on the back of the Router and the other end to an Ethernet port on a PC Repeat...

Page 17: ...s factory defaults Either press the Reset Button for approximately ten seconds or restore the defaults from the Password tab in the Access Point s Web Based Utility With these and many other Linksys...

Page 18: ...g Administration and Status Additional tabs will be available after you click one of the main tabs Setup Basic Setup Enter the Internet connection and network settings on this screen DDNS To enable th...

Page 19: ...o alter UPnP forwarding settings DMZ To allow one local user to be exposed to the Internet for use of special purpose services use this screen Administration Management On this screen alter router acc...

Page 20: ...el any unsaved changes on any page click the Cancel button The Setup Tab The Basic Setup Tab The first screen that appears is the Basic Setup tab This tab allows you to change the Router s general set...

Page 21: ...ble PPPoE User Name and Password Enter the User Name and Password provided by your ISP Connect on Demand Max Idle Time You can configure the Router to cut the Internet connection after it has been ina...

Page 22: ...f minutes you want to have elapsed before your Internet connection terminates Keep Alive Option Redial Period If you select this option the Router will periodically check your Internet connection If y...

Page 23: ...DHCP server on your network set the Router s DHCP option to Disable If you disable DHCP remember to assign a static IP address to the Router Start IP Address Enter a value for the DHCP server to start...

Page 24: ...t Name Enter the User Name Password and Host Name of the account you set up with DynDNS org Internet IP Address The Router s current Internet IP Address is displayed here Because it is dynamic it will...

Page 25: ...MAC address to the Router s MAC address It is recommended that the PC registered with the ISP is used to open the MAC Address Clone tab When finished making your changes on this tab click the Save Se...

Page 26: ...if you wanted to route to the Router s entire network rather than just to the Router Subnet Mask The Subnet Mask also known as the Network Mask determines which portion of an IP address is the networ...

Page 27: ...ss security Wireless Network Wireless Network Mode If you have Wireless G and 802 11b devices in your network then keep the default setting Mixed If you have only Wireless G devices select G Only If y...

Page 28: ...be used when the Router sends data Make sure the receiving device is using the same key WEP Encryption Select the level of WEP encryption you wish to use 64 bit 10 hex digits or 128 bit 26 hex digits...

Page 29: ...uters button and the screen in figure 7 15 will appear Select the MAC Address from the list and click the Select button To prevent access click the Prevent from accessing button then click Select MAC...

Page 30: ...acon is a packet broadcast by the Router to synchronize the wireless network DTIM Interval The default value is 3 This value between 1 and 255 milliseconds indicates the interval of the Delivery Traff...

Page 31: ...aving access to Internet sites created using this programming language To enable Java Applet filtering click Enabled Filter ActiveX ActiveX is a programming language for websites If you deny ActiveX y...

Page 32: ...o disable L2TP Passthrough click the Disabled button VPN Tunnel The VPN Router creates a tunnel or channel between two endpoints so that the data or information between these endpoints is secure To es...

Page 33: ...tication Or both ends of the tunnel may choose to Disable authentication In Figure 6 16 MD5 the default has been selected Key Management Select Auto IKE and enter a series of numbers or letters in the...

Page 34: ...commended because it is more secure Authentication Select the method used to authenticate ESP packets There are two choices MD5 and SHA SHA is recommended because it is more secure Group There are two...

Page 35: ...d Authentication Type To enable EAP TLS click EAP TLS To enable EAP TTLS click EAP TTLS To enable EAP MD5 click EAP MD5 To disable authentication click Disable WEP Settings Click the WEP Settings butt...

Page 36: ...ryption then the key must be exactly 10 hexadecimal characters in length If you are using 128 bit WEP encryption then the key must be exactly 26 hexadecimal characters in length Valid hexadecimal char...

Page 37: ...he service 5 By selecting the appropriate setting next to Days and Time choose when Internet access will be filtered 6 Lastly click the Save Settings button to activate the policy To create an Inbound...

Page 38: ...ting and ending numbers of the port you wish to forward Protocol Select the type of protocol you wish to use for each application TCP UDP or Both IP Address Enter the IP Address and Click Enabled When...

Page 39: ...standard e mail protocol on the Internet It is a TCP IP protocol that defines the message format and the message transfer agent MTA which stores and forwards the mail DNS Domain Name System The way th...

Page 40: ...re hardware and or software processes reporting activity in each network device hub router bridge etc to the workstation console used to oversee the network The agents return information contained in...

Page 41: ...s IP address To get the IP address of a computer refer to Appendix D Finding the MAC Address and IP Address for Your Ethernet Adapter Deactivate DMZ by entering a 0 in the field Hardware DMZ To use t...

Page 42: ...emote Router Access This feature allows you to access the Router from a remote location via the Internet Remote Management This feature allows you to manage the Router from a remote location via the I...

Page 43: ...k the Save Settings button to save these changes or click the Cancel Changes button to undo your changes Log The Log tab shown in Figure 7 29 provides you with a log of all incoming and outgoing URLs...

Page 44: ...a Inspection authorized Login or Configuration Changes When finished making your changes on this tab click the Save Settings button to save these changes or click the Cancel Changes button to undo you...

Page 45: ...nished making your changes on this tab click the Save Settings button to save these changes or click the Cancel Changes button to undo your changes Firmware Upgrade To upgrade the Router s firmware 1...

Page 46: ...ter and its WAN Internet Connections Information The information displayed is the Hardware Version Software Version MAC Address Local MAC Address and System Up Time WAN Connections The WAN Connections...

Page 47: ...splayed is the IP Address Subnet Mask DHCP Server and DHCP Client Lease Info To view the DHCP Clients Table click the DHCP Clients button See Figure 7 36 The DHCP Active IP Table Figure 7 37 displays...

Page 48: ...lick the Refresh button if you want to Refresh your screen System Performance The System Peformance information that is displayed is the Wireless Internet and or LAN information for the IP Address MAC...

Page 49: ...IP address in the ranges 192 168 1 2 to 192 168 1 99 and 192 168 1 151 to 192 168 1 254 Make sure that each IP address is unique for each PC or network device 4 Click the Gateway tab and in the New Ga...

Page 50: ...fy an IP address and enter a unique IP address that is not used by any other computer on the network connected to the Router You can only use an IP address in the ranges 192 168 1 2 to 192 168 1 99 an...

Page 51: ...s For Windows 98 Me 2000 and XP Refer to Chapter 4 Configure the PCs for details Make sure Obtain IP address automatically is selected in the settings For Windows NT 4 0 Click Start Settings and Contr...

Page 52: ...n of Chapter 6 The Router s Web based Utility for details C Make sure you are using the right Internet connection settings Contact your ISP to see if your Internet connection type is DHCP Static IP Ad...

Page 53: ...er that is connecting to the IPSec server Refer to Problem 7 I need to set up online game hosting or use other Internet applications for details Check the Linksys website for more information at www l...

Page 54: ...or use a certain Internet application A Access the Router s web interface by going to http 192 168 1 1 or the IP address of the Router Go to the Advanced Port Forwarding tab B Enter any name you want...

Page 55: ...ess and IP Address for Your Ethernet Adapter for details on getting an IP address Once completed with the configuration click the Apply button 9 I forgot my password or the password prompt always appe...

Page 56: ...3 The firmware upgrade failed and or the Diag LED is flashing The upgrade could have failed for a number of reasons Follow these steps to upgrade the firmware and or make the Diag LED stop flashing A...

Page 57: ...ok for the MTU option and select Manual In the Size field enter 1492 E Click the Apply button to continue If your difficulties continue change the Size to different values Try this list of values one...

Page 58: ...Is IPSec Pass Through supported by the Router Yes it is a built in feature that the Router automatically enables Where is the Router installed on the network In a typical environment the Router is ins...

Page 59: ...nge of 7777 27900 If you want to use the UT Server Admin forward another port Port 8080 usually works well but is used for remote admin You may have to disable this Then in the UWeb WebServer section...

Page 60: ...disrupt your current connection stability Will the Router function in a Macintosh environment Yes but the Router s setup pages are accessible only through Internet Explorer 4 0 or Netscape Navigator...

Page 61: ...the Router however simultaneous IPSec sessions may be possible depending on the specifics of your VPNs How can I check whether I have static or DHCP IP Addresses Consult your ISP to obtain this infor...

Page 62: ...each message Each node must maintain contact with the wireless network even when not actually transmitting data Achieving these functions simultaneously requires a dynamic RF networking technology th...

Page 63: ...oise Direct Sequence Spread Spectrum DSSS generates a redundant bit pattern for each bit to be transmitted This bit pattern is called a chip or chipping code The longer the chip the greater the probab...

Page 64: ...ery obstacle placed between the Router and a wireless PC will create signal loss Lead glass metal concrete floors water and walls will inhibit the signal and reduce range Start with the Router and you...

Page 65: ...t other than the receiver s Consult a dealer or an experienced radio TV technician for assistance FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth...

Page 66: ...handling charges ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE ARE LIMITED TO THE DURATION OF THE WARRANTY PERIOD ALL OTHER EXPRESS OR IMPLIED CONDITION...

Page 67: ...ttons One 10 100 RJ 45 Port One Power Port One Reset Button One Power Switch Cabling Type UTP CAT 5 or better Data Rate Up to 54Mbps up to 72 Mbps in Turbo Mode Transmit Power 802 11a 18dBm 802 11b 17...

Page 68: ...network Adapter This is a device that adds network functionality to your PC Ad hoc A group of wireless devices communicating directly with each other peer to peer without the use of an access point B...

Page 69: ...protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help pr...

Page 70: ...lity s Firmware Upgrade tab from the Administration tab Follow these instructions 1 Click the Browse button to find the firmware upgrade file that you downloaded from the Linksys website and then extr...

Page 71: ...ive those transmission Wireless networks are easy to find Hackers know that in order to join a wireless network your wireless PC will typically first listen for beacon messages These are identifying p...

Page 72: ...oblems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can c...

Reviews: