background image

Dual-Band Wireless A/G Broadband Router 

Block WAN Request

By enabling the Block WAN Request feature, you can

prevent your network from being “pinged,” or detected, by other Internet users.
The Block WAN Request feature also reinforces your network security by hid-
ing your network ports. Both functions of the Block WAN Request feature
make it more difficult for outside users to work their way into your network.
This feature is enabled by default. Select 

Disable

to disable this feature.

To save your changes on this page, click the 

Apply

button. To cancel any

unsaved changes on this page, click the 

Cancel

button. To get more informa-

tion about the features, click the 

Help

button.

The 

System

screen, shown in Figure 6-12, lets you control a variety of the

Router’s general features, from restoring factory defaults to enabling its remote
management capability.

Restore Defaults

Click the 

Yes 

button to reset all configuration settings to

their default values, and then click the 

Apply

button. Any settings you have

saved will be lost when the default settings are restored. This feature is disabled
by default.

39

38

PPTP

- Point-to-Point Tunneling Protocol is the method used to enable VPN

sessions to a Windows NT 4.0 or 2000 server. To allow PPTP tunnels to pass
through the Router, PPTP Pass-Through is enabled by default. To disable
PPTP Pass-Through, uncheck the box next to 

PPTP

.

Web Filters

Using the Web Filters feature, you may enable up to four specif-

ic filtering methods.

Block Proxy

- Use of WAN proxy servers may compromise the Router's

security. Denying Proxy will disable access to any WAN proxy servers. To
enable proxy filtering, click the 

Block Proxy

box. 

Block Java

- Java is a programming language for websites. If you deny Java,

you run the risk of not having access to Internet sites created using this pro-
gramming language. To enable Java filtering, click the 

Block Java

box. 

Block ActiveX

- ActiveX is a programming language for websites. If you

deny ActiveX, you run the risk of not having access to Internet sites creat-
ed using this programming language. To enable ActiveX filtering, click the

Block ActiveX

box. 

Block Cookies

- A cookie is data stored on your PC and used by Internet

sites when you interact with them. To enable cookie filtering, click the

Block Cookies

box.

DMZ

The DMZ hosting feature allows one local user to be exposed to the

Internet for use of a special-purpose service such as Internet gaming or video-
conferencing. DMZ hosting forwards all the ports at the same time to one PC.
The Port Forwarding feature is more secure because it only opens the ports you
want to have opened, while DMZ hosting opens all the ports of one computer,
exposing the computer so the Internet can see it. 

Any PC whose port is being forwarded must have its DHCP client function dis-
abled and should have a new static IP address assigned to it because its IP
address may change when using the DHCP function.

1.  To expose one PC, select 

Enable

.

2.  Enter the computer's IP address in the 

DMZ Host IP Address

field.

3. Click 

the 

Apply 

button. 

Figure 6-12

System

Содержание WRT54AG

Страница 1: ...Dual Band Wireless A G Broadband Router Use this guide to install WRT54AG User Guide...

Страница 2: ...ration All other trademarks and brand names are the property of their respective proprietors LIMITED WARRANTY Linksys guarantees that every Dual Band Wireless A G Broadband Router will be free from ph...

Страница 3: ...n enregistrement n est n cessaire pour une distance de moins de 300m Pour une distance sup rieure 300m un enreg istrement aupr s de l IBPT est requise Pour une utilisation publique l ext rieur de b ti...

Страница 4: ...with bandwidth To protect your data and privacy the Dual Band Wireless A G Broadband Router can encrypt all wireless transmissions The MAC Address filter lets you decide exactly who has access to you...

Страница 5: ...apter 6 The Router s Web based Utility 3 2 Compatibility with 802 11g 2 4GHz and 802 11b 2 4GHz Standards Setup Wizard for Easy Installation Wireless Security with up to 152 bit WEP Encryption Enhance...

Страница 6: ...n it a new dynamic IP address DHCP Dynamic Host Configuration Protocol Servers PCs and other network devices using dynamic IP addressing are assigned a new IP address by a DHCP server The PC or networ...

Страница 7: ...tore the Router s factory defaults and clear all of its settings including a new password or wireless settings If you are experiencing extreme problems with the Router and have tried all other trouble...

Страница 8: ...then your connection speed is 10Mbps Proceed to Chapter 3 Connect the Router 9 8 The WLAN Indicators Link Green When the Link LED is continuously lit the wireless network is available The LAN Indicato...

Страница 9: ...port on the Router Chapter 3 Connect the Router The Router s setup consists of more than simply plugging hardware together You will have to configure your networked PCs to accept the IP addresses tha...

Страница 10: ...ollow the instruc tions to install TCP IP Overview If you want to use a wireless connection to access the Router follow these instructions 1 Before you begin make sure that all of your network s hardw...

Страница 11: ...g D win98 D win9x etc if D is the letter of your CD ROM drive 6 Windows may ask you to restart your PC Click the Yes button If Windows does not ask you to restart restart your computer anyway Go to Ch...

Страница 12: ...lete the PC configuration 5 Restart your computer Go to Chapter 5 Configure the Router s Basic Settings 17 1 Click the Start button Select Settings and click the Control Panel icon Double click the Ne...

Страница 13: ...me you are running Windows XP with the default interface If you are using the Classic interface where the icons and menus look like previous Windows versions please follow the instructions for Windows...

Страница 14: ...ction to the Internet If you are running Internet Explorer 5 x or higher click Tools Settings Control Panel Internet Options Connections and LAN Settings Remove checkmarks from all three boxes Click t...

Страница 15: ...or click the Cancel button to clear the settings and start over When you are finished proceed to step 6 22 PPPoE If your DSL provider says that you are connecting through PPPoE you use a user name and...

Страница 16: ...ge 5GHz Settings button and customize the SSID Channel and Security settings as needed Then click the Apply button to save your changes For more infor mation refer to Chapter 6 The Router s Web based...

Страница 17: ...s firmware will be posted and available for download on the Linksys website at www linksys com Time Zone Select the time zone for your location If your location experiences daylight savings leave the...

Страница 18: ...adio button next to KeepAlive In the Redial Period field you specify how often you want the Router to check the Internet connection The default Redial Period is 30 seconds To save your changes on this...

Страница 19: ...1a The 5GHz 802 11a portion of the Setup screen shown in Figure 6 7 allows you to configure your 5GHz 802 11a wireless network settings PPTP Point to Point Tunneling Protocol PPTP is a service that ap...

Страница 20: ...function correctly If you want the Router to automatically scan for a clear channel then click the checkbox SSID The SSID is the network name shared among all points in a wireless net work The SSID mu...

Страница 21: ...z 802 11g portion of the Setup screen shown in Figure 6 9allows you to configure your 2 4GHz Wireless G wireless network settings MAC Address This shows the Router s wireless MAC address Mode If you h...

Страница 22: ...64 bit or 128 bit encryption select the type of encryption you want from the drop down box To disable WEP Encryption select Disable Passphrase Instead of manually entering WEP keys you can enter a Pa...

Страница 23: ...nable up to four specif ic filtering methods Block Proxy Use of WAN proxy servers may compromise the Router s security Denying Proxy will disable access to any WAN proxy servers To enable proxy filter...

Страница 24: ...the Enter key 4 Write down your adapter s physical address this is the adapter s MAC address Remote Management This feature allows you to manage your Router from a remote location via the Internet To...

Страница 25: ...ternet IP address and 8080 represents the specified port in your web browser s Address field You will be asked for the Router s password After successfully entering the password you will be able to ac...

Страница 26: ...view the list of PCs that are given IP addresses by the Router see Figure 6 17 For each PC the list shows the Client Hostname IP Address MAC Address and and the amount of DHCP client lease time left C...

Страница 27: ...can define two different SNMP communities with the default names being Public and Private SNMPv2 To enable the SNMP support feature select Enable Identification In the Contact field enter contact inf...

Страница 28: ...urrent date and time are displayed here Host Name The Host Name is the name of the Router This entry is necessary for some ISPs Domain Name The Domain Name is the name of the Router s domain This entr...

Страница 29: ...eed to access the basic configuration tabs click the Setup tab 51 The Help screen shown in Figure 6 20 offers links to all of the Router s tech nical support resources and the application that upgrade...

Страница 30: ...e default value is 1 RTS Threshold Should you encounter inconsistent data flow only minor reduc tion of the default value 2346 is recommended If a network packet is smaller than the preset RTS thresho...

Страница 31: ...icy will apply You can even enter ranges of PCs by IP address Click the Apply button to save your settings the Cancel button to undo any changes and the Close button to return to the Filters tab 55 Th...

Страница 32: ...er option 4 You can filter access to various services accessed over the Internet such as FTP or Telnet by selecting a service from the pull down menus next to Services If a service isn t listed you ca...

Страница 33: ...the Port Forwarding screen To save your changes on this page click the Apply button To cancel any unsaved changes on this page click the Cancel button To get more information about the features click...

Страница 34: ...m the Static Routing drop down list select the entry number of the stat ic route 2 Click the Delete This Entry button 3 To cancel a deletion click the Cancel button To save a deletion click the Apply...

Страница 35: ...s that is not used by any other computer on the network connected to the Router You can only use an IP address in the ranges 192 168 1 2 to 192 168 1 99 and 192 168 1 151 to 192 168 1 254 Make sure th...

Страница 36: ...button Repeat this action for all DNS IP addresses given by your ISP H Click the OK button in the TCP IP Protocol Properties window and click the Close button in the Network window I Restart the comp...

Страница 37: ...s to 192 168 2 1 that should solve the problem Change the Router s IP address through the Setup tab B Open a command prompt For Windows 98 and Me please click Start and Run In the Open field type in c...

Страница 38: ...e on the network you need to change its IP address accordingly to 192 168 2 Y Y being any number from 1 to 254 Note that each IP address must be unique within the network Your VPN may require port 500...

Страница 39: ...aving difficulties getting any Internet game server or application to function properly consider exposing one PC to the Internet using DeMilitarized Zone DMZ hosting This option is available when an a...

Страница 40: ...its settings If you cannot connect to it check the LAN and power connections If the Router is configured correctly check your Internet connection DSL cable modem etc to see if it is working correctly...

Страница 41: ...iple IP addresses on the pri vate LAN to one public address that is sent out to the Internet This adds a level of security since the address of a PC connected to the private LAN is never transmitted o...

Страница 42: ...ime even if on the same LAN not a prob lem with 1 0 1 3 As far as hosting games the HL server does not need to be in the DMZ Just forward port 27015 to the local IP address of the server com puter How...

Страница 43: ...What is Spread Spectrum Spread Spectrum technology is a wideband radio frequency technique devel oped by the military for use in reliable secure mission critical communica tions systems It is designed...

Страница 44: ...number assigned by the manufacturer to any Ethernet networking device such as a network adapter that allows the network to identify it at the hardware level For all practical pur poses this number is...

Страница 45: ...pinged Figure B 1 Appendix B How to Ping Your ISP s E mail Web Addresses Virtually all Internet addresses are configured with words or characters e g www linksys com www yahoo com etc In actuality ho...

Страница 46: ...structions Note WEP encryption is an additional data security measure and not essential for router operation however Linksys recommends the use of WEP encryption Step Two Pinging for a Web Address Whi...

Страница 47: ...WEP Settings button 2 You will see the 2 4GHz 54g Wireless G WEP screen Figure C 1 Next to Default Transmit Key select which WEP key 1 4 will be used when the Router sends data Make sure the receiving...

Страница 48: ...ding the MAC Address and IP Address for Your Ethernet Adapter This section describes how to find the MAC address for your Ethernet adapter to do either MAC address filtering or MAC address cloning for...

Страница 49: ...ns used by Linksys specify a maximum data transfer rate of 54Mbps using OFDM modulation an operating frequency of 2 4GHz backward compatibility with IEEE 802 11b devices and WEP encryption for securit...

Страница 50: ...ce or process to operate without being held up by the other In order for a buffer to be effective the size of the buffer and the algorithms for moving data into and out of the buffer need to be consid...

Страница 51: ...e of 10 Mbps Forms the underlying transport vehicle used by several upper level protocols including TCP IP and XNS DDNS Dynamic Domain Name System Allows a network device with a dynamic Internet IP ad...

Страница 52: ...FTP is designed to handle binary files directly and does not add the overhead of encoding and decoding the data 96 Full Duplex The ability of a device or line to transmit data simultaneously in both...

Страница 53: ...ddress In the most widely installed level of the Internet Protocol IP today an IP address is a 32 binary digit number that identifies each sender or receiver of information that is sent in packets acr...

Страница 54: ...left over after ISA devices were given their required IRQs all PCI devices could share it In a PCI only machine there cannot be insufficient IRQs as all can be shared NetBIOS The native networking pro...

Страница 55: ...s sage transfer agent MTA which stores and forwards the mail PCMCIA The PCMCIA Personal Computer Memory Card International Association is an industry group organized in 1989 to promote standards for a...

Страница 56: ...most impor tant of which include edge connections backbone connections and wide area connections 105 104 SNMP Simple Network Management Protocol A widely used network monitoring and control protocol...

Страница 57: ...ver a network In a communications ses sion upload means transmit and download means receive URL Uniform Resource Locator The address that defines the route to a file on the Web or any other Internet f...

Страница 58: ...ensing 109 108 Environmental Appendix F Specifications Model WRT54AG Standards IEEE802 3 IEEE802 3u IEEE802 11a IEEE802 11b IEEE802 11g Channels 802 11a 8 Channels US Canada 802 11b 802 11g 11 Channel...

Страница 59: ...n BE SURE TO HAVE YOUR PROOF OF PURCHASE AND A BARCODE FROM THE PRODUCT S PACKAGING ON HAND WHEN CALLING RETURN REQUESTS CANNOT BE PROCESSED WITHOUT PROOF OF PURCHASE IN NO EVENT SHALL LINKSYS S LIABI...

Страница 60: ...Copyright 2004 Linksys All Rights Reserved www linksys com...

Отзывы: