background image

46

Chapter 7: Configuring the Router’s Web-Based Utility
Applications and Gaming

Dual-Band Wireless Access Point

When finished making your changes on this tab, click the 

Save Settings

 button to save these changes, or click 

the 

Cancel Changes

 button to undo your changes. 

UPnP Forwarding

The UPnP screen displays preset application settings as well as options for customization of port services for 
other applications. 

Application. Ten preset applications are preset. You can specify up to five additional applications in the 
available fields.

The preset applications are among the most widely used Internet applications. They include the following:

FTP (File Transfer Protocol)  A protocol used to transfer files over a TCP/IP network (Internet, UNIX, etc.). 
For example, after developing the HTML pages for a website on a local machine, they are typically 
uploaded to the web server using FTP. 

Telnet  A terminal emulation protocol commonly used on Internet and TCP/IP-based networks. It allows a 
user at a terminal or computer to log onto a remote device and run a program.

SMTP (Simple Mail Transfer Protocol)  The standard e-mail protocol on the Internet. It is a TCP/IP protocol 
that defines the message format and the message transfer agent (MTA), which stores and forwards the 
mail. 

DNS (Domain Name System)  The way that Internet domain names are located and translated into IP 
addresses. A domain name is a meaningful and easy-to-remember “handle” for an Internet address.

TFTP (Trivial File Transfer Protocol)  A version of the TCP/IP FTP protocol that has no directory or password 
capability.

Finger  A UNIX command widely used on the Internet to find out information about a particular user, such 
as a telephone number, whether the user is currently logged on, and the last time the user was logged on. 
The person being “fingered” must have placed his or her profile on the system in order for the information 
to be available. Fingering requires entering the full user@domain address.

HTTP (HyperText Transport Protocol)  The communications protocol used to connect to servers on the 
World Wide Web. Its primary function is to establish a connection with a web server and transmit HTML 
pages to the client web browser. 

POP3 (Post Office Protocol 3)  A standard mail server commonly used on the Internet. It provides a 
message store that holds incoming e-mail until users log on and download it. POP3 is a simple system 

Figure 7-28: 

Содержание WRV54G - Wireless-G VPN Broadband Router Wireless

Страница 1: ...sco Systems Inc Model No VPN Router Wireless G WRV54G Linksys is a registered trademark or trademark of Cisco Systems Inc and or its affiliates in the U S and certain other countries User Guide GHz 2...

Страница 2: ...ccess Point 8 Hardware Installation 8 Chapter 5 Setting Up the Access Point 11 Setup Wizard 11 Chapter 6 Configuring the Access Point 15 Overview 15 The Setup Tab 16 The Password Tab 17 The Status Tab...

Страница 3: ...Dual Band Wireless Access Point Appendix G Warranty Information 41 Appendix H Regulatory Information 42 Appendix I Contact Information 44...

Страница 4: ...2 11 4 Figure 2 12 4 Figure 3 1 Back Panel 5 Figure 3 2 Front Panel 6 Figure 3 3 7 Figure 3 4 7 Figure 3 5 7 Figure 3 6 7 Figure 3 7 7 Figure 3 8 7 Figure 3 9 7 Figure 3 10 7 Figure 3 11 7 Figure 3 1...

Страница 5: ...17 Figure 6 4 Password Tab 17 Figure 6 5 Status Tab 18 Figure 6 6 Help Tab 18 Figure 6 7 Filter Tab 19 Figure 6 8 Wireless Tab 20 Figure 6 9 21 Figure 6 10 21 Figure 6 11 21 Figure 6 12 21 Figure 6 13...

Страница 6: ...s G or Wireless B devices to the network There s also a built in 4 port full duplex 10 100 Switch to connect your wired Ethernet devices Connect four PCs directly or daisy chain out to more hubs and s...

Страница 7: ...etwork including PCs print servers and routers requires an IP address to identify its location or address on the network This applies to both the Internet and LAN connections There are two ways of ass...

Страница 8: ...he Host Name and Domain Name usually cable ISPs require them These fields allow you to provide a host name and domain name for the Router and are usually left blank The values for the Router s LAN IP...

Страница 9: ...l your changes If you require online help click the Help button The Setup Tab The first screen that appears displays the Setup tab This allows you to change the Access Point s general settings Change...

Страница 10: ...orrectly WEP The WEP Encryption method is Disabled by default To enable WEP click the WEP Key Setting button For more information on WEP and wireless security refer to Appendix B Wireless Security Cli...

Страница 11: ...s in this Web based Utility along with upgrading the Access Point s firmware and viewing this Guide click the Help tab The help files for the various tabs in this Web based Utility are listed by tab n...

Страница 12: ...e the MAC Addresses for those PCs you wish to allow access to the Access Point in the MAC Address fields As long as Filtering is enabled PCs with MAC Addresses not entered in the MAC Address field wil...

Страница 13: ...s transmissions The Wireless Tab Before making any changes to the Wireless tab please check your wireless settings on other systems as these changes will alter the effectiveness of the Access Point In...

Страница 14: ...e default is set to Open System in which the sender and the recipient do NOT share a secret key Each party generates its own key pair and asks the receiver to accept the randomly generated key Once ac...

Страница 15: ...configure your network settings based on the type of Windows operating system you are using Make sure that an Ethernet or wireless adapter also known as a network adapter has been successfully instal...

Страница 16: ...the Router PCs and cable or DSL modem 2 Connect one end of an Ethernet network cable to one of the LAN ports labeled 1 4 on the back of the Router and the other end to an Ethernet port on a PC Repeat...

Страница 17: ...s factory defaults Either press the Reset Button for approximately ten seconds or restore the defaults from the Password tab in the Access Point s Web Based Utility With these and many other Linksys...

Страница 18: ...g Administration and Status Additional tabs will be available after you click one of the main tabs Setup Basic Setup Enter the Internet connection and network settings on this screen DDNS To enable th...

Страница 19: ...o alter UPnP forwarding settings DMZ To allow one local user to be exposed to the Internet for use of special purpose services use this screen Administration Management On this screen alter router acc...

Страница 20: ...el any unsaved changes on any page click the Cancel button The Setup Tab The Basic Setup Tab The first screen that appears is the Basic Setup tab This tab allows you to change the Router s general set...

Страница 21: ...ble PPPoE User Name and Password Enter the User Name and Password provided by your ISP Connect on Demand Max Idle Time You can configure the Router to cut the Internet connection after it has been ina...

Страница 22: ...f minutes you want to have elapsed before your Internet connection terminates Keep Alive Option Redial Period If you select this option the Router will periodically check your Internet connection If y...

Страница 23: ...DHCP server on your network set the Router s DHCP option to Disable If you disable DHCP remember to assign a static IP address to the Router Start IP Address Enter a value for the DHCP server to start...

Страница 24: ...t Name Enter the User Name Password and Host Name of the account you set up with DynDNS org Internet IP Address The Router s current Internet IP Address is displayed here Because it is dynamic it will...

Страница 25: ...MAC address to the Router s MAC address It is recommended that the PC registered with the ISP is used to open the MAC Address Clone tab When finished making your changes on this tab click the Save Se...

Страница 26: ...if you wanted to route to the Router s entire network rather than just to the Router Subnet Mask The Subnet Mask also known as the Network Mask determines which portion of an IP address is the networ...

Страница 27: ...ss security Wireless Network Wireless Network Mode If you have Wireless G and 802 11b devices in your network then keep the default setting Mixed If you have only Wireless G devices select G Only If y...

Страница 28: ...be used when the Router sends data Make sure the receiving device is using the same key WEP Encryption Select the level of WEP encryption you wish to use 64 bit 10 hex digits or 128 bit 26 hex digits...

Страница 29: ...uters button and the screen in figure 7 15 will appear Select the MAC Address from the list and click the Select button To prevent access click the Prevent from accessing button then click Select MAC...

Страница 30: ...acon is a packet broadcast by the Router to synchronize the wireless network DTIM Interval The default value is 3 This value between 1 and 255 milliseconds indicates the interval of the Delivery Traff...

Страница 31: ...aving access to Internet sites created using this programming language To enable Java Applet filtering click Enabled Filter ActiveX ActiveX is a programming language for websites If you deny ActiveX y...

Страница 32: ...o disable L2TP Passthrough click the Disabled button VPN Tunnel The VPN Router creates a tunnel or channel between two endpoints so that the data or information between these endpoints is secure To es...

Страница 33: ...tication Or both ends of the tunnel may choose to Disable authentication In Figure 6 16 MD5 the default has been selected Key Management Select Auto IKE and enter a series of numbers or letters in the...

Страница 34: ...commended because it is more secure Authentication Select the method used to authenticate ESP packets There are two choices MD5 and SHA SHA is recommended because it is more secure Group There are two...

Страница 35: ...d Authentication Type To enable EAP TLS click EAP TLS To enable EAP TTLS click EAP TTLS To enable EAP MD5 click EAP MD5 To disable authentication click Disable WEP Settings Click the WEP Settings butt...

Страница 36: ...ryption then the key must be exactly 10 hexadecimal characters in length If you are using 128 bit WEP encryption then the key must be exactly 26 hexadecimal characters in length Valid hexadecimal char...

Страница 37: ...he service 5 By selecting the appropriate setting next to Days and Time choose when Internet access will be filtered 6 Lastly click the Save Settings button to activate the policy To create an Inbound...

Страница 38: ...ting and ending numbers of the port you wish to forward Protocol Select the type of protocol you wish to use for each application TCP UDP or Both IP Address Enter the IP Address and Click Enabled When...

Страница 39: ...standard e mail protocol on the Internet It is a TCP IP protocol that defines the message format and the message transfer agent MTA which stores and forwards the mail DNS Domain Name System The way th...

Страница 40: ...re hardware and or software processes reporting activity in each network device hub router bridge etc to the workstation console used to oversee the network The agents return information contained in...

Страница 41: ...s IP address To get the IP address of a computer refer to Appendix D Finding the MAC Address and IP Address for Your Ethernet Adapter Deactivate DMZ by entering a 0 in the field Hardware DMZ To use t...

Страница 42: ...emote Router Access This feature allows you to access the Router from a remote location via the Internet Remote Management This feature allows you to manage the Router from a remote location via the I...

Страница 43: ...k the Save Settings button to save these changes or click the Cancel Changes button to undo your changes Log The Log tab shown in Figure 7 29 provides you with a log of all incoming and outgoing URLs...

Страница 44: ...a Inspection authorized Login or Configuration Changes When finished making your changes on this tab click the Save Settings button to save these changes or click the Cancel Changes button to undo you...

Страница 45: ...nished making your changes on this tab click the Save Settings button to save these changes or click the Cancel Changes button to undo your changes Firmware Upgrade To upgrade the Router s firmware 1...

Страница 46: ...ter and its WAN Internet Connections Information The information displayed is the Hardware Version Software Version MAC Address Local MAC Address and System Up Time WAN Connections The WAN Connections...

Страница 47: ...splayed is the IP Address Subnet Mask DHCP Server and DHCP Client Lease Info To view the DHCP Clients Table click the DHCP Clients button See Figure 7 36 The DHCP Active IP Table Figure 7 37 displays...

Страница 48: ...lick the Refresh button if you want to Refresh your screen System Performance The System Peformance information that is displayed is the Wireless Internet and or LAN information for the IP Address MAC...

Страница 49: ...IP address in the ranges 192 168 1 2 to 192 168 1 99 and 192 168 1 151 to 192 168 1 254 Make sure that each IP address is unique for each PC or network device 4 Click the Gateway tab and in the New Ga...

Страница 50: ...fy an IP address and enter a unique IP address that is not used by any other computer on the network connected to the Router You can only use an IP address in the ranges 192 168 1 2 to 192 168 1 99 an...

Страница 51: ...s For Windows 98 Me 2000 and XP Refer to Chapter 4 Configure the PCs for details Make sure Obtain IP address automatically is selected in the settings For Windows NT 4 0 Click Start Settings and Contr...

Страница 52: ...n of Chapter 6 The Router s Web based Utility for details C Make sure you are using the right Internet connection settings Contact your ISP to see if your Internet connection type is DHCP Static IP Ad...

Страница 53: ...er that is connecting to the IPSec server Refer to Problem 7 I need to set up online game hosting or use other Internet applications for details Check the Linksys website for more information at www l...

Страница 54: ...or use a certain Internet application A Access the Router s web interface by going to http 192 168 1 1 or the IP address of the Router Go to the Advanced Port Forwarding tab B Enter any name you want...

Страница 55: ...ess and IP Address for Your Ethernet Adapter for details on getting an IP address Once completed with the configuration click the Apply button 9 I forgot my password or the password prompt always appe...

Страница 56: ...3 The firmware upgrade failed and or the Diag LED is flashing The upgrade could have failed for a number of reasons Follow these steps to upgrade the firmware and or make the Diag LED stop flashing A...

Страница 57: ...ok for the MTU option and select Manual In the Size field enter 1492 E Click the Apply button to continue If your difficulties continue change the Size to different values Try this list of values one...

Страница 58: ...Is IPSec Pass Through supported by the Router Yes it is a built in feature that the Router automatically enables Where is the Router installed on the network In a typical environment the Router is ins...

Страница 59: ...nge of 7777 27900 If you want to use the UT Server Admin forward another port Port 8080 usually works well but is used for remote admin You may have to disable this Then in the UWeb WebServer section...

Страница 60: ...disrupt your current connection stability Will the Router function in a Macintosh environment Yes but the Router s setup pages are accessible only through Internet Explorer 4 0 or Netscape Navigator...

Страница 61: ...the Router however simultaneous IPSec sessions may be possible depending on the specifics of your VPNs How can I check whether I have static or DHCP IP Addresses Consult your ISP to obtain this infor...

Страница 62: ...each message Each node must maintain contact with the wireless network even when not actually transmitting data Achieving these functions simultaneously requires a dynamic RF networking technology th...

Страница 63: ...oise Direct Sequence Spread Spectrum DSSS generates a redundant bit pattern for each bit to be transmitted This bit pattern is called a chip or chipping code The longer the chip the greater the probab...

Страница 64: ...ery obstacle placed between the Router and a wireless PC will create signal loss Lead glass metal concrete floors water and walls will inhibit the signal and reduce range Start with the Router and you...

Страница 65: ...t other than the receiver s Consult a dealer or an experienced radio TV technician for assistance FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth...

Страница 66: ...handling charges ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE ARE LIMITED TO THE DURATION OF THE WARRANTY PERIOD ALL OTHER EXPRESS OR IMPLIED CONDITION...

Страница 67: ...ttons One 10 100 RJ 45 Port One Power Port One Reset Button One Power Switch Cabling Type UTP CAT 5 or better Data Rate Up to 54Mbps up to 72 Mbps in Turbo Mode Transmit Power 802 11a 18dBm 802 11b 17...

Страница 68: ...network Adapter This is a device that adds network functionality to your PC Ad hoc A group of wireless devices communicating directly with each other peer to peer without the use of an access point B...

Страница 69: ...protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help pr...

Страница 70: ...lity s Firmware Upgrade tab from the Administration tab Follow these instructions 1 Click the Browse button to find the firmware upgrade file that you downloaded from the Linksys website and then extr...

Страница 71: ...ive those transmission Wireless networks are easy to find Hackers know that in order to join a wireless network your wireless PC will typically first listen for beacon messages These are identifying p...

Страница 72: ...oblems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can c...

Отзывы: