® A Division of Cisco Systems, Inc. 2.4 GHz Wireless-G 54Mbps Broadband Router WIRELESS Model No.
Wireless-G Broadband Router Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2003 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
Wireless-G Broadband Router Table of Contents Chapter 1: Introduction 1 Welcome What’s in this Guide? 1 2 Chapter 2: Planning your Wireless Network Network Topology Roaming Network Layout Chapter 3: Getting to Know the Wireless-G Broadband Router The Back Panel The Front Panel Chapter 4: Connecting the Wireless-G Broadband Router Hardware Installation Chapter 5: Configuring the PCs Overview Configuring Windows 98 and Millennium PCs Configuring Windows 2000 PCs Configuring Windows XP PCs 4 4 4 5 6
Wireless-G Broadband Router The Administration Tab - Management The Administration Tab - Log The Administration Tab - Diagnostics The Administration Tab - Factory Defaults The Administration Tab - Firmware Upgrade The Status Tab - Router The Status Tab - Local Network The Status Tab - Wireless Appendix A:Troubleshooting Common Problems and Solutions Frequently Asked Questions 32 2 33 34 34 35 36 37 38 38 45 Appendix B: Wireless Security 52 A Brief Overview What Are The Risks? Maximizing Wireless Secu
Wireless-G Broadband Router List of Figures Figure 3-1: The Broadband Router’s Back Panel Figure 3-2: The Broadband Router’s Front Panel Figure 4-1: Connecting Your Internet Connection Figure 4-2: Connecting Your Network Devices Figure 4-3: Connecting the Power Figure 5-1: Configuration Tab Figure 5-2: IP Address Tab Figure 5-3: Properties Figure 5-4: TCP/IP Figure 5-5: IP Address Figure 5-6: Properties Figure 5-7: TCP/IP Figure 5-8: IP Address Figure 6-1: Password Screen Figure 6-2: Setup Tab - Basic Setu
Wireless-G Broadband Router Figure 6-18: Wireless Tab - Advanced Wireless Settings Figure 6-19: Security Tab - Firewall Figure 6-20: Wireless Tab - Basic Wireless Settings Figure 6-21: Wireless Tab - Wireless Security (WPA Pre-Shared Key) Figure 6-22: Wireless Tab - Wireless Security (WPA Radius) Figure 6-23: Wireless Tab - Wireless Security (Radius) Figure 6-24: Wireless Tab - Wireless Security (WEP) Figure 6-25: Access Restrictions Tab Figure 6-26: Internet Policy Summary Figure 6-27: List of PCs Figure
Wireless-G Broadband Router Figure B-12: WEP Figure B-13: 802.
Wireless-G Broadband Router Chapter 1: Introduction Welcome Thank you for choosing the Linksys Wireless-G Broadband Router. The Wireless-G Broadband Router will allow you to network wirelessly better than ever, sharing Internet Access, files and fun, easily and securely. How does the Wireless-G Broadband Router do all of this? A router is a device that allows access to an Internet connection over a network.
Wireless-G Broadband Router What’s in this Guide? This user guide covers the steps for setting up and using the Wireless-B Media Adapter. • Chapter 1: Introduction This chapter describes the Adapter’s applications and this User Guide. • Chapter 2: Planning your Wireless Network This chapter describes the basics of wireless networking. • Chapter 3: Getting to Know the Wireless-G Broadband Router This chapter describes the physical features of the Router.
Wireless-G Broadband Router • Appendix G: Specifications This appendix provides the technical specifications for the Router. • Appendix H: Warranty Information This appendix supplies the warranty information for the Router.. • Appendix I: Regulatory Information This appendix supplies the regulatory information regarding the Router.. • Appendix J: Contact Information This appendix provides contact information for a variety of Linksys resources, including Technical Support.
Dual-Band Wireless Access Point Chapter 2: Planning your Wireless Network Network Topology A wireless LAN is a group of computers, each equipped with one Linksys wireless adapter. Computers in a wireless LAN must be configured to share the same radio channel. The Linksys wireless adapters provide access to a wired LAN for wireless workstations. An integrated wireless and wired LAN is called an infrastructure configuration.
Dual-Band Wireless Access Point Network Layout The Wireless-G Broadband Router has been specifically designed for use with both your 802.11b and 802.11g products. Now, products using these standards can communicate with each other. The Wireless-G Broadband Router is compatible with all 802.11b and 802.11g adapters, such at the PC Cards (WPC54G, WPC11) for your laptop computers, PCI Card (WMP54G) for your desktop PC, and USB Adapter (WUSB11) for when you want to enjoy USB connectivity.
Wireless-G Broadband Router Chapter 3: Getting to Know the Wireless-G Broadband Router The Back Panel The Broadband Router's ports, where the cables are connected, are located on the back panel. Figure 3-1: The Broadband Router’s Back Panel Reset Button There are two ways to reset the Broadband Router's factory defaults. Either press the Reset Button, for approximately ten seconds, or restore the defaults from the Password tab in the Broadband Router's Web-Based Utility.
Wireless-G Broadband Router The Front Panel TheRouter's LEDs, where information about network activity is displayed, are located on the front panel. Figure 3-2: The Broadband Router’s Front Panel Power Green. The Power LED lights up and will stay on while the Router is powered on. When the Router goes through its self-diagnosis mode during every boot-up, this LED will flicker, stopping upon successful completion of the diagnosis. DMZ Green. The DMZ LED indicates when the DMZ function is being utilized.
Wireless-G Broadband Router Chapter 4: Connecting the Wireless-G Broadband Router Hardware Installation 1. Locate an optimum location for the Broadband Router. The best place for the Broadband Router is usually at the center of your wireless network, with line of sight to all of your mobile stations. 2. Fix the direction of the antenna. Try to place it in a position that will best cover your wireless network. Normally, the higher you place the antenna, the better the performance will be.
Wireless-G Broadband Router 4. Connect your network PCs or Ethernet devices to one of the Broadband Router’s numbered ports with a standard Ethernet network cable. Figure 4-2: Connecting Your Network Devices 5. Connect the AC Power Adapter to the Broadband Router's Power Socket and the other end into an electrical outlet. Only use the power adapter supplied with the Broadband Router. Use of a different adapter may result in product damage.
Wireless-G Broadband Router Chapter 4: Connecting the Wireless-G Broadband Router Hardware Installation 10
Wireless-G Broadband Router Chapter 5: Configuring the PCs Overview The instructions in this chapter will help you configure each of your computers to be able to communicate with the Router. IMPORTANT: Important: By default Windows 98, 2000, Me, and XP has TCP/IP installed and set to obtain an IP address automatically. If your PC does not have TCP/IP installed, click Start and then Help. Search for the keyword TCP/IP. Then follow the instructions to install TCP/IP.
Wireless-G Broadband Router 4. Now click the Gateway tab, and verify that the Installed Gateway field is blank. Click the OK button. 5. Click the OK button again. Windows may ask you for the original Windows installation disk or additional files. Check for the files at c:\windows\options\cabs, or insert your Windows CD-ROM into your CD-ROM drive and check the correct file location, e.g., D:\win98, D:\win9x, etc. (if “D” is the letter of your CD-ROM drive). 6. Windows may ask you to restart your PC.
Wireless-G Broadband Router Configuring Windows XP PCs The following instructions assume you are running Windows XP with the default interface. If you are using the Classic interface (where the icons and menus look like previous Windows versions), please follow the instructions for Windows 2000. 1. Click the Start button and then the Control Panel icon. Click the Network and Internet Connections icon. Then click the Network Connections icon. 2.
Wireless-G Broadband Router Figure 5-8: IP Address Chapter 5: Configuring the PCs Configuring Windows XP PCs 13
Wireless-G Broadband Router Chapter 6: Configuring the Wireless-G Broadband Router Overview The Broadband Router has been designed to be functional right out of the box with the default settings in the Setup Wizard. However, if you’d like to change these settings, use the Router’s web-based utility. This chapter will describe each web page in the Utility and each page’s key functions. The utility can be accessed via your web browser through use of a computer connected to the Router.
Wireless-G Broadband Router The Setup Tab - Basic Setup The first screen that appears displays the Setup tab. This allows you to change the Broadband Router's general settings. Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes. Internet Setup The Internet Setup section configures the Broadband Router to your Internet connection. Most of this information can be obtained through your ISP.
Wireless-G Broadband Router • PPPoE. Some DSL-based ISPs use PPPoE (Point-to-Point Protocol over Ethernet) to establish Internet connections. If you are connected to the Internet through a DSL line, check with your ISP to see if they use PPPoE. If they do, you will have to enable PPPoE. User Name and Password. Enter the User Name and Password provided by your ISP. Connect on Demand: Max Idle Time.
Wireless-G Broadband Router Optional Settings Some of these settings may be required by your ISP. Verify with your ISP before making any changes. Router Name. In this field, you can type a name of up to 39 characters to represent the Router. Host Name/Domain Name. These fields allow you to supply a host and domain name for the Router. Some ISPs, usually cable ISPs, require these names as identification.
Wireless-G Broadband Router Maximum Number of DHCP Users. Enter the maximum number of PCs that you want the DHCP server to assign IP addresses to. This number cannot be greater than 253. The default is 50. Client Lease Time. The Client Lease Time is the amount of time a network user will be allowed connection to the Router with their current dynamic IP address. Enter the amount of time, in minutes, that the user will be “leased” this dynamic IP address.
Wireless-G Broadband Router The Setup Tab - DDNS The Router offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address. It is useful when you are hosting your own website, FTP server, or other server behind the Router. Before you can use this feature, you need to sign up for DDNS service at www.dyndns.org, or www.TZO.com, DDNS service providers. DDNS Service.
Wireless-G Broadband Router The Setup Tab - MAC Address Clone A MAC address is a 12-digit code assigned to a unique piece of hardware for identification. Some ISPs will require you to register a MAC address in order to access the Internet. If you do not wish to re-register the MAC address with your ISP, you may assign the MAC address you have currently registered with your ISP to the Router with the MAC Address Clone feature. Enable/Disable.
Wireless-G Broadband Router The Setup Tab - Advanced Routing This tab is used to set up the Router’s advanced functions. Operating Mode allows you to select the type(s) of advanced functions you use. Dynamic Routing will automatically adjust how packets travel on your network. Static Routing sets up a fixed route to another network destination. Operating Mode. Select the mode in which this Router will function. If this Router is hosting your network’s connection to the Internet, select Gateway.
Wireless-G Broadband Router The Wireless Tab - Basic Wireless Settings The basic settings for wireless networking are set on this screen. Wireless Network Mode. From this drop-down menu, you can select the wireless standards running on your network. If you have both Wireless-G and 802.11b devices in your network, keep the default setting, Mixed. If you have only Wireless-G devices, select G-Only. If you have only Wireless-B devices, select B-Only. If you do not have any Wireless-G and 802.
Wireless-G Broadband Router The Wireless Tab - Wireless MAC Filter Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network’s radius. Wireless MAC Filter. To filter wireless users by MAC Address, either permitting or preventing access, click the radio button beside Enable. If you do not wish to filter users by MAC Address, select Disable. Prevent. Clicking this button will Prevent users access by MAC Address. Permit Only.
Wireless-G Broadband Router The Wireless Tab - Advanced Wireless Settings This tab is used to set up the Router’s advanced wireless functions. These settings should only be adjusted by an expert administrator as incorrect settings can reduce wireless performance. Authentication Type. The default is set to Auto, which allows either Open System or Shared Key authentication to be used. With Open System authentication, the sender and the recipient do NOT use a WEP key for authentication.
Wireless-G Broadband Router Fragmentation Threshold. This value specifies the maximum size for a packet before data is fragmented into multiple packets. If you experience a high packet error rate, you may slightly increase the Fragmentation Threshold. Setting the Fragmentation Threshold too low may result in poor network performance. Only minor reduction of the default value is recommended. In most cases, it should remain at its default value of 2346. RTS Threshold.
Wireless-G Broadband Router The Security Tab - Firewall Block WAN Requests. Enable the Block WAN Request feature by checking the box beside Block Anonymous Internet Requests and you can prevent your network from being “pinged,” or detected, by other Internet users. The Block WAN Request feature also reinforces your network security by hiding your network ports. Both functions of the Block WAN Request feature make it more difficult for outside users to work their way into your network.
Wireless-G Broadband Router The Security Tab - Wireless Security The Wireless Security settings configure the security of your wireless network. There are four wireless security mode options supported by the Router, WPA, RADIUS, and WEP. These four are briefly discussed here. For detailed instructions on configuring wireless security for the Router, turn to Appendix B: Wireless Security. WPA Pre-Shared Key. WPA gives you two encryption methods, TKIP and AES, with dynamic encryption keys.
Wireless-G Broadband Router Radius. WEP used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) First, enter the RADIUS server’s IP Address and port number, along with a key shared between the Router and the server. Then, select a WEP key and a level of WEP encryption, and either generate a WEP key through the Passphrase or enter the WEP key manually. Figure 6-23: Wireless Tab - Wireless Security (Radius) WEP.
Wireless-G Broadband Router The Access Restrictions Tab The Access Restrictions tab allows you to block or allow network access as well as manage specific kinds of Internet usage. Internet Access Policy. Access is managed by a policy. An access policy is established with the settings on this screen (after Save Settings is clicked). Selecting a policy from the drop-down menu will display that policy’s settings on this screen. To delete a policy, select that policy’s number and click the Delete button.
Wireless-G Broadband Router The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized Internet applications. (Specialized Internet applications are any applications that use Internet access to perform functions such as videoconferencing or online gaming. Some Internet applications may not require any forwarding.
Wireless-G Broadband Router The Applications and Gaming Tab - DMZ The DMZ feature allows one network user to be exposed to the Internet for use of a special-purpose service such as Internet gaming or videoconferencing. DMZ hosting forwards all the ports at the same time to one PC. The Port Range Forward feature is more secure because it only opens the ports you want to have opened, while DMZ hosting opens all the ports of one computer, exposing the computer to the Internet.
Wireless-G Broadband Router The Administration Tab - Management This section of the Administration tab allows the network’s administrator to manage specific Router functions for access and security. Local Router Access. You can change the Router’s password from here. Enter a new Router password and then type it again in the Re-enter to confirm field to confirm. Remote Router Access. To access the Router remotely, from outside the network, verify that Enable is selected.
Wireless-G Broadband Router The Administration Tab - Diagnostics The diagnostic tests (Ping and TraceRoute) allow you to check the connections of your network components. Ping Test. The Ping test will check the status of a connection. Click the Ping button to open the Ping Test screen. Enter the address of the PC whose connection you wish to test and how many times you wish to test it. Then, click the Ping button. A successful test will look similar to that shown in Figure 5-33.
Wireless-G Broadband Router The Administration Tab - Factory Defaults Click the Yes button to reset all configuration settings to their default values, and then click the Save Settings button. Any settings you have saved will be lost when the default settings are restored. This feature is disabled by default.
Wireless-G Broadband Router The Status Tab - Router The Router screen on the Status Tab displays the Router’s current status. Firmware Version. This is the Router’s current firmware. Current Time. This shows the time, as you set on the Setup Tab. MAC Address. This is the Router’s MAC Address, as seen by your ISP. Router Name. This is the specific name for the Router, which you set on the Setup Tab. Host Name. If required by your ISP, this would have been entered on the Setup Tab. Domain Name.
Wireless-G Broadband Router The Status Tab - Local Network The Local Network screen on the Status Tab displays the status of your network. MAC Address. This is the Router’s MAC Address, as seen on your local, Ethernet network. IP Address. This shows the Router’s IP Address, as it appears on your local, Ethernet network. Subnet Mask. When the Router is using a Subnet Mask, it is shown here. DHCP Server. If you are using the Router as a DHCP server, that will be displayed here. Start IP Address.
Wireless-G Broadband Router The Status Tab - Wireless The Wireless screen on the Status Tab displays the status of your wireless network. MAC Address. This is the Router’s MAC Address, as seen on your local, wireless network. Mode. As selected from the Wireless tab, this will display the wireless mode (Mixed, G-Only, or Disabled) used by the network. SSID. As entered on the Wireless tab, this will display the wireless network name or SSID. Figure 6-39: Status Tab - Wireless DHCP Server.
Wireless-G Broadband Router Appendix A: Troubleshooting This appendix consists of two parts: “Common Problems and Solutions” and “Frequently Asked Questions.” Provided are possible solutions to problems that may occur during the installation and operation of the Router. Read the descriptions below to help you solve your problems. If you can’t find an answer here, check the Linksys website at www.linksys.com. Common Problems and Solutions 1. I need to set a static IP address on a PC.
Wireless-G Broadband Router 7. Toward the bottom of the window, select Use the following DNS server addresses, and enter the Preferred DNS server and Alternative DNS server (provided by your ISP). Contact your ISP or go on its website to find the information. 8. Click the OK button in the Internet Protocol (TCP/IP) Properties window, and click the OK button in the Local Area Connection Properties window. 9. Restart the computer if asked.
Wireless-G Broadband Router C In the command prompt, type ping followed by your Internet or WAN IP address and press the Enter key. The Internet or WAN IP Address can be found on the Status screen of the Router’s web-based utility. For example, if your Internet or WAN IP address is 1.2.3.4, you would enter ping 1.2.3.4 and press the Enter key. • If you get a reply, the computer is connected to the Router.
Wireless-G Broadband Router 7. I need to set up a server behind my Router and make it available to the public. To use a server like a web, ftp, or mail server, you need to know the respective port numbers they are using. For example, port 80 (HTTP) is used for web; port 21 (FTP) is used for FTP, and port 25 (SMTP outgoing) and port 110 (POP3 incoming) are used for the mail server. You can get more information by viewing the documentation provided with the server you installed.
Wireless-G Broadband Router 4. Check the protocol you will be using, TCP and/or UDP. 5. Enter the IP address of the PC or network device that you want the port server to go to. For example, if the web server’s Ethernet adapter IP address is 192.168.1.100, you would enter 100 in the field provided. Check “Appendix D: Finding the MAC Address and IP Address for Your Ethernet Adapter” for details on getting an IP address. 6. Check the Enable option for the port services you want to use.
Wireless-G Broadband Router 1. Access the Router’s web-based utility by going to http://192.168.1.1 or the IP address of the Router. Enter the default password admin, and click the Administrations => Management tab. 2. Enter a different password in the Router Password field, and enter the same password in the second field to confirm the password. 3. Click the Save Settings button. 11. I am a PPPoE user, and I need to remove the proxy settings or the dial-up pop-up window.
Wireless-G Broadband Router • Set a static IP address on the PC; refer to “Problem #1, I need to set a static IP address.” Use the following IP address settings for the computer you are using: IP Address: 192.168.1.50 Subnet Mask: 255.255.255.0 Gateway: 192.168.1.1 • Perform the upgrade using the TFTP program or the Router’s web-based utility through its System tab. 15. My DSL service’s PPPoE is always disconnecting. PPPoE is not actually a dedicated or always-on connection.
Wireless-G Broadband Router 17. The Power LED keeps flashing. The Power LED flashes when the device is first powered up. Meantime, the system will boot up itself and check for proper operation. After finishing the checking procedure, the LED stays solid to show that the system is working fine. If the LED keeps flashing after this time, the device is not working properly. Try to flash the firmware by assigning a static IP address to the computer, and then upgrade the firmware.
Wireless-G Broadband Router Does the Internet connection of the Router support 100Mbps Ethernet? The Router’s current hardware design supports up to 100Mbps Ethernet on its Internet port; however, the Internet connection speed will vary depending on the speed of your broadband connection. The Router also supports 100Mbps over the auto-sensing Fast Ethernet 10/100 switch on the LAN side of the Router.
Wireless-G Broadband Router the same time, even if on the same LAN (not a problem with 1.0.1.3). As far as hosting games, the HL server does not need to be in the DMZ. Just forward port 27015 to the local IP address of the server computer. How can I block corrupted FTP downloads? If you are experiencing corrupted files when you download a file with your FTP client, try using another FTP program. The web page hangs; downloads are corrupt, or nothing but junk characters are being displayed on the screen.
Wireless-G Broadband Router What is DMZ Hosting? Demilitarized Zone (DMZ) allows one IP address (computer) to be exposed to the Internet. Some applications require multiple TCP/IP ports to be open. It is recommended that you set your computer with a static IP if you want to use DMZ Hosting. To get the LAN IP address, see “Appendix E: Finding the MAC Address and IP Address for Your Ethernet Adapter.” If DMZ Hosting is used, does the exposed user share the public IP with the Router? No.
Wireless-G Broadband Router • • • • • Multi-Channel Roaming Automatic Rate Selection RTS/CTS feature Fragmentation Power Management What is ad-hoc mode? When a wireless network is set to ad-hoc mode, the wireless-equipped computers are configured to communicate directly with each other. The ad-hoc wireless network will not communicate with any wired network.
Wireless-G Broadband Router What is Spread Spectrum? Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communications systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security.
Wireless-G Broadband Router How do I resolve issues with signal loss? There is no way to know the exact range of your wireless network without testing. Every obstacle placed between the Router and a wireless PC will create signal loss. Lead glass, metal, concrete floors, water and walls will inhibit the signal and reduce range. Start with the Router and your wireless PC in the same room and move it away in small increments to determine the maximum range in your environment.
Wireless-G Broadband Router Appendix B: Wireless Security A Brief Overview Whenever data - in the form of files, emails, or messages - is transmitted over your wireless network, it is open to attacks. Wireless networking is inherently risky because it broadcasts information on radio waves. Just like signals from your cellular or cordless phone can be intercepted, signals from your wireless network can also be compromised. What are the risks inherent in wireless networking? Read on.
Wireless-G Broadband Router But even WEP has its problems. WEP's encryption algorithm is referred to as "simple", which also means "weak", because the technology that scrambles the wireless signal isn't too hard to crack for a persistent hacker. There are five common ways that hackers can break into your network and steal your bandwidth as well as your data. The five attacks are popularly known as: 1. Passive Attacks 2. Jamming Attacks 3. Active Attacks 4. Dictionary-building or Table Attacks 5.
Wireless-G Broadband Router Active Attacks Hackers use Active Attacks for three purposes: 1) stealing data, 2) using your network, and 3) modifying your network so it's easier to hack in the next time. In an Active Attack, the hacker has gained access to all of your network settings (SSID, WEP keys, etc.) and is in your network. Once in your wireless network, the hacker has access to all open resources and transmitted data on the network.
Wireless-G Broadband Router examples below, your implementation and administration of network security measures is the key to maximizing wireless security. No preventative measure will guarantee network security but it will make it more difficult for someone to hack into your network. Often, hackers are looking for an easy target. Making your network less attractive to hackers, by making it harder for them to get in, will make them look elsewhere.
Wireless-G Broadband Router 5) SSID There are a few things you can do to make your SSID more secure: a. Disable Broadcast b. Make it unique c. Change it often Most wireless networking devices will give you the option of broadcasting the SSID. This is a option for convenience, allowing anyone to log into your wireless network. In this case, however, anyone includes hackers. So don't broadcast the SSID. A default SSID is set on your wireless devices by the factory. (The Linksys default SSID is "linksys".
Wireless-G Broadband Router PCs unprotected by a firewall router should at least run firewall software, and all PCs should run up-to-date antiviral software. B. WEP Wired Equivalent Privacy (WEP) is often looked upon as a panacea for wireless security concerns. This is overstating WEP's ability. Again, this can only provide enough security to make a hacker's job more difficult. WEP encryption implementation was not put in place with the 802.11 standard.
Wireless-G Broadband Router The solution, then, is to segment your network up into multiple groups. If your network had 80 users and you used four WEP keys, a hacker would have access to only ¼ of your wireless network resources. In this way, multiple keys reduce your liability. Finally, be sure to change your WEP key regularly, once a week or once a day. Using a "dynamic" WEP key, rather than one that is static, makes it even harder for a hacker to break into your network and steal your resources.
Wireless-G Broadband Router WPA Pre-Shared Key If you do not have a RADIUS server, Select the type of algorithm, TKIP or AES, enter a password in the Pre-Shared key field of 8-32 characters, and enter a Group Key Renewal period time between 0 and 99,999 seconds, which instructs the Router how often it should change the encryption keys. WPA RADIUS WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.
Wireless-G Broadband Router Appendix C: Upgrading Firmware The Access Point's firmware is upgraded through the Web-Utility's Help tab. Follow these instructions: 1. Download the firmware from Linksys's website at www.linksys.com. 2. Click Upgrade Firmware from the Web-Utility's Administration tab, and the Upgrade Firmware screen, shown in Figure C-1, will appear. 3. Enter the location of the firmware's file or click the Browse button to find the file. 4.
Wireless-G Broadband Router Appendix D: Windows Help All wireless products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix. TCP/IP Before a computer can communicate with the Access Point, TCP/IP must be enabled. TCP/IP is a set of instructions, or protocol, all PCs follow to communicate over a network.
Wireless-G Broadband Router Appendix E: Finding the MAC Address and IP Address for Your Ethernet Adapter This section describes how to find the MAC address for your computer’s Ethernet adapter so you can use the MAC filtering and/or MAC address cloning feature of the Router. You can also find the IP address of your computer’s Ethernet adapter. This IP address is used for the Router’s filtering, forwarding, and/or DMZ features.
Wireless-G Broadband Router 3. Write down the Physical Address as shown on your computer screen (Figure C-3); it is the MAC address for your Ethernet adapter. This appears as a series of numbers and letters. The MAC address/Physical Address is what you will use for MAC address cloning or MAC filtering. Note: The MAC address is also called the Physical Address. The example in Figure C-3 shows the Ethernet adapter’s IP address as 192.168.1.100. Your computer may show something different.
Wireless-G Broadband Router Appendix F: Glossary 802.11a - An IEEE wireless networking standard that specifies a maximum data transfer rate of 54Mbps and an operating frequency of 5GHz. 802.11b - An IEEE wireless networking standard that specifies a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GHz. 802.11g - An IEEE wireless networking standard that specifies a maximum data transfer rate of 54Mbps, an operating frequency of 2.4GHz, and backward compatibility with 802.11b devices.
Wireless-G Broadband Router Buffer - A block of memory that temporarily holds data to be worked on later when a device is currently too busy to accept the data. Cable Modem - A device that connects a computer to the cable television network, which in turn connects to the Internet. CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) - A method of data transfer that is used to prevent data loss in a network. CTS (Clear To Send) - A signal sent by a device to indicate that it is ready to receive data.
Wireless-G Broadband Router Dynamic IP Address - A temporary IP address assigned by a DHCP server. Encryption - Encoding data to prevent it from being read by unauthorized people. Ethernet - An IEEE standard network protocol that specifies how data is placed on and retrieved from a common transmission medium. Finger - A program that tells you the name associated with an e-mail address. Firewall - Security measures that protect the resources of a local network from intruders. Firmware - 1.
Wireless-G Broadband Router IPCONFIG - A Windows 2000 and XP utility that displays the IP address for a particular networking device. IPSec (Internet Protocol Security) - A VPN protocol used to implement secure exchange of packets at the IP layer. ISM band - Radio band used in wireless networking transmissions. ISP (Internet Service Provider) - A company that provides access to the Internet. LAN (Local Area Network) - The computers and networking products that make up the network in your home or office.
Wireless-G Broadband Router PPPoE (Point to Point Protocol over Ethernet) - A type of broadband connection that provides authentication (username and password) in addition to data transport. PPTP (Point-to-Point Tunneling Protocol) - A VPN protocol that allows the Point to Point Protocol (PPP) to be tunneled through an IP network. This protocol is also used as a type of broadband connection in Europe. Preamble - Part of the wireless signal that synchronizes network traffic.
Wireless-G Broadband Router TCP/IP (Transmission Control Protocol/Internet Protocol) - A network protocol for transmitting data that requires acknowledgement from the recipient of data sent. Telnet - A user command and TCP/IP protocol used for accessing remote PCs. TFTP (Trivial File Transfer Protocol) - A version of the TCP/IP FTP protocol that uses UDP and has no directory or password capability. Throughput - The amount of data moved successfully from one node to another in a given time period.
Wireless-G Broadband Router Appendix G: Specifications Standards IEEE 802.3, 802.3u, 802.11g and 802.11b Channels 11 Channels (US, Canada) 13 Channels (Europe) 14 Channels (Japan) Ports/Buttons One 10/100 RJ-45 Internet Port, Four 10/100 RJ-45 Switched LAN Ports, One Power Port, One Reset Button Cabling Type UTP CAT 5 or better Data Rate Up to 54Mbps Transmit Power 15dBm LEDs Power, DMZ, WLAN, LAN (1-4), Internet Dimensions (L x W x H) 7.31" x 1.89" x 7.
Wireless-G Broadband Router Appendix G: Specifications 71
Wireless-G Broadband Router Appendix H: Warranty Information LIMITED WARRANTY Linksys warrants to the original end user purchaser ("You") that, for a period of three years, (the "Warranty Period") Your Linksys product will be free of defects in materials and workmanship under normal use. Your exclusive remedy and Linksys's entire liability under this warranty will be for Linksys at its option to repair or replace the product or refund Your purchase price less any rebates.
Wireless-G Broadband Router Appendix I: Regulatory Information FCC STATEMENT This Wireless-G Broadband Router has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Wireless-G Broadband Router Italia I: E' necessaria la concessione ministeriale anche per l'uso interno. Verificare con i rivenditori la procedura da seguire. L'uso per installazione in esterni non e' permessa. Italy I: License required for indoor use. Use with outdoor installations not allowed. the Netherlands NL License required for outdoor installations. Check with reseller for procedure to follow. Nederlands NL Licentie verplicht voor gebruik met buitenantennes.
Wireless-G Broadband Router Appendix J: Contact Information Need to contact Linksys? Visit us online for information on the latest products and updates to your existing products at: http://www.linksys.com or ftp.linksys.