Ir a la página of
manuales de instrucciones parecidos
-
Network Router
Linksys BEFSX41
75 páginas 0.91 mb -
Network Router
Linksys Etherfast
57 páginas 2.05 mb -
Network Router
Linksys WPG11
17 páginas 0.24 mb -
Network Router
Linksys BEFN2PS4
26 páginas 0.57 mb -
Network Router
Linksys WRT54G2
36 páginas 3.37 mb -
Network Router
Linksys WRVS4400N
134 páginas 5.04 mb -
Network Router
Linksys Wireless-N Broadband Router WRT300N
90 páginas 4.07 mb -
Network Router
Linksys WAP11 v2.2
28 páginas 0.46 mb
Buen manual de instrucciones
Las leyes obligan al vendedor a entregarle al comprador, junto con el producto, el manual de instrucciones Linksys WRV54G. La falta del manual o facilitar información incorrecta al consumidor constituyen una base de reclamación por no estar de acuerdo el producto con el contrato. Según la ley, está permitido adjuntar un manual de otra forma que no sea en papel, lo cual últimamente es bastante común y los fabricantes nos facilitan un manual gráfico, su versión electrónica Linksys WRV54G o vídeos de instrucciones para usuarios. La condición es que tenga una forma legible y entendible.
¿Qué es un manual de instrucciones?
El nombre proviene de la palabra latina “instructio”, es decir, ordenar. Por lo tanto, en un manual Linksys WRV54G se puede encontrar la descripción de las etapas de actuación. El propósito de un manual es enseñar, facilitar el encendido o el uso de un dispositivo o la realización de acciones concretas. Un manual de instrucciones también es una fuente de información acerca de un objeto o un servicio, es una pista.
Desafortunadamente pocos usuarios destinan su tiempo a leer manuales Linksys WRV54G, sin embargo, un buen manual nos permite, no solo conocer una cantidad de funcionalidades adicionales del dispositivo comprado, sino también evitar la mayoría de fallos.
Entonces, ¿qué debe contener el manual de instrucciones perfecto?
Sobre todo, un manual de instrucciones Linksys WRV54G debe contener:
- información acerca de las especificaciones técnicas del dispositivo Linksys WRV54G
- nombre de fabricante y año de fabricación del dispositivo Linksys WRV54G
- condiciones de uso, configuración y mantenimiento del dispositivo Linksys WRV54G
- marcas de seguridad y certificados que confirmen su concordancia con determinadas normativas
¿Por qué no leemos los manuales de instrucciones?
Normalmente es por la falta de tiempo y seguridad acerca de las funcionalidades determinadas de los dispositivos comprados. Desafortunadamente la conexión y el encendido de Linksys WRV54G no es suficiente. El manual de instrucciones siempre contiene una serie de indicaciones acerca de determinadas funcionalidades, normas de seguridad, consejos de mantenimiento (incluso qué productos usar), fallos eventuales de Linksys WRV54G y maneras de solucionar los problemas que puedan ocurrir durante su uso. Al final, en un manual se pueden encontrar los detalles de servicio técnico Linksys en caso de que las soluciones propuestas no hayan funcionado. Actualmente gozan de éxito manuales de instrucciones en forma de animaciones interesantes o vídeo manuales que llegan al usuario mucho mejor que en forma de un folleto. Este tipo de manual ayuda a que el usuario vea el vídeo entero sin saltarse las especificaciones y las descripciones técnicas complicadas de Linksys WRV54G, como se suele hacer teniendo una versión en papel.
¿Por qué vale la pena leer los manuales de instrucciones?
Sobre todo es en ellos donde encontraremos las respuestas acerca de la construcción, las posibilidades del dispositivo Linksys WRV54G, el uso de determinados accesorios y una serie de informaciones que permiten aprovechar completamente sus funciones y comodidades.
Tras una compra exitosa de un equipo o un dispositivo, vale la pena dedicar un momento para familiarizarse con cada parte del manual Linksys WRV54G. Actualmente se preparan y traducen con dedicación, para que no solo sean comprensibles para los usuarios, sino que también cumplan su función básica de información y ayuda.
Índice de manuales de instrucciones
-
Página 1
A Division of Cisco Systems, Inc . ® Model No . VPN Broadband Router Wir eless- G WRV54G User Guide GHz 2.4 54 Mbps WIRELESS[...]
-
Página 2
Wireless-G VPN Broadban d Router Copyright and T rademarks Specifications are subject to change without notice . Insta nt Etherfast, Linksys, and the Linksys logo are registered trademarks of Linksys Group , Inc . Other brands and product n ames are trademarks or registered trademarks of their respective holders. Copyright © 2003 Linksys. All righ[...]
-
Página 3
Wireless-G VPN Broadban d Router Table of Contents Chapter 1: Introduction 1 Welcome 1 What’s in this Guide? 2 Chapter 2: Planning your Wireless Network 4 The Router’s Functions 4 IP Addresses 4 Why do I need a VPN? 5 What is a VPN? 6 Chapter 3: Getting to Know the Wireless-G VPN Broadband Router 9 The Back Panel 9 The Front Panel 10 Chapter 4:[...]
-
Página 4
Wireless-G VPN Broadban d Router Frequently Asked Questions 57 Appendix B: Wireless Security 64 A Brief Overview 64 What Are The Risks? 64 Appendix C: Configuring IPSec between a Windows 2000 PC and the Router 71 Introduction 71 Environment 71 How to Establish a Secure IPSec Tunnel 72 Windows 98 or Me Instructions 82 Windows 2000 or XP Instructions[...]
-
Página 5
1 Chapter 1: Introductio n Welcome Wireless-G Broad band VPN Router Chapter 1: Introduction We l c o me Wireless-G is the upcoming 54Mbps wireless networking standard that’ s almost five times faster th an the widely deployed Wireless-B (802.11b) products found in homes, businesses, and public wireless hotspots around the country—b ut since the[...]
-
Página 6
2 Chapter 1: Introductio n What’s in this Guide? Wireless-G Broad band VPN Router What’ s in this Gu ide? This user guide covers the steps for setting up and using the Wireless-G VPN Broadband Router . • Chapter 1: Introduction This chapter describes the Wireless-G VPN Br oadband Router applications and this User Guide. • Chapter 2: Plannin[...]
-
Página 7
3 Chapter 1: Introductio n What’s in this Guide? Wireless-G Broad band VPN Router • Appendix G: Finding the MAC Address and IP Address for your Ethernet Ad apter . This appendix describes how to find the MAC address for your computer’s Ethenet adapter so you can use the MAC filtering and/or MAC address cloning feature of the Router . • Appe[...]
-
Página 8
4 Chapter 2: Planning your Wireless Network The Rout er’s Func tions Wireless-G VPN Broadban d Router Chapter 2: Planning your Wireless Network The Router’ s Functions Simply put, a router is a network device that connects two networks together . In this instance , the Router connects your Local Area Network (LAN), or the group of PCs in your h[...]
-
Página 9
5 Chapter 2: Planning your Wireless Network Why do I need a VPN? Wireless-G VPN Broadban d Router If you use the Router to share your cable or DSL Internet connection , contact your ISP to find out if they have assigned a static IP address to your account. If so, you will need that static IP address when configuring the Router . Y ou can get that i[...]
-
Página 10
6 Chapter 2: Planning your Wireless Network What is a VPN? Wireless-G VPN Broadban d Router At this point, your data becomes open to hackers using a variety of methods to steal not only the data you are transmitting but also your network login and security data. Some of the most common m ethods are as follows: 1) MAC Address Spoofing Packets transm[...]
-
Página 11
7 Chapter 2: Planning your Wireless Network What is a VPN? Wireless-G VPN Broadban d Router a secure connection that, in effect, operates as if you were directly connected to your local network. Virtual Private Networking can be used to create secure netwo rks linking a central office with br anch offices, telecommuters, and/or professionals on the[...]
-
Página 12
8 Chapter 2: Planning your Wireless Network What is a VPN? Wireless-G VPN Broadban d Router Computer (using VPN client softwar e that supports IPSec) to VPN Router The following is an example of a computer -to-VPN Route r VPN. (See Figure 2-3.) In her hotel room, a traveling businesswoman dials up her ISP . Her notebook computer has VPN client soft[...]
-
Página 13
9 Chapter 3: The Back Panel Wireless-G VPN Broadban d Router Chapter 3: Chapter 3: Getting to Know the Wireless-G VPN Broadband Router The Back P anel The Router’ s ports, where a network cable is connected, are located on the back panel. Internet The Internet port connects to your modem. LAN (1-4) The LAN (Local Area Network) ports connect to yo[...]
-
Página 14
10 Chapter 3: Getting to Know the Wireless-G VPN Broadband Router The Front Panel Wireless-G VPN Broadban d Router The Front P anel The Router's LEDs, where information about network ac tivity is displayed, are located on the front panel. Po w e r Green. The P ower LED lights up when the Access Po int is powered on. DMZ Red. The DMZ LED indica[...]
-
Página 15
11 Chapter 4: Connecting the Wire less-G Broadband Router Overview Wireless-G VPN Broadban d Router Chapter 4: Connecting the Wireless-G Broadband Router Overview The Router’s setup consists of more than simply plugging hardwar e togeth er . Y ou will have to configure your networked PCs to accept the IP addresses that the Ro uter assigns them (i[...]
-
Página 16
12 Chapter 4: Connecting the Wire less-G Broadband Router Wired Connectio n to a PC Wireless-G VPN Broadban d Router Wired Connection to a PC 1. Before you begin, make sure that all of your network ’ s hardware is powered off , inclu ding the Router , PCs, and cable or DSL modem. 2. Connect one end of an Ether net network cable to one of the LAN [...]
-
Página 17
13 Chapter 4: Connecting the Wire less-G Broadband Router Wireless Connection to a PC Wireless-G VPN Broadban d Router • The Power LED on the front panel will light up green as soon as the power adapter is connected properly . The Power LED will flash for a few seconds, then light up steady when the self-test is com plete . If the LED flashes for[...]
-
Página 18
14 Chapter 5: Configuring th e PCs Overview Wireless-G VPN Broadban d Router Chapter 5: Configuring the PCs Overview The instructions in this chapter will help you configure each of your computers to be able to communicate with the Router . T o do this, you need to configure your PC’s netw ork settings to obtain an IP (or TCP/IP) address automati[...]
-
Página 19
15 Chapter 5: Configuring th e PCs Configuring Windows 2000 PCs Wireless-G VPN Broadban d Router 4. Now click the Gateway tab , and verify that the Installed Gateway field is blank. Click the OK button. 5. Click the OK button again. Windows may ask you fo r the or iginal Windows installation disk or additional files. Check for the files at c:windo[...]
-
Página 20
16 Chapter 5: Configuring th e PCs Configuring Windows XP PCs Wireless-G VPN Broadban d Router Configuring Windows XP PCs The following instructions assume you are running Windows XP with the default interface. If you are using the Classic interface (where the icons and menus look like previous Windows versions), please follow the instructions for [...]
-
Página 21
17 Chapter 5: Configuring th e PCs Configuring Windows XP PCs Wireless-G VPN Broadban d Router Figure 5-8: IP Address[...]
-
Página 22
17 Chapter 6: Configuring th e Router Overview Wireless-G VPN Broadban d Router Chapter 6: Configuring the Router Overview Use the Router’ s web-based utility to configure the Router . This chapter will describe each web page in the Utility and each page’ s key functions. The utility can be accessed via your w eb browser through use of a comput[...]
-
Página 23
18 Chapter 6: Configuring th e Router Overview Wireless-G VPN Broadban d Router • Advanced Wireless Settings. On this screen you can access the Advanced Wireless features of Authentication T ype, Basic Data Rates, Control Tx Rates, Beacon Interval, DTIM Interval, R TS Threshold, and Fragmentation Threshold. Security • Filter . T o block specifi[...]
-
Página 24
19 Chapter 6: Configuring th e Router How to Access the Web-based Utility Wireless-G VPN Broadban d Router Status • Router . This screen provides stat us information about the Router . • Local Network. This provides status information about the local network. How to Access the W eb-based Utility T o access the web-based utility , launch Interne[...]
-
Página 25
20 Chapter 6: Configuring th e Router The Setup Tab Wireless-G VPN Broadban d Router Static (See Figure 6-3.) If you are required to use a permanent IP address to connect to the Internet, then sele ct Static IP . • IP Address. This is the Router ’ s IP address, when se en from th e WAN , or the In ternet. Y our ISP will provide you with the IP [...]
-
Página 26
21 Chapter 6: Configuring th e Router The Setup Tab Wireless-G VPN Broadban d Router PPTP (See Figure 6-5.) Point to Point T unn eling Protocol (PPTP) is a service that applie s to connections in Europe only (see Figure 6- 8). • Internet IP Address. This is the Router’ s IP address, when seen from the Intern et. Y our ISP will provide you with [...]
-
Página 27
22 Chapter 6: Configuring th e Router The Setup Tab Wireless-G VPN Broadban d Router 1200 to 1500 range . For most DSL users, it is recomm ended to use the value 1492. By default, MTU is set at 1500 when disabled. Network Setup • Gateway IP . The values for the Router’s Local IP Address and Subnet Mask are shown here . In most cases, keeping th[...]
-
Página 28
23 Chapter 6: Configuring th e Router The Setup Tab Wireless-G VPN Broadban d Router The DDNS T ab The Router offers a Dynamic Domain Name System (DDN S) feature . DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address. It is useful when you are hosting your own website, FTP server , or other server behind the Router . B[...]
-
Página 29
24 Chapter 6: Configuring th e Router The Setup Tab Wireless-G VPN Broadban d Router MAC Address Clone T ab (See Figure 6-8.) The Router’ s MAC address is a 12-digit code assigned to a unique piece of hardware for identification, like a social security number . If your ISP requires MAC address registration, find your adapter’ s MAC address by f[...]
-
Página 30
25 Chapter 6: Configuring th e Router The Setup Tab Wireless-G VPN Broadban d Router Static Routing If the Router is connected to more than one network, it may be necessary to set up a static route between th em. A static route is a pre-determin ed pathway that network information must travel to reach a specific host or network. T o create a static[...]
-
Página 31
26 Chapter 6: Configuring th e Router The Wireless Tab Wireless-G VPN Broadban d Router Hot Spot (See Figure 6-11.) Hot Spot Ser vice Provider . Select the Hot Spot P rovider from the drop-down menu. Hot Spot Sevice Provider URL. Enter the Hot Spot Sev ice Provider URL in the field. Obtain this inform ation from your Hot Spot Provider . Hot Spot Ob[...]
-
Página 32
27 Chapter 6: Configuring th e Router The Wireless Tab Wireless-G VPN Broadban d Router Wireless Security • Wireless SSID Broadcast. When wireless clients survey the lo cal area for wireless networks to associate with, they will detect the SSID broadcast by the Router . T o broadcast the Router's SSID, k eep the default setting, Enabled . If[...]
-
Página 33
28 Chapter 6: Configuring th e Router The Wireless Tab Wireless-G VPN Broadban d Router Wireless Network Access (See Figure 6-14.) Wireless Network Access. If this function is enabled, only the computers on the list will be allowed access to the wireless network. T o add a computer to the network, click the Permit to access button, and enter the MA[...]
-
Página 34
29 Chapter 6: Configuring th e Router The Wireless Tab Wireless-G VPN Broadban d Router Advanced Wireless Settings (See Figure 6-16.) On this screen you can access the Advanced Wireless features, including Authentication T ype, Basic Data Rates, Control Tx Rates, Beacon Interval, DTIM Int erval, RTS Threshold, and Fragmentation Threshold. • Authe[...]
-
Página 35
30 Chapter 6: Configuring th e Router The Security Tab Wireless-G VPN Broadban d Router The Security T ab Fire wal l When you click the Security tab , you will see the Firewall scr een (see Figure 6-17). This screen contains Filters and Block W AN Requests. Filters blo ck specific internal users from accessing th e Internet and block anonymous Inte[...]
-
Página 36
31 Chapter 6: Configuring th e Router The Security Tab Wireless-G VPN Broadban d Router VPN Virtual Private Networking (VPN) is a security measure t hat basically creates a secure connection between two remote locations. This connection is very specific as far as its settings are concerned; this is what create s the security . The VPN screen, shown[...]
-
Página 37
32 Chapter 6: Configuring th e Router The Security Tab Wireless-G VPN Broadban d Router settings of the remote VPN device . Make sure that you have entered the IP Address correctly , or the connection cannot be made. Remember , this is NO T the IP Add ress of the local VPN Router , but the IP Address of the remote VPN Router or device with which yo[...]
-
Página 38
33 Chapter 6: Configuring th e Router The Security Tab Wireless-G VPN Broadban d Router Advanced VPN T unnel Setup From the Advance VPN T unnel Setup screen, shown in Figure 6-19, you can adjust the settings for specific VPN tunnels. Phase 1 • Phase 1 is used to create a security association (SA), often called the IKE SA. After P hase 1 is comple[...]
-
Página 39
34 Chapter 6: Configuring th e Router The Security Tab Wireless-G VPN Broadban d Router Other Options • Unauthorized IP Blocking. Click Enabled to block unauthorized IP addresses. Enter in the Rejects Number field to specify how many times IKE must fail b efore bloc king that unauthorized IP address. Enter the length of time that you specify (in [...]
-
Página 40
35 Chapter 6: Configuring th e Router The Access Restrictions Tab Wireless-G VPN Broadban d Router • WEP Encr yption. Select the level of WEP encr yption you wish to use , 64-bit 10 hex digits or 1 28-bit 26 hex digits. Higher encryption levels offer higher levels of secu rity , but due to the complexity of the encryption, they may decrease netwo[...]
-
Página 41
36 Chapter 6: Configuring th e Router The Access Restrictions Tab Wireless-G VPN Broadban d Router 2. Click the Edit List button. This will open the List of PCs screen, shown in Figure 6-24. From this screen, you can enter the IP address or MAC address of any PC to which this policy will apply . Y ou can even enter ranges of PCs by IP address. Clic[...]
-
Página 42
37 Chapter 6: Configuring th e Router The Applications and Gaming Tab Wireless-G VPN Broadban d Router The Applications and Gaming T ab Port Range Forwar ding The Port Forwarding screen sets up public services on your network, such as web servers, ftp ser vers, e-mail servers, or other spe cialized Inter net applications. (Spec ialized Internet app[...]
-
Página 43
38 Chapter 6: Configuring th e Router The Applications and Gaming Tab Wireless-G VPN Broadban d Router When finished making your changes on this tab , click the Save Settings button to sav e these changes, or click the Cancel Changes button to undo your changes. UPnP Forwarding The UPnP screen displays preset application settings as well as options[...]
-
Página 44
39 Chapter 6: Configuring th e Router The Applications and Gaming Tab Wireless-G VPN Broadban d Router with little selectivity . All pending messages and attachments are downloaded at the same time. POP3 uses the SMTP messaging protocol. • NNTP (Network News T ransfer Protocol) The protoc ol used to connect to Usenet groups on the Internet. Usene[...]
-
Página 45
40 Chapter 6: Configuring th e Router The Applications and Gaming Tab Wireless-G VPN Broadban d Router DMZ The DMZ screen (see Figure 6-29) allows one local user to be exposed to the Internet for use of a special-purpose service such as Inter net gaming and videoco nferencing, through Software DMZ, or a user can use LAN Port 4 as a DMZ Port, throug[...]
-
Página 46
41 Chapter 6: Configuring th e Router The Administration Tab Wireless-G VPN Broadban d Router Figure 6-30: Managem ent The Administration T ab Management The Management screen, shown in Figure 6-30, allows you to change the Router’s access settings as well as configure the SNMP and UPnP (Universal Plu g and Play) features. Router Password Local R[...]
-
Página 47
42 Chapter 6: Configuring th e Router The Administration Tab Wireless-G VPN Broadban d Router Figure 6-31: Log • SNMP T rap-Destination. Enter the IP Address . UPnP UPnP allows Windows XP to automatically configure the Router for various Internet application s, such as gaming and videoconferencing. T o enable UPnP , click Enabled . • Allow User[...]
-
Página 48
43 Chapter 6: Configuring th e Router The Administration Tab Wireless-G VPN Broadban d Router Notification Qeue Length • Log queue Length. Enter the numbe r of entries in the log queue in the field. • Log Time Threshold. Enter the time for the threshold in the field. Alert Log Select the type of attacks that you want to be alerted to. Select Sy[...]
-
Página 49
44 Chapter 6: Configuring th e Router Wireless-G VPN Broadban d Router Factory Default (See Figu re 6-33.) If you have exhausted all other options and wish to restore the Router to its factor y default settings and lose all your settings, click Ye s . When finished making your changes on this tab , click the Save Settings button to save these chang[...]
-
Página 50
45 Chapter 6: Configuring th e Router Status Wireless-G VPN Broadban d Router Status Router This screen displays information about your Ro uter and its WA N (Internet) Connections. (See F igure 6-35.) Informati on The information displayed is the Hardware Version, Softw are Version, MAC Address, Local MAC Address, and System Up Time . W AN Connecti[...]
-
Página 51
46 Chapter 6: Configuring th e Router Status Wireless-G VPN Broadban d Router Local Network The Local Network information that is displayed is the IP Address, Subnet Mask, DHCP Ser ver , and DHCP Client Lease Info. T o view the DHCP Clients T able, click the DHCP Clients button. See Figu re 6-36. The DHCP Active IP T able , Figure 6-37, displays th[...]
-
Página 52
47 Chapter 6: Configuring th e Router Status Wireless-G VPN Broadban d Router Wireless The Wireless Network information that is displayed is the MAC Address, Mode , SSID , Channel, and E ncryptio n Function. (See Figure 6-38.) Click the Refresh button if you want to Refr esh your screen. System Performance The System Peformance infor mation that is[...]
-
Página 53
49 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadban d Router Appendix A: T roubleshooting This appendix consists of two parts: “Common Problems and Solutions” and “F requently Asked Questions. ” Provided are possible solutions to problems that may occu r during the installation and operation of the Router [...]
-
Página 54
50 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadban d Router 7. T oward the bottom of the window , select Use the following DNS server addresses, and enter the Preferred DNS server and Alternative DNS ser ver (pro vided by your ISP). Contact your ISP or go on its website to find the information. 8. Click the OK bu[...]
-
Página 55
51 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadban d Router For Windows 98 and Me: • Click Start and Ru n . In the Open field, type in command. Press the Enter key or click the OK button. For Windows NT , 2000, and XP: • Click Star t and Run . In the Open field, type cmd. Press the Enter key or click the OK b[...]
-
Página 56
52 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadban d Router 4. I am not able to access the Se tup page of the Router’ s web-based utility . • Refer to “Problem #2, I want to test my Internet c onnection” to ve rify that your computer is properly connected to the Router . 1. Refer to “ Appendix D: Findin[...]
-
Página 57
53 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadban d Router 2. Enter any name you want to use for the Customized Application. 3. Enter the External Port range of the ser vice you are using. For example , if you have a web ser ver , you would enter the range 80 to 80. 4. Check the protocol you will be using, TCP a[...]
-
Página 58
54 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadban d Router Customized External Port TCP UDP IP Address Enable Application UT 7777 to 27900 X X 192.168.1.100 X Halflife 27015 to 27015 X X 192.168.1.105 X PC Anywhere5631 to 5631 X 192.168.1.102 X VPN IPSEC 500 to 500 X 192.168.1.100 X When you have completed the c[...]
-
Página 59
55 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadban d Router • For Microsoft Internet Explorer 5.0 or higher: 1. Click Start, Settings , and Control P anel . Double-click Internet Options. 2. Click the Connections tab. 3. Click the LAN settings button and remove anything that is checked. 4. Click the OK button t[...]
-
Página 60
56 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadban d Router 14. My DSL service’ s PPPoE is alwa ys disconnecting. PPPoE is not actually a dedicated or always-on connection. Th e DSL ISP can disconnect the service a fter a period of inactivity , just like a nor mal phone dial-up connection to the Inter net. • [...]
-
Página 61
57 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-G VPN Broadban d Router 17. When I enter a URL or IP address, I get a time-o ut error or am prompted to retry . • Check if other PCs work. If they do, ensure that y our workstation’ s IP settings are correct (IP Address, Subnet Mask, Default Gateway , and DNS). Rest art the com[...]
-
Página 62
58 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-G VPN Broadban d Router Network Address T ranslation (NA T) translates multiple IP addresses on the p rivate LAN to one public address that is sent out to the Internet. This adds a level of security since the address of a PC connected to the private LAN is never transmitted on the [...]
-
Página 63
59 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-G VPN Broadban d Router The web page hangs; downloads are corrupt, or nothi ng but junk characters are being displayed on the screen. Wha t do I need to do? Force your Ethernet adapter to 10Mbps or h alf duplex m ode , and tur n off the “ Auto-negotiate” feature of your Etherne[...]
-
Página 64
60 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-G VPN Broadban d Router No. Does the Router pass PPTP packets or actively route PPTP sessions? The Router allows PPTP packets to pass through. Is the Router cross-platform compatibl e? Any platform that supports Ether net and TCP/IP is compatible with the Router . How many ports ca[...]
-
Página 65
61 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-G VPN Broadban d Router • Automatic Rate Selection • RTS/CTS feature • Fragmentation • Power Management What is ad-hoc mode? When a wireless network is set to ad-hoc mode , the wireless-equipped computers are configured to communicate directly with each other . The ad-hoc w[...]
-
Página 66
62 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-G VPN Broadban d Router What is Spread Spec trum? Spread Spectrum technology is a wideband radio frequency tec hnique developed by the militar y for use in reliable , secure , mission-critical communications systems. It is designed to trade off bandwidth efficiency for reliability [...]
-
Página 67
63 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-G VPN Broadban d Router There is no way to know the exact range of your wireless network without testing. Every obstacle placed between the Router and a wireless PC will create signal loss. Lead glass, metal, concrete floors, water and walls will inhibit the signal and reduce range[...]
-
Página 68
64 Appendix B: Wireless Security A Brief Overview Wireless-G VPN Broadban d Router Appendix B: Wireless Security A Brief Overview Whenever data - in the form of files, emails, or messages - is transmitted over your wireless network, it is open to attacks. Wireless networking is inherently risky because it broadcasts information on radio waves. Just[...]
-
Página 69
65 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadban d Router But even WEP has its problems. WEP's encr yption algorithm is referred to as "simple", which also means "weak", because the technology that scrambles the wireless signal isn't too hard to crack for a persistent hacker . There are five[...]
-
Página 70
66 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadban d Router Active Attacks Hackers use Active Attacks for three purposes: 1) stealing data, 2) using your network, and 3) modifying your network so it's easier to hack in the next time . In an Active Attack, the hacker has gained access to all of your network settings (S[...]
-
Página 71
67 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadban d Router examples below , your implementation and administration of network security measures is the key to maximizing wireless security . No preventative measure will guarantee network security but it will make it more difficult for someone to hack into your network. Ofte[...]
-
Página 72
68 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadban d Router There are a few things you can do to make your SSID more secure: a. Disable Broadcast b . Make it unique c . Change it often Most wireless networking devices will give you the option of broadcasting the SSID . This is a option for convenience , allowing anyone to [...]
-
Página 73
69 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadban d Router not completely secure . One piece of infor mation still not encrypted is the MAC address, which hackers can use to break into a network by spoofing (or faking) the MAC address. Programs exist on the Internet tha t are designed to defeat WEP . The best known of the[...]
-
Página 74
70 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadban d Router 2.4GHz/802.11b and 802.11g WEP Encryption WEP encryption for the Wireless-G VPN Broadband Router is configured through the Web-Utility's Wireless tab . Enable WEP from this tab and click the Edit WEP Setting s button, which will open the WEP screen, shown in [...]
-
Página 75
71 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Rou ter Introduc tion Wireless-G VPN Bor adband Router Appendix C: Configuring IPSec between a Windows 2000 PC and the Router Introduction This document demonstrates how to establish a secure IPSec tunnel using preshared keys to join a private network inside the VPN Router and a Wi[...]
-
Página 76
72 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Rou ter How to Establish a Secure IPSec Tunnel Wireless-G VPN Bor adband Router How to Establish a Secure IPSec T unnel Step 1: Create an IPSec Polic y 1. Click the Start button, select Ru n , and type secpol.msc in the Open field. The Local Security Setting screen will appear as s[...]
-
Página 77
73 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Rou ter How to Establish a Secure IPSec Tunnel Wireless-G VPN Bor adband Router 3. The IP Filter List screen should appear , as shown in Figure C-4. Enter an appropriate name , such as win- >router , for the filter list, and de-select the Use Add Wizard check box. Then, click th[...]
-
Página 78
74 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Rou ter How to Establish a Secure IPSec Tunnel Wireless-G VPN Bor adband Router 8. The IP Filter List screen should appear , as shown in Figur e C-7. Enter an appropriate name , such as router - >win for the filter list, and de-select the Use Add Wizard check box. Click the Add [...]
-
Página 79
75 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Rou ter How to Establish a Secure IPSec Tunnel Wireless-G VPN Bor adband Router Step 3: Configure Indi vidual T unnel Rules T unnel 1: win->router 1. From the IP Filter List tab , shown in Figure C-10, click the filter list win->router . 2. Click the Filter Action tab (as in [...]
-
Página 80
76 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Rou ter How to Establish a Secure IPSec Tunnel Wireless-G VPN Bor adband Router 4. Select the Authenticatio n Methods tab, shown in Figure C-13, and click the Edit button. 5. Change the authentication method to Use this string to protect the key exchange (preshar ed key) , as shown[...]
-
Página 81
77 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Rou ter How to Establish a Secure IPSec Tunnel Wireless-G VPN Bor adband Router 7. Select the T unnel S etting tab, shown in Figure C-16, and click The tunnel endpoint is specified by this IP Address radio button. Then, enter the Router’ s W A N IP Address. 8. Select the Connecti[...]
-
Página 82
78 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Rou ter How to Establish a Secure IPSec Tunnel Wireless-G VPN Bor adband Router 10. Go to the IP Filter List tab , and click the filter list router ->win , as shown in Figure C-19. 11. Click the Filter Action tab , and select the filter action Require Security , as shown in Figu[...]
-
Página 83
79 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Rou ter How to Establish a Secure IPSec Tunnel Wireless-G VPN Bor adband Router 13. Change the authentication method to Use this string to pr otect the key exchange (preshared k ey) , and enter the preshared key string, such as XYZ12345, as shown in Figure C-22. (This is a sample k[...]
-
Página 84
80 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Rou ter How to Establish a Secure IPSec Tunnel Wireless-G VPN Bor adband Router 16. Click the Co nnection T ype tab , shown in Figure C-25, and select All network connections . Then click the OK (for Windows XP) or Close (for Windows 2000) button to finish. 17. From the Rules tab ,[...]
-
Página 85
81 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Rou ter How to Establish a Secure IPSec Tunnel Wireless-G VPN Bor adband Router Step 5: Create a T unnel Thro ugh the W eb-Based Utility 1. Open your web browser , and enter 192.168.1.1 in the Address field. Press the Ente r key . 2. When the User name and Password field appears, e[...]
-
Página 86
82 Appendix D: Findi ng the MAC Ad dress an d IP Address for Your Ethernet Adapter Windows 98 or Me Instructions Wireless-G Broad band Router Appendix D: Finding the MA C Address and IP Address for Y our Ethernet Adapter This section describes how to find the MAC address for your computer’s Ethernet adapter so you can use the MAC filtering and/or[...]
-
Página 87
83 Appendix D: Findi ng the MAC Ad dress an d IP Address for Your Ethernet Adapter Windows 2000 or XP Instructions Wireless-G Broad band Router Windows 2000 or XP Instructions 1. Click Start and Run . In the Open field, enter cmd . Press the Enter key or click the OK bu tton. 2. At the command prompt, enter ipcon fig /all . Then press the Enter key[...]
-
Página 88
84 Appendix E: SNMP Functions Wireless-G VPN Broadban d Router Appendix E: SNMP Functions SNMP (Simple Network Management Protocol) is a widely-us ed network monitoring and control protocol. Data is passed from a SNMP agent, such as the VPN Router , to the workstation console used to oversee the network. The Router then returns inform ation contain[...]
-
Página 89
85 Appendix F: Upgradin g Firmware Wireless-G VPN Broadban d Router Appendix F: Upgrading Firmware The Router's firmware is upgraded through the Web-Utility' s Firmware Upgrade tab from the Administration tab . Follow these instructions: 1. Click the Browse button to find the firmware upgrade file that you downloaded from the Linksys web [...]
-
Página 90
86 Appendix G: Window s Help Wireless-G VPN Broadban d Router Appendix G: Windows Help All wireless products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier . These fea tures can be accessed through Windows Help and are described in this appendix. TCP/IP[...]
-
Página 91
87 Appendix H: Glossary Wireless-G VPN Broadban d Router Appendix H: Glossar y 802.11a - An IEEE wireless networking standard that specifies a maximum data transfer rate of 54Mbps and an operating frequency of 5GHz. 802.11b - An IEEE wireless networking standard that specifies a maximum data transfer rate of 11Mbps and an operating frequency of 2.4[...]
-
Página 92
88 Appendix H: Glossary Wireless-G VPN Broadban d Router Buffer - A block of memor y that temporarily holds data to be worked on later when a device is currently too busy to accept the data. Cable Modem - A device that con nects a computer to the cable television network, which in turn connects to the Internet. CSMA/CA (Carrier Sense M ultiple Acce[...]
-
Página 93
89 Appendix H: Glossary Wireless-G VPN Broadban d Router Dynamic IP Address - A temporar y IP address assigned by a DHCP server . Encryption - Encoding data to prevent it from being read by unauthorized people . Ethernet - An IEEE standard network protocol that specifies how data is placed on and retrieved from a common transmission medium. Finger [...]
-
Página 94
90 Appendix H: Glossary Wireless-G VPN Broadban d Router IPCONFIG - A Windows 2000 and XP utility that displays the IP address for a particular networking device. IPSec (Internet Pro tocol Security) - A VPN protocol used to implem ent secure exchange of packets at the IP layer . ISM band - Radio band used in w ireless networking transmissions. ISP [...]
-
Página 95
91 Appendix H: Glossary Wireless-G VPN Broadban d Router PPP oE (Point to Point Proto col over Ethernet) - A type of broadband connection that provides authentication (username and password) in addition to data transport. PPTP (Point-to-Point T unneling Protocol) - A VPN protocol that allows the Point to Point Protoco l (PPP) to be tunneled through[...]
-
Página 96
92 Appendix H: Glossary Wireless-G VPN Broadban d Router TCP/IP (T ransmission Control Protocol/Inter net Protocol) - A network protocol fo r transmitting data that requires acknowledgement from the recipient of data sent. Te l n e t - A user command and TCP/IP p rotocol used for accessing remote PCs. TFTP (T rivial File T ransfer P rotocol) - A ve[...]
-
Página 97
93 Appendix I: Specification s Wireless-G VPN Broadban d Router Appendix I: Specifications Standards IEEE 802.3, 802.11b and 802.11g Ports One Internet, Ethernet (1-4), Power Buttons One Reset Button, One Power Switch Cabling T ype UTP CA T 5 or better Data Rate Up to 54Mbps T ransmit Power 19dBm LEDs Power , Inter net, Ethern et (1, 2, 3, 4), Wire[...]
-
Página 98
94 Appendix I: Specification s Wireless-G VPN Broadban d Router Storage Humidity 5% to 90% Non-Condensing[...]
-
Página 99
95 Appendix J: Warranty Information Wireless-G VPN Broad band Router Appendix J: W arranty Information LIMITED WARRANTY Linksys warrants to the original end user purchaser ("Y ou") that, for a period o f three years, (the "Warranty Period") Y our Linksys product will be free of defects in materials and workmanship under nor mal [...]
-
Página 100
96 Appendix K: Regulatory Inf ormation Wireless-G VPN Broadban d Router Appendix K: Regulator y Information FCC ST A TEMENT This product has been tested and complies with the specification s for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to pr ovide reasonable protection against harmful interference in[...]
-
Página 101
97 Appendix K: Regulatory Inf ormation Wireless-G VPN Broadban d Router Note: This equipment is intended to be used in all EU and EFT A countries. Outdo or use may be restricted to certain frequencies and/or may require a license for operation. For more details, contact Linksys Corporate Compliance . Note: Combinations of power levels and antenna s[...]
-
Página 102
9 8 Appendix L: Contact In formation Wireless-G VPN Br oadband Router Appendix L: Contact Information Need to contact Linksys? Visit us online for information on the latest products and updates to your existing products at: http://www .linksys.com or ftp.linksys.com Can't find information about a product you want to buy on the web? Do you want[...]