Cisco Systems WRV54G инструкция обслуживания

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101

Идти на страницу of

Хорошее руководство по эксплуатации

Законодательство обязывает продавца передать покупателю, вместе с товаром, руководство по эксплуатации Cisco Systems WRV54G. Отсутствие инструкции либо неправильная информация, переданная потребителю, составляют основание для рекламации в связи с несоответствием устройства с договором. В законодательстве допускается предоставлении руководства в другой, чем бумажная форме, что, в последнее время, часто используется, предоставляя графическую или электронную форму инструкции Cisco Systems WRV54G или обучающее видео для пользователей. Условием остается четкая и понятная форма.

Что такое руководство?

Слово происходит от латинского "instructio", тоесть привести в порядок. Следовательно в инструкции Cisco Systems WRV54G можно найти описание этапов поведения. Цель инструкции заключается в облегчении запуска, использования оборудования либо выполнения определенной деятельности. Инструкция является набором информации о предмете/услуге, подсказкой.

К сожалению немного пользователей находит время для чтения инструкций Cisco Systems WRV54G, и хорошая инструкция позволяет не только узнать ряд дополнительных функций приобретенного устройства, но и позволяет избежать возникновения большинства поломок.

Из чего должно состоять идеальное руководство по эксплуатации?

Прежде всего в инструкции Cisco Systems WRV54G должна находится:
- информация относительно технических данных устройства Cisco Systems WRV54G
- название производителя и год производства оборудования Cisco Systems WRV54G
- правила обслуживания, настройки и ухода за оборудованием Cisco Systems WRV54G
- знаки безопасности и сертификаты, подтверждающие соответствие стандартам

Почему мы не читаем инструкций?

Как правило из-за нехватки времени и уверенности в отдельных функциональностях приобретенных устройств. К сожалению само подсоединение и запуск Cisco Systems WRV54G это слишком мало. Инструкция заключает ряд отдельных указаний, касающихся функциональности, принципов безопасности, способов ухода (даже то, какие средства стоит использовать), возможных поломок Cisco Systems WRV54G и способов решения проблем, возникающих во время использования. И наконец то, в инструкции можно найти адресные данные сайта Cisco Systems, в случае отсутствия эффективности предлагаемых решений. Сейчас очень большой популярностью пользуются инструкции в форме интересных анимаций или видео материалов, которое лучше, чем брошюра воспринимаются пользователем. Такой вид инструкции позволяет пользователю просмотреть весь фильм, не пропуская спецификацию и сложные технические описания Cisco Systems WRV54G, как это часто бывает в случае бумажной версии.

Почему стоит читать инструкции?

Прежде всего здесь мы найдем ответы касательно конструкции, возможностей устройства Cisco Systems WRV54G, использования отдельных аксессуаров и ряд информации, позволяющей вполне использовать все функции и упрощения.

После удачной покупки оборудования/устройства стоит посвятить несколько минут для ознакомления с каждой частью инструкции Cisco Systems WRV54G. Сейчас их старательно готовят или переводят, чтобы они были не только понятными для пользователя, но и чтобы выполняли свою основную информационно-поддерживающую функцию.

Содержание руководства

  • Страница 1

    A Division of Cisco Systems, Inc. ® Model No. VPN Broadband Router Wireless- G WRV54G User Guide WIRELESS GH z 2.4 802.11g[...]

  • Страница 2

    Wireless-G VPN Broadband Router Copyright and Trademarks Specifications are subject to change without notice. Instant Etherfast, Linksys, and the Linksys logo are registered trademarks of Linksys Group, Inc. Othe r brands and product names are trademarks or registered trademarks of their respective holders. Copyright © 2003 Linksys. All rights res[...]

  • Страница 3

    EtherFast Cable/DSL Router with 8-Port Switch Table of Contents Chapter 1: Introduction 1 Welcome 1 What’s in this Guide? 2 Chapter 2: Planning your Wireless Network 4 The Router’s Functions 4 IP Addresses 4 Why do I need a VPN? 5 What is a VPN? 6 Chapter 3: Getting to Know the Wireless-G VPN Broadband Router 9 The Back Panel 9 The Front Panel [...]

  • Страница 4

    EtherFast Cable/DSL Router with 8-Port Switch Frequently Asked Questions 56 Chapter 8: Wireless Security 63 A Brief Overview 63 What Are The Risks? 63 Chapter 9: Configuring IPSec between a Windows 2000 PC and the Router 70 Introduction 70 Environment 70 How to Establish a Secure IPSec Tunnel 71 Windows 98 or Me Instructions 81 Windows 2000 or XP I[...]

  • Страница 5

    1 Chapter 1: Introductio n Welcome Wireless-G Broadband VPN Router Chapter 1: Introduction Welcome Wireless-G is the upcoming 54Mbps wireless networking standar d that’s almost five times faste r than the widely deployed Wireless-B (802.11b) products found in homes, businesses, and pub lic wireless hotspots around the country—but since they sha[...]

  • Страница 6

    2 Chapter 1: Introductio n What’s in this Guide? Wireless-G Broadband VPN Router What’s in this Guide? This user guide covers the steps for setting up and using the Wireless-G VPN Broadband Router. • Chapter 1: Introduction This chapter describes the Wireless-G VPN Broa dband Router applications and this User Guide. • Chapter 2: Planning yo[...]

  • Страница 7

    3 Chapter 1: Introductio n What’s in this Guide? Wireless-G Broadband VPN Router • Appendix G: Finding the MAC Address and IP Address for your Ethernet Adapter. This appendix describes how to find the MAC address for your comp uter’s Ethenet adapter so you can use the MAC filtering and/or MAC address cloning feature of the Router. • Appendi[...]

  • Страница 8

    4 Chapter 2: Planning your Wireless Network The Rout er’s Functi ons Wireless-G VPN Broadband Router Chapter 2: Planning your Wireless Network The Router’s Functions Simply put, a router is a network device that connects two networks toge ther. In this instance, the Router connects your Local Area Networ k (LAN), or the group of PCs in your hom[...]

  • Страница 9

    5 Chapter 2: Planning your Wireless Network Why do I need a VPN? Wireless-G VPN Broadband Router If you use the Router to share your cable or DSL Interne t connection, conta ct your ISP to find out if they have assigned a static IP address to your account. If so , you will need tha t static IP address when configuring the Router. You can get that i[...]

  • Страница 10

    6 Chapter 2: Planning your Wireless Network What is a VPN? Wireless-G VPN Broadband Router At this point, your data becomes open to hackers using a variety of methods to steal not only the da ta you are transmitting but also your network login and security data. Some of the most co mmon methods are as follows: 1) MAC Address Spoofing Packets transm[...]

  • Страница 11

    7 Chapter 2: Planning your Wireless Network What is a VPN? Wireless-G VPN Broadband Router a secure connection that, in effect, operates as if you were directly conn ected to your local network. Virtual Private Networking can be used to create secure netwo rks linking a central office with branch offices, telecommuters, and/or profe ssionals on the[...]

  • Страница 12

    8 Chapter 2: Planning your Wireless Network What is a VPN? Wireless-G VPN Broadband Router Computer (using VPN client software that supports IPSec) to VPN Router The following is an example of a computer-to-VPN Router VPN. (See Figure 2-3.) In her h otel room, a traveling businesswoman dials up her ISP. Her notebook computer has VPN client software[...]

  • Страница 13

    9 Chapter 3: Getting to Know the Wireless-G VPN Broadband Router The Back Panel Wireless-G VPN Broadband Router Chapter 3: Getting to Know the Wireless-G VPN Broadband Router The Back Panel The Router’s ports, where a network cable is connected, are located on the back panel. Internet The Internet port connects to your modem. LAN (1-4) The LAN (L[...]

  • Страница 14

    10 Chapter 3: Getting to Know the Wireless-G VPN Broadband Router The Front Panel Wireless-G VPN Broadband Router The Front Panel The Router's LEDs, where information about network activity is displayed, are located on the fron t panel. Power Green. The Power LED lights up when the Access Point is powered on. DMZ Red. The DMZ LED indicate s th[...]

  • Страница 15

    11 Chapter 4: Connecting the Wire less-G Broadband Router Overview Wireless-G VPN Broadband Router Chapter 4: Connecting the Wireless-G Broadband Router Overview The Router’s setup consists of more than simply plugging hardware toge ther. You will have to configure your networked PCs to accept the IP addresses that the Rout er assigns them ( if a[...]

  • Страница 16

    12 Chapter 4: Connecting the Wire less-G Broadband Router Wired Connectio n to a PC Wireless-G VPN Broadband Router Wired Connection to a PC 1. Before you begin, make sure that all of your network ’s hardware is powered off, including the Router, P Cs, and cable or DSL modem. 2. Connect one end of an Ethernet network cable to one of the LAN ports[...]

  • Страница 17

    13 Chapter 4: Connecting the Wire less-G Broadband Router Wireless Connection to a PC Wireless-G VPN Broadband Router • The Power LED on the front panel will light up green as soon as the power adapter is connected properly. The Power LED will flash for a few seconds, then light up steady when the self-test is complete. If the LED flashes for one[...]

  • Страница 18

    14 Chapter 5: Configuring th e PCs Overview Wireless-G VPN Broadband Router Chapter 5: Configuring the PCs Overview The instructions in this chapter will help you configure each of your computers to be able to commu nicate with the Router. To do this, you need to configure your PC’s network sett ings to obtain an IP (or TCP/IP) address automatica[...]

  • Страница 19

    15 Chapter 5: Configuring th e PCs Configuring Windows 2000 PCs Wireless-G VPN Broadband Router 4. Now click the Gateway tab, and verify that the Installed Gateway field is blank. Click the OK button. 5. Click the OK button again. Windows may ask you for the original Windows installation disk or additional files. Check for the files at c:windowso[...]

  • Страница 20

    16 Chapter 5: Configuring th e PCs Configuring Windows XP PCs Wireless-G VPN Broadband Router Configuring Windows XP PCs The following instructions assume you are running Wind ows XP with the default interface. If you are using the Classic interface (where the icons and menus look like previous Windows versions), please follow the instructions for [...]

  • Страница 21

    17 Chapter 6: Configuring th e Router Overview Wireless-G VPN Broadband Router Chapter 6: Configuring the Router Overview Linksys recommends using the Setup CD-ROM for first- time installation of th e Router and setting up additional computers. If you do not wish to run the Setup Wizard on the Setup CD-ROM, then follow the steps in this chapter and[...]

  • Страница 22

    18 Chapter 6: Configuring th e Router Overview Wireless-G VPN Broadband Router • Advanced Wireless Settings. On this screen you can access the Advanced Wireless features of Authentication Type, Basic Data Rates, Control Tx Rates, Beacon Interval, DTIM Interval, RTS Threshold, and Fragme ntation Threshold. Security • Filter. To block specific us[...]

  • Страница 23

    19 Chapter 6: Configuring th e Router How to Access the Web-based Utility Wireless-G VPN Broadband Router Status • Router. This screen provides status in formation about the Router. • Local Network. This provides status information about the lo cal network. How to Access the Web-based Utility To access the web-based utility, launch Internet Exp[...]

  • Страница 24

    20 Chapter 6: Configuring th e Router The Setup Tab Wireless-G VPN Broadband Router Static (See Figure 6-3.) If you are required to use a permanent IP address to connect to the Internet, then select Static IP. • IP Address. This is the Router’s IP address, when s een from the WAN, or the Internet. Your ISP will provide you with the IP Address y[...]

  • Страница 25

    21 Chapter 6: Configuring th e Router The Setup Tab Wireless-G VPN Broadband Router PPTP (See Figure 6-5.) Point to Point Tunneling Protocol (PPT P) is a service that applies to connections in Europe only (see Figure 6- 5). • Internet IP Address. This is the Router’s IP address, when seen from the Internet. Your ISP will provide you with the IP[...]

  • Страница 26

    22 Chapter 6: Configuring th e Router The Setup Tab Wireless-G VPN Broadband Router 1200 to 1500 range. For most DSL users, it is reco mmended to use the value 1492. By default, MTU is set at 1500 when disabled. Network Setup • Gateway IP. The values for the Router’s Local IP A ddress and Subnet Mask are shown here. In most cases, keeping the d[...]

  • Страница 27

    23 Chapter 6: Configuring th e Router The Setup Tab Wireless-G VPN Broadband Router The DDNS Tab The Router offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address. It is use ful when you are hosting your own website, FTP server, or other server behind the Router. Before[...]

  • Страница 28

    24 Chapter 6: Configuring th e Router The Setup Tab Wireless-G VPN Broadband Router MAC Address Clone Tab (See Figure 6-8.) The Router’s MAC address is a 12-digit code assigned to a unique piece of hardware for identificatio n, like a social security number. If your ISP requires MAC add ress registration, fin d your adapter’s MAC address by fol[...]

  • Страница 29

    25 Chapter 6: Configuring th e Router The Setup Tab Wireless-G VPN Broadband Router Static Routing If the Router is connected to more than one network, it may be necessary to set up a static route between them. A static route is a pre-determined pathway that netw ork information must travel to reach a specific host or network. To create a static ro[...]

  • Страница 30

    26 Chapter 6: Configuring th e Router The Wireless Tab Wireless-G VPN Broadband Router The Wireless Tab Basic Wireless Settings (See Figure 6-11.) This screen allows you to choose your wireless network mode and wireless security. Wireless Network • Wireless Network Mode. If you have Wireless-G and 802.11b devices in you r network, then keep the d[...]

  • Страница 31

    27 Chapter 6: Configuring th e Router The Wireless Tab Wireless-G VPN Broadband Router Wireless Security • Wireless SSID Broadcast. When wireless clients survey the loca l area for wireless networks to associate with, they will detect the SSID broadcast by the Router. To broa dcast the Router's SSID, keep the default setting, Enabled . If yo[...]

  • Страница 32

    28 Chapter 6: Configuring th e Router The Wireless Tab Wireless-G VPN Broadband Router Wireless Network Access (See Figure 6-13.) Wireless Network Access. If this function is enabled, on ly the computers on the list will be allowed access to the wireless network. To add a computer to the network, click the P ermit to access button, and enter the MA[...]

  • Страница 33

    29 Chapter 6: Configuring th e Router The Wireless Tab Wireless-G VPN Broadband Router Advanced Wireless Settings (See Figure 6-15.) On this screen you can access the Advanced Wireless features, including Authentication Type, Basic Data Rates, Control Tx Rates, Beacon Interval, DTIM Int erval, RTS Threshold, and Fragmentation Threshold. • Authent[...]

  • Страница 34

    30 Chapter 6: Configuring th e Router The Security Tab Wireless-G VPN Broadband Router The Security Tab Firewall When you click the Security tab, you will see the Firewall screen (see Figure 6-16). This scree n contains Filters and Block WAN Requests. Filters block specific internal users from accessing the Internet and block anonymous Internet req[...]

  • Страница 35

    31 Chapter 6: Configuring th e Router The Security Tab Wireless-G VPN Broadband Router VPN Virtual Private Networking (VPN) is a security measure that basically creates a secure connection between two remote locations. This connection is very specific as far as its settings are concerned; this is what creates the security. The VPN screen, shown in [...]

  • Страница 36

    32 Chapter 6: Configuring th e Router The Security Tab Wireless-G VPN Broadband Router settings of the remote VPN device. Make sure that you have entered the IP Address correctly, or the connection cannot be made. Remember, this is NOT t he IP Address of the local VPN Router, but the IP Address of the remote VPN Router or device with which you w is[...]

  • Страница 37

    33 Chapter 6: Configuring th e Router The Security Tab Wireless-G VPN Broadband Router When finished making your changes on this tab, click the Save Sett ings button to save these changes, or click the Cancel Changes button to undo your changes. Advanced VPN Tunnel Setup From the Advance VPN Tunnel Setup screen, shown in Figu re 6-19, you can adjus[...]

  • Страница 38

    34 Chapter 6: Configuring th e Router The Security Tab Wireless-G VPN Broadband Router Other Options • Unauthorized IP Blocking. Click Enable d to block unauthorized IP addresses. Enter in the Rejects Number field to specify how many times IKE must fail b efore bloc king that unauthorized IP address. Enter the length of time that you specify (in [...]

  • Страница 39

    35 Chapter 6: Configuring th e Router The Access Restrictions Tab Wireless-G VPN Broadband Router • WEP Encryption. Select the level of WEP encryption you wish to use, 64-bit 10 hex digits or 1 28-bit 26 hex digits. Higher encryption levels offer higher levels of security, but due to the complexity of the encryption, they may decrease network per[...]

  • Страница 40

    36 Chapter 6: Configuring th e Router The Access Restrictions Tab Wireless-G VPN Broadband Router 2. Click the Edit List button. This will open the List of PCs screen, shown in F igure 6-24. From this screen, you can enter the IP address or MAC address of any PC to which this policy will apply. You can even enter ranges of PCs by IP address. Click [...]

  • Страница 41

    37 Chapter 6: Configuring th e Router The Applications and Gaming Tab Wireless-G VPN Broadband Router The Applications and Gaming Tab Port Range Forwarding The Port Forwarding screen sets up public services on your network , such as web servers, ftp servers, e-mail servers, or other specialized Internet applications. (S pecialized Internet applicat[...]

  • Страница 42

    38 Chapter 6: Configuring th e Router The Applications and Gaming Tab Wireless-G VPN Broadband Router Port Triggering Port Triggering is used for special Internet applications whose outgoin g ports differ from the incoming ports. For this feature, the Router will watch outgoing data for s pecific port numbers. (See Figure 6-27.) The Route r will re[...]

  • Страница 43

    39 Chapter 6: Configuring th e Router The Applications and Gaming Tab Wireless-G VPN Broadband Router UPnP Forwarding The UPnP screen provides options for customization of port services for applications. (See Figure 6-28.) Enter the Application in the field. Then, enter th e External and Internal Port numbers in the fields. Select the typ e of prot[...]

  • Страница 44

    40 Chapter 6: Configuring th e Router The Applications and Gaming Tab Wireless-G VPN Broadband Router DMZ The DMZ screen (see Figure 6-29) a llows one local user to be expo sed to the Internet for use of a special-purpose service such as Internet gaming and videoconferencing, thro ugh Software DMZ, or a user can use LAN Port 4 as a DMZ Port, throug[...]

  • Страница 45

    41 Chapter 6: Configuring th e Router The Administration Tab Wireless-G VPN Broadband Router Figure 6-30: Management The Administration Tab Management The Management screen, shown in Figure 6-30, allows you to change the Router’s access settings as well as configure the SNMP and UPnP (Un iversal Plug and Play) features. Router Password Local Rout[...]

  • Страница 46

    42 Chapter 6: Configuring th e Router The Administration Tab Wireless-G VPN Broadband Router Figure 6-31: Log • SNMP Trap-Community. Enter the password requ ired by the remote host computer that will receive trap messages or notices sent by the Router. • SNMP Trap-Destination. Enter the IP address of the re mote host computer that will receive [...]

  • Страница 47

    43 Chapter 6: Configuring th e Router The Administration Tab Wireless-G VPN Broadband Router • Syslog Server IP Address. Enter the I P Address of the Syslog Server . • Syslog Priority. Select the priority from the drop-do wn list. Notification Queue Length • Log queue Length. Enter the numbe r of entries in the log queue in the field. • Log[...]

  • Страница 48

    44 Chapter 6: Configuring th e Router The Administration Tab Wireless-G VPN Broadband Router Factory Default (See Figure 6-33.) If you have exhausted all other options and wish to restore the Router to its factory default settings and lose all your settings, click Yes . When finished making your changes on this tab, click the Save Sett ings button [...]

  • Страница 49

    45 Chapter 6: Configuring th e Router Status Wireless-G VPN Broadband Router Status Router This screen displays information about your Router and its WAN (Internet) Connections. (See Figure 6-35.) Information The information displayed is the Hardware Version, Softw a re Version, MAC Address, Local MAC Address, and Syst em Up Time . WAN Connections [...]

  • Страница 50

    46 Chapter 6: Configuring th e Router Status Wireless-G VPN Broadband Router Local Network The Local Network information that is displayed is the IP Address, Subnet Mask, DHCP Server, and DHCP Clien t Lease Info. To view the DHCP Clients Table, click the DHCP Clients button. See Figure 6-36. The DHCP Active IP Table, Figure 6-37, displays the compu[...]

  • Страница 51

    47 Chapter 6: Configuring th e Router Status Wireless-G VPN Broadband Router Wireless The Wireless Network information that is displayed is the MAC Address, Mode, SSID, Channel, and Encryption Function. (See Figure 6-38.) Click the Refresh button if you want to Refresh your screen. System Performance The System Peformance information that is displa[...]

  • Страница 52

    48 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadband Router Appendix A: Troubleshooting This appendix consists of two parts: “Common Problems and So lutions” and “Frequently Asked Questions.” Provided are possible solutions to problems that may occu r during the installation and operatio n of the Router. R[...]

  • Страница 53

    49 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadband Router 7. Toward the bottom of the window, select Use the following DNS server addresses, and enter the Preferred DNS server and Alternative DNS server (pro vided by your ISP). Contact your ISP or go on its website to find the information. 8. Click the OK button[...]

  • Страница 54

    50 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadband Router For Windows 98 and Me: • Click Start and Run . In the Open field, type in comm and. Press the Enter key or click the OK button. For Windows NT, 2000, and XP: • Click Star t and Run . In the Open field, type cmd. Press the Enter key or click the OK but[...]

  • Страница 55

    51 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadband Router 4. I am not able to access the Se tup page of the Router’s web-based utility. • Refer to “Problem #2, I want to test my Internet connection” to verify that your computer is properly connected to the Router. 1. Refer to “Appendix D: Finding the M[...]

  • Страница 56

    52 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadband Router 2. Enter any name you want to use for the Customized Application. 3. Enter the External Port range of the service you are u sing. For example, if you have a web serve r, you would enter the range 80 to 80. 4. Check the protocol you will be using, TCP and/[...]

  • Страница 57

    53 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadband Router Customized External Port TCP UDP IP Address Enable Application UT 7777 to 27900 X X 192.168.1.100 X Halflife 27015 to 27015 X X 192.168.1.105 X PC Anywhere5631 to 5631 X 192.168.1.102 X VPN IPSEC 500 to 500 X 192.168.1.100 X When you have completed the co[...]

  • Страница 58

    54 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadband Router 10. I am a PPPoE user, and I need to remove th e proxy settings or t he dial-up pop-up window. If you have proxy settings, you need to disable these on y our computer. Because the Router is the gateway for the Internet connection, the computer does not ne[...]

  • Страница 59

    55 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadband Router Gateway: 192.168.1.1 • Perform the upgrade using the TFTP program or the Router’s web-based utility through its Administration tab. 14. My DSL service’s PPPoE is alw ays disconnecting. PPPoE is not actually a dedicated or alwa ys-on connection. The [...]

  • Страница 60

    56 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-G VPN Broadband Router flash the firmware by assigning a static IP address to the computer, and then upgrade the firmware. Try using the following settings, IP Address: 192.168.1.50 and Subnet M ask: 255.255.255.0. 17. When I enter a URL or IP address, I get a time-out error or am [...]

  • Страница 61

    57 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-G VPN Broadband Router Does the Internet connection o f the Router support 100Mbps Ethernet? The Router’s current hardware d esign supports up to 100 Mbps Ethe rnet on its Internet port; however, the Internet connection speed will vary depending on the speed of your broadband con[...]

  • Страница 62

    58 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-G VPN Broadband Router the same time, even if on the same LAN (not a problem with 1.0.1.3). As far as hosting games, the HL server does not need to be in the DMZ. Just forward port 27015 to the local IP address of the server computer. How can I block corrupted FTP downloa ds? If yo[...]

  • Страница 63

    59 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-G VPN Broadband Router What is DMZ H osting? Demilitarized Zone (DMZ) allows one IP address (com puter ) to be exposed to the Internet. Some applications require multiple TCP/IP ports to be open. It is recommende d that you set your computer with a static IP if you want to use DMZ [...]

  • Страница 64

    60 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-G VPN Broadband Router What is the IEEE 802.11 g standard? It is one of the IEEE standards for wireless networks. The 802.11g standard allows wireless networking hardware from different manufacturers to communicate, provided that the hardwa re complies with the 802.11g standard. Th[...]

  • Страница 65

    61 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-G VPN Broadband Router acknowledgment from its original access point, it undertakes a new search. Upon finding a new access point, it then re-registers, and the communication process continues. What is ISM b and? The FCC and their counterparts outside of the U.S. have set aside ba [...]

  • Страница 66

    62 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-G VPN Broadband Router practical purposes, this number is usually permanent. Unlike IP addresses, wh ich can change every time a computer logs onto the network, the MAC address of a device stays the same, making it a valuable ide ntifier for the network. How do I reset the Router? [...]

  • Страница 67

    63 Appendix B: Wireless Security A Brief Overview Wireless-G VPN Broadband Router Appendix B: Wireless Security A Brief Overview Whenever data - in the form of files, emails, or messages - is transm itted over your wireless network, it is open to attacks. Wireless networking is inherently risky because it broadcasts information on radio waves. Just[...]

  • Страница 68

    64 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadband Router But even WEP has its problems. WEP's encryption algorithm is referred to as "simple", which also means "weak", because the technology that scrambles the wireless signal isn't too h ard to crack for a persistent hacker. There are five c[...]

  • Страница 69

    65 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadband Router Active Attacks Hackers use Active Attacks for three purposes: 1) st ealing data, 2) using your network, an d 3) modifying your network so it's easier to hack in the next time. In an Active Attack, the hacker has gained access to all of your network settings (S[...]

  • Страница 70

    66 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadband Router examples below, your implementation and ad ministration of network security measures is the key to maximizing wireless security. No preventative measure will guaran tee network security but it will make it more difficult for some one to hack into your network. Ofte[...]

  • Страница 71

    67 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadband Router There are a few things you can do to make your SSID more secure: a. Disable Broadcast b. Make it unique c. Change it often Most wireless networking devices will give you the option of broadcasting the SSID. This is a optio n for convenience, allowing anyone to log [...]

  • Страница 72

    68 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadband Router not completely secure. One piece o f information still not en crypted is the MAC address, which hackers can use to break into a network by spoofin g (or faking) the MAC address. Programs exist on the Internet that are designed to defeat WEP. The best know n of thes[...]

  • Страница 73

    69 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadband Router 2.4GHz/802.11b and 802.11g WEP Encryption WEP encryption for the Wireless-G VPN Broadband Router is configured through the Web-Utility's Wireless tab. Enable WEP from this tab and click the Edit WEP Setting s button, wh ich will open the WEP screen, shown in F[...]

  • Страница 74

    70 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Router Introduc tion Wireless-G VPN Boradband Router Appendix C: Configuring IPSec between a Windows 2000 PC and the Router Introduction This document demonstrates how to establish a secure IPSec tunnel using preshared keys to join a private network inside the VPN Router and a Wind[...]

  • Страница 75

    71 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Router How to Establish a Secure IPSec Tunnel Wireless-G VPN Boradband Router How to Establish a Secure IPSec Tunnel Step 1: Create an IPSec Policy 1. Click the Start button, select Run , and type secpol.msc in the Open field. The Local Security Setting screen will appear as shown [...]

  • Страница 76

    72 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Router How to Establish a Secure IPSec Tunnel Wireless-G VPN Boradband Router 3. The IP Filter List screen should appear, as shown in Figure C-4. Ente r an appropriate name, such as win->router, for the filter list, and de-select the Use Add Wizard check box. Then, click the Add[...]

  • Страница 77

    73 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Router How to Establish a Secure IPSec Tunnel Wireless-G VPN Boradband Router 8. The IP Filter List screen should appear, as shown in Figure C-7. Ente r an appropriate name, such as router->win for the filter list, and de-select the Use Add Wizard check box. Click the Add button[...]

  • Страница 78

    74 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Router How to Establish a Secure IPSec Tunnel Wireless-G VPN Boradband Router Step 3: Configure Individual Tunnel Rules Tunnel 1: win->router 1. From the IP Filter List tab, shown in Figur e C-10, click the filter list win->router. 2. Click the Filter Action tab (as in Figure[...]

  • Страница 79

    75 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Router How to Establish a Secure IPSec Tunnel Wireless-G VPN Boradband Router 4. Select the Authenticatio n Methods tab, sh own in Figure C-13, and click the Edit button. 5. Change the authentication method to Use this string to protect the key excha nge (preshared key) , as shown [...]

  • Страница 80

    76 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Router How to Establish a Secure IPSec Tunnel Wireless-G VPN Boradband Router 7. Select the Tunnel Setti ng tab, shown in Figure C-16, and click The tunnel endpoint is specified by this IP Address radio button. Then, enter the Router’s WAN IP Address. 8. Select the Connection Ty [...]

  • Страница 81

    77 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Router How to Establish a Secure IPSec Tunnel Wireless-G VPN Boradband Router 10. Go to the IP Filter List tab, and click the filter list router->win , as shown in Figure C-19. 11. Click the Filter Action tab, and select the filter action Requi re Security , as shown in Figure C[...]

  • Страница 82

    78 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Router How to Establish a Secure IPSec Tunnel Wireless-G VPN Boradband Router 13. Change the authentication method to Use this string to pr otect the key exchange (preshared key) , and enter the preshared key string, such as XYZ12345, as shown in Figure C-22. (This is a sample key [...]

  • Страница 83

    79 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Router How to Establish a Secure IPSec Tunnel Wireless-G VPN Boradband Router 16. Click the Conn ection Type tab, shown in Figure C-25, and select All networ k connections . Then click the OK (for Windows XP) or Close (for Windows 2000) button to finish. 17. From the Rules tab, sho[...]

  • Страница 84

    80 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Router How to Establish a Secure IPSec Tunnel Wireless-G VPN Boradband Router Step 5: Create a Tunnel Thro ugh the Web-Based Utility 1. Open your web browser, and enter 192.168.1. 1 in the Address field. Press the Ente r key. 2. When the User name and Password field appears, enter [...]

  • Страница 85

    81 Appendix D: Finding t he MAC Address a nd IP Address for Your Ethernet Adapter Windows 98 or Me Instructions Wireless-G Broadband Router Appendix D: Finding the MAC Address and IP Address for Your Ethernet Adapter This section describes how to find the MAC address for your computer’s Ethernet adapter so you can use the MAC filtering and/or MAC[...]

  • Страница 86

    82 Appendix D: Finding t he MAC Address a nd IP Address for Your Ethernet Adapter Windows 2000 or XP Instructions Wireless-G Broadband Router Windows 2000 or XP Instructions 1. Click Start and Run . In the Open field, enter cmd . Press the Enter key or click the OK button. 2. At the command prompt, enter ipcon fig /all . Then press the Enter key. 3[...]

  • Страница 87

    83 Appendix E: SNMP Functions Wireless-G VPN Broadband Router Appendix E: SNMP Functions SNMP (Simple Network Management Proto col) is a widely-u sed network monitoring and control protocol. Data is passed from a SNMP agent, such as the VPN Router, to the workstation console used to oversee the network. The Router then returns information contained[...]

  • Страница 88

    84 Appendix F: Upgradin g Firmware Wireless-G VPN Broadband Router Appendix F: Upgrading Firmware The Router's firmware is upgraded through the Web-Utilit y's Firmware Upgrade ta b from the Administration tab. Follow these instructions: 1. Click the Browse button to find the firmware up grade file that you downloaded from the Linksys webs[...]

  • Страница 89

    85 Appendix G: Window s Help Wireless-G VPN Broadband Router Appendix G: Windows Help All wireless products require Microsoft Windows. Windows is the mo st used operating system in the world and comes with many features that help make netwo rking easier. These features can be accessed th rough Windows Help and are described in this appendix. TCP/IP[...]

  • Страница 90

    86 Appendix H: Glossary Wireless-G VPN Broadband Router Appendix H: Glossary 802.11a - An IEEE wireless networking standard that specifies a maximum data transfer rate of 54Mbps and an operating frequency of 5GHz. 802.11b - An IEEE wireless networking standard that specifies a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GH[...]

  • Страница 91

    87 Appendix H: Glossary Wireless-G VPN Broadband Router Buffer - A block of memory that temporarily holds data to be worked on later when a device is currently too busy to accept the data. Cable Modem - A device th at connects a computer to the cable television n etwork, which in turn connects to the Internet. CSMA/CA (Carrier Sense Multiple Access[...]

  • Страница 92

    88 Appendix H: Glossary Wireless-G VPN Broadband Router Dynamic IP Address - A temporary IP address assigned by a DHCP server. Encryption - Encoding data to prevent it from being read by unauthorized pe ople. Ethernet - An IEEE standard network protocol that specifie s how data is placed on an d retrieved from a common transmission medium. Finger -[...]

  • Страница 93

    89 Appendix H: Glossary Wireless-G VPN Broadband Router IPCONFIG - A Windows 2000 and XP utility that displays the IP address for a particular networking device. IPSec (Internet Protocol Security) - A VPN protocol used to implem ent secure exchange of packets at the IP layer. ISM band - Radio band used in w ireless networking transmissions. ISP (In[...]

  • Страница 94

    90 Appendix H: Glossary Wireless-G VPN Broadband Router PPPoE (Point to Point Protocol over Ethernet) - A type of broadband connection that provides a uthentication (username and password) in addition to data transport. PPTP (Point-to-Point Tunneling Protocol) - A VPN protocol t hat allows the Point to Point Protocol (PPP) to be tunneled through an[...]

  • Страница 95

    91 Appendix H: Glossary Wireless-G VPN Broadband Router TCP/IP (Transmission Control Protocol/Internet Protocol) - A network protocol for transmitting data that requires acknowledgement from the recipient of data sent. Telnet - A user command and TCP/IP protocol used for accessing remote PCs. TFTP (Trivial File Transfer Protocol) - A version of the[...]

  • Страница 96

    92 Appendix I: Specification s Wireless-G VPN Broadband Router Appendix I: Specifications Standards IEEE 802.3, 802.3u, 802.11b and 802.11g Ports One Internet, Ethernet (1-4), Power Buttons One Reset Button, One Power Switch Cabling Type UTP CAT 5 or better Data Rate Up to 54Mbps (wirel ess), up to 100 Mbps (LAN) Transmit Power 19dBm LEDs Power, In[...]

  • Страница 97

    93 Appendix J: Regulato ry Information Wireless-G VPN Broadband Router Appendix J: Regulatory Information FCC STATEMENT This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to pr ovide reasonable protection against harm ful interference in a r[...]

  • Страница 98

    94 Appendix J: Regulato ry Information Wireless-G VPN Broadband Router EN 300-328-1, EN 300-328-2 Technical requirements for Radio equipment. Caution: This equipment is intended to be used in all EU and EFTA cou ntries. Outdoor use may be restricted to certain frequencies and/or may require a license for operation. Co ntact local Authority for proc[...]

  • Страница 99

    95 Appendix J: Regulato ry Information Wireless-G VPN Broadband Router An FCC compliant telephone cord and modular plug is provided with this equ ipment. This equipment is designed to be connected to the telephone network or premises wi ring using a compatible modular jack, which is FCC Part 68 compliant. Connection to the telephone network should [...]

  • Страница 100

    96 Appendix K: Warranty Informat ion Wireless-G VPN Broadband Router Appendix K: Warranty Information LIMITED WARRANTY Linksys war rants to You t hat, for a p eriod of thr ee years (the “Warranty P eriod”), yo ur Linksys Product will b e substantial ly free of defects in materials a nd workmanship under normal use. Your exclusive remedy and Lin[...]

  • Страница 101

    97 Appendix L: Contact Inform ation Wireless-G VPN Broadband Router Appendix L: Contact Information Need to contact Linksys? Visit us online for information on the latest products and updates to your existing products at: http://www.linksys.com/international If you experience problems with any Linksys product, you can e-mail us at: Austria support.[...]