hank you for choosing the Linksys Compact Wireless-G
Broadband Router. The Compact Wireless-G Broadband
Router will allow you to network wirelessly better than
ever, sharing Internet access, files and fun, easily and
securely.
Front Panel
Ethernet 1-4 (Green) These numbered LEDs,
orresponding with the numbered ports on the
Router’s back panel, serve two purposes. If the
LED is continuously lit, the Router is connected
o a device through that port. A flashing LED
ndicates network activity over that port
Wireless
hen there is a successful wireless connection
Green) The WIRELESS LED flashes
Back Panel
Ethernet 1-4These ports connect the Router
o your networked PCs and other Ethernet
network devices
InternetThe Internet port is where you wi
onnect your broadband Internet connection
PowerThe Power port is where you wi
onnect the power adapter
Bottom Pane
Internet (Green) The INTERNET LED lights up
hen there is a connection through the Internet
port.
Power
nd will stay on while the Router is powered
LED will flash. When the diagnostic is complete,
Green
n. When the Router goes through its sel
iagnostic mode during every boot-up, this
e LED will be soli
he POWER LED lights up
he Router’s Reset button is located on the bottom panel.
o access the button, turn the stand perpendicular to
the Router. Use a sharp object like a pencil to push in the
utton
Reset There are two ways to reset the Router’s
actory defaults. Either press the RESET button,
for approximately eight seconds, or restore the
efaults from Administration > Factory Defaults
in the Router’s Web-based Utilit
4
Chapter 2
.
g
y
d
.
s
.
.
s
y
.
T
.
g
o
Wireless Security Checklist
apter 2:
Wireless Security Checklist
ireless networks are convenient and easy to install, so
homes with high-speed Internet access are adopting them
t a rapid pace. Because wireless networking operates by
sending information over radio waves, it can be more
vulnerable to intruders than a traditional wired network
Like signals from your cellular or cordless phones, signals
rom your wireless network can also be intercepted. Since
ou cannot physically prevent someone from connecting
to your wireless network, you need to take some additional
steps to keep your network secure.
1. Change the default wireless
network name or SSID
ireless devices have a default wireless network name
or Service Set Identifier (SSID) set by the factory. This
s the name of your wireless network, and can be up
to 32 characters in length. Linksys wireless products
inksys as the default wireless network name. You
should change the wireless network name to somethin
nique to distinguish your wireless network from other
wireless networks that may exist around you, but do not
se personal information (such as your Social Securit
umber) because this information may be available for
nyone to see when browsing for wireless networks.
2. Change the default password
For wireless products such as access points, routers, an
gateways, you will be asked for a password when you
want to change their settings. These devices have a default
assword set by the factory. The Linksys default password
min. Hackers know these defaults and may try to
se them to access your wireless device and change your
etwork settings. To thwart any unauthorized changes,
customize the device’s password so it will be hard to
guess.
4. Enable encryption
Encryption protects data transmitted over a wireless
etwork. Wi-Fi Protected Access (WPA/WPA2) and Wired
Equivalency Privacy (WEP) offer different levels of security
or wireless communication
network encrypted with WPA/WPA2 is more secure
than a network encrypted with WEP, because WPA/WPA2
ses dynamic key encryption. To protect the information
s it passes over the airwaves, you should enable the
highest level of encryption supported by your network
equipment.
EP is an older encryption standard and may be the
only option available on some older devices that do not
support WPA.
General Network Security Guideline
ireless network security is useless if the underlying
etwork is not secure.
Password protect all computers on the network and
ndividually password protect sensitive files
Change passwords on a regular basis
Install anti-virus software and personal firewall
software.
Disable file sharing (peer-to-peer). Some applications
ay open file sharing without your consent and/or
knowledge.
Additional Security Tip
Keep wireless routers, access points, or gateways awa
rom exterior walls and windows
urn wireless routers, access points, or gateways
off when they are not being used (at night, during
vacations)
Use strong passphrases that are at least eight characters
n length. Combine letters and numbers to avoid usin
standard words that can be found in the dictionary.
3. Enable MAC address filtering
Linksys routers and gateways give you the ability to
enable Media Access Control (MAC) address filtering. The
MAC address is a unique series of numbers and letters
ssigned to every networking device. With MAC address
iltering enabled, wireless network access is provided
solely for wireless devices with specific MAC addresses.
For example, you can specify the MAC address of each
computer in your home so that only those computers can
ccess your wireless network.
WEB: F
security, visit www.linksys.com/security
r more information on wireless
5
Chapter 3
h
.
T
ll
.
y.
y
T
68.1.1
ess
f
screen.) Click
.
n
p
T
Basic Setup
p
T
.
e
:
P
oE
P
)
P
apter 3:
dvanced Configuration
ter setting up the Router with the Setup Wizard (located
on the CD-ROM), the Router will be ready for use. However,
f you’d like to change its advanced settings, use the
Router’s web-based utility. This chapter describes eac
web page of the utility and each page’s key functions. You
can access the utility via a web browser on a computer
connected to the Router
Gaming, Administration, and Status. Additional tabs wi
e available after you click one of the main tabs
NOTE: When first installing the Router, you
ould use the Setup Wizard on the Setup
CD-ROM. If you want to configure advanced
ettings, use this chapter to learn about the
web-based utilit
Advanced Configuration
>
Internet Setu
How to Access the Web-Based Utilit
o access the web-based utility, launch the web browser on
our computer, and enter the Router’s default IP address,
192.1
password request screen will appear. (Non-Windows XP
sers will see a similar screen.) Leave the
lank. The first time you open the Web-based utility, use
the default password
rom the Administration tab’s
to continue
in the Addr
ield. Then, press Enter
ser name field
min. (You can set a new password
assword Scree
he Internet Setup section configures the Router to your
Internet connection. Most of this information can be
obtained through your ISP
nternet Connection Typ
elect the type of Internet connection your ISP provides
rom the drop-down menu. The available types are
utomatic Configuration - DHCP
tatic I
PPP
Automatic Configuration - DHC
By default, the Router’s Internet Connection Type is set
toutomatic Configuration - DHCP, which should be
kept only if your ISP supports DHCP or you are connecting
through a dynamic IP address. (This option usually applies
to cable connections.
Internet Connection Type > Automatic Configuration - DHC
etup > Basic Setu
he first screen that appears is the
ows you to change the Router’s general settings.
asic Setup screen. This
6
Chapter 3
P
.
ll
.
.
.
l
abl
oE
E
d
ect
.
lly
ll
lly
od
field,
.
.
.
k.
y
.
d
.
lly
.
od
field, you specify how often
.
ly.
Advanced Configuration
tatic I
If you are required to use a permanent IP address to
connect to the Internet, select
nternet Connection Type > Static IP
Internet IP AddressThis is the Router’s IP address, when
seen from the Internet. Your ISP will provide you with the
IP Address you need to specify here
Subnet Mask This is the Router’s Subnet Mask, as seen
users on the Internet (including your ISP). Your ISP wi
rovide you with the Subnet Mask
Gateway
ress, which is the ISP server’s IP address
DNS
(Domain Name System) Server IP Address
our ISP will provide you with the Gateway
our ISP will provide you with at least one DNS
tatic IP
oE
ome DSL-based ISPs use PPPoE (Point-to-Point Protoco
over Ethernet) to establish Internet connections. If you are
connected to the Internet through a DSL line, check with
your ISP to see if they use PPPoE. If they do, you will have
to en
e
PP
connection. If you are disconnected, then the Router
automatica
wi
this option, select
you specify how often you want the Router to check
the Internet connection. The default Redial Period is
seconds
re-establish your connection. To use
eep Alive In the Redial Peri
PPTP
Point-to-Point Tunneling Protocol (PPTP) is a service that
pplies to connections in Europe only
Internet Connection Type > PPTP
Internet IP Address This is the Router’s IP address, as
seen from the Internet. Your ISP will provide you with the
IP Address you need to specify here
Subnet Mask This is the Router’s Subnet Mask, as seen
users on the Internet (including your ISP). Your ISP will
rovide you with the Subnet Mas
Gateway
ress
User Name and Password Enter the User Name an
Password provided by your ISP
our ISP will provide you with the Gatewa
nternet Connection Type > PPPo
User Name and Password Enter the User Name an
Password provided by your ISP.
Connect on Demand: Max Idle Time You can configure
the Router to cut the Internet connection after it has been
nactive for a specified period of time (Max Idle Time). If
our Internet connection has been terminated due to
nactivity, Connect on Demand enables the Router to
utomatically re-establish your connection as soon as you
ttempt to access the Internet again. To use this option,
l
nnect on Demand In the
enter the number of minutes you want to have elapsed
efore your Internet connection terminates. The default
Max Idle Time is
Keep Alive: Redial Period If you select this option,
the Router will periodica
minutes
check your Internet
x Idle Timefield,
Connect on Demand: Max Idle Time You can configure
the Router to cut the Internet connection after it has been
nactive for a specified period of time (Max Idle Time). If
our Internet connection has been terminated due to
nactivity, Connect on Demand enables the Router to
utomatica
ttempt to access the Internet again. To use this option,
enter the number of minutes you want to have elapsed
efore your Internet connection terminates. The default
Max Idle Time is
Keep Alive: Redial Period
Router will periodically check your Internet connection. If
ou are disconnected, then the Router will automatically
e-establish your connection. To use this option, select
Keep Alive In the
ou want the Router to check the Internet connection. The
default value is 30seconds
L2TP is a service that applies to connections in Israel on
re-establish your connection as soon as you
onnect on Demand. In the
minutes
If you select this option, the
ial Peri
ax Idle Timefield,
7
Chapter 3
L2TP
d
.
add
.
.
lly
s
lly
od
field,
fau
.
s
.
Settings
.
ual
field, this option
:
00
60
p
T
.
P
T
.
Add
s
)
T
Add
(DHCP)
.
92.168.1.100
Advanced Configuration
MTU MTU is the Maximum Transmission Unit. It specifies
the largest packet size permitted for Internet transmission.
elect Manual if you want to manually enter the largest
acket size that is transmitted. To have the Router select
the best MTU for your Internet connection, keep the
default setting, Auto
nternet Connection Type >
User Name and Password Enter the User Name an
Password provided by your ISP
L2TP ServerThis is the IP
Your ISP will provide you with the IP Address you need to
specify here
Connect on Demand: Max Idle Time You can configure
the Router to cut the Internet connection after it has been
nactive for a specified period of time (Max Idle Time). If
your Internet connection has been terminated due to
nactivity, Connect on Demand enables the Router to
utomatica
ttempt to access the Internet again. To use this option,
select
enter the number of minutes you want to have elapsed
efore your Internet connection terminates. The default
Max Idle Time is
Keep Alive: Redial Period If you select this option,
the Router will periodically check your Internet
connection. If you are disconnected, then the Router
will automatica
this option, select
you specify how often you want the Router to check
the Internet connection. The de
seconds
re-establish your connection as soon as you
onnect on Demand. In the
minute
re-establish your connection. To use
eep Alive In the Redial Peri
ress of the L2TP Server
ax Idle Timefield,
lt Redial Period is
Optional Setting
ome of these settings may be required by your ISP. Verify
with your ISP before making any changes
Size
s enabled. Leave this value in the 1200 to 1500 range. The
default size depends on the Internet Connection Type
en Man
DHCP, Static IP, or Telstra:
PPPoE:
1492
TP or L2TP:14
is selected in the
5
Network Setu
he Network Setup section changes the settings on the
etwork connected to the Router’s Ethernet ports. Wireless
etup is performed through the Wireless tab
ter I
his presents both the Router’s IP Address and Subnet
Mask as seen by your network
ter IP
etwork Address Server Settings (DHCP
he settings allow you to configure the Router’s Dynamic
Host Configuration Protocol (DHCP) server function. The
Router can be used as a DHCP server for your network. A
DHCP server automatically assigns an IP address to each
computer on your network. If you choose to enable the
Router’s DHCP server option, make sure there is no other
DHCP server on your network.
res
Router Name
9 characters to represent the Router.
Host Name/Domain NameThese fields allow you to
supply a host and domain name for the Router. Some ISPs,
sually cable ISPs, require these names as identification.
You may have to check with your ISP to see if your
roadband Internet service has been configured with a
host and domain name. In most cases, leaving these fields
lank will work
n this field, you can enter a name of up to
DHCP Server DHCP is enabled by factory default. If you
ready have a DHCP server on your network, or you don’t
want a DHCP server, then select
eatures will be available)
Starting IP Address
start with when issuing IP addresses. Because the Router’s
efault IP address is 192.168.1.1, the Starting IP Address must
e 192.168.1.2 or greater, but smaller than 192.168.1.253.
The default Starting IP Address is 1
etwork
ress Server Settings
isable(no other DHCP
nter a value for the DHCP server to
8
Chapter 3
T
y.
y
)
Ti
tting
.
T
abl
S
T
.
e
ce
ect
m
T
g
DDNS > DynDNS
.
.
add
.
.
m
DDNS > TZ O
.
Advanced Configuration
Maximum Number of DHCP Users
umber of PCs that you want the DHCP server to assign
IP addresses to. This number cannot be greater than 253.
he default is
Client Lease TimeThe Client Lease Time is the amount
time a network user will be allowed connection to the
Router with their current dynamic IP address. Enter the
mount of time, in minutes, that the user will be “leased”
this dynamic IP address. After the time is up, the user will
e automatically assigned a new dynamic IP address. The
default is 0 minutes, which means one da
Static DNS (1-3)
he Internet translates domain or website names into
nternet addresses or URLs. Your ISP will provide you with at
east one DNS Server IP Address. If you wish to use another,
enter that IP Address in one of these fields. You can enter up
o three DNS Server IP Addresses here. The Router will use
hese for quicker access to functioning DNS servers
WINS The Windows Internet Naming Service (WINS)
anages each PC’s interaction with the Internet. If you
se a WINS server, enter that server’s IP Address here.
therwise, leave this blank.
The Domain Name System (DNS) is how
nter the maximum
Time Setting
elect the time zone in which your network functions
rom this drop-down menu. (You can even automaticall
djust for daylight saving time.
Before you can use this feature, you need to sign up for
DDNS service at one of two DDNS service providers,
DynDNS.org or TZO.com. If you do not want to use this
eature, keep the default setting, Disabl
DNS Servi
If your DDNS service is provided by DynDNS.org, then
l
ynDNS.org from the drop-down menu. If your
DDNS service is provided by TZO, then select TZO.co
he features available on the DDNS screen will vary,
depending on which DDNS service provider you use.
DynDNS.or
>
User Name Enter the User Name for your DDNS account
Password
nter the Password for your DDNS account
me Se
lick
ave Settingsto apply your changes, or click Cancel
angesto cancel your changes
etup > DDNS
he Router offers a Dynamic Domain Name System (DDNS)
eature. DDNS lets you assign a fixed host and domain
ame to a dynamic Internet IP address. It is useful when
you are hosting your own website, FTP server, or other
server behind the Router.
Before you can use this feature, you need to sign
for DDNS service with a DDNS service provider,
www.dyndns.org or www.TZO.com. If you do not want to
se this feature, keep the default setting,
DDN
he Router offers a Dynamic Domain Name System (DDNS)
eature. DDNS lets you assign a fixed host and domain
ame to a dynamic Internet IP address. It is useful when
ou are hosting your own website, FTP server, or other
server behind the Router
is
e
Host NameThe is the DDNS URL assigned by the DDNS
service.
Internet IP Address The Router’s Internet IP
displayed here. Because it is dynamic, it will change
Status The status of the DDNS service connection is
displayed here.
lick
ave Settingsto apply your changes, or click Cancel
angesto cancel your changes
ress is
ZO.co
>
E-mail Address, TZO Key, and Domain Name
settings of the account you set up with TZO
nter the
9
Chapter 3
.
.
ly
.
MAC Address Clone
e
ble
.
.
.
g
T
g
lly ad
.
Advanced Routing (Gateway)
Advanced Routing (Router )
.
g
y
,
)
Internet IP Address The Router’s Internet IP address is
isplayed here. Because it is dynamic, it will change
Status The status of the DDNS service connection is
displayed here.
lick
ave Settingsto apply your changes, or click Cancel
hangesto cancel your changes
etup > MAC Address Clone
MAC address is a 12-digit code assigned to a unique
iece of hardware for identification. Some ISPs will require
ou to register a MAC address in order to access the
Internet. If you do not wish to re-register the MAC address
with your ISP, you may assign the MAC address you have
current
MAC Address Clone feature
registered with your ISP to the Router with the
Advanced Configuration
>
>
MAC Address Clon
Enable/DisableTo have the MAC Address cloned, select
Ena
User Defined Entry
with your ISP here
Clone Your PC’s MAC
MAC address of the computer you are using
lick
ave Settingsto apply your changes, or click Cancel
angesto cancel your changes
nter the MAC Address registered
icking this button will clone the
etup > Advanced Routin
his screen is used to set up the Router’s advanced routin
unctions. NAT routes the host Router ‘s network connection
to the Internet. Dynamic Routing automatica
how packets travel on your network. Static Routing sets
p a fixed route to another network destination
justs
>
Advanced Routing
Operating Mode
will function. If this Router is hosting your network’s
connection to the Internet, select
Router exists on your network, select
Router is chosen,Dynamic Routingwill be available as
n option
ynamic Routin
RIPThis feature enables the Router to automaticall
djust to physical changes in the network’s layout and
exchange routing tables with the other router(s). The
Router determines the network packets’ route based on
the fewest number of hops between the source and the
destination. This feature is Disabled by default. From the
drop-down menu, you can also select
which performs dynamic routing over your Ethernet and
wireless networks. You can also select WAN (Internet
which performs dynamic routing with data coming from
elect the mode in which this Router
ateway. If another
ter When
AN & Wireless
10
Chapter 3
.
-
)
.
.
h
.
)
.
l
Table
.
T
k
T
e
T
.
ll
y
e
y
k.
Advanced Configuration
the Internet. Finally, selecting
outing for both networks, as well as data from the
Internet
Select set number To set up a static route between the
Router and another network, select a number from the
tatic Routing drop-down list. (A static route is a pre
determined pathway that network information must travel
to reach a specific host or network.) Enter the information
described below to set up a new static route. (Click the
Delete This Entry button to delete a static route.
Enter Route Name Enter a name for the Route here,
sing a maximum of 25 alphanumeric characters
Destination LAN IPThe Destination LAN IP is the address
of the remote network or host to which you want to assign
static route
Subnet Mask The Subnet Mask determines whic
ortion of a Destination LAN IP address is the network
ortion, and which portion is the host portion.
Default GatewayThis is the IP address of the gateway
device that allows for contact between the Router and the
emote network or host
InterfaceThis interface tells you whether the Destination
IP Address is on the LAN & Wireless (Ethernet and wireless
etworks) or the
Delete This EntryTo delete a route, select its number
rom the drop-down menu, and click this button
Show Routing Table
screen displaying how data is routed through your loca
etwork. For each route, the Destination LAN IP address,
ubnet Mask, Gateway, and Interface are displayed. Click
Refresh to update the information. Click Close to exit this
Internet
lick Show Routing Table to open
oth enables dynamic
Basic Wireless Settings
Wireless Networ
he basic settings for wireless networking are set on this
Wireless Network Mode From this drop-down menu,
you can select the wireless standards running on your
etwork. If you have both 802.11g and 802.11b devices
n your network, keep the default setting, Mixed If you
have only 802.11g devices, select
only 802.11b devices, select B-Only If you do not have
ny 802.11g and 802.11b devices in your network, select
Disabl
Wireless Network Name (SSID)The SSID is the network
ame shared among all devices in a wireless network.
he SSID must be identical for all devices in the wireless
etwork. It is case-sensitive and must not exceed 32
characters (use any of the characters on the keyboard).
Make sure this setting is the same for all devices in your
wireless network. For added security, you should change
the default SSID (inksys
to a unique name
-Only If you have
Wireless Channel
rovided to correspond with your network settings. A
evices in your wireless network must be broadcast on
the same channel in order to function correctly.
lick
ave Settingsto apply your changes, or click Cancel
angesto cancel your changes
Wireless > Basic Wireless Settings
he basic settings for wireless networking are set on this
Wireless SSID Broadcast When wireless clients survey
the local area for wireless networks to associate with, the
will detect the SSID broadcast by the Router. To broadcast
the Router’s SSID, keep the default setting,
o not want to broadcast the Router’s SSID, then select
Disabl
SecureEasySetup If you did not utilize this network
connection feature during the Setup Wizard, you may use
t here by clicking the green logo. When you are prompted
to start the push button setup, click OK
Reset Security Use this button to reset the securit
settings on your network. You will need to run
ecureEasySetup again on each device on your network
to re-associate it to your networ
elect the channel from the list
nable
If you
11
Chapter 3
.
y
T
y
”
y
de
d
al
.
Mode > WPA Personal
T
o
)
d
.
h
00
e
T
Mode > WPA Enterprise
T
)
.
2
.
T
.
l
Mode > WPA2 Personal
lick
ave Settingsto apply your changes, or click Cancel
angesto cancel your changes
Advanced Configuration
keys. The default Group Key Renewal period is
seconds.
6
Wireless > Wireless Securit
he Wireless Security settings configure the security of
our wireless network. There are six wireless securit
ode options supported by the Router: WPA Personal,
PA Enterprise, WPA2 Personal, WPA2 Enterprise, RADIUS,
nd WEP. (WPA stands for Wi-Fi Protected Access, which is
security standard stronger than WEP encryption. WPA2
s a more advanced, more secure version of WPA. WEP
stands for Wired Equivalent Privacy, and RADIUS stands
or Remote Authentication Dial-In User Service.) These
six are briefly discussed here. For detailed instructions
on configuring wireless security for the Router, refer to
Chapter 2: Wireless Security.
Wireless Securit
ecurity Mo
elect the security method for your wireless network. If
you do not want to use wireless security, keep the default,
Disable
PA Person
NOTE: If you are using WPA, always remember
that each device in your wireless network MUST
se the same WPA method and shared key, or
else the network will not function properly
A Enterpris
his option features WPA used in coordination with a
RADIUS server. (This should only be used when a RADIUS
server is connected to the Router.)
WPA Algorithm
KIP and AES, with dynamic encryption keys. Select
the type of algorithm,
encryption method than TKIP.
RADIUS Server Address
RADIUS server
RADIUS Port Enter the port number of the RADIUS
server. The default value is
PA supports two encryption m ethods,
KIP or
ES (AES is a stronger
nter the IP Address of the
1
WPA Algorithm WPA supports two encryption methods,
KIP and AES, with dynamic encryption keys. Select
the type of algorithm,
encryption method than TKIP.
WPA Shared Key Enter the key shared by the Router an
your other network devices. It must have 8-63 characters
Group Key Renewal Enter a Key Renewal period, whic
tells the Router how often it should change the encryption
r AES. (AES is a stronger
Shared Key Enter the key shared between the Router
nd the server
Key Renewal Timeout Enter a Key Renewal Timeout
eriod, which instructs the Router how often it should
change the encryption keys. The default Key Renewal
imeout period is
seconds
PA2 Persona
WPA Algorithm WPA2 supports two encryption
ethods, TKIP and AES, with dynamic encryption keys.
12
Chapter 3
S
.
.
e
T
)
Mode > WPA2 Enterprise
fau
S
.
2
.
T
.
S
T
)
Mode > RADIUS
.
2
.
y
s
or
fau
e
.
P
Advanced Configuration
elect the type of algorithm, AES or
default selection is AE
WPA Shared Key
characters
Group Key Renewal Enter a Group Key Renewal period,
which instructs the Router how often it should change the
encryption keys. The default Group Key Renewal period is
600seconds
nter a WPA Shared Key of 8-63
AES. The
A2 Enterpris
his option features WPA2 used in coordination with a
RADIUS server. (This should only be used when a RADIUS
server is connected to the Router.
IMPORTANT: If you are using WEP encryption,
lways remember that each device in your
ireless network MUST use the same WEP
encryption method and encryption key, or else
our wireless network will not function properly.
WPA Algorithm WPA2 supports two encryption
ethods, TKIP and AES, with dynamic encryption keys.
elect the type of algorithm, AES or
e
lt selection is AE
RADIUS Server Address
RADIUS server
RADIUS Port Enter the port number of the RADIUS
server. The default value is
Shared Key Enter the key shared between the Router
nd the server
Key Renewal Timeout Enter a Key Renewal Timeout
eriod, which instructs the Router how often it should
change the encryption keys. The default Key Renewal
imeout period is
nter the IP Address of the
1
seconds
KIP+AES. The
RADIUS Server Address
RADIUS server
RADIUS Port Enter the port number of the RADIUS
server. The default value is
Shared Key Enter the key shared between the Router
nd the server
Default Transmit Key Select a Default Transmit Ke
(choose which Key to use). The default is
WEP Encryption
64 bits 10 hex digit
e
lt is
4 bits 10 hex digits
Passphrase
EP keys. Then click
Key 1-4
key(s) manually
you did not enter a Passphrase, enter the WEP
elect a level of WEP encryption,
nter a Passphrase to automatically generate
nter the IP Address of the
81
128 bits 26 hex digits. The
enerat
E
EP is a basic encryption method, which is not as secure
s WPA.
RADIU
his option features WEP used in coordination with a
RADIUS server. (This should only be used when a RADIUS
server is connected to the Router.
13
Chapter 3
Mode > WEP
s
s
o
s
lly
e
lly.
.
eless
eless
lte
.
Wireless MAC Filter
ess
ter
e
ect this
.
.
ess
t
screen. On this screen, you can list users, by MAC
eless Client
s
Add
Fil
t
l
.
gs
Th
d
.
Advanced Wireless Settings
Advanced Configuration
Default Transmit Key Select a Default Transmit Key
(choose which Key to use). The default is
WEP Encryption
10 hex digit
64 bits 10 hex digit
Passphrase
EP keys. Then click
elect a level of WEP encryption,
r
28 bits 26 hex digits The default is
nter a Passphrase to automatica
enerat
it
generate
Permit Only
Address. This button is not selected by default
Edit MAC Filter List
ilter Lis
ress, to whom you wish to provide or block access. For
easy reference, click Wir
of network users by MAC Addres
elect this to allow wireless access by MAC
lick this to open the MAC Addr
MAC List to display a list
Key 1-4
ey(s) manua
lick
hangesto cancel your changes
Wir
Wireless access can be filtered by using the MAC addresses of
the wireless devices transmitting within your network’s radius
Wirel
f you did not enter a Passphrase, enter the WEP
ave Settingsto apply your changes, or click Cancel
> Wir
MAC Fi
>
r
MAC Fil
ress
ter Lis
Clickave Settingsto apply your changes, or click Cance
hangesto cancel your changes
Wireless > Advanced Wireless Settin
is Wireless > Advanced Wireless Settings screen is use
to set up the Router’s advanced wireless functions. These
settings should only be adjusted by an expert administrator
s incorrect settings can reduce wireless performance
Wireless MAC Filter
ither permitting or blocking access, click Enable If you do
not wish to filter users by MAC Address, keep the default
etting, Disabl
Prevent
Address. This button is selected by default
l
To filter wireless users by MAC Address,
o block wireless access by MAC
>
14
Chapter 3
s
fau
.
fault
.
lly
fau
o
ly
.
ble
ble
fau
alu
.
g
oadca
y
T
fau
6
ll
T
f
by default.
o
.
.
ll
The
screen is used to configure a firewall
.
l
Advanced Configuration
Advanced Wireles
Authentication Type The de
llows either Open System or Shared Key authentication
o be used. With
nd the recipient do NOT use a WEP key for authentication.
ith Shared Key authentication, the sender and recipient
se a WEP key for authentication
Basic Rate The Basic Rate setting is not actually one rate
of transmission but a series of rates at which the Router
can transmit. The Router will advertise its Basic Rate to the
other wireless devices in your network, so they know which
ates will be used. The Router will also advertise that it will
utomatically select the best rate for transmission. The
default setting is De
t all standard wireless rates (1-2Mbps, 5.5Mbps, 11Mbps,
8Mbps, and 24Mbps). Other options are
se with older wireless technology, and
Router can transmit at all wireless rates. The Basic Rate
s not the actual rate of data transmission. If you want to
specify the Router’s rate of data transmission, configure
the Transmission Rate setting
Transmission Rate The rate of data transmission should
e set depending on the speed of your wireless network.
You can select from a range of transmission speeds, or you
can select
astest possible data rate and enable the Auto-Fallback
eature. Auto-Fallback will negotiate the best possible
connection speed between the Router and a wireless
client. The de
Mode should remain disabled unless you are having severe
roblems with your Wireless-G products not being able
to transmit to the Router in an environment with heavy
802.11b traffic. This function boosts the Router’s ability
to catch all Wireless-G transmissions but will severe
decrease performance
Frame Burst Enabling this option should provide your
etwork with greater performance, depending on the
anufacturer of your wireless products. To turn on the
Frame Burst option, select Ena
pen Systemauthentication, the sender
, when the Router can transmit
utoto have the Router automatica
lt value is
lt is set toAuto, which
-2Mbps for
when the
t
. The default is
use the
isa
hear the beacons and awaken to receive the br
nd multicast messages. The default value is
Fragmentation Threshold This value specifies the
aximum size for a packet before data is fragmented
nto multiple packets. If you experience a high packet
error rate,
hreshold. Setting the Fragmentation Threshold too low
ay result in poor network performance. Only minor
eduction of the de
cases, it should remain at its default value of
RTS Threshold
low, only minor reduction of the default value, 2347, is
ecommended. If a network packet is smaller than the
reset RTS threshold size, the RTS/CTS mechanism wi
ot be enabled. The Router sends Request to Send (RTS)
rames to a particular receiving station and negotiates
the sending of a data frame. After receiving an RTS, the
wireless station responds with a Clear to Send (CTS) frame
to acknowledge the right to begin transmission. The RTS
hreshold value should remain at its default value of
47
AP Isolation This isolates all wireless clients and wireless
devices on your network from each other. Wireless devices
will be able to communicate with the Router but not with
each other. To use this function, select
turned Of
SecureEasySetupThis feature allows you to enable or
disable the SecureEasySetup feature. Select Disabled t
disable the feature and turn off the button’s light. The
eature is Enabledby default
lick
hanges to cancel your changes
ou may slightly increase the Fragmentation
lt value is recommended. In most
4
ould you encounter inconsistent data
AP Isolation is
ave Settingsto apply your changes, or click Cancel
ecurity > Firewa
that can filter out various types of unwanted traffic on the
Router’s local network
st
Beacon IntervalThe de
etween 1 and 65,535 milliseconds. The Beacon Interval
alue indicates the frequency interval of the beacon. A
eacon is a packet broadcast by the Router to synchronize
the wireless network
DTIM Interval This value, between 1 and 255, indicates
the interval of the Delivery Traffic Indication Message
(DTIM). A DTIM field is a countdown field informin
clients of the next window for listening to broadcast
and multicast messages. When the Router has buffered
roadcast or multicast messages for associated clients, it
ends the next DTIM with a DTIM Interval value. Its clients
lt value is
Enter a v
e
Security > Firewal
15
Chapter 3
l
ect
s
.
lte
.
T
.
.
h
The
.
VPN Passthrough
V
gh
hod used to
abl
l
.
The
Access Restrictions
ccess
.
Restrictions > Internet Access
s
ete
screen by
elete
o
Advanced Configuration
Firewal
Firewall Protection To use firewall protection, keep the
default selection, Enable. To turn off firewall protection,
l
Disable
ock WAN Request
Block Anonymous Internet Requests This feature
kes it more difficult for outside users to work their
way into your network. This feature is selectedby default.
Deselect the feature to allow anonymous Internet
equests
Filter Multicast
transmissions to specific recipients at the same time. If
ulticasting is permitted, then the Router will allow IP
ulticast packets to be forwarded to the appropriate
computers. This feature is selected by default. Deselect
this feature to disable it
Filter Internet NAT Redirection This feature uses
ort forwarding to block access to local servers from
local networked computers. Select FiRedirection to filter Internet NAT redirection. This feature
s not selected by default
ulticasting allows for multiple
r Internet NAT
PPTP Passthrough
(PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. To allow PPTP tunnels to
ass through the Router, keep the default,
L2TP Passthrough Layer 2 Tunneling Protocol is the
et
Internet on the Layer 2 level. To allow L2TP tunnels to pass
through the Router, keep the default,
Clickave Settingsto apply your changes, or click Cance
hangesto cancel your changes
oint-to-Point Tunneling Protocol
en
e Point-to-Point sessions via the
nable
nable
Access Restrictions > Internet Access
to block or allow specific kinds of Internet usage and
traffic, such as Internet access, designated services, and
websites during specific days and times
> Internet A
screen allows you
Filter IDENT (Port 113)This feature keeps port 113 from
eing scanned by devices outside of your local network.
his feature is selected by default. Deselect this feature to
isable it
lick
ave Settingsto apply your changes, or click Cancel
angesto cancel your changes
ecurity > VPN Passthroug
Security > VPN Passthrough screen allows you to enable
VPN tunnels using IPSec, PPTP, or L2TP protocols to pass
hrough the Router’s firewall
>
PN Passthrou
IPSec Passthrough Internet Protocol Security (IPSec) is
suite of protocols used to implement secure exchange
of packets at the IP layer. To allow IPSec tunnels to pass
through the Router, keep the default,
nable
nternet Acces
Internet Access Policy Access can be managed by a
olicy. Use the settings on this screen to establish an
ccess policy (after Save Settings is clicked). Selecting a
olicy from the drop-down menu will display that policy’s
settings. To delete a policy, select that policy’s number
nd click
Policies can be deleted from the
selecting the policy or policies and clicking D
eturn to the Internet Access tab, click Close
l
. To view all the policies, click
ummary
T
16
Loading...
+ 39 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.