hit counter script
Linksys WRV54G User Manual
Linksys WRV54G User Manual

Linksys WRV54G User Manual

2.4ghz wireless-g vpn broadband router
Hide thumbs Also See for WRV54G:

Advertisement

®
A Division of Cisco Systems, Inc.
2.4
GHz
Wireless-G
54Mbps

User Guide

VPN Broadband Router
WIRELESS
WRV54G
Model No.

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WRV54G

  • Page 1: User Guide

    ® A Division of Cisco Systems, Inc. Wireless-G 54Mbps User Guide VPN Broadband Router WIRELESS WRV54G Model No.
  • Page 2 Wireless-G VPN Broadband Router Copyright and Trademarks Specifications are subject to change without notice. Instant Etherfast, Linksys, and the Linksys logo are registered trademarks of Linksys Group, Inc. Other brands and product names are trademarks or registered trademarks of their respective holders. Copyright © 2003 Linksys. All rights reserved.
  • Page 3: Table Of Contents

    Wireless-G VPN Broadband Router Table of Contents Chapter 1: Introduction Welcome 1 What’s in this Guide? Chapter 2: Planning your Wireless Network The Router’s Functions IP Addresses Why do I need a VPN? What is a VPN? Chapter 3: Getting to Know the Wireless-G VPN Broadband Router The Back Panel The Front Panel Chapter 4: Connecting the Wireless-G Broadband Router...
  • Page 4 Wireless-G VPN Broadband Router Frequently Asked Questions Appendix B: Wireless Security A Brief Overview What Are The Risks? Appendix C: Configuring IPSec between a Windows 2000 PC and the Router Introduction Environment How to Establish a Secure IPSec Tunnel Windows 98 or Me Instructions Windows 2000 or XP Instructions Appendix D: Finding the MAC Address and IP Address for Your Ethernet Adapter 84 Appendix E: SNMP Functions...
  • Page 5: Chapter 1: Introduction Welcome

    Internet. Configuration is a snap with the web browser-based configuration utility. With the Linksys Wireless-G Broadband VPN Router at the center of your home or office network, you can share a high-speed Internet connection, files, printers, and multi-player games with the flexibility, speed, and security...
  • Page 6: What's In This Guide

    Wireless-G Broadband VPN Router What’s in this Guide? This user guide covers the steps for setting up and using the Wireless-G VPN Broadband Router. • Chapter 1: Introduction This chapter describes the Wireless-G VPN Broadband Router applications and this User Guide. •...
  • Page 7 • Appendix K: Regulatory Information This appendix supplies the regulatory information regarding the Router. • Appendix L: Contact Information This appendix provides contact information for a variety of Linksys resources, including Technical Support. Chapter 1: Introduction What’s in this Guide?
  • Page 8: Chapter 2: Planning Your Wireless Network

    Wireless-G VPN Broadband Router Chapter 2: Planning your Wireless Network The Router’s Functions Simply put, a router is a network device that connects two networks together. In this instance, the Router connects your Local Area Network (LAN), or the group of PCs in your home or office, to the Internet.
  • Page 9: Why Do I Need A Vpn

    Wireless-G VPN Broadband Router If you use the Router to share your cable or DSL Internet connection, contact your ISP to find out if they have assigned a static IP address to your account. If so, you will need that static IP address when configuring the Router.
  • Page 10: What Is A Vpn

    Wireless-G VPN Broadband Router At this point, your data becomes open to hackers using a variety of methods to steal not only the data you are transmitting but also your network login and security data. Some of the most common methods are as follows: 1) MAC Address Spoofing Packets transmitted over a network, either your local network or the Internet, are preceded by a packet header.
  • Page 11 Wireless-G VPN Broadband Router a secure connection that, in effect, operates as if you were directly connected to your local network. Virtual Private Networking can be used to create secure networks linking a central office with branch offices, telecommuters, and/or professionals on the road (travelers can connect to a VPN Router using any computer with VPN client software that supports IPSec, such as SSH Sentinel.) There are two basic ways to create a VPN connection: •VPN Router to VPN Router...
  • Page 12 For additional information and instructions about creating your own VPN, please visit Linksys’s website at www.linksys.com or refer to “Appendix C: Configuring IPSec between a Windows 2000 or XP PC and the VPN Router.”...
  • Page 13: Chapter 3: Getting To Know The Wireless-G Vpn Broadband Router

    Password tab in the Router’s Web- Based Utility. With these, and many other, Linksys products, your networking options are limitless. Go to the Linksys website at www.linksys.com for more information about products that work with the Router.
  • Page 14: The Front Panel

    Wireless-G VPN Broadband Router The Front Panel The Router's LEDs, where information about network activity is displayed, are located on the front panel. Figure 3-2: Front Panel Power Green. The Power LED lights up when the Access Point is powered on. Red.
  • Page 15: Chapter 4: Connecting The Wireless-G Broadband Router

    Wireless-G VPN Broadband Router Chapter 4: Connecting the Wireless-G Broadband Router Overview The Router’s setup consists of more than simply plugging hardware together. You will have to configure your networked PCs to accept the IP addresses that the Router assigns them (if applicable), and you will also have to configure the Router with setting(s) provided by your Internet Service Provider (ISP).
  • Page 16: Wired Connection To A Pc

    Wired Connection to a PC Figure 4-1: Figure 4-2: Figure 4-3: NOTE: IYou should always plug the Router’s power adapter into a power strip with surge protection. NOTE: IYou should always change the SSID from its default, linksys, and enable WEP encryption.
  • Page 17 6. For initial access to the Router through a wireless connection, make sure the PC’s wireless adapter has its SSID set to linksys-g (the Router’s default setting), and its WEP encryption is disabled. After you have accessed the Router, you can change the Router and this PC’s adapter settings to match the your usual network settings.
  • Page 18: Chapter 5: Configuring The Pcs

    Wireless-G VPN Broadband Router Chapter 5: Configuring the PCs Overview The instructions in this chapter will help you configure each of your computers to be able to communicate with the Router. To do this, you need to configure your PC’s network settings to obtain an IP (or TCP/IP) address automatically, so your PC can function as a DHCP client.
  • Page 19: Configuring Windows 2000 Pcs

    Wireless-G VPN Broadband Router 4. Now click the Gateway tab, and verify that the Installed Gateway field is blank. Click the OK button. 5. Click the OK button again. Windows may ask you for the original Windows installation disk or additional files. Check for the files at c:\windows\options\cabs, or insert your Windows CD-ROM into your CD-ROM drive and check the correct file location, e.g., D:\win98, D:\win9x, etc.
  • Page 20: Configuring Windows Xp Pcs

    Wireless-G VPN Broadband Router Configuring Windows XP PCs The following instructions assume you are running Windows XP with the default interface. If you are using the Classic interface (where the icons and menus look like previous Windows versions), please follow the instructions for Windows 2000.
  • Page 21 Wireless-G VPN Broadband Router Figure 5-8: IP Address Chapter 5: Configuring the PCs Configuring Windows XP PCs...
  • Page 22: Chapter 6: Configuring The Router

    Wireless-G VPN Broadband Router Chapter 6: Configuring the Router Overview Use the Router’s web-based utility to configure the Router. This chapter will describe each web page in the Utility and each page’s key functions. The utility can be accessed via your web browser through use of a computer connected to the Router.
  • Page 23 Wireless-G VPN Broadband Router • Advanced Wireless Settings. On this screen you can access the Advanced Wireless features of Authentication Type, Basic Data Rates, Control Tx Rates, Beacon Interval, DTIM Interval, RTS Threshold, and Fragmentation Threshold. Security • Filter. To block specific users from Internet access, you can set up IP address, port, and MAC address filtering on the Filter screen.
  • Page 24: How To Access The Web-Based Utility

    Wireless-G VPN Broadband Router Status • Router. This screen provides status information about the Router. • Local Network. This provides status information about the local network. How to Access the Web-based Utility To access the web-based utility, launch Internet Explorer or Netscape Navigator, and enter the Router’s default IP address, 192.168.1.1, in the Address field.
  • Page 25 Wireless-G VPN Broadband Router Static (See Figure 6-3.) If you are required to use a permanent IP address to connect to the Internet, then select Static IP. • IP Address. This is the Router’s IP address, when seen from the WAN, or the Internet. Your ISP will provide you with the IP Address you need to specify here.
  • Page 26 Wireless-G VPN Broadband Router PPTP (See Figure 6-5.) Point to Point Tunneling Protocol (PPTP) is a service that applies to connections in Europe only (see Figure 6- • Internet IP Address. This is the Router’s IP address, when seen from the Internet. Your ISP will provide you with the IP Address you need to specify here.
  • Page 27 Wireless-G VPN Broadband Router 1200 to 1500 range. For most DSL users, it is recommended to use the value 1492. By default, MTU is set at 1500 when disabled. Network Setup • Gateway IP. The values for the Router’s Local IP Address and Subnet Mask are shown here. In most cases, keeping the default values will work.
  • Page 28 Wireless-G VPN Broadband Router The DDNS Tab The Router offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address. It is useful when you are hosting your own website, FTP server, or other server behind the Router.
  • Page 29 Wireless-G VPN Broadband Router MAC Address Clone Tab (See Figure 6-8.) The Router’s MAC address is a 12-digit code assigned to a unique piece of hardware for identification, like a social security number. If your ISP requires MAC address registration, find your adapter’s MAC address by following the instructions in “Appendix D: Finding the MAC Address and IP Address for Your Ethernet Adapter.”...
  • Page 30 Wireless-G VPN Broadband Router Static Routing If the Router is connected to more than one network, it may be necessary to set up a static route between them. A static route is a pre-determined pathway that network information must travel to reach a specific host or network.
  • Page 31: The Wireless Tab

    The SSID must be identical for all devices in the wireless network. It is case-sensitive and must not exceed 32 alphanumeric characters, which may be any keyboard character. For added security, Linksys recommends that you change the default SSID (linksys) to a unique name of your choice.
  • Page 32 WEP keys. It is case-sensitive and should not be longer than 16 alphanumeric characters. (This Passphrase function is compatible with Linksys wireless products only. If you want to communicate with non-Linksys wireless products, enter the WEP key manually on the non-Linksys wireless products.) After you enter the Passphrase, click the Generate button to create WEP keys.
  • Page 33 Wireless-G VPN Broadband Router Wireless Network Access (See Figure 6-14.) Wireless Network Access. If this function is enabled, only the computers on the list will be allowed access to the wireless network. To add a computer to the network, click the Permit to access button, and enter the MAC address in the fields.
  • Page 34 Wireless-G VPN Broadband Router Advanced Wireless Settings (See Figure 6-16.) On this screen you can access the Advanced Wireless features, including Authentication Type, Basic Data Rates, Control Tx Rates, Beacon Interval, DTIM Interval, RTS Threshold, and Fragmentation Threshold. • Authentication Type. The default is set to Auto, which allows either Open System or Shared Key authentication to be used.
  • Page 35: The Security Tab

    Wireless-G VPN Broadband Router The Security Tab Firewall When you click the Security tab, you will see the Firewall screen (see Figure 6-17). This screen contains Filters and Block WAN Requests. Filters block specific internal users from accessing the Internet and block anonymous Internet requests and/or multicasting.
  • Page 36 Wireless-G VPN Broadband Router Virtual Private Networking (VPN) is a security measure that basically creates a secure connection between two remote locations. This connection is very specific as far as its settings are concerned; this is what creates the security. The VPN screen, shown in Figure 6-18, allows you to configure your VPN settings to make your network more secure.
  • Page 37 Wireless-G VPN Broadband Router settings of the remote VPN device. Make sure that you have entered the IP Address correctly, or the connection cannot be made. Remember, this is NOT the IP Address of the local VPN Router, but the IP Address of the remote VPN Router or device with which you wish to communicate.
  • Page 38 Wireless-G VPN Broadband Router Advanced VPN Tunnel Setup From the Advance VPN Tunnel Setup screen, shown in Figure 6-19, you can adjust the settings for specific VPN tunnels. Phase 1 • Phase 1 is used to create a security association (SA), often called the IKE SA. After Phase 1 is completed, Phase 2 is used to create one or more IPSec SAs, which are then used to key IPSec sessions.
  • Page 39 Wireless-G VPN Broadband Router Other Options • Unauthorized IP Blocking. Click Enabled to block unauthorized IP addresses. Enter in the Rejects Number field to specify how many times IKE must fail before blocking that unauthorized IP address. Enter the length of time that you specify (in seconds) in the Block Period field.
  • Page 40: The Access Restrictions Tab

    WEP keys. It is case-sensitive and should not be longer than 16 alphanumeric characters. (This Passphrase function is compatible with Linksys wireless products only. If you want to communicate with non-Linksys wireless products, enter the WEP key manually on the non-Linksys wireless products.) After you enter the Passphrase, click the Generate button to create WEP keys.
  • Page 41 Wireless-G VPN Broadband Router 2. Click the Edit List button. This will open the List of PCs screen, shown in Figure 6-24. From this screen, you can enter the IP address or MAC address of any PC to which this policy will apply. You can even enter ranges of PCs by IP address.
  • Page 42: The Applications And Gaming Tab

    Wireless-G VPN Broadband Router The Applications and Gaming Tab Port Range Forwarding The Port Forwarding screen sets up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized Internet applications. (Specialized Internet applications are any applications that use Internet access to perform functions such as videoconferencing or online gaming.
  • Page 43 Wireless-G VPN Broadband Router When finished making your changes on this tab, click the Save Settings button to save these changes, or click the Cancel Changes button to undo your changes. UPnP Forwarding The UPnP screen displays preset application settings as well as options for customization of port services for other applications.
  • Page 44 Wireless-G VPN Broadband Router with little selectivity. All pending messages and attachments are downloaded at the same time. POP3 uses the SMTP messaging protocol. • NNTP (Network News Transfer Protocol) The protocol used to connect to Usenet groups on the Internet. Usenet newsreaders support the NNTP protocol.
  • Page 45 Wireless-G VPN Broadband Router The DMZ screen (see Figure 6-29) allows one local user to be exposed to the Internet for use of a special-purpose service such as Internet gaming and videoconferencing, through Software DMZ, or a user can use LAN Port 4 as a DMZ Port, through Hardware DMZ.
  • Page 46: The Administration Tab

    Wireless-G VPN Broadband Router The Administration Tab Management The Management screen, shown in Figure 6-30, allows you to change the Router’s access settings as well as configure the SNMP and UPnP (Universal Plug and Play) features. Router Password Local Router Access. To ensure the Router’s security, you will be asked for your password when you access the Router’s Web-based Utility.
  • Page 47 Wireless-G VPN Broadband Router • SNMP Trap-Destination. Enter the IP Address. UPnP UPnP allows Windows XP to automatically configure the Router for various Internet applications, such as gaming and videoconferencing. To enable UPnP, click Enabled. • Allow User to make Configuration Changes. When enabled, this feature allows you to make manual changes while still using the UPnP feature.
  • Page 48 Wireless-G VPN Broadband Router Notification Qeue Length • Log queue Length. Enter the number of entries in the log queue in the field. • Log Time Threshold. Enter the time for the threshold in the field. Alert Log Select the type of attacks that you want to be alerted to. Select Syn Flooding, IP Spoofing, Win Nuke, Ping of Death, or Unauthorized Login attempt.
  • Page 49 (See Figure 6-34.) To upgrade the Router’s firmware: 1. Click the Browse button to find the firmware upgrade file that you downloaded from the Linksys website and then extracted. 2. Double-click the firmware file you downloaded and extracted. Click the Upgrade button, and follow the instructions there.
  • Page 50: Status

    Wireless-G VPN Broadband Router Status Router This screen displays information about your Router and its WAN (Internet) Connections. (See Figure 6-35.) Information The information displayed is the Hardware Version, Software Version, MAC Address, Local MAC Address, and System Up Time. WAN Connections The WAN Connections displayed are the Network Access, WAN IP Address, Subnet Mask, Default Gateway, and DNS.
  • Page 51 Wireless-G VPN Broadband Router Local Network The Local Network information that is displayed is the IP Address, Subnet Mask, DHCP Server, and DHCP Client Lease Info. To view the DHCP Clients Table, click the DHCP Clients button. See Figure 6-36. The DHCP Active IP Table, Figure 6-37, displays the computer name, IP Address, MAC Address and the expiration time.
  • Page 52 Wireless-G VPN Broadband Router Wireless The Wireless Network information that is displayed is the MAC Address, Mode, SSID, Channel, and Encryption Function. (See Figure 6-38.) Click the Refresh button if you want to Refresh your screen. System Performance The System Peformance information that is displayed is the Wireless, Internet, and/or LAN information for the IP Address, MAC Address, Connection Status, Packets Received, Packets Sent, Bytes Received, Bytes Sent, Error Packes Received, and Dropped Packets Received.
  • Page 53: Appendix A:troubleshooting

    Provided are possible solutions to problems that may occur during the installation and operation of the Router. Read the descriptions below to help you solve your problems. If you can’t find an answer here, check the Linksys website at www.linksys.com.
  • Page 54 Wireless-G VPN Broadband Router 7. Toward the bottom of the window, select Use the following DNS server addresses, and enter the Preferred DNS server and Alternative DNS server (provided by your ISP). Contact your ISP or go on its website to find the information. 8.
  • Page 55 Wireless-G VPN Broadband Router For Windows 98 and Me: • Click Start and Run. In the Open field, type in command. Press the Enter key or click the OK button. For Windows NT, 2000, and XP: • Click Start and Run. In the Open field, type cmd. Press the Enter key or click the OK button. In the command prompt, type ping 192.168.1.1 and press the Enter key.
  • Page 56 Refer to “Problem #7, I need to set up online game hosting or use other Internet applications” for details. • Check the Linksys website for more information at www.linksys.com. 6. I need to set up a server behind my Router and make it available to the public.
  • Page 57 Wireless-G VPN Broadband Router 2. Enter any name you want to use for the Customized Application. 3. Enter the External Port range of the service you are using. For example, if you have a web server, you would enter the range 80 to 80. 4.
  • Page 58 Wireless-G VPN Broadband Router Customized External Port Application 7777 to 27900 Halflife 27015 to 27015 PC Anywhere5631 to 5631 VPN IPSEC 500 to 500 When you have completed the configuration, click the Save Settings button. 8. I can’t get the Internet game, server, or application to work. If you are having difficulties getting any Internet game, server, or application to function properly, consider exposing one PC to the Internet using DeMilitarized Zone (DMZ) hosting.
  • Page 59 Router to the factory default settings. In other words, the Router will revert to its original factory configuration. 12. I need to upgrade the firmware. In order to upgrade the firmware with the latest features, you need to go to the Linksys website and download the latest firmware at www.linksys.com. • Follow these steps: 1.
  • Page 60 Wireless-G VPN Broadband Router 14. My DSL service’s PPPoE is always disconnecting. PPPoE is not actually a dedicated or always-on connection. The DSL ISP can disconnect the service after a period of inactivity, just like a normal phone dial-up connection to the Internet. •...
  • Page 61: Frequently Asked Questions

    Wireless-G VPN Broadband Router 17. When I enter a URL or IP address, I get a time-out error or am prompted to retry. • Check if other PCs work. If they do, ensure that your workstation’s IP settings are correct (IP Address, Subnet Mask, Default Gateway, and DNS).
  • Page 62 Does the Router support any operating system other than Windows 95, Windows 98SE, Windows Millennium, Windows 2000, or Windows XP? Yes, but Linksys does not, at this time, provide technical support for setup, configuration or troubleshooting of any non-Windows operating systems.
  • Page 63 How will I be notified of new Router firmware upgrades? All Linksys firmware upgrades are posted on the Linksys website at www.linksys.com, where they can be downloaded for free. To upgrade the Router’s firmware, use the System tab of the Router’s web-based utility. If the Router’s Internet connection is working well, there is no need to download a newer firmware version, unless...
  • Page 64 Wireless-G VPN Broadband Router Does the Router pass PPTP packets or actively route PPTP sessions? The Router allows PPTP packets to pass through. Is the Router cross-platform compatible? Any platform that supports Ethernet and TCP/IP is compatible with the Router. How many ports can be simultaneously forwarded? Theoretically, the Router can establish 520 sessions at the same time, but you can only forward 10 ranges of ports.
  • Page 65 Wireless-G VPN Broadband Router • Automatic Rate Selection • RTS/CTS feature • Fragmentation • Power Management What is ad-hoc mode? When a wireless network is set to ad-hoc mode, the wireless-equipped computers are configured to communicate directly with each other. The ad-hoc wireless network will not communicate with any wired network.
  • Page 66 Wireless-G VPN Broadband Router What is Spread Spectrum? Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communications systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade-off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast.
  • Page 67 How many channels/frequencies are available with the Router? There are eleven available channels, ranging from 1 to 11 (in North America). If your questions are not addressed here, refer to the Linksys website, www.linksys.com. Appendix A: Troubleshooting Frequently Asked Questions...
  • Page 68: Appendix B: Wireless Security

    Wireless-G VPN Broadband Router Appendix B: Wireless Security A Brief Overview Whenever data - in the form of files, emails, or messages - is transmitted over your wireless network, it is open to attacks. Wireless networking is inherently risky because it broadcasts information on radio waves. Just like signals from your cellular or cordless phone can be intercepted, signals from your wireless network can also be compromised.
  • Page 69 Wireless-G VPN Broadband Router But even WEP has its problems. WEP's encryption algorithm is referred to as "simple", which also means "weak", because the technology that scrambles the wireless signal isn't too hard to crack for a persistent hacker. There are five common ways that hackers can break into your network and steal your bandwidth as well as your data.
  • Page 70 Wireless-G VPN Broadband Router Active Attacks Hackers use Active Attacks for three purposes: 1) stealing data, 2) using your network, and 3) modifying your network so it's easier to hack in the next time. In an Active Attack, the hacker has gained access to all of your network settings (SSID, WEP keys, etc.) and is in your network.
  • Page 71 Wireless-G VPN Broadband Router examples below, your implementation and administration of network security measures is the key to maximizing wireless security. No preventative measure will guarantee network security but it will make it more difficult for someone to hack into your network. Often, hackers are looking for an easy target. Making your network less attractive to hackers, by making it harder for them to get in, will make them look elsewhere.
  • Page 72 So don't broadcast the SSID. A default SSID is set on your wireless devices by the factory. (The Linksys default SSID is "linksys".) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.
  • Page 73 Wireless-G VPN Broadband Router not completely secure. One piece of information still not encrypted is the MAC address, which hackers can use to break into a network by spoofing (or faking) the MAC address. Programs exist on the Internet that are designed to defeat WEP. The best known of these is AirSnort. In about a day, AirSnort can analyze enough of the wireless transmissions to crack the WEP key.
  • Page 74 If you wish to use a WEP Passphrase, it can be a maximum of 16 alphanumeric characters. This passphrase may not work with non-Linksys products due to possible incompatibility with other vendors' passphrase generators. The WEP Key can be generated using your Passphrase or you can enter it manually.
  • Page 75: Appendix C: Configuring Ipsec Between A Windows 2000 Pc And The Router

    Wireless-G VPN Boradband Router Appendix C: Configuring IPSec between a Windows 2000 PC and the Router Introduction This document demonstrates how to establish a secure IPSec tunnel using preshared keys to join a private network inside the VPN Router and a Windows 2000 or XP PC. You can find detailed information on configuring the Windows 2000 server at the Microsoft website: Microsoft KB Q252735 - How to Configure IPSec Tunneling in Windows 2000 http://support.microsoft.com/support/kb/articles/Q252/7/35.asp...
  • Page 76: How To Establish A Secure Ipsec Tunnel

    Wireless-G VPN Boradband Router How to Establish a Secure IPSec Tunnel Step 1: Create an IPSec Policy 1. Click the Start button, select Run, and type secpol.msc in the Open field. The Local Security Setting screen will appear as shown in Figure C-1. 2.
  • Page 77 Wireless-G VPN Boradband Router 3. The IP Filter List screen should appear, as shown in Figure C-4. Enter an appropriate name, such as win- >router, for the filter list, and de-select the Use Add Wizard check box. Then, click the Add button. 4.
  • Page 78 Wireless-G VPN Boradband Router 8. The IP Filter List screen should appear, as shown in Figure C-7. Enter an appropriate name, such as router- >win for the filter list, and de-select the Use Add Wizard check box. Click the Add button. 9.
  • Page 79 Wireless-G VPN Boradband Router Step 3: Configure Individual Tunnel Rules Tunnel 1: win->router 1. From the IP Filter List tab, shown in Figure C-10, click the filter list win->router. 2. Click the Filter Action tab (as in Figure C-11), and click the filter action Require Security radio button. Then, click the Edit button.
  • Page 80 Wireless-G VPN Boradband Router 4. Select the Authentication Methods tab, shown in Figure C-13, and click the Edit button. 5. Change the authentication method to Use this string to protect the key exchange (preshared key), as shown in Figure C-14, and enter the preshared key string, such as XYZ12345. Click the OK button. 6.
  • Page 81 Wireless-G VPN Boradband Router 7. Select the Tunnel Setting tab, shown in Figure C-16, and click The tunnel endpoint is specified by this IP Address radio button. Then, enter the Router’s WAN IP Address. 8. Select the Connection Type tab, as shown in Figure C-17, and click All network connections. Then, click the OK or Close button to finish this rule.
  • Page 82 Wireless-G VPN Boradband Router 10. Go to the IP Filter List tab, and click the filter list router->win, as shown in Figure C-19. 11. Click the Filter Action tab, and select the filter action Require Security, as shown in Figure C-20. Then, click the Edit button.
  • Page 83 Wireless-G VPN Boradband Router 13. Change the authentication method to Use this string to protect the key exchange (preshared key), and enter the preshared key string, such as XYZ12345, as shown in Figure C-22. (This is a sample key string. Yours should be a key that is unique but easy to remember.) Then click the OK button.
  • Page 84 Wireless-G VPN Boradband Router 16. Click the Connection Type tab, shown in Figure C-25, and select All network connections. Then click the OK (for Windows XP) or Close (for Windows 2000) button to finish. 17. From the Rules tab, shown in Figure C-26, click the OK button to return to the secpol screen. Step 4: Assign New IPSec Policy In the IP Security Policies on Local Computer window, shown in Figure C-27, right-click the policy named Figure C-25: Connection Type...
  • Page 85 Wireless-G VPN Boradband Router Step 5: Create a Tunnel Through the Web-Based Utility 1. Open your web browser, and enter 192.168.1.1 in the Address field. Press the Enter key. 2. When the User name and Password field appears, enter the default the user name and password admin. Press the Enter key.
  • Page 86: Windows 98 Or Me Instructions

    Wireless-G Broadband Router Appendix D: Finding the MAC Address and IP Address for Your Ethernet Adapter This section describes how to find the MAC address for your computer’s Ethernet adapter so you can use the MAC filtering and/or MAC address cloning feature of the Router. You can also find the IP address of your computer’s Ethernet adapter.
  • Page 87: Windows 2000 Or Xp Instructions

    Wireless-G Broadband Router Windows 2000 or XP Instructions 1. Click Start and Run. In the Open field, enter cmd. Press the Enter key or click the OK button. Note: The MAC address is also called the Physical Address. 2. At the command prompt, enter ipconfig /all. Then press the Enter key. 3.
  • Page 88: Appendix E: Snmp Functions

    Wireless-G VPN Broadband Router Appendix E: SNMP Functions SNMP (Simple Network Management Protocol) is a widely-used network monitoring and control protocol. Data is passed from a SNMP agent, such as the VPN Router, to the workstation console used to oversee the network. The Router then returns information contained in a MIB (Management Information Base), which is a data structure that defines what is obtainable from the device and what can be controlled (turned off, on, etc.).
  • Page 89: Appendix F: Upgrading Firmware

    The Router's firmware is upgraded through the Web-Utility's Firmware Upgrade tab from the Administration tab. Follow these instructions: 1. Click the Browse button to find the firmware upgrade file that you downloaded from the Linksys website and then extracted. 2. Double-click the firmware file you downloaded and extracted. Click the Upgrade button, and follow the instructions there.
  • Page 90: Appendix G: Windows Help

    Wireless-G VPN Broadband Router Appendix G: Windows Help All wireless products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix.
  • Page 91: Appendix H: Glossary

    Wireless-G VPN Broadband Router Appendix H: Glossary 802.11a - An IEEE wireless networking standard that specifies a maximum data transfer rate of 54Mbps and an operating frequency of 5GHz. 802.11b - An IEEE wireless networking standard that specifies a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GHz.
  • Page 92 Wireless-G VPN Broadband Router Buffer - A block of memory that temporarily holds data to be worked on later when a device is currently too busy to accept the data. Cable Modem - A device that connects a computer to the cable television network, which in turn connects to the Internet.
  • Page 93 Wireless-G VPN Broadband Router Dynamic IP Address - A temporary IP address assigned by a DHCP server. Encryption - Encoding data to prevent it from being read by unauthorized people. Ethernet - An IEEE standard network protocol that specifies how data is placed on and retrieved from a common transmission medium.
  • Page 94 Passphrase - Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products. Ping (Packet INternet Groper) - An Internet utility used to determine whether a particular IP address is online.
  • Page 95 Wireless-G VPN Broadband Router PPPoE (Point to Point Protocol over Ethernet) - A type of broadband connection that provides authentication (username and password) in addition to data transport. PPTP (Point-to-Point Tunneling Protocol) - A VPN protocol that allows the Point to Point Protocol (PPP) to be tunneled through an IP network.
  • Page 96 Wireless-G VPN Broadband Router TCP/IP (Transmission Control Protocol/Internet Protocol) - A network protocol for transmitting data that requires acknowledgement from the recipient of data sent. Telnet - A user command and TCP/IP protocol used for accessing remote PCs. TFTP (Trivial File Transfer Protocol) - A version of the TCP/IP FTP protocol that uses UDP and has no directory or password capability.
  • Page 97: Appendix I: Specifications

    Wireless-G VPN Broadband Router Appendix I: Specifications Standards IEEE 802.3, 802.11b and 802.11g Ports One Internet, Ethernet (1-4), Power Buttons One Reset Button, One Power Switch Cabling Type UTP CAT 5 or better Data Rate Up to 54Mbps Transmit Power 19dBm LEDs Power, Internet, Ethernet (1, 2, 3, 4), Wireless-G, DMZ...
  • Page 98 Wireless-G VPN Broadband Router Storage Humidity 5% to 90% Non-Condensing Appendix I: Specifications...
  • Page 99: Appendix J: Warranty Information

    Linksys product will be free of defects in materials and workmanship under normal use. Your exclusive remedy and Linksys's entire liability under this warranty will be for Linksys at its option to repair or replace the product or refund Your purchase price less any rebates.
  • Page 100: Appendix K: Regulatory Information

    Canadian regulations. EC DECLARATION OF CONFORMITY (EUROPE) Linksys Group declares that the Instant Wireless™ Series products included in the Instant Wireless™ Series conform to the specifications listed below, following the provisions of the EMC Directive 89/336/EEC and Low Voltage Directive 73/23/EEC: ETS 300-826, 301 489-1 General EMC requirements for Radio equipment.
  • Page 101 EY, direktiivin 89/336/EEC ja direktiivin 73/23/EEC oleellisten vaatimusten ja sitä koskevien näiden direktiivien muiden ehtojen mukainen. Linksys Group™ déclare que la carte PC Instant Wireless IEEE 802.11 est conforme aux conditions essentielles et aux dispositions relatives à la directive 1999/5/EC, la directive 89/336/EEC, et à la directive 73/23/EEC.
  • Page 102: Appendix L: Contact Information

    Can't find information about a product you want to buy on the web? Do you want to know more about networking with Linksys products? Give our advice line a call at: Or fax your request in to: If you experience problems with any Linksys product,...

Table of Contents