LINKSYS WRT330N Wireless-N Gigabit Gaming Router User Manual UserMan

LINKSYS LLC Wireless-N Gigabit Gaming Router UserMan

Manual Part3

Download: LINKSYS WRT330N Wireless-N Gigabit Gaming Router User Manual UserMan
Mirror Download [FCC.gov]LINKSYS WRT330N Wireless-N Gigabit Gaming Router User Manual UserMan
Document ID725764
Application IDHIMRTbV1R0lmg5c7DRoJGw==
Document DescriptionManual Part3
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize105.32kB (1316496 bits)
Date Submitted2006-11-08 00:00:00
Date Available2007-02-06 00:00:00
Creation Date2006-11-06 10:22:25
Producing SoftwarepdfFactory Pro 2.30 (Windows 2000 Professional Chinese)
Document Lastmod2006-11-06 10:23:50
Document TitleUserMan_.pdf
Document CreatorpdfFactory Pro www.pdffactory.com
Document Author: midoli

Follow nose steps to set DMZ hosting-
1 Access the Renter's Wehrboaed utility by going to http ”102100111“ the II" address ofthe Router.
Go to tie hpplitations t Gaming => Rm Range Forwarding ran.
2. Disable or remove the entries you have entered tor fonuarding. Keep this information in case you
want to use n a a later time.
3 Go m the Applications 5. Gaming => DMZ tab
4. Select Enabled next to DMZ. rorrhe tornputer you want exposed rothe intemet. specify iroy IP
address or Milt address. Ifyou use its IP address. select Destinatim IP Address. and enter its IP
address the Destination IPAddressfidd Ityot use its MAC address. select Destin ton Mite
Address, am enter its MAC address in the Destination MAC Address held. Please reter to vAppendix
E: Finding the MAC Adtress and IP Address for Vour Ethernet Adapter" tor details on getting an IP
address. It you afiignsd a static IP address ti: the computer. then you can click the DHcP
Reservation button onthe Basic Sew: screen to look up its static IP address.
5. Once completed With he configuration, clickthe Save Settings button.
9. ilorgot my password, or the password prompt always appears when tam saving settings to the
Router.
Reset the Router to Iactory denult by pressing the Reset bunon for five seconds and then releasing it. If you
are still getting prompted for a password what savrnu settings, then pertorrn the tollowmg steps:
1 Access the Renter's wehrbfrsed utility by going to httpiI/192 168.1.1 or the iP address of the Router.
Enter the detailt password admin, cm! clrok the Mmtntatrntion _-, Mnnugememlub.
2. Enter a ditterent password in the Rotter Passwordt‘ield, and enter me same password i1r'ie secmo
Iield to confirm the password.
3. Click the Save Settings button.
10. i am a PPPoE user, and I need to remove the pmtiy settings or the diai-up pop-up window.
It you have oroty settian. you need to disable these m your computer. Because the Router is the Gateway for
the Internet connection, the ctmputerdoes not need any proxy settings to gain access. Please tollow these
ctioris to verify that you do not have any Foxy settings and that the browser you use is set to connect
drrectlyto the LAN.
- For Microsofl Internet Explorer 5.0 or higier.
1. Click Start, Settings, rnd Control Patel. Double—click Internet Optbns.
Z. Clickthe connectionstab.
3. Clickthe LAN settings button and remove anything that is checked.
4. Click the 0K httton to go back to the preVious screen.
5. Click the option Neverdial a conneetion. This Will remove any dial—up pop—ups tor PPPoE users.
- For Netscape 4.7 oi higher
1. Start Netscape Navigrtor, am click Erit, Preterences, Advanced. and Proxies.
2 Make sure you have Drect connection to the Internet selected ontils screen.
J. Close all the Window: to ilhlah.
55
11, To gran over, I need to set the Router m Intury delaults
Ilold the Item button rornve seconds and then release it This will return the paamrd, lorwnrding. and
othersatings on the Roulertolhe taclory default setings. In otherwoids, the Routerwill revert to its original
lactory tohfigurauon.
12.1med to upgrade the firmware.
I1 orderlo upgrade the firmware with the latest teatuies, you need to go to the Linksys website and download
the latest firmware at iuww.lin prelerentze -> connections tah->,and check I am heh'nd a firewall
or proxy. Then set the firewall timeout to BO seconds in the firewall setting. The Internet usercan then send a file
to auserbmind the Router.
55
I set up an unreal Tnnmamni sen/er, hm nrlnrs on the Mill cannntjoirt llIIIrar it) I need in do?
Ifym have a dedlcoted Unreal tou—nornent server runnrng, you need to create o startle I‘fur eoen ol the LAM
corrputers rnd lorward ports 7777, 7778, 7779, i750, 7781, and 27900 to the IP address otthe servet Vou can
also use a port forwardlng range ol 7777 ~ 27900. Ilyou want to use the UT ServerAdmln, forward another part.
(Pol: 8030 usually works well but ls used lor remote adrrlln. Vou may have to dlsable this.) Then ln the
[UWeb.WehServer] sectionofthe sewerjni file, set the ListenPort to soon (to match the mapped port above) and
Serten‘iame to the IP assigned to the Router fron your IsP.
Carr mulfifle gamers an the LAN get on one game server and play simultaneously with just one public ”1
Mae’s?
It depends on whlch netwtrk game or what Klnd or game serveryllu are using. For example, unreal Tournament
supports mllltl—Iogln llrlth one pubic IP.
How do I mt Half-Life.- Inam Fortress m work with Ilte Runner?
The detaultcllerl port tor llalt-the ls 27005, Thecnmputers on your [AN heed to have “+cllentport Zloux"
added to the Ht shortcut command Ilne; the x world be E, 7, ll, and on up. Thls lets mlltlple computes connect
to rle same server. One prohlem:version1.0.1.6 won‘t let mutiple computers with the same CD key connect at
the sametlrrle, even ll on the same LAN (mta problem Wth1.0.1.3). Aslar as hostlng games, the HL serverdoes
not need to be lo the DMZ. Just forward port 27m 5 to the local IP address olthe server computer
Ihrw can I brook can-Warrrrr- downloads?
If ym are get corrupted tiles whenyou oownloada file Wll|1 your FTP client, try using another ITP program.
Ilre well page hangs; downloads are corrupt, or nothing or: junk characters are being displayed an the
screen. What do lneelitd do?
Foroe your Ethernet adapter to tolllhps or halfdlplex mode, and turn air the "Auto—negotiate” featureot your
Ethernet adimel as a temporary measure. lPlease look a the Network Control Panel inyorrr Ethernet adapters
Advanced Hopenies tab.) l/Iake stre that your proxy settlng ls dlsahleo lnthe browser. Check our webslte at
www.llnltsys.corn for more lnlormotlon.
ll all else lails l'rr lire installation, what canl do?
Reset the Router by holdlng down :he Reset button until the Power LED hilly turns on and olT. Reset your cable or
DSL modern by powerlng the unlt clfand then on.0htaln and Ilash the latest llrmware release that ls arallahleon
the trnksys we hslte, wwwllnksyscom.
How will I be nolilied or new Rainer limrware upgrades?
All Ijnltsys llrmware upgrades are posted an the Llnksys wehslte atwww.llnhsys.cun1,wnere they call be
downloadet tor lree. To upgrade the Reuters hrrrware, use the Admlnlstratlon- Flrmlllrare Upgrade tall ofthe
Router's wet-based utlllty. llthe Router’slntemel mnnectlon ls worklng well, there ls no needto download a
newer rinnwnre veroron, unless tlutverslon mnmno new lemme: that you would Ilhe to use. Downloadlng a
59
more currenl llelsion or Router firmware will not enhance the quality or speed at your Internet conrectlon, and
may dlnrupi your current oonneotlm atobilty.
Will the halter function W a Macintosh environment?
Yes, but the Routers setup pages are accesslble orly through Internet Btplorer 4.0 or Netscape Nalllgator 4.0 or
hlghertor Macintosh.
I an not able to net the lueb configuration screen for the Router. What can I do?
You may have to remove the proxy settlngs on your Internet browser, e.g., Netstape Nat/lgator or Internet
Explorer or remove the dlaI-up seltlngs on your browser. Check wlth your browser documentatlon, and make
sure thatyolr browser is set to co'lnect dlrectty and thatany mat-up ls dlsabtec. Make sure that your Drowsel ls
set to connect dlrectly andtlm any tlialrup ls dlsaoled. For Internet Explorer, cll:k Tools. InternetOptillns, and
then the Connectlorl tan Make sure that Internet Explorer ls set to Never dlal a connection For Netscape
Navgatorv dlck Edlt, Prefelences, Rdvmced, and Proxy. Make sure that Netscape Navlgator IS set to Drect
conneotlon to the Internet.
What is DIIIZ Hosting?
Derrllltanzod Zone (DMZ) allows one IP address (uomputerMo be exposed to the Internet. Some applltzllons
requlre multlple TCPIIP polls to be open. It ls lemrnmemeo that you set your oomputei Wlth a statlc P ltyou
wart to use DMI Hostlng. To get the LAN IP adorms, see "Appendlx E: Flnding me MAC Address and IP Address
rnr Your [tterrlel Adopter."
II DMZ Hosingis used, does the exposed user share the public IP with the Router?
No.
Does the Ruutev pass PFTP packets of actively mute PPIP sessions .7
The Router allows PPTP kaets k Dass throuoh.
I: the Ruukr cross-platform compatible?
Any platform that supports Ethernet a no lcP/IP IS compalhl e with the Router.
How many parts can be simultaneoushr IBM/"dad?
Theoreticallj, the Router can estatllsrl 520 sesslms at the same tlme, but lt can only Iorward ‘IO ranges oI ports.
What are the advanced leatures of the Route”
The Routers adlla nced Ieatllles inzlude aova ncec wireless settings, fillers, access reslricrion policiesl porl
forwardlng, advanced routngv and DDNS.
How do I mt mIRB to ”Mk with the Router?
Underthe Pan rorwordlngtub, set ponlorwurdlrg to 111 for the N: on whlch you are llamg mlRC.
Ran the Ram.— act a: my Dllcl'serlmr?
Yes. The Roller has DHCP server software built
Call I run an applicatiul from a remote computer over the wireless network?
Thiswill depend dn whether or not the application is designed to be used over I network. Consult the
appicalron's documenlatiun To determine if it supports operation over a nelwont.
What is the IEEE 302.115 standard?
It is one oftle IEEE standards for Wireless networts The 002.119 standard allows wireless networking hardware
from different manufacturers to communicate, pmvrded that the hardware complies With the 002.1 lg standard.
The 802.l lg standard slates a maximum data tra'lsfer rate of 54Mups am an operating frequency of1.4GHz.
What is Mn IEEE m2. 110 standard?
It is one of he IEEE standards for Wireless hetworrs The 002.11u standard allows wreless networking hardware
from different manufacturers to communicate. moulded that the hardware complies With the 002.1") standard.
The 802.l 1b standard slates a matimum dale transfer rate of 1 1Mhps am an operaling frequency ofMGHz.
What IEEE 902.11; [names aresupparfed?
The product supports the followrng IEEE 802.1 1 9 functions:
CSNNCA plus Acknowledge protoeni
- OFENI protocol
- Mulli—Channel Rualrling
- Automatic Rate Selection
RTSCCTS feature
- Fragmerltall'nn
- PuwerMan-‘lclemert
What IEEE 802.1117 leatms amsupparted?
The product supports the followrng ItEE 802.11bfunctions:
CSNA/CA plus Acknowledge protocol
- Mulli Channel Roaming
- Automatic Rate Selection
- RTSrCTS teature
Fragmentation
PDWSI’ Managemerl
What is ad-hoc mode?
When a Wireless network is set to ad-hoc mode. the wireess-equipped computers are configured til
corrmunlcute dlledly wlth each olher. The ud'hoc network wlII not communicate with any wired netwntk.
61
wrm is infrastructure nude?
when a Wireless network is set to nfrastruciure node. lh3 Wireless network is mnfigured to communicate with a
Wired network through a Wireless access point.
mm is morning?
Roaming isthe ability or a sortable computer to mmmuricale continuously Whie the userand computer are
mound lredythroughout an area preaterthanthat covered by a single access point Belore using the roamino
function. the workstation must mate sure that it s the same channel number With the access point oldedicaied
coverage area.
To a:l|eiie hie seamless connectivrly. the Wireless LAN inust incorporate a number of different functions. Each
node and atcess paint. forexampte. must always acknowledge receipt at each message. Each node must
maintain cmtact unth the ivireless network even when mt actually transmitting data. Achieving thesefunctims
simlltaneousty requires a dynamic RF networking technology that Iin ks access points and nodes. in slch a
system. the users end node undertakes a searchlorthe best possible access to the system. First. I evaluates
such factors as signal strength and quality. as well as the message load currenily being carried by each access
poirl and the distance or each access pointto thr- Wired Jackhone. Based onttet inlormation. the node next
selects the right access point and registers its adrlress. Communications between end node and host computer
can then betmnsmitted Lip and down the backbone
As the usermoves on. the end node's RF transmiiter regularly checks the system to determine Whether it is in
toudi with he original access point or whether itshould seek a new one. When a node no longer rece ves
acknowledgment horn its original access point. it undertakes a new search. Upon finding a new access point. it
then re—regsters, and the communication process comimes.
What is ISM band?
The FCC and their counterparts ouside ofthe [LS lave setaside banduiiidth forunlicensed use in the ISM
(Industrial, Scientific and Medicaliband. Spectrum in the vicintyofM GHz. in particular. is being made available
worldWide. This presents atruly revolutionary opportunity to place convenient high-speed Wireless capabilities in
the hands of users around the globe.
What is Spread Spectrum?
Spread Spectrum technology is a wmenahd ramotrequeiicy technique developed bythe military tor use in
reliable. secure. mission-ciitical communicationssysten‘s. It is designed to trade 0" ba ndwrdth efficiency lor
reliability. irtegrit’y. and security. Iii other Words, more bandwidth is consumed ihah in the case or mrmwband
trartsrnissio'i, but the trade-off produces a signal that is, n eflect. louder and thrs easierto detect. provided that
the receiver knows the parameters of the spread-spectrum signal being broadcast. It a receiver is nottuned to
the right freruency. a spretd-spearum signal looks like background nose There are two main alternztivg.
nrect Sequmce Spread Spectrum (osss) and Frequency napping Spread Speurum (ri isst.
Wine is uses:- wtrat i: 17:55? And what are their diflemmzes?
Frequencyrlloppi rig Spreac—Spectium tFHSS) uses a narrowband carrierthatchanges frequency in a pattern that
is knownto oothtransmitter and receiver. Propeny synchronized, the net effect is to maintain a single logical
channel. Toan unintended receive: fHSS appears to tie short-duration impulse miise. Direct-Sequence Spread-
Spectrum loses) generates a redundant hit pattern for each bit to be transmitted. This hit pattern is caiieti a chip
(or chipping code). The longer the chip, the greater the probability that the origiral data can be recovered. Even it
one or more hits in the chip are danaqed during transmission. statistical techni‘iues embedded in the radio can
recover theongihal data Without the need for retransmission. To an unintended receiver. DSSS appeais as low
powerwtdetiand noise and is rejected (ignored) by most 1armwhand receivers.
What is a now Address?
The Media Access Control MAC) address is a unique number assigned by the manufacturer to any Ethernet
netvmrkingdevice. such as a netviioik adapter,that allows the network to identily it atlhe hardware level. Forall
practical pirposes.this number is usually permanent. Unlike lP addresses. llllhlth can change every tiine a
conputei logs onto the network, the MAC address at a dewce stays the same. making it a valuable identitier hr
the network.
How do I reset the Room?
Press the Reset button on the luau panel for short five seconds. This Will resetthe Router to its default settirgs.
How do l resolve issues vvim siynal loss?
There is no ivay to knowtl‘e exact “ange of your wireless networlt Without testing. Every obstacle placed between
the Router and a Wireless PC wtll Lreate signal loss. Lead glass, metal, concrete floors. water and walls Will
inhibit the s'gnal and reduce range. Stanwith the Router and your wireless PC in the same room and move it
away in small increments to determine the maximum rarge in your enviohrnerl.
You may also try using different cl'annels. as this may elminate interference al‘ecting only one channel.
lliave excellent signal strength but I cannot see my network.
Wireless security is probably enat‘led on the Router, but not on yourwireless adapter (orVice versa]. Verify that
the same wreless security method and passphrasetkeysare being used on all devices olyourwtreless netwuk.
lam manychannels/rrequencies are available wim the Met?
Theie are eleven available channes. rangng lion 1 to 1T, in North America. There may be additional channels
avaiable inother regiars. sudjectio the regulations olynur region and/or country
ltyuirquesions are not addrexed here. relertotle linlsys website. inww.linlsys.com.
Appendix B: Wireless Security
Llnksys wants to make Wireless networking as safe and easy for you as possible. The currerl generation of
llnleys products provide several retwtlrk securiq features, but they require specific action on your pm for
implemernalnn. So, keep the follollling in mind whenever you are settirg up or uslng yourwireless network.
Security Precautions
The following is a complete list of security precautions to take (at least steps 1 :hrough 5 should be followedi
1. changethe default Wireless Network Name (SSID).
2. Disable SSID Broadcast.
3 Changethe default pasword for the Administrator amount
4. Enable MAC Address Fitering.
5. chanqethe SSID periodically.
6. Use the highest encryption algorithm possible Use PSK lflt is available. Please note that this may reduce your
network performance.
7. changeihe WEP encryption keys periodically.
Security “treats Facing Wireless Networks
Wireless rieiwtirks are easy to find Hackers know thnl in orderto pain zlwlreless nelulrnrk, Wireless nonworkirg
products firs isten for “beacon rressages" These messages can be easily decrypted and contain mien ofihe
network's informatlon, sum as the network's SSID (Servize Set Iiiernilier). Hereare the steps you can take:
Challoe the administrator's password reouiarly Viith every wireless networking device you use. keep in mlnli that
network sellngs (SSID, WEP keys,eic.) are stored in its firmware. Vour network ad mi strator ls the only person
who can orange network settings. Ifa hacker yes a mic oftne administrator'spassworo, he. too. can change
those settings. so. make it haraerfor a hackerloget that information. Change Irle aun'inlstrator's pasworo
regularly.
SSIII. There are several things to keep in mind aboul the SSID:
NOTE: Some ofihese secuity features are
availableonlyihioigh the network router or
access Dolm. Relertothe rouleruraecess Dninl’s
dbnimenraiiun for more lnlurmatlon.
1 DisaoIeBmadcast
2. vlakeitunique
3. Changeitolten
Most wireless networking deviceswul give you the option of broadcasting the SSID. While this option may be
more convenient, il allowsanyoneto log inlo your wireless nelwork. Th's includes hackers. So. don’t broadcafi
the ssto.
Wireless neworking products corre with a defaut 5le set bythe factory. (The linksys default 5le is Iinksys".l
l-hckers know these delatlts and can check these against your network. Change your SSID to something unique
and not something related In youreompany or the networking products you use.
Change yoil SSID regularly so that any hackers who have gained access to you wireless network will have to
start from the beginning inttying to break in.
MM Add resses. Enable MAI: Addess filtering. MAC Adcress filtering will allow you to provide access to only
those Wireless trodes With certain MAC Atiltesses. This makes it harder for a hacker to acce$ your network with
a random MAC Address.
vrzp Encrwtiolt Wired Equivalert Privacy (WEP) is olton looked upon as a cure-all Forwiroloss security
concerns. his is overstating WEPs ability. Again. this ca1 only provide enough security to make a hadtcr’syob
more difficult.
There are several ways that WEP can be maximized:
1. Use thehignest level olencryption possible
2. Use “Stored Key" autrertication
3. change yourWEP key regularly
PSK. Prershated Key (PSK] is the newest and hes available standard inWi—Fi security. Two modes are available:
PSKand Radius. PSK givesyou a matte at two encryption methods: TKIP (Temporal Key Integrity Prototol], whch
utilizes a stronger encryption method and incorporates Message Integrity CooetMICl tri proVide protemon
aganst hooters. and AES [Advanced Encryption System). which utilizes a symmetric 1ZH-Bit block data
encryptionRADiUS (Remote Authentication Dialrh user Service] utilizes a RADlJS server torauthentication.
IMPORTANT: Always remember that each device
in your Wireless nawork MUST use the same
security method ard key. or else yourwireless
network Will not [motion properly
PSK Ifyuu 1111 no! hzvaa RADIUS server, Salem the type of algnrithm, TKlP nr MES, and Anur a password i1
lhe anphrune field 010ch nhumtteu
RADlUS.WEP used in mominalim wim a RADIUS server. (This shnuld only m used when a RADIUS serveris
connected to the Route! or other device)
Implememmg encrypnon nay haw a negallve lnpact onynur network’s pellormance, but ll you are transmmmg
sensmve data over your netwnrk, encryplmn shalld be used.
These security recummennaliuns shnuld help keep your mind al ease while you are emoying [he most flexible
and cunvenanl lechnnlngy Linksys has to mm
Appendix B: Upgrading Firmware
The Rouler‘s filmwale IS upgrade: thrcu gh the Web-based Uullly's ADMINSTRATION lab Follow these
insuuclinns
. Download the firmware [mm L nksys's webshe at Wu/le‘nksysmm
. Exlracnhe fimware file onyourcumpuler.
3. Open the RfluIer’s Web-based JlIIily, and did. (he ADMINISTRATION lab
4. chckme HRMWARE LPr-RADE tan, and me FIRMWARE UPGRADEscreen will swear.
5. Emerthe bcatmn utthz firmware‘s fiIe, Urclitkthe Browse bultun 10 find the file.
6. Clwck UPGRADE, and dedWlhE on—screen instructiors.
F‘uule 0-1: Firmware Upgrade
67
Appendix I]: Windows Help
Almost all Iunksys Wireless produns require Mcnsalthdaws. Windows is the most used operating systemin
the world and comes with ‘nany features that rial) make networking easier. These lefltures can be accessed
through windows Help and are described in this appendix.
TCP/IP
Belcre a compuler can communicate With the Rouler. TCPIIP must be enabled. lCPllP is a set or instructions, or
protocol. aIIPCslollowlo (ornmuricate over a nawork. This 5 true lorwrreless networks as well. Your PCs will
not be able to utilize Wireless networking WithouthavingTCP/IPenabled. Windows Help provides complete
instructions on enabling T(P/IP.
Shared Resouoes
Ifym Wish to snare prirlels. lolde’, or files overyour network Windows Help provides complele IllSlILClIOlIS on
utilizmg shared resources.
Newark Neighborhood/My Network Places
Qher PCs on your nelworkwill apoearunder Network Neighborhood or My Network Places (depending upon lhe
vereon ofllliridows you‘re running. Windows Help provides complete instructions on adding PCs to your
network.
Appendix E: Finding the MAI: Address and IP Address for
Your Ethernet Adanter
Thissedlnndescrihes home find the MAC addressforymircnmputer’s Etherne: adaptersn you caniise the MAC
filtering and/Ur MAE address cluiiiiig «mine or tie Ruulei. run wan aiso find the IP address oryuur cuntputer's
Ethernet adamer. This IP address is used forms knurer’sfilieiing,iorularding, and/hr DMZ features F0||Wllh3
step in this appendix in iiiid the adapter; MAE in IP address in Windows zmnnr xv
Windows 2000 or XP Instructions
I. ciick Sun and Run Ilillie Dpeliflelu, enter um. Press the Eumr key ui ciicit the DK uunnn.
2. M the cummand prompt. erlei ipcontig (all. Then press me Enter key.
3. Write dnnn the Physiczl Address as shown on your ermpnter screen (Figure m]; it is the MAC address m
your Eihemeladupter. this fipyefirs as a series nf nnrrirers and ieners.
Tie MAC address/Physical Adcross is what you Will use lur MAC address cloning or MAC filterirg.
figure 5.1: IP canrignmim Screen
‘he example in Figure E—l shows the Ethernet adapter's IP address as 192.168.1100. Your carrpiLer may
zhow seiiietliiiig dirietunt.
| No“: he MAC address is also filled the Adaplerhddress.
For the Rouler's Web—based U y
wmsss MAC FILIER
To filler WlfllESS users by MAC Address, select ll! WIREIESS lull, (hen seled WIRELESS MAC FILTER. Use lhis
screen to Enable DI Disable me Wireless MAC Filler, Prevent ur Pelmilancess lc me wireless newvurkmiew the
MAC AfldIESS Filler List and access the Wireless Client List.
Far more in'hrmatian, refer to “thapr 5: Cuni|glr|ng the Wireless-N G|gabn Gaming Router."
I NOTE: The MAC address is also miled the Physical Address.
Figure E-Z: MAC Alums/Mame: Address
73
Nlac Cloning
To cone a Fc’s MAC Address, seleclrne SETUP ll'ab, men uliuk on MAC ADDRESS CLONE. You can Enable nr
Usable MAC Clunmg and enter the MAC Address 'eq|stered with your ISP w cro're.
For more |n'armztrun, refer to "Chap|e15:Cunl|glr|ngthu Wrmlnssru Glgablt Gamrng Router.”
Fuure 5-3: MAC Mass/Physical Address
71
ltnnemliit F: Glossary
Thts glossaty comatns serve bastc networktng letms you may come across when ustng thts product. For more
advanced terms, seethe complete Ltnksys glossary at htltp:llwww.|inksys com/glossary.
lioness Point - A device thatallovts wireless-equipped computers and otherdevrces to communicate witha
wired network. Also used to expand the range ota wireless network
M—noc , Agroup ofwtreless devtoes oommunicettng directly With each other (peer—to—peer) wttholtt he use or
an access point.
AES (Advanced Encryption Standad) — A security method that uses symmetric 128rbit block data encryption.
Bandwidlh- The transmtsstort capacity at n gwen detnce or network.
Bit - Abinary digit.
Boa - To start a devtce ant cause tt to start exemtrng trstrudtons.
Brnodband - An always-on, Vast Internet. ounnet‘ion.
Browser - Art appltcatmn program that pmvtdes I way to look at and tnternct With all the tnfonnatton on the
Wand WlfleWED.
Byte , A out at data that ts usually ctqht htts long
(Fable Modem , A device that conlebts a computer to the cable television network, which in turn mnmct: to the
Internet.
Daisy chain - A method ured to connect devioesin a series, one alter the other.
DDNS (Dynzmtc Domam Name System) — Allows the hosting ofa webstte, FTP sewer, tr e—matl serverwttha
fixed domatn name (e.g.. www.xyLeom) and a dy'tamr: IP address.
Default Gateway -A device that fi)rwa'ds Internet traffit from your local area retwork
DHCP (Dynzmio Host Configuration Protocol) , A networking protocol that allows administrators to assign
temporary IP addresses m network computers by "lensing” an n7 address to a userlora limited amount drone,
instead of asignrng permanent lPaddresses.
72
m1 (Demilirarized lone) Remotes the Rnurer's firewall prnretrion tram one PC, allowing it m be ”seen” trim
the internet
Ills (Doma n Name Sen/er) - me P address or your ISP's sen/eL whichrranslates the names otwebsnes into IP
addresses.
Domain - Aspecrfic nametora network ofcomptrlers.
Dlwmlnal‘l Tl) receive a lie llflllsllilled we! to rework.
DSLlDigitalSubscriher Line) — An always—on broadband tonnection over traditional phone lines.
Wmmir. IP Address - A temporay IP address assigned by a DHCP server.
ERPtExlensrhIe Arnhemrcatron Protocol) -A general authentrcatron protocol used to control network access.
Many specrlrc authentrcotron metmds work Witnrn thrs tramewom.
Encryption. Encoding data lransnitted in a network
Ethemel — lEEE standard networkpmtocol that speoifies how data is placed onand retrieved from a common
transrnrssro'r meurum.
Firewall , A set or related programs located at a 1ctworl gateway server that protects the resources oi a
network iron users from other networks.
Firmware , The programming code that mns a networking device.
FIP (File Trtnsier Protocoll - A prrtocol used to transfer liles over a TCFIIP network.
Full Duplex — The abrlity ola networking devrce n recerve and transmrt data srmultaneously.
Gateway , A devrce that rtterconrects networks wlh drflerent, rncompatrltle ccmmunrcatrons protncds.
Halt Duplex — Data transmissron that can occur r| two dr'cctrons over a srnglc line, but only one drmclron at a
time.
H1TP (Hypertext transpen Protocol) - The commuricfltiurvs protocol used to connect to servers on the World
Wide Welt.
Intrastnrcture - A wrreless network that is bridged to a rvrreo network vra an access pornt.
IP (htemet Protocol) , A protocol used to send data were network.
73
IP Address, The address used tuidentify a computer ordevice on a network
IPculIFIG —AWindows Zoo!) and xP utility that displays the l? address lora particularnetworking detice.
IPSec (Inteinet Protocol Secuntyl - A lIFN prolocol used to in'plernent secure exchange of packets at the IP layer.
ISP (Internet Service Provider) , A company that provides acoess to the Intemet.
LIIII- The mmputcrs and netwom'ng product: that make up your local networt.
MAC (Media Access control) Address - The unique address that a manufacturer assigns to each networking
deuice.
Mbps (MegBits PerSecoridl - One million hits persecond; a unit oI measurement Iordata transmiseon.
run'r metvvuknuuress ‘nansiaiiurn - NAT technology uamiates IP addresses or a local area iienvuriuu a uirleieril
IP address brtlre lnterrEt.
Network , A series or cunpulers or devices ennnectea forlhe purpose of data sharing. storage, and/or
transmissim between users.
Packet - A unit of data sent over a network.
Passphrase - Used much ike a password, a possphrase simplifies the WEP entryption process by automatically
generating the WEP encryption kevs Ior Linkeys products.
Ping (Packet INlerriet hover) - Ar Internet utility used to determine whether a particular IP address is online
POPS lPostOl’fice Protocol 3] , A standard mail EIIIEI commonly used onthe Internet.
Pan - The connection poirt on a computer or networking device used for pluggng in cables or adaptes.
Power overElhernet (PoE)- A technology enabling an Ethernet network cable to deliver omn data and power.
PPPoE (Poinlto Point Protocol over Ethemel) - Alype ofhroadband oonnection that pmvides authent’mtion
(usunamo and passweni) in additon to data dampen.
PPTP [PoinlstosPoint "lurlnellrlg Protocol) , R VPN protocol tl'ld allows the Polntto Point Protocol lPPPlto be
tunneled through an IP netrlork. This protocol is also used asa type of broadband connection In Europe.
RADIUS (Remote Authentitaiion Iial—In User Service) — A protocol that uses an authentication server to control
network access.
74

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : No
Encryption                      : Standard V2.3 (128-bit)
User Access                     : Print, Copy, Extract, Print high-res
XMP Toolkit                     : 3.1-702
Modify Date                     : 2006:11:06 10:23:50-08:00
Create Date                     : 2006:11:06 10:22:25-08:00
Metadata Date                   : 2006:11:06 10:23:50-08:00
Creator Tool                    : pdfFactory Pro www.pdffactory.com
Format                          : application/pdf
Title                           : UserMan_.pdf
Creator                         : midoli
Document ID                     : uuid:73015326-54e1-4986-ae75-8c6e6d0aaf75
Instance ID                     : uuid:64884215-6173-43d7-820e-04c3b322525e
Producer                        : pdfFactory Pro 2.30 (Windows 2000 Professional Chinese)
Has XFA                         : No
Page Count                      : 20
Author                          : midoli
EXIF Metadata provided by EXIF.tools
FCC ID Filing: Q87-WRT330N

Navigation menu