LINKSYS WRT54AG Wireless A/G Broadband Router User Manual WRT54AG ug Rev NC
LINKSYS LLC Wireless A/G Broadband Router WRT54AG ug Rev NC
LINKSYS >
Contents
- 1. Users Manual 1
- 2. Users Manual 2
- 3. Users Manual 3
- 4. Users Manual 4
Users Manual 2
Dual-Band Wireless A/G Broadband Router Wireless-G (802.11g) The 2.4GHz, 802.11g portion of the Setup screen, shown in Figure 6-9allows you to configure your 2.4GHz, Wireless-G wireless network settings. Figure 6-9 MAC Address This shows the Router’s wireless MAC address. Security This enables or disables WEP Encryption. An acronym for Wired Equivalent Privacy, WEP is an encryption method used to protect your wireless data communications. WEP uses a combination of 64-bit or 128-bit keys to provide access control to your network and encryption security for every data transmission. To decode a data transmission, each device in a network must use an identical 64-bit or 128-bit key. Higher encryption levels offer higher levels of security, but due to the complexity of the encryption, they may decrease network performance. To enable WEP, click the radio button beside Enable. Click the Edit Wireless Security button to configure the WEP keys for your 2.4GHz, Wireless-G network (see Figure 6-10). Check all the values, and click the Apply button to save your 2.4GHz, WirelessG settings. To cancel any changes you’ve entered on this page, click the Cancel button. To get more information about the features, click the Help button. Wireless-G (802.11g) Security Mode If you have Wireless-G and 802.11b devices in your network, then keep the default setting, Mixed. If you have only Wireless-G devices, select G-Only. If you do not have any Wireless-G and 802.11b devices in your network, select Disable. The 2.4GHz, 802.11b (WEP) screen, shown in Figure 6-10, allows you to configure your 2.4GHz, Wireless-G WEP settings. WEP encryption is recommended to increase the security of your wireless network. Channel Select the appropriate channel from the list provided to correspond with your network settings, between 36 and 64. All devices in your wireless network must use the same channel in order to function correctly. If you want the Router to automatically scan for a clear channel, then click the checkbox. SSID The SSID is the network name shared among all points in a wireless network. The SSID must be identical for all points in the wireless network. It is case-sensitive and must not exceed 32 characters (use any of the characters on the keyboard). Make sure this setting is the same for all points in your wireless network. For added security, you should change the default SSID (linksys-g) to a unique name. SSID Broadcast When wireless clients survey the local area for wireless networks to associate with, they will detect the SSID broadcast by the Router. To broadcast the Router's SSID, keep the default setting, Enable. If you do not want to broadcast the Router's SSID, then select Disable. Figure 6-10 34 35 Dual-Band Wireless A/G Broadband Router Default Transmit Key Select which WEP key (1-4) will be used when the Router sends data. Make sure the receiver is using the same key. Security WEP Encryption Keys 1-4 offer 64-bit or 128-bit encryption; select the type of encryption you want from the drop-down box. To disable WEP Encryption, select Disable. The Security screen, shown in Figure 6-11, allows you to change the Router’s security settings. You should change the factory default password, which is admin, to your own as soon as possible. All users who try to access the Router’s web-based utility or Setup Wizard will be prompted for the Router’s password. Passphrase Instead of manually entering WEP keys, you can enter a Passphrase. This Passphrase is used to generate one or more WEP keys. It is case-sensitive and should not be longer than 16 alphanumeric characters. This Passphrase function is compatible with Linksys wireless products only. [If you want to communicate with non-Linksys wireless products, enter the WEP key(s) manually on the non-Linksys wireless products.] After you enter the Passphrase, click the Generate button to create WEP keys. Keys 1-4 WEP keys enable you to create an encryption scheme for wireless LAN transmissions. Manually enter a set of values. (Do not leave a key field blank, and do not enter all zeroes. These are not valid key values.) Keys 1-4 offer 64-bit or 128-bit encryption. If you are using 64-bit WEP encryption, then the key must be exactly 10 hexadecimal characters in length. If you are using 128-bit WEP encryption, then the key must be exactly 26 hexadecimal characters in length. Valid hexadecimal characters are “0”-“9” and “A”-“F”. Check all the values, and click the Apply button to save your 2.4GHz, WirelessG WEP settings. To apply any of the settings you change on this page, click the Apply button. To cancel any changes you’ve entered on this page, click the Cancel button. To get more information about the features, click the Help button. Note: All Wireless devices in your network must use the same Passphrase or WEP key. Figure 6-11 Router Password The new Password must not exceed 32 characters in length and must not include any spaces. Enter the new Password in the second field to confirm it. VPN Pass-Through Virtual Private Networking (VPN) is typically used for work-related networking. For VPN tunnels, the Router supports IPSec PassThrough and PPTP Pass-Through. IPSec - Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, IPSec Pass-Through is enabled by default. To disable IPSec Pass-Through, uncheck the box next to IPSec. L2TP - Layer Two Tunneling Protocol is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by to enable the operation of a virtual private network (VPN) over the Internet. 36 37 Dual-Band Wireless A/G Broadband Router PPTP - Point-to-Point Tunneling Protocol is the method used to enable VPN sessions to a Windows NT 4.0 or 2000 server. To allow PPTP tunnels to pass through the Router, PPTP Pass-Through is enabled by default. To disable PPTP Pass-Through, uncheck the box next to PPTP. Web Filters Using the Web Filters feature, you may enable up to four specific filtering methods. Block Proxy - Use of WAN proxy servers may compromise the Router's security. Denying Proxy will disable access to any WAN proxy servers. To enable proxy filtering, click the Block Proxy box. Block WAN Request By enabling the Block WAN Request feature, you can prevent your network from being “pinged,” or detected, by other Internet users. The Block WAN Request feature also reinforces your network security by hiding your network ports. Both functions of the Block WAN Request feature make it more difficult for outside users to work their way into your network. This feature is enabled by default. Select Disable to disable this feature. To save your changes on this page, click the Apply button. To cancel any unsaved changes on this page, click the Cancel button. To get more information about the features, click the Help button. System Block Java - Java is a programming language for websites. If you deny Java, you run the risk of not having access to Internet sites created using this programming language. To enable Java filtering, click the Block Java box. Block ActiveX - ActiveX is a programming language for websites. If you deny ActiveX, you run the risk of not having access to Internet sites created using this programming language. To enable ActiveX filtering, click the Block ActiveX box. The System screen, shown in Figure 6-12, lets you control a variety of the Router’s general features, from restoring factory defaults to enabling its remote management capability. Restore Defaults Click the Yes button to reset all configuration settings to their default values, and then click the Apply button. Any settings you have saved will be lost when the default settings are restored. This feature is disabled by default. Block Cookies - A cookie is data stored on your PC and used by Internet sites when you interact with them. To enable cookie filtering, click the Block Cookies box. DMZ The DMZ hosting feature allows one local user to be exposed to the Internet for use of a special-purpose service such as Internet gaming or videoconferencing. DMZ hosting forwards all the ports at the same time to one PC. The Port Forwarding feature is more secure because it only opens the ports you want to have opened, while DMZ hosting opens all the ports of one computer, exposing the computer so the Internet can see it. Any PC whose port is being forwarded must have its DHCP client function disabled and should have a new static IP address assigned to it because its IP address may change when using the DHCP function. 1. To expose one PC, select Enable. 2. Enter the computer's IP address in the DMZ Host IP Address field. 3. Click the Apply button. Figure 6-12 38 39 Dual-Band Wireless A/G Broadband Router Firmware Upgrade New firmware versions are posted at www.linksys.com and can be downloaded for free. If the Router already works well, there’s no need to download a newer firmware version, unless that version has a new feature that you want to use. (To learn about any new firmware with new features, visit www.linksys.com.) Multicast Pass-Through IP Multicasting occurs when a single data transmission is sent to multiple recipients at the same time. Using the Multicast PassThrough feature, the Router allows IP multicast packets to be forwarded to the appropriate computers. Keep the default setting, Enable, to support the feature, or select Disable to disable it. Note: By upgrading the Router’s firmware, you may lose the Router’s configuration settings, so make sure you write down the Router’s settings before you upgrade its firmware. MAC Cloning You can clone the MAC address of your PC’s network adapter onto the Router. 1. Download the firmware upgrade file from www.linksys.com, and extract the file using a file archive utility such as WinZip. A MAC address is a 12-digit code assigned to a unique piece of hardware for identification. Some ISPs require that you register the MAC address of your PC’s network adapter, which was connected to your cable or DSL modem during installation. To avoid calling your ISP and changing the MAC address that is registered with the ISP, follow these instructions: 2. Click the Upgrade button. 1. Select Enable. 3. On the Upgrade Firmware screen (see Figure 6-13), click the Browse button to find the firmware upgrade file you extracted. 2. Enter your adapter’s MAC address in the MAC Address field. To upgrade the Router’s firmware: 3. To save your new settings, click the Apply button. To cancel your changes, click the Cancel button. To get more information about the features, click the Help button. To disable MAC address cloning, keep the default setting, Disable. If you do not know your adapter’s MAC address, follow these instructions: 1. Click the Start button, and select Run. 2. Enter command in the field provided, and press the OK button. 3. At the command prompt, enter ipconfig /all. Then press the Enter key. Figure 6-13 4. Write down your adapter’s physical address; this is the adapter’s MAC address. 4. Double-click the firmware upgrade file you extracted. 5. Click the Upgrade button, and follow the on-screen instructions. Important: When you are upgrading the firmware, do NOT turn off the Router, and do NOT press the Reset button. 40 Remote Management This feature allows you to manage your Router from a remote location, via the Internet. To disable this feature, keep the default setting, Disable. To enable this feature, select Enable, and use the specified port (default is 8080) on your PC to remotely manage the Router. You must also change the Router's default password to one of your own, if you haven’t already. A unique password will increase security. 41
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : No Encryption : Standard V1.2 (40-bit) User Access : Print, Copy, Fill forms, Extract, Assemble, Print high-res Modify Date : 2004:03:04 16:27:56+08:00 Create Date : 2004:03:04 16:27:31+08:00 Title : WRT54AG-ug-Rev_NC.qxd Author : klacelle Creator : PScript5.dll Version 5.2 Producer : Acrobat Distiller 5.0.5 (Windows) Page Count : 4 Mod Date : 2004:03:04 16:27:56+08:00 Creation Date : 2004:03:04 16:27:31+08:00 Metadata Date : 2004:03:04 16:27:56+08:00 Has XFA : NoEXIF Metadata provided by EXIF.tools