LINKSYS WRV210 Wireless-G VPN Router with RangeBooster User Manual Book

LINKSYS LLC Wireless-G VPN Router with RangeBooster Book

Contents

Manual 2

Download: LINKSYS WRV210 Wireless-G VPN Router with RangeBooster User Manual Book
Mirror Download [FCC.gov]LINKSYS WRV210 Wireless-G VPN Router with RangeBooster User Manual Book
Document ID856341
Application IDED0Irp84Jti9KozCSSeXYQ==
Document DescriptionManual 2
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize242.41kB (3030066 bits)
Date Submitted2007-10-18 00:00:00
Date Available2007-10-18 00:00:00
Creation Date2007-10-18 08:40:24
Producing SoftwareAcrobat Distiller 6.0 (Windows)
Document Lastmod2007-10-18 08:41:30
Document TitleBook Template.book
Document CreatorFrameMaker 7.0
Document Author: bewalter

Wireless-G VPN Router with RangeBooster
Windows 2000 or XP Instructions
1. Click Start and Run. In the Open field, enter cmd. Press the Enter key or click the OK button.
Note: The MAC address is also called the Physical Address.
2. At the command prompt, enter ipconfig /all. Then press the Enter key.
3. Write down the Physical Address as shown on your computer screen; it is the MAC address for your Ethernet
adapter. This appears as a series of numbers and letters.
The MAC address/Physical Address is what you will use for MAC address cloning or MAC filtering.
Figure F-3: MAC Address/Physical Address
On the MAC Address/Physical Address screen, the example shows the Ethernet adapter’s IP address as
192.168.1.100. Your computer may show something different.
Appendix F: Finding the MAC Address and IP Address for your Ethernet Adapter
Windows 2000 or XP Instructions
101
Wireless-G VPN Router with RangeBooster
Appendix G: SNMP Functions
SNMP (Simple Network Management Protocol) is a widely-used network monitoring and control protocol. Data is
passed from a SNMP agent, such as the VPN Router, to the workstation console used to oversee the network. The
Router then returns information contained in a MIB (Management Information Base), which is a data structure
that defines what is obtainable from the device and what can be controlled (turned off, on, etc.).
SNMP functions, such as statistics, configuration, and device information, are not available without third-party
Management Software. The Router is compatible with all HP Openview compliant software.
Appendix G: SNMP Functions
102
Wireless-G VPN Router with RangeBooster
Appendix H: Upgrading Firmware
You can use the Router’s Web-based Utility to upgrade the firmware; however, if you do so, you will lose the
settings you have configured on the Router. Before you upgrade its firmware, write down all of your custom
settings. After you upgrade its firmware, you will have to re-enter all of your configuration settings.
To upgrade the Router’s firmware, follow these instructions:
1. Download the Router’s firmware upgrade file from the Linksys website, www.linksys.com.
2. Extract the file on your computer.
3. Click the Administration tab and then the Firmware Upgrade tab of the Router’s Web-based Utility.
4. On the Upgrade Firmware screen, enter the location of the extracted firmware upgrade file, or click the
Browse button to find this file.
5. Click the Upgrade button, and follow the on-screen instructions.
Appendix H: Upgrading Firmware
Figure H-1: Upgrade Firmware
103
Wireless-G VPN Router with RangeBooster
Appendix I: Windows Help
Almost all wireless products require Microsoft Windows. Windows is the most used operating system in the world
and comes with many features that help make networking easier. These features can be accessed through
Windows Help and are described in this appendix.
TCP/IP
Before a computer can communicate with the Access Point, TCP/IP must be enabled. TCP/IP is a set of
instructions, or protocol, all PCs follow to communicate over a network. This is true for wireless networks as well.
Your PCs will not be able to utilize wireless networking without having TCP/IP enabled. Windows Help provides
complete instructions on enabling TCP/IP.
Shared Resources
If you wish to share printers, folder, or files over your network, Windows Help provides complete instructions on
utilizing shared resources.
Network Neighborhood/My Network Places
Other PCs on your network will appear under Network Neighborhood or My Network Places (depending upon the
version of Windows you're running). Windows Help provides complete instructions on adding PCs to your
network.
Appendix I: Windows Help
104
Wireless-G VPN Router with RangeBooster
Appendix J: Glossary
This glossary contains some basic networking terms you may come across when using this product. For more
advanced terms, see the complete Linksys glossary at http://www.linksys.com/glossary.
Access Point - A device that allows wireless-equipped computers and other devices to communicate with a
wired network. Also used to expand the range of a wireless network.
Ad-hoc - A group of wireless devices communicating directly with each other (peer-to-peer) without the use of
an access point.
AES (Advanced Encryption Standard) - A security method that uses symmetric 128-bit block data encryption.
Bandwidth - The transmission capacity of a given device or network.
Bit - A binary digit.
Boot - To start a device and cause it to start executing instructions.
Broadband - An always-on, fast Internet connection.
Browser - An application program that provides a way to look at and interact with all the information on the
World Wide Web.
Byte - A unit of data that is usually eight bits long.
Cable Modem - A device that connects a computer to the cable television network, which in turn connects to the
Internet.
Daisy Chain - A method used to connect devices in a series, one after the other.
DDNS (Dynamic Domain Name System) - Allows the hosting of a website, FTP server, or e-mail server with a
fixed domain name (e.g., www.xyz.com) and a dynamic IP address.
Default Gateway - A device that forwards Internet traffic from your local area network.
DHCP (Dynamic Host Configuration Protocol) - A networking protocol that allows administrators to assign
temporary IP addresses to network computers by “leasing” an IP address to a user for a limited amount of time,
instead of assigning permanent IP addresses.
Appendix J: Glossary
105
Wireless-G VPN Router with RangeBooster
DMZ (Demilitarized Zone) - Removes the Router's firewall protection from one PC, allowing it to be “seen” from
the Internet.
DNS (Domain Name Server) - The IP address of your ISP's server, which translates the names of websites into IP
addresses.
Domain - A specific name for a network of computers.
Download - To receive a file transmitted over a network.
DSL (Digital Subscriber Line) - An always-on broadband connection over traditional phone lines.
Dynamic IP Address - A temporary IP address assigned by a DHCP server.
EAP (Extensible Authentication Protocol) - A general authentication protocol used to control network access.
Many specific authentication methods work within this framework.
Encryption - Encoding data transmitted in a network.
Ethernet - IEEE standard network protocol that specifies how data is placed on and retrieved from a common
transmission medium.
Firewall - A set of related programs located at a network gateway server that protects the resources of a
network from users from other networks.
Firmware - The programming code that runs a networking device.
FTP (File Transfer Protocol) - A protocol used to transfer files over a TCP/IP network.
Full Duplex - The ability of a networking device to receive and transmit data simultaneously.
Gateway - A device that interconnects networks with different, incompatible communications protocols.
Half Duplex - Data transmission that can occur in two directions over a single line, but only one direction at a
time.
HTTP (HyperText Transport Protocol) - The communications protocol used to connect to servers on the World
Wide Web.
Infrastructure - A wireless network that is bridged to a wired network via an access point.
IP (Internet Protocol) - A protocol used to send data over a network.
Appendix J: Glossary
106
Wireless-G VPN Router with RangeBooster
IP Address - The address used to identify a computer or device on a network.
IPCONFIG - A Windows 2000 and XP utility that displays the IP address for a particular networking device.
IPSec (Internet Protocol Security) - A VPN protocol used to implement secure exchange of packets at the IP layer.
ISP (Internet Service Provider) - A company that provides access to the Internet.
LAN - The computers and networking products that make up your local network.
MAC (Media Access Control) Address - The unique address that a manufacturer assigns to each networking
device.
Mbps (MegaBits Per Second) - One million bits per second; a unit of measurement for data transmission.
NAT (Network Address Translation) - NAT technology translates IP addresses of a local area network to a different
IP address for the Internet.
Network - A series of computers or devices connected for the purpose of data sharing, storage, and/or
transmission between users.
Packet - A unit of data sent over a network.
Passphrase - Used much like a password, a passphrase simplifies the WEP encryption process by automatically
generating the WEP encryption keys for Linksys products.
Ping (Packet INternet Groper) - An Internet utility used to determine whether a particular IP address is online.
POP3 (Post Office Protocol 3) - A standard mail server commonly used on the Internet.
Port - The connection point on a computer or networking device used for plugging in cables or adapters.
Power over Ethernet (PoE) - A technology enabling an Ethernet network cable to deliver both data and power.
PPPoE (Point to Point Protocol over Ethernet) - A type of broadband connection that provides authentication
(username and password) in addition to data transport.
PPTP (Point-to-Point Tunneling Protocol) - A VPN protocol that allows the Point to Point Protocol (PPP) to be
tunneled through an IP network. This protocol is also used as a type of broadband connection in Europe.
RADIUS (Remote Authentication Dial-In User Service) - A protocol that uses an authentication server to control
network access.
Appendix J: Glossary
107
Wireless-G VPN Router with RangeBooster
RJ-45 (Registered Jack-45) - An Ethernet connector that holds up to eight wires.
Roaming - The ability to take a wireless device from one access point's range to another without losing the
connection.
Router - A networking device that connects multiple networks together.
Server - Any computer whose function in a network is to provide user access to files, printing, communications,
and other services.
SMTP (Simple Mail Transfer Protocol) - The standard e-mail protocol on the Internet.
SNMP (Simple Network Management Protocol) - A widely used network monitoring and control protocol.
SPI (Stateful Packet Inspection) Firewall - A technology that inspects incoming packets of information before
allowing them to enter the network.
SSID (Service Set IDentifier) - Your wireless network's name.
Static IP Address - A fixed address assigned to a computer or device that is connected to a network.
Static Routing - Forwarding data in a network via a fixed path.
Subnet Mask - An address code that determines the size of the network.
Switch - 1. A data switch that connects computing devices to host computers, allowing a large number of
devices to share a limited number of ports. 2. A device for making, breaking, or changing the connections in an
electrical circuit.
TCP (Transmission Control Protocol) - A network protocol for transmitting data that requires acknowledgement
from the recipient of data sent.
TCP/IP (Transmission Control Protocol/Internet Protocol) - A set of instructions PCs use to communicate over a
network.
Telnet - A user command and TCP/IP protocol used for accessing remote PCs.
TFTP (Trivial File Transfer Protocol) - A version of the TCP/IP FTP protocol that has no directory or password
capability.
Throughput - The amount of data moved successfully from one node to another in a given time period.
Appendix J: Glossary
108
Wireless-G VPN Router with RangeBooster
TKIP (Temporal Key Integrity Protocol) - a wireless encryption protocol that provides dynamic encryption keys for
each packet transmitted.
Topology - The physical layout of a network.
TX Rate - Transmission Rate.
Upgrade - To replace existing software or firmware with a newer version.
Upload - To transmit a file over a network.
URL (Uniform Resource Locator) - The address of a file located on the Internet.
VPN (Virtual Private Network) - A security measure to protect data as it leaves one network and goes to another
over the Internet.
WAN (Wide Area Network)- The Internet.
WEP (Wired Equivalent Privacy) - A method of encrypting network data transmitted on a wireless network for
greater security.
WLAN (Wireless Local Area Network) - A group of computers and associated devices that communicate with
each other wirelessly.
WPA (Wi-Fi Protected Access) - A wireless security protocol using TKIP (Temporal Key Integrity Protocol)
encryption, which can be used in conjunction with a RADIUS server.
Appendix J: Glossary
109
Wireless-G VPN Router with RangeBooster
Appendix K: Specifications
Standards
802.11b, 802.11g, 802.3, 802.3u, 801.1x
Ports
Internet, Ethernet (1-4), Power
Buttons
Reset
Cabling Type
UTP CAT 5 or better
LEDs
Power, DMZ, Internet, Wireless, Ethernet (1, 2, 3, 4), ,
Transmit Power
15
19 dBm
Security Features
WEP, WPA, WPA2
WEP Key Bits
64, 128
Dimensions
(W x H x D)
6.69" x 1.65" x 7.62"
(170 mm x 42 mm x 194 mm)
Unit Weight
12.52 oz. (0.355 kg)
Power
12 V, 1A
Certifications
FCC, ICES-003
Operating Temp.
32º ~ 104º F (0º ~ 40º C)
Storage Temp.
-4º ~ 158º F (-20º ~ 70º C)
Operating Humidity
10% to 85% Non-Condensing
Storage Humidity
5% to 90% Non-Condensing
Appendix K: Specifications
110
Wireless-G VPN Router with RangeBooster
Appendix L: Warranty Information
LIMITED WARRANTY
Linksys warrants to You that, for a period of three years (the “Warranty Period”), your Linksys Product will be
substantially free of defects in materials and workmanship under normal use. Your exclusive remedy and
Linksys' entire liability under this warranty will be for Linksys at its option to repair or replace the Product or
refund Your purchase price less any rebates. This limited warranty extends only to the original purchaser.
If the Product proves defective during the Warranty Period call Linksys Technical Support in order to obtain a
Return Authorization Number, if applicable. BE SURE TO HAVE YOUR PROOF OF PURCHASE ON HAND WHEN
CALLING. If You are requested to return the Product, mark the Return Authorization Number clearly on the outside
of the package and include a copy of your original proof of purchase. RETURN REQUESTS CANNOT BE
PROCESSED WITHOUT PROOF OF PURCHASE. You are responsible for shipping defective Products to Linksys.
Linksys pays for UPS Ground shipping from Linksys back to You only. Customers located outside of the United
States of America and Canada are responsible for all shipping and handling charges.
ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE
ARE LIMITED TO THE DURATION OF THE WARRANTY PERIOD. ALL OTHER EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF NON-INFRINGEMENT, ARE
DISCLAIMED. Some jurisdictions do not allow limitations on how long an implied warranty lasts, so the above
limitation may not apply to You. This warranty gives You specific legal rights, and You may also have other rights
which vary by jurisdiction.
This warranty does not apply if the Product (a) has been altered, except by Linksys, (b) has not been installed,
operated, repaired, or maintained in accordance with instructions supplied by Linksys, or (c) has been subjected
to abnormal physical or electrical stress, misuse, negligence, or accident. In addition, due to the continual
development of new techniques for intruding upon and attacking networks, Linksys does not warrant that the
Product will be free of vulnerability to intrusion or attack.
TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL LINKSYS BE LIABLE FOR ANY LOST DATA, REVENUE
OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF
THE THEORY OF LIABILITY (INCLUDING NEGLIGENCE), ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY
TO USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES. IN NO EVENT WILL LINKSYS’ LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT.
The foregoing limitations will apply even if any warranty or remedy provided under this Agreement fails of its
essential purpose. Some jurisdictions do not allow the exclusion or limitation of incidental or consequential
damages, so the above limitation or exclusion may not apply to You.
Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623.
Appendix L: Warranty Information
111
Appendix M: Regulatory Information
FCC Statement
This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the
FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential
installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used
according to the instructions, may cause harmful interference to radio communications. However, there is no guarantee
that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or
television reception, which is found by turning the equipment off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
• Reorient or relocate the receiving antenna
• Increase the separation between the equipment or devices
• Connect the equipment to an outlet other than the receiver's
• Consult a dealer or an experienced radio/TV technician for assistance
FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void
the user's authority to operate this equipment.
This device complies with Part 15 of the FCC Rules. Operation is subject
to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any
interference received, including interference that may cause undesired operation.
FCC Radiation Exposure Statement
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment
should be installed and operated with minimum distance 20cm between the radiator and your body.
This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
The availability of some specific channels and/or operational frequency bands are country dependent and are firmware programmed
at the factory to match the intended destination. The firmware setting is not accessible by the end user.
Safety Notices
112
Caution: To reduce the risk of fire, use only No.26 AWG or larger telecommunication line cord.Do not use this product near water, for example, in a wet basement or near a swimming pool.
Appendix M: Regulatory Information
Avoid using this product during an electrical storm. There may be a remote risk of electric shock from lightning.
Industry Canada (Canada)
This device complies with Canadian ICES-003 and RSS210 rules.
Cet appareil est conforme aux normes NMB-003 et RSS210 d'Industry Canada.
Wireless-G VPN Router with RangeBooster
User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic
Equipment (WEEE)
This document contains important information for users with regards to the proper disposal and recycling of Linksys
products. Consumers are required to comply with this notice for all electronic products bearing the following symbol
:This Class B digital apparatus complies with Canadian ICES-003. Cet appareil num?rique de la classe B est conforme ? la norme NMB-003 du Canada.
This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to :the following two conditions: (1) This device may not cause harmful interference, and
(2) this device must accept any interferencmay received, including interference that may cause undesired operation.
Reglement d'Industry Canada
Les conditions de fonctionnement sont sujettes a deux conditions:1) Ce peripherique ne doit pas causer d'interference et.2) Ce peripherique doit accepter toute interference,
y compris les interferences pouvant perturber le bon fonctionnement de ce peripherique.Radiation Exposure Statement:This equipment complies with IC radiation exposure
limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body.
Appendix M: Regulatory Information
113
Wireless-G VPN Router with RangeBooster
Appendix M: Regulatory Information
114
Wireless-G VPN Router with RangeBooster
Appendix M: Regulatory Information
115
Wireless-G VPN Router with RangeBooster
Appendix M: Regulatory Information
116
Wireless-G VPN Broadband Router
For more information, visit www.linksys.com.
Appendix M: Regulatory Information
117
Wireless-G VPN Router with RangeBooster
Appendix N: Contact Information
Need to contact Linksys?
Visit us online for information on the latest products and updates
to your existing products at:
http://www.linksys.com or
ftp.linksys.com
Can't find information about a product you want to buy
on the web? Do you want to know more about networking
with Linksys products? Give our advice line a call at:
Or fax your request in to:
800-546-5797 (LINKSYS)
949-823-3002
If you experience problems with any Linksys product,
you can call us at:
Don't wish to call? You can e-mail us at:
800-326-7114
support@linksys.com
If any Linksys product proves defective during its warranty period,
you can call the Linksys Return Merchandise Authorization
department for obtaining a Return Authorization Number at:
(Details on Warranty and RMA issues can be found in the Warranty
Information section in this Guide.)
Appendix N: Contact Information
949-823-3000
118

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : No
Encryption                      : Standard V2.3 (128-bit)
User Access                     : Print, Copy, Print high-res
XMP Toolkit                     : 3.1-702
Modify Date                     : 2007:10:18 08:41:30-07:00
Create Date                     : 2007:10:18 08:40:24-07:00
Metadata Date                   : 2007:10:18 08:41:30-07:00
Creator Tool                    : FrameMaker 7.0
Format                          : application/pdf
Title                           : Book Template.book
Creator                         : bewalter
Document ID                     : uuid:c7edc1a9-65ea-4134-bf64-f1a9c5bb91dd
Instance ID                     : uuid:53b367da-bedd-45a3-87fe-aef626bcade3
Producer                        : Acrobat Distiller 6.0 (Windows)
Has XFA                         : No
Page Count                      : 18
Author                          : bewalter
EXIF Metadata provided by EXIF.tools
FCC ID Filing: Q87-WRV210

Navigation menu