Instruction/ maintenance manual of the product WRV54G Linksys
Go to page of 102
A Division of Cisco Systems, Inc . ® Model No . VPN Broadband Router Wir eless- G WRV54G User Guide GHz 2.4 54 Mbps WIRELESS.
Wireless-G VPN Broadban d Router Copyright and T rademarks Specifications are subject to change without notice . Insta nt Etherfast, Linksys, and the Linksys logo are registered trademarks of Linksys Group , Inc . Other brands and product n ames are trademarks or registered trademarks of their respective holders.
Wireless-G VPN Broadban d Router Table of Contents Chapter 1: Introduction 1 Welcome 1 What’s in this Guide? 2 Chapter 2: Planning your Wireless Network 4 The Router’s Functions 4 IP Addresses 4 W.
Wireless-G VPN Broadban d Router Frequently Asked Questions 57 Appendix B: Wireless Security 64 A Brief Overview 64 What Are The Risks? 64 Appendix C: Configuring IPSec between a Windows 2000 PC and t.
1 Chapter 1: Introductio n Welcome Wireless-G Broad band VPN Router Chapter 1: Introduction We l c o me Wireless-G is the upcoming 54Mbps wireless networking standard that’ s almost five times faster th an the widely deployed Wireless-B (802.
2 Chapter 1: Introductio n What’s in this Guide? Wireless-G Broad band VPN Router What’ s in this Gu ide? This user guide covers the steps for setting up and using the Wireless-G VPN Broadband Router . • Chapter 1: Introduction This chapter describes the Wireless-G VPN Br oadband Router applications and this User Guide.
3 Chapter 1: Introductio n What’s in this Guide? Wireless-G Broad band VPN Router • Appendix G: Finding the MAC Address and IP Address for your Ethernet Ad apter . This appendix describes how to find the MAC address for your computer’s Ethenet adapter so you can use the MAC filtering and/or MAC address cloning feature of the Router .
4 Chapter 2: Planning your Wireless Network The Rout er’s Func tions Wireless-G VPN Broadban d Router Chapter 2: Planning your Wireless Network The Router’ s Functions Simply put, a router is a network device that connects two networks together .
5 Chapter 2: Planning your Wireless Network Why do I need a VPN? Wireless-G VPN Broadban d Router If you use the Router to share your cable or DSL Internet connection , contact your ISP to find out if they have assigned a static IP address to your account.
6 Chapter 2: Planning your Wireless Network What is a VPN? Wireless-G VPN Broadban d Router At this point, your data becomes open to hackers using a variety of methods to steal not only the data you are transmitting but also your network login and security data.
7 Chapter 2: Planning your Wireless Network What is a VPN? Wireless-G VPN Broadban d Router a secure connection that, in effect, operates as if you were directly connected to your local network.
8 Chapter 2: Planning your Wireless Network What is a VPN? Wireless-G VPN Broadban d Router Computer (using VPN client softwar e that supports IPSec) to VPN Router The following is an example of a computer -to-VPN Route r VPN. (See Figure 2-3.) In her hotel room, a traveling businesswoman dials up her ISP .
9 Chapter 3: The Back Panel Wireless-G VPN Broadban d Router Chapter 3: Chapter 3: Getting to Know the Wireless-G VPN Broadband Router The Back P anel The Router’ s ports, where a network cable is connected, are located on the back panel. Internet The Internet port connects to your modem.
10 Chapter 3: Getting to Know the Wireless-G VPN Broadband Router The Front Panel Wireless-G VPN Broadban d Router The Front P anel The Router's LEDs, where information about network ac tivity is displayed, are located on the front panel. Po w e r Green.
11 Chapter 4: Connecting the Wire less-G Broadband Router Overview Wireless-G VPN Broadban d Router Chapter 4: Connecting the Wireless-G Broadband Router Overview The Router’s setup consists of more than simply plugging hardwar e togeth er .
12 Chapter 4: Connecting the Wire less-G Broadband Router Wired Connectio n to a PC Wireless-G VPN Broadban d Router Wired Connection to a PC 1. Before you begin, make sure that all of your network ’ s hardware is powered off , inclu ding the Router , PCs, and cable or DSL modem.
13 Chapter 4: Connecting the Wire less-G Broadband Router Wireless Connection to a PC Wireless-G VPN Broadban d Router • The Power LED on the front panel will light up green as soon as the power adapter is connected properly . The Power LED will flash for a few seconds, then light up steady when the self-test is com plete .
14 Chapter 5: Configuring th e PCs Overview Wireless-G VPN Broadban d Router Chapter 5: Configuring the PCs Overview The instructions in this chapter will help you configure each of your computers to be able to communicate with the Router .
15 Chapter 5: Configuring th e PCs Configuring Windows 2000 PCs Wireless-G VPN Broadban d Router 4. Now click the Gateway tab , and verify that the Installed Gateway field is blank. Click the OK button. 5. Click the OK button again. Windows may ask you fo r the or iginal Windows installation disk or additional files.
16 Chapter 5: Configuring th e PCs Configuring Windows XP PCs Wireless-G VPN Broadban d Router Configuring Windows XP PCs The following instructions assume you are running Windows XP with the default interface.
17 Chapter 5: Configuring th e PCs Configuring Windows XP PCs Wireless-G VPN Broadban d Router Figure 5-8: IP Address.
17 Chapter 6: Configuring th e Router Overview Wireless-G VPN Broadban d Router Chapter 6: Configuring the Router Overview Use the Router’ s web-based utility to configure the Router . This chapter will describe each web page in the Utility and each page’ s key functions.
18 Chapter 6: Configuring th e Router Overview Wireless-G VPN Broadban d Router • Advanced Wireless Settings. On this screen you can access the Advanced Wireless features of Authentication T ype, Basic Data Rates, Control Tx Rates, Beacon Interval, DTIM Interval, R TS Threshold, and Fragmentation Threshold.
19 Chapter 6: Configuring th e Router How to Access the Web-based Utility Wireless-G VPN Broadban d Router Status • Router . This screen provides stat us information about the Router . • Local Network. This provides status information about the local network.
20 Chapter 6: Configuring th e Router The Setup Tab Wireless-G VPN Broadban d Router Static (See Figure 6-3.) If you are required to use a permanent IP address to connect to the Internet, then sele ct Static IP . • IP Address. This is the Router ’ s IP address, when se en from th e WAN , or the In ternet.
21 Chapter 6: Configuring th e Router The Setup Tab Wireless-G VPN Broadban d Router PPTP (See Figure 6-5.) Point to Point T unn eling Protocol (PPTP) is a service that applie s to connections in Europe only (see Figure 6- 8). • Internet IP Address.
22 Chapter 6: Configuring th e Router The Setup Tab Wireless-G VPN Broadban d Router 1200 to 1500 range . For most DSL users, it is recomm ended to use the value 1492. By default, MTU is set at 1500 when disabled. Network Setup • Gateway IP . The values for the Router’s Local IP Address and Subnet Mask are shown here .
23 Chapter 6: Configuring th e Router The Setup Tab Wireless-G VPN Broadban d Router The DDNS T ab The Router offers a Dynamic Domain Name System (DDN S) feature . DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address. It is useful when you are hosting your own website, FTP server , or other server behind the Router .
24 Chapter 6: Configuring th e Router The Setup Tab Wireless-G VPN Broadban d Router MAC Address Clone T ab (See Figure 6-8.) The Router’ s MAC address is a 12-digit code assigned to a unique piece of hardware for identification, like a social security number .
25 Chapter 6: Configuring th e Router The Setup Tab Wireless-G VPN Broadban d Router Static Routing If the Router is connected to more than one network, it may be necessary to set up a static route between th em. A static route is a pre-determin ed pathway that network information must travel to reach a specific host or network.
26 Chapter 6: Configuring th e Router The Wireless Tab Wireless-G VPN Broadban d Router Hot Spot (See Figure 6-11.) Hot Spot Ser vice Provider . Select the Hot Spot P rovider from the drop-down menu. Hot Spot Sevice Provider URL. Enter the Hot Spot Sev ice Provider URL in the field.
27 Chapter 6: Configuring th e Router The Wireless Tab Wireless-G VPN Broadban d Router Wireless Security • Wireless SSID Broadcast. When wireless clients survey the lo cal area for wireless networks to associate with, they will detect the SSID broadcast by the Router .
28 Chapter 6: Configuring th e Router The Wireless Tab Wireless-G VPN Broadban d Router Wireless Network Access (See Figure 6-14.) Wireless Network Access. If this function is enabled, only the computers on the list will be allowed access to the wireless network.
29 Chapter 6: Configuring th e Router The Wireless Tab Wireless-G VPN Broadban d Router Advanced Wireless Settings (See Figure 6-16.) On this screen you can access the Advanced Wireless features, including Authentication T ype, Basic Data Rates, Control Tx Rates, Beacon Interval, DTIM Int erval, RTS Threshold, and Fragmentation Threshold.
30 Chapter 6: Configuring th e Router The Security Tab Wireless-G VPN Broadban d Router The Security T ab Fire wal l When you click the Security tab , you will see the Firewall scr een (see Figure 6-17). This screen contains Filters and Block W AN Requests.
31 Chapter 6: Configuring th e Router The Security Tab Wireless-G VPN Broadban d Router VPN Virtual Private Networking (VPN) is a security measure t hat basically creates a secure connection between two remote locations. This connection is very specific as far as its settings are concerned; this is what create s the security .
32 Chapter 6: Configuring th e Router The Security Tab Wireless-G VPN Broadban d Router settings of the remote VPN device . Make sure that you have entered the IP Address correctly , or the connection cannot be made.
33 Chapter 6: Configuring th e Router The Security Tab Wireless-G VPN Broadban d Router Advanced VPN T unnel Setup From the Advance VPN T unnel Setup screen, shown in Figure 6-19, you can adjust the settings for specific VPN tunnels. Phase 1 • Phase 1 is used to create a security association (SA), often called the IKE SA.
34 Chapter 6: Configuring th e Router The Security Tab Wireless-G VPN Broadban d Router Other Options • Unauthorized IP Blocking. Click Enabled to block unauthorized IP addresses. Enter in the Rejects Number field to specify how many times IKE must fail b efore bloc king that unauthorized IP address.
35 Chapter 6: Configuring th e Router The Access Restrictions Tab Wireless-G VPN Broadban d Router • WEP Encr yption. Select the level of WEP encr yption you wish to use , 64-bit 10 hex digits or 1 28-bit 26 hex digits.
36 Chapter 6: Configuring th e Router The Access Restrictions Tab Wireless-G VPN Broadban d Router 2. Click the Edit List button. This will open the List of PCs screen, shown in Figure 6-24. From this screen, you can enter the IP address or MAC address of any PC to which this policy will apply .
37 Chapter 6: Configuring th e Router The Applications and Gaming Tab Wireless-G VPN Broadban d Router The Applications and Gaming T ab Port Range Forwar ding The Port Forwarding screen sets up public services on your network, such as web servers, ftp ser vers, e-mail servers, or other spe cialized Inter net applications.
38 Chapter 6: Configuring th e Router The Applications and Gaming Tab Wireless-G VPN Broadban d Router When finished making your changes on this tab , click the Save Settings button to sav e these changes, or click the Cancel Changes button to undo your changes.
39 Chapter 6: Configuring th e Router The Applications and Gaming Tab Wireless-G VPN Broadban d Router with little selectivity . All pending messages and attachments are downloaded at the same time. POP3 uses the SMTP messaging protocol. • NNTP (Network News T ransfer Protocol) The protoc ol used to connect to Usenet groups on the Internet.
40 Chapter 6: Configuring th e Router The Applications and Gaming Tab Wireless-G VPN Broadban d Router DMZ The DMZ screen (see Figure 6-29) allows one local user to be exposed to the Internet for use .
41 Chapter 6: Configuring th e Router The Administration Tab Wireless-G VPN Broadban d Router Figure 6-30: Managem ent The Administration T ab Management The Management screen, shown in Figure 6-30, allows you to change the Router’s access settings as well as configure the SNMP and UPnP (Universal Plu g and Play) features.
42 Chapter 6: Configuring th e Router The Administration Tab Wireless-G VPN Broadban d Router Figure 6-31: Log • SNMP T rap-Destination. Enter the IP Address . UPnP UPnP allows Windows XP to automatically configure the Router for various Internet application s, such as gaming and videoconferencing.
43 Chapter 6: Configuring th e Router The Administration Tab Wireless-G VPN Broadban d Router Notification Qeue Length • Log queue Length. Enter the numbe r of entries in the log queue in the field. • Log Time Threshold. Enter the time for the threshold in the field.
44 Chapter 6: Configuring th e Router Wireless-G VPN Broadban d Router Factory Default (See Figu re 6-33.) If you have exhausted all other options and wish to restore the Router to its factor y default settings and lose all your settings, click Ye s .
45 Chapter 6: Configuring th e Router Status Wireless-G VPN Broadban d Router Status Router This screen displays information about your Ro uter and its WA N (Internet) Connections. (See F igure 6-35.) Informati on The information displayed is the Hardware Version, Softw are Version, MAC Address, Local MAC Address, and System Up Time .
46 Chapter 6: Configuring th e Router Status Wireless-G VPN Broadban d Router Local Network The Local Network information that is displayed is the IP Address, Subnet Mask, DHCP Ser ver , and DHCP Client Lease Info. T o view the DHCP Clients T able, click the DHCP Clients button.
47 Chapter 6: Configuring th e Router Status Wireless-G VPN Broadban d Router Wireless The Wireless Network information that is displayed is the MAC Address, Mode , SSID , Channel, and E ncryptio n Function. (See Figure 6-38.) Click the Refresh button if you want to Refr esh your screen.
49 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadban d Router Appendix A: T roubleshooting This appendix consists of two parts: “Common Problems and Solutions” and “F requently Asked Questions.
50 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadban d Router 7. T oward the bottom of the window , select Use the following DNS server addresses, and enter the Preferred DNS server and Alternative DNS ser ver (pro vided by your ISP).
51 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadban d Router For Windows 98 and Me: • Click Start and Ru n . In the Open field, type in command. Press the Enter key or click the OK button. For Windows NT , 2000, and XP: • Click Star t and Run .
52 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadban d Router 4. I am not able to access the Se tup page of the Router’ s web-based utility . • Refer to “Problem #2, I want to test my Internet c onnection” to ve rify that your computer is properly connected to the Router .
53 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadban d Router 2. Enter any name you want to use for the Customized Application. 3. Enter the External Port range of the ser vice you are using. For example , if you have a web ser ver , you would enter the range 80 to 80.
54 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadban d Router Customized External Port TCP UDP IP Address Enable Application UT 7777 to 27900 X X 192.168.1.100 X Halflife 27015 to 27015 X X 192.168.1.105 X PC Anywhere5631 to 5631 X 192.
55 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadban d Router • For Microsoft Internet Explorer 5.0 or higher: 1. Click Start, Settings , and Control P anel . Double-click Internet Options. 2. Click the Connections tab.
56 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-G VPN Broadban d Router 14. My DSL service’ s PPPoE is alwa ys disconnecting. PPPoE is not actually a dedicated or always-on connection. Th e DSL ISP can disconnect the service a fter a period of inactivity , just like a nor mal phone dial-up connection to the Inter net.
57 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-G VPN Broadban d Router 17. When I enter a URL or IP address, I get a time-o ut error or am prompted to retry . • Check if other PCs work. If they do, ensure that y our workstation’ s IP settings are correct (IP Address, Subnet Mask, Default Gateway , and DNS).
58 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-G VPN Broadban d Router Network Address T ranslation (NA T) translates multiple IP addresses on the p rivate LAN to one public address that is sent out to the Internet.
59 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-G VPN Broadban d Router The web page hangs; downloads are corrupt, or nothi ng but junk characters are being displayed on the screen.
60 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-G VPN Broadban d Router No. Does the Router pass PPTP packets or actively route PPTP sessions? The Router allows PPTP packets to pass through. Is the Router cross-platform compatibl e? Any platform that supports Ether net and TCP/IP is compatible with the Router .
61 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-G VPN Broadban d Router • Automatic Rate Selection • RTS/CTS feature • Fragmentation • Power Management What is ad-hoc mode? When a wireless network is set to ad-hoc mode , the wireless-equipped computers are configured to communicate directly with each other .
62 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-G VPN Broadban d Router What is Spread Spec trum? Spread Spectrum technology is a wideband radio frequency tec hnique developed by the militar y for use in reliable , secure , mission-critical communications systems.
63 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-G VPN Broadban d Router There is no way to know the exact range of your wireless network without testing. Every obstacle placed between the Router and a wireless PC will create signal loss.
64 Appendix B: Wireless Security A Brief Overview Wireless-G VPN Broadban d Router Appendix B: Wireless Security A Brief Overview Whenever data - in the form of files, emails, or messages - is transmitted over your wireless network, it is open to attacks.
65 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadban d Router But even WEP has its problems. WEP's encr yption algorithm is referred to as "simple", which also means "weak", because the technology that scrambles the wireless signal isn't too hard to crack for a persistent hacker .
66 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadban d Router Active Attacks Hackers use Active Attacks for three purposes: 1) stealing data, 2) using your network, and 3) modifying your network so it's easier to hack in the next time .
67 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadban d Router examples below , your implementation and administration of network security measures is the key to maximizing wireless security . No preventative measure will guarantee network security but it will make it more difficult for someone to hack into your network.
68 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadban d Router There are a few things you can do to make your SSID more secure: a. Disable Broadcast b . Make it unique c . Change it often Most wireless networking devices will give you the option of broadcasting the SSID .
69 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadban d Router not completely secure . One piece of infor mation still not encrypted is the MAC address, which hackers can use to break into a network by spoofing (or faking) the MAC address.
70 Appendix B: Wireless Security What Are The Risks? Wireless-G VPN Broadban d Router 2.4GHz/802.11b and 802.11g WEP Encryption WEP encryption for the Wireless-G VPN Broadband Router is configured through the Web-Utility's Wireless tab .
71 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Rou ter Introduc tion Wireless-G VPN Bor adband Router Appendix C: Configuring IPSec between a Windows 2000 PC and the Router Introd.
72 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Rou ter How to Establish a Secure IPSec Tunnel Wireless-G VPN Bor adband Router How to Establish a Secure IPSec T unnel Step 1: Create an IPSec Polic y 1. Click the Start button, select Ru n , and type secpol.
73 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Rou ter How to Establish a Secure IPSec Tunnel Wireless-G VPN Bor adband Router 3. The IP Filter List screen should appear , as shown in Figure C-4. Enter an appropriate name , such as win- >router , for the filter list, and de-select the Use Add Wizard check box.
74 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Rou ter How to Establish a Secure IPSec Tunnel Wireless-G VPN Bor adband Router 8. The IP Filter List screen should appear , as shown in Figur e C-7. Enter an appropriate name , such as router - >win for the filter list, and de-select the Use Add Wizard check box.
75 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Rou ter How to Establish a Secure IPSec Tunnel Wireless-G VPN Bor adband Router Step 3: Configure Indi vidual T unnel Rules T unnel 1: win->router 1. From the IP Filter List tab , shown in Figure C-10, click the filter list win->router .
76 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Rou ter How to Establish a Secure IPSec Tunnel Wireless-G VPN Bor adband Router 4. Select the Authenticatio n Methods tab, shown in Figure C-13, and click the Edit button.
77 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Rou ter How to Establish a Secure IPSec Tunnel Wireless-G VPN Bor adband Router 7. Select the T unnel S etting tab, shown in Figure C-16, and click The tunnel endpoint is specified by this IP Address radio button.
78 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Rou ter How to Establish a Secure IPSec Tunnel Wireless-G VPN Bor adband Router 10. Go to the IP Filter List tab , and click the filter list router ->win , as shown in Figure C-19.
79 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Rou ter How to Establish a Secure IPSec Tunnel Wireless-G VPN Bor adband Router 13. Change the authentication method to Use this string to pr otect the key exchange (preshared k ey) , and enter the preshared key string, such as XYZ12345, as shown in Figure C-22.
80 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Rou ter How to Establish a Secure IPSec Tunnel Wireless-G VPN Bor adband Router 16. Click the Co nnection T ype tab , shown in Figure C-25, and select All network connections . Then click the OK (for Windows XP) or Close (for Windows 2000) button to finish.
81 Appendix C: Configuring IPSec betwe en a Windows 2000 PC and the Rou ter How to Establish a Secure IPSec Tunnel Wireless-G VPN Bor adband Router Step 5: Create a T unnel Thro ugh the W eb-Based Utility 1. Open your web browser , and enter 192.168.1.
82 Appendix D: Findi ng the MAC Ad dress an d IP Address for Your Ethernet Adapter Windows 98 or Me Instructions Wireless-G Broad band Router Appendix D: Finding the MA C Address and IP Address for Y .
83 Appendix D: Findi ng the MAC Ad dress an d IP Address for Your Ethernet Adapter Windows 2000 or XP Instructions Wireless-G Broad band Router Windows 2000 or XP Instructions 1. Click Start and Run . In the Open field, enter cmd . Press the Enter key or click the OK bu tton.
84 Appendix E: SNMP Functions Wireless-G VPN Broadban d Router Appendix E: SNMP Functions SNMP (Simple Network Management Protocol) is a widely-us ed network monitoring and control protocol. Data is passed from a SNMP agent, such as the VPN Router , to the workstation console used to oversee the network.
85 Appendix F: Upgradin g Firmware Wireless-G VPN Broadban d Router Appendix F: Upgrading Firmware The Router's firmware is upgraded through the Web-Utility' s Firmware Upgrade tab from the Administration tab .
86 Appendix G: Window s Help Wireless-G VPN Broadban d Router Appendix G: Windows Help All wireless products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier .
87 Appendix H: Glossary Wireless-G VPN Broadban d Router Appendix H: Glossar y 802.11a - An IEEE wireless networking standard that specifies a maximum data transfer rate of 54Mbps and an operating frequency of 5GHz. 802.11b - An IEEE wireless networking standard that specifies a maximum data transfer rate of 11Mbps and an operating frequency of 2.
88 Appendix H: Glossary Wireless-G VPN Broadban d Router Buffer - A block of memor y that temporarily holds data to be worked on later when a device is currently too busy to accept the data. Cable Modem - A device that con nects a computer to the cable television network, which in turn connects to the Internet.
89 Appendix H: Glossary Wireless-G VPN Broadban d Router Dynamic IP Address - A temporar y IP address assigned by a DHCP server . Encryption - Encoding data to prevent it from being read by unauthorized people . Ethernet - An IEEE standard network protocol that specifies how data is placed on and retrieved from a common transmission medium.
90 Appendix H: Glossary Wireless-G VPN Broadban d Router IPCONFIG - A Windows 2000 and XP utility that displays the IP address for a particular networking device. IPSec (Internet Pro tocol Security) - A VPN protocol used to implem ent secure exchange of packets at the IP layer .
91 Appendix H: Glossary Wireless-G VPN Broadban d Router PPP oE (Point to Point Proto col over Ethernet) - A type of broadband connection that provides authentication (username and password) in addition to data transport.
92 Appendix H: Glossary Wireless-G VPN Broadban d Router TCP/IP (T ransmission Control Protocol/Inter net Protocol) - A network protocol fo r transmitting data that requires acknowledgement from the recipient of data sent. Te l n e t - A user command and TCP/IP p rotocol used for accessing remote PCs.
93 Appendix I: Specification s Wireless-G VPN Broadban d Router Appendix I: Specifications Standards IEEE 802.3, 802.11b and 802.11g Ports One Internet, Ethernet (1-4), Power Buttons One Reset Button,.
94 Appendix I: Specification s Wireless-G VPN Broadban d Router Storage Humidity 5% to 90% Non-Condensing.
95 Appendix J: Warranty Information Wireless-G VPN Broad band Router Appendix J: W arranty Information LIMITED WARRANTY Linksys warrants to the original end user purchaser ("Y ou") that, for.
96 Appendix K: Regulatory Inf ormation Wireless-G VPN Broadban d Router Appendix K: Regulator y Information FCC ST A TEMENT This product has been tested and complies with the specification s for a Class B digital device, pursuant to Part 15 of the FCC Rules.
97 Appendix K: Regulatory Inf ormation Wireless-G VPN Broadban d Router Note: This equipment is intended to be used in all EU and EFT A countries. Outdo or use may be restricted to certain frequencies and/or may require a license for operation. For more details, contact Linksys Corporate Compliance .
9 8 Appendix L: Contact In formation Wireless-G VPN Br oadband Router Appendix L: Contact Information Need to contact Linksys? Visit us online for information on the latest products and updates to your existing products at: http://www .linksys.com or ftp.
An important point after buying a device Linksys WRV54G (or even before the purchase) is to read its user manual. We should do this for several simple reasons:
If you have not bought Linksys WRV54G yet, this is a good time to familiarize yourself with the basic data on the product. First of all view first pages of the manual, you can find above. You should find there the most important technical data Linksys WRV54G - thus you can check whether the hardware meets your expectations. When delving into next pages of the user manual, Linksys WRV54G you will learn all the available features of the product, as well as information on its operation. The information that you get Linksys WRV54G will certainly help you make a decision on the purchase.
If you already are a holder of Linksys WRV54G, but have not read the manual yet, you should do it for the reasons described above. You will learn then if you properly used the available features, and whether you have not made any mistakes, which can shorten the lifetime Linksys WRV54G.
However, one of the most important roles played by the user manual is to help in solving problems with Linksys WRV54G. Almost always you will find there Troubleshooting, which are the most frequently occurring failures and malfunctions of the device Linksys WRV54G along with tips on how to solve them. Even if you fail to solve the problem, the manual will show you a further procedure – contact to the customer service center or the nearest service center