Page 46 / 61 Scroll up to view Page 41 - 45
Wireless-G Broadband Router
85
Instant Wireless
®
Series
84
Step One: Pinging an IP Address
The first step to determining your ISP’s web and e-mail server address is to
ping its IP address.
1.
Power on the computer and the cable or DSL modem, and restore the net-
work configuration set by your ISP if you have since changed it.
2. Click
Start
and then
Run
. Type
command
in the
Open
field. This will
bring up the DOS window.
3.
At the DOS command prompt, type
ping mail
(assuming that the location
for which you’re trying to find an IP address is configured as
mail
). Press
the
Enter
key. Information such as the following data, taken from a ping of
Microsoft Network’s e-mail server, will be displayed.
C:\>ping mail
Pinging mail [24.53.32.4] with 32 bytes of data:
Reply from 24.53.32.4: bytes=32 time<10ms TTL=128
Reply from 24.53.32.4: bytes=32 time<10ms TTL=128
Reply from 24.53.32.4: bytes=32 time<10ms TTL=128
Reply from 24.53.32.4: bytes=32 time<10ms TTL=128
Ping statistics for 24.53.32.4:
Packets: Sent = 4, Received = 4, Lost = 0 (0%
loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum =
0ms, Average =
0ms
4.
Write down the IP address returned by the ping command (in the example
above: 24.53.32.4.). This IP address is the actual IP address of the server
mail
, or any other word or value you have pinged.
Figure B-1
Appendix B: How to Ping Your
ISP’s E-mail & Web Addresses
Virtually all Internet addresses are configured with words or characters (e.g.,
www.linksys.com
,
www.yahoo.com
, etc.) In actuality, however, these Internet
addresses are assigned to IP addresses, which are the true addresses on the
Internet. For example,
www.yahoo.com
is 66.218.71.87 (this IP address may
change). Type it into your web browser and you will wind up at the Linksys
home page every time. There are servers that translate the URL to an IP
address; this is called the Domain Name System (DNS).
IP and web addresses, however, can sometimes be long and hard to remember.
Because of this, certain ISPs will shorten their server addresses to single words
or codes on their users’ web browser or e-mail configurations. If your ISP’s e-
mail and web server addresses are configured with single words (
www
,
e-mail
,
home
,
pop3
, etc.) rather than whole Internet addresses or IP addresses, the
Router may have problems sending or receiving mail and accessing the
Internet. This happens because the Router has not been configured by your ISP
to accept their abbreviated server addresses.
The solution is to determine the true web addresses behind your ISPs code
words. You can determine the IP and web addresses of your ISP’s servers by
“pinging” them.
Important
: If you don’t have your ISP’s web and e-mail IP
addresses, you
must
either get them from your ISP or follow these
steps
prior
to connecting the Router to your network.
Page 47 / 61
Wireless-G Broadband Router
87
Instant Wireless
®
Series
86
Appendix C: Configuring
Wireless Security
An acronym for Wired Equivalent Privacy, WEP is an encryption method used
to protect your wireless data communications.
WEP uses 64-bit or 128-bit keys
to provide access control to your network and encryption security for every
data transmission.
To decode a data transmission, each point in a network must
use an identical 64-bit or 128-bit key.
Higher encryption levels mean higher
levels of security, but due to the complexity of the encryption, they may mean
decreased network performance.
You may also have heard the term “40-bit” used in conjunction with WEP
encryption.
This is simply another term for 64-bit WEP encryption.
This level
of WEP encryption has been called 40-bit because it uses a 40-bit secret key
along with a 24-bit Initialization Vector (40 + 24 = 64).
Wireless vendors may
use either name.
Linksys uses the term “64-bit” when referring to this level of
encryption. All wireless devices compliant with the 802.11b standard will sup-
port 64-bit WEP.
Make sure your wireless network is functioning before attempting to configure
WEP encryption.
In addition to enabling WEP, Linksys also recommends the following security
implementations:
Change the SSID from the default “linksys”
Change the SSID on a regular basis
Change the WEP key regularly
Enable wireless MAC address filtering (see the “Advanced Wireless” section
of “Chapter 6: The Router’s Web-Based Utility”)
For instructions on how to configure the WEP settings of your PC’s wireless
adapter, refer to your wireless adapter’s documentation. To configure the
Router’s WEP settings, follow these instructions:
Note:
WEP encryption is an additional data security measure and not
essential for router operation; however, Linksys recommends the use
of WEP encryption.
Step Two: Pinging for a Web Address
While the IP address returned above would work as your e-mail server address,
it may not be permanent. IP addresses change all the time. Web addresses, how-
ever, usually don’t. Because of this, you’re likely to have fewer problems by
configuring your system with web addresses rather than IP addresses. Follow
the instructions below to find the web address assigned to the IP address you
just pinged.
1.
At the DOS command prompt, type
ping -a 24.53.32.4
, where 24.53.32.4
is the IP address you just pinged. Information such as the following data
will be displayed.
C:\>ping -a 24.53.32.4
Pinging mail.msnv3.occa.home.com [24.53.32.4] with
32 bytes of data:
Reply from 24.53.32.4: bytes=32 time<10ms TTL=127
Reply from 24.53.32.4: bytes=32 time<10ms TTL=127
Reply from 24.53.32.4: bytes=32 time<10ms TTL=127
Reply from 24.53.32.4: bytes=32 time<10ms TTL=127
Ping statistics for 24.53.32.4:
Packets: Sent = 4, Received = 4, Lost = 0 (0%
loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum =
0ms, Average =
0ms
2.
Write down the web address returned by the ping command. (In the exam-
ple in Figure C-2,
mail.msnv3.occa.home.com
is the web address.) This
web address is the web address assigned to the IP address you just pinged.
While the IP address of
mail
could conceivably change, it is likely that this
web address will not.
3.
Replace your ISP’s abbreviated server address with this extended web
address in the corresponding Internet application (web browser, e-mail
application, etc.).
Once you have replaced the brief server address with the true server address,
the Router should have no problem accessing the Internet through that Internet
application.
Figure B-2
Page 48 / 61
Wireless-G Broadband Router
5.
WEP keys enable you to create an encryption scheme for wireless LAN
transmissions. If you are not using a Passphrase, then manually enter a set
of values in each
Key
field. (Do not leave a key field blank, and do not enter
all zeroes. These are not valid key values.)
If you are using 64-bit WEP encryption, then the key must be exactly 10
hexadecimal characters in length. If you are using 128-bit WEP encryption,
then the key must be exactly 26 hexadecimal characters in length. Valid
hexadecimal characters are “0”-“9” and “A”-“F”.
6.
Check all the values, and click the
Apply
button to save your WEP settings
and return to the
Setup
screen. To cancel any changes you’ve entered on this
page, click the
Cancel
button.
To get more information about the features,
click the
Help
button.
89
Instant Wireless
®
Series
1.
On the
Setup
tab of the Router’s web-based utility, click the
Enable
radio
button next to
WEP
. Then click the
Edit WEP Settings
button.
2.
You will see the
2.4GHz, 54g, Wireless-G (WEP)
screen (Figure C-1). Next
to
Default Transmit Key
, select which WEP key (1-4) will be used when the
Router sends data. Make sure the receiving device is using the same key.
3.
For the
WEP Encryption
drop-down box, select the level of WEP encryp-
tion you wish to use,
64-bit 10 hex digits
or
128-bit 26 hex digits
. Higher
encryption levels offer higher levels of security, but due to the complexity
of the encryption, they may decrease network performance.
4.
Instead of manually entering WEP keys, you can enter a Passphrase in the
Passphrase
field. This Passphrase is used to generate one or more WEP
keys. It is case-sensitive and should not be longer than 16 alphanumeric
characters. (This Passphrase function is compatible with Linksys wireless
products only. If you want to communicate with non-Linksys wireless prod-
ucts, enter the WEP key manually on the non-Linksys wireless products.)
After you enter the Passphrase, click the
Generate
button to create WEP
keys.
88
Note:
All Wireless-G and 802.11b devices in your network must use
the same Passphrase or WEP key.
Figure C-1
Page 49 / 61
Wireless-G Broadband Router
3.
Write down the Adapter Address as shown on your computer screen (see
Figure E-3).
This is the MAC address for your Ethernet adapter and will
be shown as a series of numbers and letters.
The MAC address/Adapter Address is what you will use for MAC address
cloning or MAC filtering.
Write down the IP Address as shown on your computer screen. The exam-
ple in Figure E-3 shows the IP address of your Ethernet adapter as
192.168.1.100. Your computer may show something different.
For Windows NT, 2000, and XP:
1. Click
Start
and
Run
. In the
Open
field, enter
cmd
. Press the
Enter
key or
click the
OK
button.
91
Instant Wireless
®
Series
Appendix D: Finding the MAC
Address and IP Address for Your
Ethernet Adapter
This section describes how to find the MAC address for your Ethernet adapter
to do either MAC address filtering or MAC address cloning for the Router and
ISP.
You can also find the IP address of your computer’s Ethernet adapter.
The
IP address is used for filtering, forwarding, and DMZ.
Follow the steps in this
appendix to find the MAC address or IP address for your adapter in Windows
95, 98, Me, NT, 2000, and XP.
For Windows 95, 98, and Me:
1. Click on
Start
and
Run
. In the Open field, enter
winipcfg
. Then press the
Enter
key or the
OK
button.
2. When the IP Configuration window appears, select the Ethernet adapter
you are using to connect to the Router via a Category 5 Ethernet network
cable.
90
Figure D-3
Figure D-4
Note
: The MAC address is also called the Adapter
Address.
Figure D-1
Figure D-2
Page 50 / 61
Wireless-G Broadband Router
93
Instant Wireless
®
Series
2.
In the command prompt, enter
ipconfig /all
. Then press the
Enter
key.
3.
Write down the Physical Address as shown on your computer screen; it is
the MAC address for your Ethernet adapter.
This will appear as a series of
letters and numbers.
The MAC address/Physical Address is what you will use for MAC address
cloning or MAC filtering.
Write down the IP Address as shown on your computer screen. The exam-
ple in Figure E-5 shows the IP address of your Ethernet adapter as
192.168.1.100. Your computer may show something different.
92
Appendix E: Glossary
10BaseT
- An Ethernet standard that uses twisted wire pairs.
100BaseTX
- IEEE physical layer specification for 100 Mbps over two pairs of
Category 5 UTP or STP wire.
802.11b
- One of the IEEE standards for wireless networking hardware.
Products that adhere to a specific IEEE standard will work with each other,
even if they are manufactured by different companies. The 802.11b standard
specifies a maximum data transfer rate of 11Mbps, an operating frequency of
2.4GHz, and WEP encryption for security. 802.11b networks are also referred
to as Wi-Fi networks.
802.1g
- A proposed, but as yet unratified extension of the IEEE 802.11 stan-
dard for wireless networking hardware. The draft 802.11g specifications used
by Linksys specify a maximum data transfer rate of 54Mbps using OFDM
modulation, an operating frequency of 2.4GHz, backward compatibility with
IEEE 802.11b devices, and WEP encryption for security.
Adapter -
Printed circuit board that plugs into a PC to add to capabilities or
connectivity to a PC. In a networked environment, a network interface card
(NIC) is the typical adapter that allows the PC or server to connect to the
intranet and/or Internet.
Ad-hoc Network
- An ad-hoc network is a group of computers, each with a
wireless adapter, connected as an independent 802.11 wireless LAN.
Ad-hoc
wireless computers operate on a peer-to-peer basis, communicating directly
with each other without the use of an access point.
Ad-hoc mode is also
referred to as an Independent Basic Service Set (IBSS) or as peer-to-peer
mode, and is useful at a departmental scale or SOHO operation.
Automatic Fall-back
- A feature provided by some wireless products to
increase connection reliability. Automatic fall-back enables a device to dynam-
ically shift between various data transfer rates. It works by decreasing the data
transfer rate when interference increases, distance increases, and other factors
undermine signal strength and quality.
Auto-MDI/MDIX
- On a network hub or switch, an auto-MDI/MDIX port
automatically senses if it needs to act as a MDI or MDIX port. The auto-
MDI/MDIX capability eliminates the need for crossover cables.
Figure D-5
Note
: The MAC address is also called the Physical
Address.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top