Page 21 / 61 Scroll up to view Page 16 - 20
Wireless-G Broadband Router
35
The
Security
screen allows you to change the Router’s security settings. You
should change the factory default password, which is
admin
, to your own as
soon as possible. All users who try to access the Router’s web-based utility or
Setup Wizard will be prompted for the Router’s password.
Router Password
The new Password must not exceed 32 characters in length
and must not include any spaces. Enter the new Password in the second field to
confirm it.
VPN Pass-Through
Virtual Private Networking (VPN) is typically used for
work-related networking. For VPN tunnels, the Router supports IPSec Pass-
Through and PPTP Pass-Through.
IPSec
- Internet Protocol Security (IPSec) is a suite of protocols used to
implement secure exchange of packets at the IP layer. To allow IPSec tun-
nels to pass through the Router, IPSec Pass-Through is enabled by default.
To disable IPSec Pass-Through, uncheck the box next to
IPSec
.
Security
Figure 6-8
Instant Wireless
®
Series
Default Transmit Key
Select which WEP key (1-4) will be used when the
Router sends data. Make sure the receiving device is using the same key.
WEP Encryption
Select the level of WEP encryption you wish to use,
64-
bit 10 hex digits
or
128-bit 26 hex digits
. Higher encryption levels offer
higher levels of security, but due to the complexity of the encryption, they
may decrease network performance.
Passphrase
Instead of manually entering WEP keys, you can enter a
Passphrase. This Passphrase is used to generate one or more WEP keys. It
is case-sensitive and should not be longer than 16 alphanumeric characters.
(This Passphrase function is compatible with Linksys wireless products
only. If you want to communicate with non-Linksys wireless products, enter
the WEP key manually on the non-Linksys wireless products.) After you
enter the Passphrase, click the
Generate
button to create WEP keys.
Keys 1-4
WEP keys enable you to create an encryption scheme for wireless
LAN transmissions. If you are not using a Passphrase, then manually enter
a set of values. (Do not leave a key field blank, and do not enter all zeroes.
These are not valid key values.)
If you are using 64-bit WEP encryption, then the key must be exactly 10
hexadecimal characters in length. If you are using 128-bit WEP encryption,
then the key must be exactly 26 hexadecimal characters in length. Valid
hexadecimal characters are “0”-“9” and “A”-“F”.
Check all the values, and click the
Apply
button to save your WEP settings.
To cancel any changes you’ve entered on this page, click the
Cancel
button.
To get more information about the features, click the
Help
button.
34
Note:
All Wireless-G and 802.11b devices in your network must use
the same Passphrase or WEP key.
Page 22 / 61
Wireless-G Broadband Router
Block WAN Request
By enabling the Block WAN Request feature, you can
prevent your network from being “pinged,” or detected, by other Internet users.
The Block WAN Request feature also reinforces your network security by hid-
ing your network ports. Both functions of the Block WAN Request feature
make it more difficult for outside users to work their way into your network.
This feature is enabled by default. Select
Disable
to disable this feature.
To save your changes on this page, click the
Apply
button. To cancel any
unsaved changes on this page, click the
Cancel
button. To get more information
about the features, click the
Help
button.
The
System
screen lets you control a variety of the Router’s general features,
from restoring factory defaults to enabling its remote management capability.
Restore Factory Defaults
Click the
Yes
button to reset all configuration set-
tings to their default values, and then click the
Apply
button. Any settings you
have saved will be lost when the default settings are restored. This feature is
disabled by default.
37
Instant Wireless
®
Series
36
PPTP
- Point-to-Point Tunneling Protocol is the method used to enable VPN
sessions to a Windows NT 4.0 or 2000 server. To allow PPTP tunnels to pass
through the Router, PPTP Pass-Through is enabled by default. To disable
PPTP Pass-Through, uncheck the box next to
PPTP
.
Web Filters
Using the Web Filters feature, you may enable up to four specif-
ic filtering methods.
Block Proxy
- Use of WAN proxy servers may compromise the Router's
security. Denying Proxy will disable access to any WAN proxy servers. To
enable proxy filtering, click the
Block Proxy
box.
Block Java
- Java is a programming language for websites. If you deny Java,
you run the risk of not having access to Internet sites created using this pro-
gramming language. To enable Java filtering, click the
Block Java
box.
Block ActiveX
- ActiveX is a programming language for websites. If you
deny ActiveX, you run the risk of not having access to Internet sites creat-
ed using this programming language. To enable ActiveX filtering, click the
Block ActiveX
box.
Block Cookies
- A cookie is data stored on your PC and used by Internet
sites when you interact with them. To enable cookie filtering, click the
Block Cookies
box.
DMZ
The DMZ hosting feature allows one local user to be exposed to the
Internet for use of a special-purpose service such as Internet gaming or video-
conferencing. DMZ hosting forwards all the ports at the same time to one PC.
The Port Forwarding feature is more secure because it only opens the ports you
want to have opened, while DMZ hosting opens all the ports of one computer,
exposing the computer so the Internet can see it.
Any PC whose port is being forwarded must have its DHCP client function dis-
abled and should have a new static IP address assigned to it because its IP
address may change when using the DHCP function.
1.
To expose one PC, select
Enable
.
2.
Enter the computer's IP address in the
DMZ Host IP Address
field.
3. Click the
Apply
button.
Figure 6-9
System
Page 23 / 61
Wireless-G Broadband Router
Multicast Pass-Through
IP Multicasting occurs when a single data transmis-
sion is sent to multiple recipients at the same time.
Using the Multicast Pass-
Through feature, the Router allows IP multicast packets to be forwarded to the
appropriate computers. Keep the default setting,
Enable
, to support the feature,
or select
Disable
to disable it.
MAC Cloning
You can clone the MAC address of your PC’s network adapter
onto the Router.
A MAC address is a 12-digit code assigned to a unique piece of hardware for
identification. Some ISPs require that you register the MAC address of your
PC’s network adapter, which was connected to your cable or DSL modem dur-
ing installation. To avoid calling your ISP and changing the MAC address that
is registered with the ISP, follow these instructions:
1.
Select
Enable
.
2.
Enter your adapter’s MAC address in the
MAC Address
field.
3.
To save your new settings, click the
Apply
button. To cancel your changes,
click the
Cancel
button. To get more information about the features, click
the
Help
button.
To disable MAC address cloning, keep the default setting,
Disable
.
If you do not know your adapter’s MAC address, follow these instructions:
1. Click the
Start
button, and select
Run
.
2. Enter
command
in the field provided, and press the
OK
button.
3.
At the command prompt, enter
ipconfig /all
. Then press the
Enter
key.
4. Write down your adapter’s physical address; this is the adapter’s MAC
address.
Remote Management
This feature allows you to manage your Router from a
remote location, via the Internet. To disable this feature, keep the default set-
ting,
Disable
. To enable this feature, select
Enable
, and use the specified port
(default is
8080
) on your PC to remotely manage the Router. You must also
change the Router's default password to one of your own, if you haven’t
already. A unique password will increase security.
39
Instant Wireless
®
Series
Upgrade Firmware
New firmware versions are posted at
www.linksys.com
and can be downloaded for free. If the Router already works well, there’s no
need to download a newer firmware version, unless that version has a new fea-
ture that you want to use. (To learn about any new firmware with new features,
visit
www.linksys.com
.)
To upgrade the Router’s firmware:
1. Download the firmware upgrade file from
www.linksys.com
, and extract
the file using a file archive utility such as WinZip.
2. Click the
Upgrade
button.
3. On the
Upgrade Firmware
screen (see Figure 6-10), click the Browse but-
ton to find the firmware upgrade file you extracted.
4.
Double-click the firmware upgrade file you extracted.
5. Click the
Upgrade
button, and follow the on-screen instructions.
38
Figure 6-10
Important:
When you are upgrading the firmware, do NOT turn off
the Router, and do NOT press the Reset button.
Note:
By upgrading the Router’s firmware, you may lose the Router’s
configuration settings, so make sure you write down the Router’s set-
tings before you upgrade its firmware.
Page 24 / 61
Wireless-G Broadband Router
The Outgoing Access Log gives you a log of all outgoing Internet traffic. For
each activity, it displays the LAN IP address, the Destination URL or IP
address of the Internet site accessed, as well as the Service/Port Number used
(see Figure 6-12). Click the
Refresh
button to update the logs. Click the
Close
button to return to the
System
screen.
To save your changes on this page, click the
Apply
button. To cancel any
unsaved changes on this page, click the
Cancel
button. To get more information
about the features, click the
Help
button.
41
Instant Wireless
®
Series
To remotely manage the Router, enter
(the x’s
represent the Router's Internet IP address, and 8080 represents the specified
port) in your web browser’s
Address
field. You will be asked for the Router’s
password. After successfully entering the password, you will be able to access
the Router’s web-based utility.
MTU
MTU is the Maximum Transmission Unit. It specifies the largest pack-
et size permitted for Internet transmission. Keep the default setting,
Auto
, to
have the Router select the best MTU for your Internet connection. To specify a
MTU size, select
Manual
, and enter the value desired (default is
1400
).
You
should leave this value in the 1200 to 1500 range.
Log
The Router can keep logs of all traffic for your Internet connection. To
disable the Log function, keep the default setting,
Disable
. To monitor traffic
between the network and the Internet, select
Enable
.
Temporary logs can be accessed by clicking either the
Incoming Access Log
or
Outgoing Access Log
button.
The Incoming Access Log gives you a log of all the incoming Internet traffic,
displaying the Source IP address and Destination Port Number of the Router
for each activity (see Figure 6-11). Click the
Refresh
button to update the logs.
Click the
Close
button to return to the
System
screen.
40
Note:
If the Remote Management feature is enabled, anyone who
knows the Router’s Internet IP address and password will be able to
alter the Router’s settings.
Figure 6-11
Figure 6-12
Page 25 / 61
Wireless-G Broadband Router
43
Instant Wireless
®
Series
42
Number of DHCP Users
(Optional) Enter the maximum number of PCs that
you want the DHCP server to assign IP addresses to. This number cannot be
greater than 253. The default is
50
.
Client Lease Time
The Client Lease Time is the amount of time a network
user will be allowed connection to the Router with their current dynamic IP
address. Enter the amount of time, in minutes, that the user will be “leased” this
dynamic IP address. After the time is up, the user will be automatically
assigned a new dynamic IP address. The default is
0
minutes, which means one
day.
Static DNS 1-3
The Domain Name System (DNS) is how the Internet trans-
lates domain or website names into Internet addresses or URLs. Your ISP will
provide you with at least one DNS Server IP Address. If you wish to use anoth-
er, type that IP Address in one of these fields. You can type up to three DNS
Server IP Addresses here. The Router will use these for quicker access to func-
tioning DNS servers.
WINS
The Windows Internet Naming Service (WINS) manages each PC’s
interaction with the Internet. If you use a WINS server, enter that server’s IP
Address here. Otherwise, leave this blank.
Currently Assigned: DHCP Clients Table
Click the
DHCP Clients Table
button to view the list of PCs that are given IP addresses by the Router (see
Figure 6-14). For each PC, the list shows the Client Hostname, IP Address,
MAC Address, and and the amount of DHCP client lease time left. Click the
Refresh
button to display the most current information.
To save your changes on this page, click the
Apply
button. To cancel any
unsaved changes on this page, click the
Cancel
button. To get more information
about the features, click the
Help
button.
Figure 6-14
The
DHCP
screen allows you to configure the settings for the Router’s Dynamic
Host Configuration Protocol (DHCP) server function. The Router can be used as
a DHCP server for your network. A DHCP server automatically assigns an IP
address to each computer on your network.
If you choose to enable the Router’s DHCP server option, you must configure all
of your network PCs to connect to a DHCP server (the Router), and make sure
there is no other DHCP server on your network.
DHCP Server
DHCP is enabled by factory default. If you already have a
DHCP server on your network, or you don’t want a DHCP server, then click the
Disable
radio button (no other DHCP features will be available).
Starting IP Address
Enter a value for the DHCP server to start with when
issuing IP addresses.
Because the Router’s default IP address is
192.168.1.1
,
the Starting IP Address must be 192.168.1.2 or greater, but smaller than
192.168.1.253. The default Starting IP Address is
192.168.1.100
.
DHCP
Figure 6-13

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top