Page 6 / 178 Scroll up to view Page 1 - 5
M-10153-01
2
Contents
How to Manually Configure Your Internet Connection
....................................................
3-9
Manual PPPoE Configuration
................................................................................
3-11
Manual PPTP Configuration
...................................................................................
3-13
Manual Telstra Bigpond Configuration
...................................................................
3-15
Chapter 4
Wireless Configuration
Observing Performance, Placement, and Range Guidelines
.........................................
4-1
Implementing Appropriate Wireless Security
..................................................................
4-2
Wireless Mode Options
..................................................................................................
4-3
Default Basic Wireless Settings
...............................................................................
4-4
Basic 802.11a Wireless Settings
..............................................................................
4-4
Basic 802.11g Wireless Settings
..............................................................................
4-6
Wireless Security Settings
..............................................................................................
4-9
WEP Authentication and Encryption
........................................................................
4-9
Security Mode Selection
..................................................................................
4-10
Cipher Type Choices
.......................................................................................
4-10
WPA Encryption
.....................................................................................................
4-11
Recording Your SSID and Security Settings
.................................................................
4-13
Setting Up and Testing Basic Wireless Connectivity
....................................................
4-14
Restricting Wireless Access by MAC Address
.......................................................
4-15
Configuring WEP
....................................................................................................
4-17
Configuring WPA-PSK Encryption Security
...........................................................
4-18
Configuring Advanced Wireless Settings
.....................................................................
4-19
Default Advanced Wireless Settings
......................................................................
4-19
Configuring Advanced 802.11a Wireless Settings
.................................................
4-20
Configuring Advanced 802.11b/g Wireless Settings
..............................................
4-21
Chapter 5
Content Filtering
Blocking Access to Internet Sites
...................................................................................
5-1
Blocking Access to Internet Services
.............................................................................
5-3
Scheduling When Blocking Will Be Enforced
.................................................................
5-5
Viewing Logs of Web Access or Attempted Web Access
...............................................
5-6
Configuring E-Mail Alert and Web Access Log Notifications
..........................................
5-8
Page 7 / 178
Contents
3
M-10153-01
Chapter 6
Maintenance
Viewing Wireless Router Status Information
...................................................................
6-1
Viewing a List of Attached Devices
.................................................................................
6-5
Upgrading the Router Software
......................................................................................
6-5
Configuration File Management
.....................................................................................
6-7
Restoring and Backing Up the Configuration
...........................................................
6-7
Erasing the Configuration
.........................................................................................
6-8
Changing the Administrator Password
...........................................................................
6-8
Chapter 7
Advanced Configuration
Comparison of Port Triggering and Port Forwarding
......................................................
7-1
Configuring Port Forwarding
...........................................................................................
7-2
Adding a Port Forwarding Custom Service
..............................................................
7-3
Local Web and FTP Server Example
.......................................................................
7-4
Configuring Port Triggering
.............................................................................................
7-5
Configuring WAN Setup Options
....................................................................................
7-6
Configuring LAN IP Setup Options
.................................................................................
7-8
Using the Router as a DHCP Server
......................................................................
7-10
Using Address Reservation
....................................................................................
7-11
Using a Dynamic DNS Service
.....................................................................................
7-12
Configuring Static Routes
.............................................................................................
7-13
Enabling Remote Management Access
.......................................................................
7-16
Using Universal Plug and Play (UPnP)
........................................................................
7-17
Chapter 8
Troubleshooting
Basic Functioning
...........................................................................................................
8-1
Power LED Not On
...................................................................................................
8-2
LEDs Never Turn Off
................................................................................................
8-2
Local or Internet Port LEDs Not On
.........................................................................
8-2
Troubleshooting the Web Configuration Interface
..........................................................
8-3
Troubleshooting the ISP Connection
..............................................................................
8-4
Troubleshooting a TCP/IP Network Using a Ping Utility
.................................................
8-5
Testing the LAN Path to the WGU624
......................................................................
8-5
Testing the Path from Your PC to a Remote Device
................................................
8-6
Page 8 / 178
M-10153-01
4
Contents
Restoring the Default Configuration and Password
........................................................
8-7
Problems with Date and Time
.........................................................................................
8-7
Why Does the WGU624 Not Reach Full 108 Mbps Speeds?
.........................................
8-8
Appendix A
Technical Specifications
Appendix B
Network, Routing, Firewall, and Basics
Related Publications
......................................................................................................
B-1
Basic Router Concepts
..................................................................................................
B-1
What is a Router?
...................................................................................................
B-1
Routing Information Protocol
...................................................................................
B-2
IP Addresses and the Internet
.......................................................................................
B-2
Netmask
..................................................................................................................
B-4
Subnet Addressing
..................................................................................................
B-5
Private IP Addresses
...............................................................................................
B-7
Single IP Address Operation Using NAT
.......................................................................
B-8
MAC Addresses and Address Resolution Protocol
.................................................
B-9
Related Documents
.................................................................................................
B-9
Domain Name Server
............................................................................................
B-10
IP Configuration by DHCP
...........................................................................................
B-10
Internet Security and Firewalls
....................................................................................
B-10
What is a Firewall?
.................................................................................................
B-11
Stateful Packet Inspection
...............................................................................
B-11
Denial of Service Attack
..................................................................................
B-11
Ethernet Cabling
...........................................................................................................
B-11
Category 5 Cable Quality
......................................................................................
B-12
Inside Twisted Pair Cables
....................................................................................
B-13
Uplink Switches, Crossover Cables, and MDI/MDIX Switching
............................
B-14
Appendix C
Preparing Your Network
Preparing Your Computers for TCP/IP Networking
.......................................................
C-1
Configuring Windows 95, 98, and Me for TCP/IP Networking
.......................................
C-2
Install or Verify Windows Networking Components
.................................................
C-2
Enabling DHCP to Automatically Configure TCP/IP Settings
.................................
C-4
Selecting Windows’ Internet Access Method
..........................................................
C-6
Page 9 / 178
Contents
5
M-10153-01
Verifying TCP/IP Properties
....................................................................................
C-6
Configuring Windows NT4, 2000 or XP for IP Networking
............................................
C-7
Install or Verify Windows Networking Components
.................................................
C-7
DHCP Configuration of TCP/IP in Windows XP, 2000, or NT4
...............................
C-8
DHCP Configuration of TCP/IP in Windows XP
.....................................................
C-8
DHCP Configuration of TCP/IP in Windows 2000
................................................
C-10
DHCP Configuration of TCP/IP in Windows NT4
..................................................
C-13
Verifying TCP/IP Properties for Windows XP, 2000, and NT4
..............................
C-15
Configuring the Macintosh for TCP/IP Networking
......................................................
C-16
MacOS 8.6 or 9.x
..................................................................................................
C-16
MacOS X
...............................................................................................................
C-17
Verifying TCP/IP Properties for Macintosh Computers
.........................................
C-17
Verifying the Readiness of Your Internet Account
.......................................................
C-18
Are Login Protocols Used?
...................................................................................
C-18
What Is Your Configuration Information?
..............................................................
C-18
Obtaining ISP Configuration Information for Windows Computers
.......................
C-19
Obtaining ISP Configuration Information for Macintosh Computers
.....................
C-20
Restarting the Network
................................................................................................
C-21
Appendix D
Wireless Networking Basics
Wireless Networking Overview
......................................................................................
D-1
Infrastructure Mode
.................................................................................................
D-1
Ad Hoc Mode (Peer-to-Peer Workgroup)
................................................................
D-2
Network Name: Extended Service Set Identification (ESSID)
................................
D-2
Authentication and WEP
................................................................................................
D-3
802.11 Authentication
..............................................................................................
D-3
Open System Authentication
...................................................................................
D-4
Shared Key Authentication
......................................................................................
D-4
Overview of WEP Parameters
................................................................................
D-5
Key Size
..................................................................................................................
D-6
WEP Configuration Options
....................................................................................
D-7
Wireless Channels
.........................................................................................................
D-7
WPA Wireless Security
..................................................................................................
D-8
How Does WPA Compare to WEP?
........................................................................
D-9
How Does WPA Compare to IEEE 802.11i?
........................................................
D-10
Page 10 / 178
M-10153-01
6
Contents
What are the Key Features of WPA Security?
......................................................
D-10
WPA Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS
..................................................
D-12
WPA Data Encryption Key Management
........................................................
D-14
Is WPA Perfect?
....................................................................................................
D-16
Product Support for WPA
......................................................................................
D-16
Supporting a Mixture of WPA and WEP Wireless Clients is Discouraged
......
D-16
Changes to Wireless Access Points
...............................................................
D-17
Changes to Wireless Network Adapters
.........................................................
D-17
Changes to Wireless Client Programs
............................................................
D-18
Glossary
List of Glossary Terms
...................................................................................................
G-1
Index

Rate

4.3 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top