Cisco Systems WRTP54G manual Wireless-G Broadband Router with 2 Phone Ports

Page 89

Wireless-G Broadband Router with 2 Phone Ports

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Two modes are available: Pre-Shared Key and RADIUS. Pre-Shared Key gives you one encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers.

WPA Pre-Shared Key. If you do not have a RADIUS server, Select the type of algorithm, TKIP or AES, enter a password in the Pre-Shared key field of 8-64 characters, and enter a Group Key Renewal period time between 0 and 99,999 seconds, which instructs the Router or other device how often it should change the encryption keys.

IMPORTANT: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

Appendix B: Wireless Security

81

Security Threats Facing Wireless Networks

Image 89
Contents Division of Cisco Systems, Inc Wireless- GPage Word definition How to Use this GuideCopyright and Trademarks Wireless-G Broadband Router with 2 Phone Ports Table of Contents Vonage 103 Linksys Appendix C Finding the MAC Address and IPWireless Security WEP Wireless Security RadiusWireless MAC Filter Wireless Security37 Dhcp Active IP Table Welcome IntroductionWhat’s in this Guide? Introduction What’s in this Guide? Wireless-G Broadband Router with 2 Phone Ports Ad-Hoc versus Infrastructure Mode Planning Your Wireless NetworkSsid your wireless network’s name Network TopologyNetwork Layout Back Panel Getting to Know the RouterFront Panel PowerOverview Connecting the RouterConnect the Modem Connection InstructionsStand Option Placement OptionsMeasurement between Wall-Mount Slots Wall-Mount OptionConfiguring the Router Security SetupWireless Administration Access RestrictionsApplications & Gaming StatusVoice How to Access the Web-based UtilityInternet Setup Setup Tab Basic SetupInternet Connection Type Obtain an IP automaticallyStatic IP Packet a unit of data sent over a network Network SetupOptional Settings Router IP Network Address Server Settings DhcpTime Setting Setup Tab DdnsTZO.com DynDNS.orgMAC Clone Setup Tab MAC Address CloneAdvanced Routing Setup Tab Advanced Routing10 Routing Table Entry List Wireless Settings Wireless Tab Basic Wireless SettingsWireless Security Wireless Tab Wireless Security13 Wireless Tab Wireless Security WPA-RADIUS 15 Wireless Tab Wireless Security WEP Wireless MAC Filter Wireless Tab Wireless MAC FilterAdvanced Wireless Settings Wireless Tab Advanced Wireless SettingsWireless-G Broadband Router with 2 Phone Ports Web Filters Security Tab FirewallFilter IP Address Range Access Restrictions Tab FilterFilter Port Range Filter MAC AddressBlock WAN Requests Access Control Access Restrictions Tab Device Access ControlPort Range Applications & Gaming Tab Port Range ForwardingPort Range Forwarding Triggered Range Applications & Gaming Tab Port TriggeringPort Triggering Forwarded Range Applications & Gaming Tab UPnP ForwardingUPnP Forwarding Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports DMZ Applications & Gaming Tab DMZIP QoS Applications & Gaming Tab QoS29 QoS Create Rule Router Password Administration Tab ManagementLocal Router Access UPnPLog Administration Tab Log32 Administration Tab Factory Defaults Administration Tab Factory DefaultsTraceroute Test Administration Tab DiagnosticsPing Test Local Network Status Tab Local NetworkInformation Status Tab RouterStatus Tab Router 39 Status Tab Wireless Status Tab WirelessLine2 Status Status Tab VoiceLine1 Status 42 Voice Tab Voice TabCommon Problems and Solutions Appendix a TroubleshootingNeed to set a static IP address on a PC For Windows 98 and MillenniumFor Windows XP For WindowsWant to test my Internet connection For Windows XP Wireless-G Broadband Router with 2 Phone Ports Am not able to access the Router’s Web-based Utility Setup Need to set up a server behind my Router TCP Application Start and End Protocol IP Address EnabledCan’t get the Internet game, server, or application to work Appendix a Troubleshooting Common Problems and Solutions My DSL service’s PPPoE is always disconnecting To start over, I need to set the Router to factory defaultFor Microsoft Internet Explorer 5.0 or higher For Netscape 4.7 or higherWireless-G Broadband Router with 2 Phone Ports Go through this checklist until your problem is solved Where is the Router installed on the network? Frequently Asked QuestionsHow do I make a phone call? Can I make calls if my Internet connection is down?What is Network Address Translation and what is it used for? How can I block corrupted FTP downloads? Will the Router function in a Macintosh environment? If all else fails in the installation, what can I do?What is DMZ Hosting? Is the Router cross-platform compatible? What is the Ieee 802.11b standard?How many ports can be simultaneously forwarded? Which modems are compatible with the Router?What Ieee 802.11g features are supported? What is the Ieee 802.11g standard?What Ieee 802.11b features are supported? What is roaming? What is ad-hoc mode?What is infrastructure mode? What is DSSS? What is FHSS? And what are their differences? What is ISM band?What is Spread Spectrum? What is WPA? What is WEP?What is a MAC Address? How do I reset the Router?How many channels/frequencies are available with the Router? Have excellent signal strength, but I cannot see my networkSecurity Precautions Appendix B Wireless SecuritySecurity Threats Facing Wireless Networks Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Windows 98 or Me Instructions Figure C-1 IP Configuration ScreenFor the Router’s Web-based Utility Windows 2000 or XP InstructionsNetwork Neighborhood/My Network Places Appendix D Windows HelpShared Resources Appendix D Windows Help Appendix E Glossary Appendix E Glossary Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Appendix F Specifications Storage Humidity Warranty Year LimitedOperating Humidity Limited Warranty Appendix G Warranty InformationAppendix G Warranty Information Federal Communication Commission Interference Statement Appendix H Regulatory InformationImportant Note 101 Safety Notices Vonage Appendix I Contact InformationLinksys Need to contact Vonage?Linksys

WRTP54G specifications

Cisco Systems is a prominent name in the realm of networking and communication technology, and one of its notable offerings is the WRTP54G, a versatile wireless router designed to enhance home and small office networks. With its dual functionality as both a router and a VoIP (Voice over Internet Protocol) gateway, the WRTP54G stands out by combining traditional internet access with advanced voice communication capabilities.

One of the main features of the WRTP54G is its robust wireless connectivity. It complies with the IEEE 802.11g standard, providing high-speed wireless connections of up to 54 Mbps, which is ideal for streaming media, online gaming, and fast data transfers. The router's built-in antenna ensures a wide coverage area, enabling users to enjoy seamless internet access throughout their homes or small offices.

The WRTP54G also integrates a four-port Ethernet switch, allowing users to connect multiple wired devices directly. This feature is particularly useful for setups that require stable connections, such as desktop computers, printers, and game consoles. Each port supports auto-sensing, which optimizes the performance of connected devices.

A standout characteristic of the WRTP54G is its VoIP functionality, enabling users to make phone calls over the internet. With two telephone ports, users can connect regular telephones to the router, facilitating VoIP calls without requiring additional equipment. This feature is complemented by comprehensive call management features, including call waiting, caller ID, and three-way calling, making it a great choice for users looking to reduce traditional phone bills.

Security is a top priority for the WRTP54G, which includes essential security protocols such as WEP, WPA, and WPA2 encryption. These measures help protect users’ data from unauthorized access and ensure a safe browsing experience. Additionally, the router supports firewall features that provide an extra layer of protection against external threats.

In terms of setup and management, Cisco has ensured that the WRTP54G is user-friendly. The web-based interface allows users to easily configure the router, manage network settings, and monitor connected devices.

Overall, the Cisco WRTP54G is a powerful networking solution that combines wireless connectivity with VoIP capabilities, making it an ideal choice for users seeking to enhance their home or small office internet experience. With its combination of flexibility, security, and ease of use, it remains a relevant option in the competitive landscape of home networking technology.