Cisco Systems WRV54G What is the Ieee 802.11g standard?, What is ad-hoc mode?, What is roaming?

Page 64

Wireless-G VPN Broadband Router

What is the IEEE 802.11g standard?

It is one of the IEEE standards for wireless networks. The 802.11g standard allows wireless networking hardware from different manufacturers to communicate, provided that the hardware complies with the 802.11g standard. The 802.11g standard states a maximum data transfer rate of 54Mbps and an operating frequency of 2.4GHz.

What IEEE 802.11b features are supported?

The product supports the following IEEE 802.11b functions:

CSMA/CA plus Acknowledge protocol

Multi-Channel Roaming

Automatic Rate Selection

RTS/CTS feature

Fragmentation

Power Management

What is ad-hoc mode?

When a wireless network is set to ad-hoc mode, the wireless-equipped computers are configured to communicate directly with each other. The ad-hoc wireless network will not communicate with any wired network.

What is infrastructure mode?

When a wireless network is set to infrastructure mode, the wireless network is configured to communicate with a wired network through a wireless access point.

What is roaming?

Roaming is the ability of a portable computer user to communicate continuously while moving freely throughout an area greater than that covered by a single access point. Before using the roaming function, the workstation must make sure that it is the same channel number with the access point of dedicated coverage area.

To achieve true seamless connectivity, the wireless LAN must incorporate a number of different functions. Each node and access point, for example, must always acknowledge receipt of each message. Each node must maintain contact with the wireless network even when not actually transmitting data. Achieving these functions simultaneously requires a dynamic RF networking technology that links access points and nodes. In such a system, the user’s end node undertakes a search for the best possible access to the system. First, it evaluates such factors as signal strength and quality, as well as the message load currently being carried by each access point and the distance of each access point to the wired backbone. Based on that information, the node next selects the right access point and registers its address. Communications between end node and host computer can then be transmitted up and down the backbone.

As the user moves on, the end node’s RF transmitter regularly checks the system to determine whether it is in touch with the original access point or whether it should seek a new one. When a node no longer receives

Appendix A: Troubleshooting

60

Frequently Asked Questions

Image 64
Contents 802 GHz .11g Wireless- G Copyright and Trademarks How to Use this GuideWord definition Table of Contents Wireless Security Frequently Asked QuestionsIntroduction WelcomeWhat’s in this Guide? Wireless-G Broadband VPN Router Planning your Wireless Network Router’s FunctionsIP Addresses What’s an IP Address?Dhcp Dynamic Host Configuration Protocol Servers Why do I need a VPN?Dynamic IP Addresses What is a VPN? VPN Router to VPN Router Wireless-G VPN Broadband Router Getting to Know the Wireless-G VPN Broadband Router Back PanelFront Panel DMZConnecting the Wireless-G Broadband Router OverviewWired Connection to a PC Wireless Connection to a PCWireless-G VPN Broadband Router Configuring the PCs Configuring Windows 98 and Millennium PCsConfiguring Windows 2000 PCs PropertiesConfiguring Windows XP PCs Setup Configuring the RouterWireless Access Restrictions AdministrationSecurity Applications & GamingHow to Access the Web-based Utility Setup TabBasic Setup Tab Internet SetupStatic Internet Connection Type Optional Settings Required by some ISPs Pptp Internet Connection TypeNetwork Setup Ddns Tab DynDNS.orgMAC Address Clone Tab See Figure Advanced Routing TabMAC Clone Advanced RoutingStatic Routing 10 Routing TableBasic Wireless Settings See Figure Wireless TabWireless Network Wireless Security WEP See FigureWireless Network Access See Figure 13 Wireless Network AccessAdvanced Wireless Settings See Figure 15 Advanced Wireless SettingsSecurity Tab FirewallVPN 18 Manual Key Management 19 Advanced VPN Tunnel Setup WEP Access Restrictions Tab Access Restriction23 Internet Filter Summary Applications and Gaming Tab Port Range ForwardingPort Triggering 27 Port TriggeringUPnP Forwarding 28 UPnP ForwardingDMZ Router Password Administration TabManagement Log UPnPEmail Alert Syslog NotificationDiagnostics Notification Queue LengthAlert Log General Log33 Factory Default Status RouterInformation WAN ConnectionsLocal Network 36 Local Network38 Wireless System PerformanceCommon Problems and Solutions Appendix a TroubleshootingNeed to set a static IP address on a PC Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router TCP UDP Can’t get the Internet game, server, or application to work Need to upgrade the firmware To start over, I need to set the Router to factory defaultFirmware upgrade failed, and/or the Power LED is flashing My DSL service’s PPPoE is always disconnecting Power LED flashes continuouslyFrequently Asked Questions Where is the Router installed on the network?Is IPSec Pass-Through supported by the Router? Does the Router support IPX or AppleTalk?What is Network Address Translation and what is it used for? Does the Router support ICQ send file?How can I block corrupted FTP downloads? What is DMZ Hosting? What are the advanced features of the Router?Is the Router cross-platform compatible? How many ports can be simultaneously forwarded?What is the Ieee 802.11g standard? What Ieee 802.11b features are supported?What is ad-hoc mode? What is infrastructure mode?What is ISM band? What is Spread Spectrum?What is DSSS? What is FHSS? And what are their differences? What is WEP?How do I resolve issues with signal loss? How do I reset the Router?Have excellent signal strength, but I cannot see my network Brief Overview Appendix B Wireless SecurityWhat Are The Risks? Passive Attacks Jamming AttacksMaximizing Wireless Security Active AttacksDictionary-Building or Table Attacks Man-in-the-Middle Attacks5SSID 8WEP Wireless-G VPN Broadband Router 4GHz/802.11b and 802.11g WEP Encryption Figure B-2 WEPEnvironment WRV54GHow to Establish a Secure IPSec Tunnel Create an IPSec PolicyBuild Filter Lists Filter List 1 win-routerFilter List 2 router-win Figure C-4 IP Filter ListFigure C-7 IP Filter List Configure Individual Tunnel Rules Tunnel 1 win-routerFigure C-13 Authentication Methods Figure C-16 Tunnel Setting Tab Tunnel 2 router-winFigure C-19 IP Filter List Tab Figure C-22 Preshared Key Assign New IPSec Policy Figure C-25 Connection TypeCreate a Tunnel Through the Web-Based Utility Figure C-28 VPN TabFigure D-1 IP Configuration Screen Windows 98 or Me InstructionsWindows 2000 or XP Instructions Figure D-3 MAC Address/Physical AddressAppendix E Snmp Functions Figure F-1 Upgrade Firmware Appendix F Upgrading FirmwareShared Resources Appendix G Windows HelpNetwork Neighborhood/My Network Places Appendix H Glossary Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router Transmit Power 19dBm LEDs Appendix I SpecificationsUp to 54Mbps wireless, up to 100 Mbps LAN Appendix J Regulatory Information FCC StatementFCC Part 68 Statement Safety Notices Appendix K Warranty Information Limited WarrantyAppendix L Contact Information