Linksys WRV200 manual Wireless Wireless Network Access

Page 21

Chapter 5

Configuring the Wireless-G Router

using 64-bit WEP encryption, the key must be exactly 10 hexadecimal characters in length. If you are using 128-bit WEP encryption, the key must be exactly 26 hexadecimal characters in length. Valid hexadecimal characters are “0” to “9” and “A” to “F”.

When you have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to undo your changes. For help information, click More.

WEP

WEP is a basic encryption method, which is not as secure as WPA. To indicate which WEP key to use, select the appropriate Default Transmit Key number. Then, select the level of WEP encryption, 64 bits (10 hex digits) or 128 bits (26 hex digits). Higher encryption levels offer higher levels of security, but due to the complexity of the encryption, they may decrease network performance.

Wireless Security - WEP

Instead of manually entering WEP keys, you can enter a Passphrase to generate one or more WEP keys. The Passphrase is case-sensitive and should have no more than 32 alphanumeric characters. If you want to use a Passphrase, enter it in the Passphrase field and click Generate.

If you want to enter the WEP key(s) manually, then enter it in the Key 1-4field(s). (Do not leave a field blank, and do not enter all zeroes; they are not valid key values.) If you are using 64-bit WEP encryption, the key must be exactly 10 hexadecimal characters in length. If you are using 128-bit WEP encryption, the key must be exactly 26 hexadecimal characters in length. Valid hexadecimal characters are “0” to “9” and “A” to “F”.

When you have finished making changes to the screen, click Save Settings to save the changes, or click Cancel

Changes to undo your changes. For help information, click More.

Wireless > Wireless Network Access

This screen allows you to control access to your wireless network for each SSID.

Wireless > Wireless Network Access

Wireless Network Access

Access List  To allow the designated computers to access your network, select Permit to access. To block the designated computers from accessing your wireless network, select Prevent from accessing. Click Disabled to disable the access function.

MAC 1-16 Enter the MAC addresses of the designated computers. For a more convenient way to add MAC addresses, click Select MAC Address From Networked Computers. The Networked Computers screen will appear. Select the MAC addresses you want. Then click Select. Click Refresh if you want to refresh the screen. Click Close to return to the previous screen.

Networked Computers

When you have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to undo your changes. For help information, click More.

Wireless-G VPN Router with RangeBooster

16

Image 21
Contents Wireless-G VPN Router with RangeBooster About This Guide About This GuideTable of Contents Appendix B Wireless Security Checklist Appendix a TroubleshootingAppendix E Gateway-to-Gateway VPN Tunnel Appendix I Regulatory InformationAppendix J Contact Information Introduction ChapterAd-Hoc versus Infrastructure Mode Chapter Planning Your Wireless NetworkNetwork Topology Network LayoutWhy do I need a VPN? What is a VPN?Chapter Planning Your Virtual Private Network VPN VPN Router to VPN Router Computer using the Linksys VPN client software to VPN RouterProduct Overview Chapter Product OverviewFront Panel Back PanelOverview Chapter Configuring the Wireless-G VPN RouterSetup How to Access the Web-based UtilitySetup Basic Settings Internet SetupPptp LAN Setup Optional Settings Required by some ISPsSetup Vlan Setup DdnsTime Settings Ddns Setup MAC Address CloneSetup Advanced Routing Dynamic RoutingStatic Routing Wireless Basic Wireless Settings WirelessWireless Wireless Security Wireless Network ModeWPA2 Personal WPA EnterpriseWPA2 Enterprise WPA2 Enterprise Mixed WPA2 Personal MixedWireless Network Access Wireless Wireless Network AccessWireless Advanced Wireless Settings Wireless WDSAdvanced Wireless Settings Firewall General FirewallFirewall Port Forwarding Internet BlockFirewall DMZ Firewall Port TriggeringFirewall Access Restriction VPN VPN Client AccessFirewall URL Filtering VPN VPN Passthrough VPN Client List TableCertificate Management VPN IPSec VPN Local Secure GroupRemote Secure Group Remote Secure Gateway Key ManagementTunnel Options VPN VPN Summary QoS Application-Based QoS QoSQoS Port-Based QoS Priority QueueAdministration Management AdministrationAdmin Password Local Router AccessAdministration Log Backup and RestoreUPnP Administration Factory Default Administration DiagnosticsAdministration Firmware Upgrade Ping TestStatus Administration RebootStatus Router InformationStatus Local Network Status WirelessStatus System Performance Local NetworkStatus VPN Clients System PerformanceVPN Summary Troubleshooting Appendix a TroubleshootingAppendix a WindowsTroubleshooting Need to set up a server behind my Router Go to the Firewall DMZ tab Click Save SettingsClick the Firewall Port Triggering tab Go to the Setup Basic Setup tabWRV200 does not support NetBIOS Broadcast over Frequently Asked QuestionsIs the Router cross-platform compatible? Wireless Security Checklist Appendix B Wireless Security ChecklistAppendix B General Network Security GuidelinesAppendix C Installing from the CD-ROMAppendix C Overview Before You BeginVersion Number of the QuickVPN Client Using the Linksys QuickVPN SoftwareSelect VPN, then VPN Client Access Distributing Certificates to QuickVPN Users\Program Files\Linksys\QuickVPN Client\ Introduction Appendix DEnvironment Create an IPSec PolicyFilter List 2 router win Tunnel 1 win-Router Configure Individual Tunnel RulesTunnel 2 Router-win Rules Tab Assign New IPSec Policy Create a Tunnel Through the Web-Based UtilityYour tunnel should now be established Appendix E Configuration of the WRV200Appendix E Gateway-to-Gateway VPN Tunnel Click IPSec VPNConfiguration of the RV082 Configuration of PC 1 and PCClick the Gateway to Gateway tab RV082 WRV200 Dynamic IP B.B.B.B with Configuration when Both Gateways Use Dynamic IP Addresses RV082 VPN Settings Appendix F Glossary Appendix FGlossary Http HyperText Transport ProtocolSmtp Simple Mail Transfer Protocol The standard e GlossaryAppendix F Appendix G Specifications SpecificationsAppendix G Specifications Obtaining Warranty Service Warranty InformationAppendix H Exclusions and LimitationsTechnical Support Warranty InformationRegulatory Information AppendixAvis d’Industrie Canada Wireless DisclaimerDansk Danish Miljøinformation for kunder i EU Appendix Norsk Norwegian Miljøinformasjon for kunder i EU Appendix Contact Information Appendix J
Related manuals
Manual 2 pages 11.27 Kb