Linksys WRV200 manual Chapter Planning Your Wireless Network, Network Topology, Network Layout

Page 7

Chapter 2

Chapter 2:

Planning Your Wireless

Network

Network Topology

A wireless local area network (WLAN) is exactly like a regular local area network (LAN), except that each computer in the WLAN uses a wireless device to connect to the network. Computers in a WLAN share the same frequency channel and SSID, which is an identification name shared by the wireless devices belonging to the same wireless network.

Ad-Hoc versus Infrastructure Mode

Unlike wired networks, wireless networks have two different modes in which they may be set up: infrastructure and ad-hoc. An infrastructure configuration is a WLAN and wired LAN communicating to each other through an access point. An ad-hoc configuration is wireless- equipped computers communicating directly with each other. Choosing between these two modes depends on whether or not the wireless network needs to share data or peripherals with a wired network or not.

If the computers on the wireless network need to be accessible by a wired network or need to share a peripheral, such as a printer, with the wired network computers, the wireless network should be set up in Infrastructure mode. The basis of Infrastructure mode centers around an access point or wireless router, such as the Wireless-G VPN Router, which serves as the main point of communications in a wireless network. The Router transmits data to PCs equipped with wireless network adapters, which can roam within a certain radial range of the Router. You can arrange the Router and multiple access points to work in succession to extend the roaming range, and you can set up your wireless network to communicate with your Ethernet hardware as well.

If the wireless network is relatively small and needs to share resources only with the other computers on the wireless network, then the Ad-Hoc mode can be used. Ad-Hoc mode allows computers equipped with wireless transmitters and receivers to communicate directly with each other, eliminating the need for a wireless router or access point. The drawback of this mode is that in Ad- Hoc mode, wireless-equipped computers are not able to communicate with computers on a wired network. And, of course, communication between the wireless-equipped computers is limited by the distance and interference directly between them.

Networking and Security Basics

Network Layout

The Wireless-G VPN Router has been specifically designed for use with both your 802.11b and 802.11g products. Now, products using these standards can communicate with each other.

The Wireless-G VPN Router is compatible with all 802.11g and 802.11n adapters, such as the Notebook Adapters (WPC4400N, WPC200) for your laptop computers, PCI Adapter (WMP200) for your desktop PC, and USB Adapter (WUSB200, USB1000) when you want to enjoy USB connectivity. The Router will also communicate with Wireless Ethernet Bridges (WET200).

When you wish to connect your wireless network with your wired network, you can use the Router’s four LAN ports. To add more ports, any of the Router’s LAN ports can be connected to any Linksys Business Series switch (such as the SLM series or SRW series switches).

With these, and many other, Linksys products, your networking options are limitless. Go to the Linksys website at www.linksys.com for more information about products that work with the Wireless-G VPN Router with RangeBooster.

Network Diagram

Wireless-G VPN Router with RangeBooster



Image 7
Contents Wireless-G VPN Router with RangeBooster About This Guide About This GuideTable of Contents Appendix B Wireless Security Checklist Appendix a TroubleshootingAppendix I Regulatory Information Appendix E Gateway-to-Gateway VPN TunnelAppendix J Contact Information Introduction ChapterNetwork Layout Chapter Planning Your Wireless NetworkAd-Hoc versus Infrastructure Mode Network TopologyWhat is a VPN? Why do I need a VPN?Chapter Planning Your Virtual Private Network VPN VPN Router to VPN Router Computer using the Linksys VPN client software to VPN RouterBack Panel Chapter Product OverviewProduct Overview Front PanelOverview Chapter Configuring the Wireless-G VPN RouterInternet Setup How to Access the Web-based UtilitySetup Setup Basic SettingsPptp LAN Setup Optional Settings Required by some ISPsSetup Ddns Setup VlanTime Settings Ddns Setup MAC Address CloneDynamic Routing Setup Advanced RoutingStatic Routing Wireless Network Mode WirelessWireless Basic Wireless Settings Wireless Wireless SecurityWPA Enterprise WPA2 PersonalWPA2 Enterprise WPA2 Enterprise Mixed WPA2 Personal MixedWireless Network Access Wireless Wireless Network AccessWireless WDS Wireless Advanced Wireless SettingsAdvanced Wireless Settings Internet Block FirewallFirewall General Firewall Port ForwardingFirewall DMZ Firewall Port TriggeringVPN VPN Client Access Firewall Access RestrictionFirewall URL Filtering VPN Client List Table VPN VPN PassthroughCertificate Management Local Secure Group VPN IPSec VPNRemote Secure Group Key Management Remote Secure GatewayTunnel Options VPN VPN Summary Priority Queue QoSQoS Application-Based QoS QoS Port-Based QoSLocal Router Access AdministrationAdministration Management Admin PasswordBackup and Restore Administration LogUPnP Ping Test Administration DiagnosticsAdministration Factory Default Administration Firmware UpgradeInformation Administration RebootStatus Status RouterLocal Network Status WirelessStatus Local Network Status System PerformanceSystem Performance Status VPN ClientsVPN Summary Windows Appendix a TroubleshootingTroubleshooting Appendix aTroubleshooting Need to set up a server behind my Router Go to the Firewall DMZ tab Click Save SettingsClick the Firewall Port Triggering tab Go to the Setup Basic Setup tabWRV200 does not support NetBIOS Broadcast over Frequently Asked QuestionsIs the Router cross-platform compatible? General Network Security Guidelines Appendix B Wireless Security ChecklistWireless Security Checklist Appendix BOverview Before You Begin Installing from the CD-ROMAppendix C Appendix CVersion Number of the QuickVPN Client Using the Linksys QuickVPN SoftwareDistributing Certificates to QuickVPN Users Select VPN, then VPN Client Access\Program Files\Linksys\QuickVPN Client\ Create an IPSec Policy Appendix DIntroduction EnvironmentFilter List 2 router win Tunnel 1 win-Router Configure Individual Tunnel RulesTunnel 2 Router-win Rules Tab Create a Tunnel Through the Web-Based Utility Assign New IPSec PolicyYour tunnel should now be established Click IPSec VPN Configuration of the WRV200Appendix E Appendix E Gateway-to-Gateway VPN TunnelConfiguration of PC 1 and PC Configuration of the RV082Click the Gateway to Gateway tab RV082 WRV200 Dynamic IP B.B.B.B with Configuration when Both Gateways Use Dynamic IP Addresses RV082 VPN Settings Http HyperText Transport Protocol Appendix FAppendix F Glossary GlossarySmtp Simple Mail Transfer Protocol The standard e GlossaryAppendix F Specifications Appendix G SpecificationsAppendix G Specifications Exclusions and Limitations Warranty InformationObtaining Warranty Service Appendix HTechnical Support Warranty InformationRegulatory Information AppendixAvis d’Industrie Canada Wireless DisclaimerDansk Danish Miljøinformation for kunder i EU Appendix Norsk Norwegian Miljøinformasjon for kunder i EU Appendix Contact Information Appendix J
Related manuals
Manual 2 pages 11.27 Kb