Linksys WRTU54G-TM manual Wireless-G Broadband Router with 2 Phone Ports

Page 73

Wireless-G Broadband Router with 2 Phone Ports

EAP (Extensible Authentication Protocol) - A general authentication protocol used to control network access. Many specific authentication methods work within this framework.

EAP-PEAP (Extensible Authentication Protocol-Protected Extensible Authentication Protocol) - A mutual authentication method that uses a combination of digital certificates and another system, such as passwords.

EAP-TLS (Extensible Authentication Protocol-Transport Layer Security) - A mutual authentication method that uses digital certificates.

EasyKeySetup - EasyKeySetup will create a secure wireless connection using encryption. To ensure your T- Mobile phone works on your secured connection, follow the EasyKeySetup steps to share the encryption information with your phone. If you have not previously enabled security for the wireless router, the default will be WPA-PSK encryption. If you have enabled security and have a key already in the wireless router, EasyKeySetup will use the currently security settings and share those with the T-Mobile phone.

Encryption - Encoding data transmitted in a network.

Ethernet - A networking protocol that specifies how data is placed on and retrieved from a common transmission medium.

Finger - A program that tells you the name associated with an e-mail address.

Firewall - A set of related programs located at a network gateway server that protects the resources of a network from users from other networks.

Firmware - The programming code that runs a networking device.

Fragmentation -Breaking a packet into smaller units when transmitting over a network medium that cannot support the original size of the packet.

FTP (File Transfer Protocol) - A protocol used to transfer files over a TCP/IP network.

Full Duplex - The ability of a networking device to receive and transmit data simultaneously.

Gateway - A device that interconnects networks with different, incompatible communications protocols.

Half Duplex - Data transmission that can occur in two directions over a single line, but only one direction at a time.

Hardware - The physical aspect of computers, telecommunications, and other information technology devices.

Appendix F: Glossary

66

Image 73
Contents 802 GHz .11g Wireless- G Copyright and Trademarks How to Use This User GuideWord definition Table of Contents Appendix B Wireless Security Appendix a TroubleshootingAppendix C Upgrading Firmware Appendix D Windows Help Ethernet AdapterRouter’s Back Panel List of Figures17 Wireless Tab Basic Wireless Settings 51 Status Tab Voice Error List Welcome IntroductionWhat’s in this User Guide? Wireless-G Broadband Router with 2 Phone Ports Ad-Hoc versus Infrastructure Mode Planning Your Wireless NetworkSsid service set identifier your wireless network’s name Network TopologyPlanning Your Wireless Network Network Layout Back Panel Getting to Know the Wireless-G Broadband RouterEthernet Front PanelOverview Hardware Installation for Connection to Your Broadband ModemConnecting Your Network Devices Multiple PCs Hardware Installation for Connection to An Existing RouterConnecting the Power Placement Options Direction Holder SIM Card InstallationPassword Screen Internet Setup Setup Tab Basic SetupPPPoE Connection Type Optional Settings Router IP Ddns Service Setup Tab Ddns14 Setup Tab MAC Address Clone Setup Tab MAC Address Clone15 Setup Tab Advanced Routing Router Setup Tab Advanced RoutingWireless Tab Basic Wireless Settings 18 Wireless Tab Wireless Security WPA Personal Wireless Tab Wireless Security21 Wireless Tab Wireless Security WPA2 Enterprise 22 Wireless Tab Wireless Security Radius 24 Wireless Tab Wireless MAC Filter Wireless Tab Wireless MAC FilterSetting Wireless Tab Advanced Wireless SettingsWireless-G Broadband Router with 2 Phone Ports Security Tab VPN Passthrough Security Tab FirewallTo create an Internet Access policy Access Restrictions Tab Internet AccessClick the Modify button 33 Applications and Gaming Tab Port Range Forward Applications and Gaming Tab Port Range ForwardPort Triggering Applications & Gaming Tab Port TriggeringApplications and Gaming Tab DMZ Wired QoSApplications and Gaming Tab QoS Ethernet Port Priority Wireless QoSAdministration Tab Log Administration Tab Management39 Administration Tab Diagnostics Administration Tab DiagnosticsAdministration Tab Firmware Upgrade Administration Tab Factory DefaultsAdministration Tab Config Management 45 Status Tab Router Status Tab Router46 Status Tab Local Network Status Tab Local Network48 Status Tab Wireless Status Tab Wireless49 Status Tab Voice Status Tab VoiceCommon Problems and Solutions Appendix a TroubleshootingNeed to set a static IP address on a PC Wireless-G Broadband Router with 2 Phone Ports Open a command prompt. For Windows 2000 and XP TCP Application Start and End Protocol IP Address EnabledCan’t get the Internet game, server, or application to work Wireless-G Broadband Router with 2 Phone Ports Need to upgrade the firmware To start over, I need to set the Router to factory defaultWhere is the Router installed on the network? Frequently Asked QuestionsIs IPSec Pass-Through supported by the Router? Does the Router support IPX or AppleTalk?Does the Router support ICQ send file? If all else fails in the installation, what can I do?How can I block corrupted FTP downloads? Is the Router cross-platform compatible? What is DMZ Hosting?How many ports can be simultaneously forwarded? What is the Ieee 802.11g standard? What are the advanced features of the Router?What is the Ieee 802.11b standard? What Ieee 802.11g features are supported?What is infrastructure mode? What is ad-hoc mode?What is roaming? What is ISM band?What is DSSS? What is FHSS? And what are their differences? What is Spread Spectrum?What is WEP? What is a MAC Address?How many channels/frequencies are available with the Router? Have excellent signal strength, but I cannot see my networkSecurity Precautions Appendix B Wireless SecuritySecurity Threats Facing Wireless Networks Appendix B Wireless Security Wireless-G Broadband Router with 2 Phone Ports Appendix C Upgrading Firmware Figure C-1 Upgrade FirmwareShared Resources Appendix D Windows HelpNetwork Neighborhood/My Network Places Windows Vista Instructions Windows 2000 or XP InstructionsFigure E-3 MAC Address Clone For the Router’s Web-based UtilityAppendix F Glossary Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless Security Appendix G SpecificationsWi-Fi Protected Access2 WPA2 ModelCertifications Limited Warranty Appendix H Warranty InformationAppendix I Regulatory Information Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Avis de non-responsabilité concernant les appareils sans fil Wireless DisclaimerSoftware in Linksys Products Appendix J Software License AgreementSchedule 1 Linksys Software License Agreement Software LicensesWireless-G Router for 3G/UMTS Broadband Wireless-G Router for 3G/UMTS Broadband Preamble ScheduleWireless-G Router for 3G/UMTS Broadband Wireless-G Router for 3G/UMTS Broadband Wireless-G Router for 3G/UMTS Broadband No Warranty GNU Lesser General Public License Wireless-G Router for 3G/UMTS Broadband Wireless-G Router for 3G/UMTS Broadband Wireless-G Router for 3G/UMTS Broadband Wireless-G Router for 3G/UMTS Broadband Wireless-G Router for 3G/UMTS Broadband Wireless-G Router for 3G/UMTS Broadband Wireless-G Router for 3G/UMTS Broadband OpenSSL License Original SSLeay License END of Schedule Appendix K Contact Information