Linksys WRT51AB Appendix C Configuring Wireless Security, Step Two Pinging for a Web Address

Page 48

Instant Wireless® Series

Step Two: Pinging for a Web Address

While the IP address returned above would work as your e-mail server address, it may not be permanent. IP addresses change all the time. Web addresses, how- ever, usually don’t. Because of this, you’re likely to have fewer problems by configuring your system with web addresses rather than IP addresses. Follow the instructions below to find the web address assigned to the IP address you just pinged.

1.At the DOS command prompt, type ping -a 24.53.32.4, where 24.53.32.4 is the IP address you just pinged. Information such as the following data will be displayed.

C:\>ping -a 24.53.32.4

Pinging mail.msnv3.occa.home.com [24.53.32.4] with

32 bytes of data:

Reply from 24.53.32.4: bytes=32 time<10ms TTL=127

Reply from 24.53.32.4: bytes=32 time<10ms TTL=127

Reply from 24.53.32.4: bytes=32 time<10ms TTL=127

Reply from 24.53.32.4: bytes=32 time<10ms TTL=127

Ping statistics for 24.53.32.4:

Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms

Figure B-2

2.Write down the web address returned by the ping command. (In the exam- ple in Figure C-2, mail.msnv3.occa.home.com is the web address.) This web address is the web address assigned to the IP address you just pinged. While the IP address of mail could conceivably change, it is likely that this web address will not.

3.Replace your ISP’s abbreviated server address with this extended web address in the corresponding Internet application (web browser, e-mail application, etc.).

Once you have replaced the brief server address with the true server address, the Router should have no problem accessing the Internet through that Internet application.

Dual-Band Wireless A+B Broadband Router

Appendix C: Configuring

Wireless Security

Background

The Router offers two wireless security features. The basic feature is Wired Equivalent Privacy (WEP) encryption, an encryption method used to protect your wireless data communications. WEP uses 64-bit, 128-bit, or 152-bit keys to provide access control to your network and encryption security for every data transmission. To decode a data transmission, each point in a network must use an identical key. Higher encryption levels mean higher levels of security, but due to the complexity of the encryption, they may mean decreased network performance.

You may also have heard the term “40-bit” used in conjunction with WEP encryption. This is simply another term for 64-bit WEP encryption. This level of WEP encryption has been called 40-bit because it uses a 40-bit secret key along with a 24-bit Initialization Vector (40 + 24 = 64). Wireless vendors may use either name. Linksys uses the term “64-bit” when referring to this level of encryption.

Note: WEP encryption is an additional data security measure and not essential for router operation; however, Linksys recommends the use of WEP encryption.

The second wireless security feature is 802.1x. The IEEE 802.1x standard spec- ifies authentication methods for a wireless client, such as a PC, to access a net- work, so network security is enhanced. Based on the Extensible Authentication Protocol (EAP), 802.1x designates how a client accesses a network server, fre- quently a RADIUS server, with the Router acting as an authenticator. When a network uses 802.1x, the identity of the client is verified before the client is allowed network access.

For example, a wireless user may use one of the authentication methods to access a wireless network protected by an authentication server. The user’s PC sends a request to the Router (an access point can be used instead). The Router sends an identification request back to the PC. After the PC sends the Router the identification message, the Router forwards the identification message to the server. If the server accepts the identification message, then the PC is permitted access to the wireless network.

88

89

Image 48
Contents Dual-Band Wireless A+B Broadband Router Copyright & Trademarks Table of Contents Common Problems and Solutions Frequently Asked Questions IntroductionEnvironmental 127 Features Router’s FunctionsIP Addresses What’s an IP Address?Dhcp Dynamic Host Configuration Protocol Servers Router Setup OverviewDynamic IP Addresses Getting to Know the Dual-Band Wireless A+B Broadband Router Router’s Back PanelRouter’s Front Panel LEDs LAN Indicators Internet IndicatorsProceed to Connect the Router Wired Connection to a PC Connect the RouterOverview Configure the PCs Wireless Connection to a PCConfiguring Windows 98 and Millennium PCs Go to Configure the Router’s Basic SettingsConfiguring Windows 2000 PCs Configuring Windows XP PCs Configure the Router’s Basic Settings Automatic Configuration Dhcp Enter the Default GatewayStatic or Fixed IP Address Enter the Internet IP AddressHow to Access the Web-based Utility Router’s Web-based UtilityAutomatic Configuration Dhcp SetupStatic IP Pptp 5GHz, 802.11a 5GHz, 802.11a WEP 4GHz, 802.11b WEP Password StatusLAN Dhcp Log HelpAdvanced Tabs Advanced Wireless 5GHz, 802.11a802.1x Configuration Radius Server Filters Private MAC Filter To set up a filter Private IP Filter11-20 , 21-30 , 31-40 , or 41-50 from Applications External Port TCP Protocol UDP Protocol Port ForwardingRouting Click the Delete This Entry buttonDMZ Host MAC Address Clone Appendix a Troubleshooting Common Problems and SolutionsNeed to set a static IP address on a PC For Windows NTFor Windows XP Want to test my Internet connectionFor Windows 98, Me, 2000, and XP Need to set up a server behind my Router TCP UDPCan’t get the Internet game, server, or application to work To start over, I need to set the Router to factory default Need to upgrade the firmwareFirmware upgrade failed, and/or the Diag LED is flashing My DSL service’s PPPoE is always disconnectingFrequently Asked Questions Click the Advanced = Filters tabDoes the Router support ICQ send file? How can I block corrupted FTP downloads?What is DMZ Hosting? What are the advanced features of the Router?What is the Ieee 802.11a standard? What is the Ieee 802.11b standard? What Ieee 802.11b features are supported? What is ad-hoc mode? What is infrastructure mode? What is roaming?What is WEP? What is a MAC Address?How do I reset the Router? How do I resolve issues with signal loss?Appendix B How to Ping Your ISP’s E-mail & Web Addresses Step One Pinging an IP AddressAppendix C Configuring Wireless Security Step Two Pinging for a Web AddressBackground 802.1x Authentication WEP EncryptionMD5 Authentication for Windows XP Figure C-2Figure C-5 Digital Certificate Installation Figure C-9Click Install this certificate Figure C-13TLS Authentication for Windows XP Figure C-18Figure C-21 Figure C-25 For Windows 95, 98, and MeFigure D-3 For Windows NT, 2000, and XPAppendix E Glossary 111 113 115 117 119 121 123 125 Appendix F Specifications One 10/100 RJ-45 Port for Cable/DSL ModemCategory 5 Ethernet Network Cable or better EnvironmentalAppendix G Warranty Information Sales Information Technical Support RMA Issues FaxAppendix H Contact Information Web site FTP siteCopyright 2002 Linksys, All Rights Reserved