Linksys BEFSX41 manual Figure G-5

Page 66

Instant Broadband® Series

2. In the command prompt, enter ipconfig /all. Then press the Enter key.

Figure G-5

3.Write down the Physical Address as shown on your computer screen; it is the MAC address for your Ethernet adapter. This will appear as a series of letters and numbers.

The MAC address/Physical Address is what you will use for MAC Address Cloning.

Note: The MAC address is also called the Physical

Address.

The example in Figure G-5 shows the IP address of your Ethernet adapter as 192.168.1.100. Your computer may show something different.

EtherFast® Cable/DSL Firewall Router with 4-Port Switch/VPN Endpoint

When entering information for MAC Address Cloning, type the 12-digit MAC address (see Figure G-6).

Figure G-6

124

125

Image 66
Contents User Guide Copyright & Trademarks Table of Contents Features IntroductionEnvironmental 139 An Introduction to LANs and WANs IP AddressesNetwork Setup Overview Why Do I Need a VPN?Your Virtual Private Network VPN What is a Virtual Private Network? Firewall Router to Firewall RouterModem connection will not work from any other port PowerRouter’s Back Panel PortsWAN and LAN LEDs Router’s Front Panel LEDsProceed to Connect the Router Connect the Router Connecting Your Hardware Together and Booting UpRouter’s hardware installation is now complete OverviewConfigure the PCs Configuring Windows 95, 98, and Millennium PCsGo to Configure the Router Configuring Windows 2000 PCsConfiguring Windows XP PCs Configure the Router Advanced Proxies. Click Direct Connection to the Internet Obtain an IP Address AutomaticallyStatic IP Address Enter the Gateway AddressPPPoE RASQuick and Easy Router Administration Cable/DSL Firewall Router’s Web-based UtilitySetup User Name and Password Static IPWAN IP Firewall Multicast Pass Through Remote UpgradeBlock WAN Request IPSec Pass ThroughEstablishing a Tunnel VPNLocal Secure Group and Remote Secure Group Remote Security Gateway Authentication EncryptionKey Management Instant Broadband Series Advanced Settings for Selected IPSec Tunnel PhaseOther Settings PasswordStatus Dhcp Log Help Advanced FiltersInstant Broadband Series Forwarding UPnP Forwarding Port Triggering Dynamic Routing Static RoutingDMZ Host DMZ PortDMZ Host Address Current DMZ Host MAC Address CloneDynDNS.org DdnsAppendix a Troubleshooting Common Problems and SolutionsTZO.com For Windows NT For Windows XPFor Windows 95, 98, and Me For Windows XP Am not able to access the Router’s web interface Setup Can’t get the Internet game, server, or application to work To start over, I need to set the Router to factory default Click the Advanced = Filter tab Need to use port triggeringFrequently Asked Questions TCP/IP is compatible with the Router Appendix B Maximizing VPN Security Windows 2000 or Windows XP IntroductionEnvironment Step One Create an IPSec PolicyFilter List 1 win-router Step Two Build Filter ListsIP Address Filter List 2 router=win Figure C-6Step Three Configure Individual Tunnel Rules Tunnel 1 win-routerShared key, as shown Respond Using IPSec XYZ12345. ClickString to Protect Negotiate Security Key exchange pre AcceptTunnel 2 router-win Preshared key, Action Require Security This string to protectKey Exchange XYZ12345Figure C-24 Step Four Assign New IPSec PolicyStep Five Create a Tunnel Through the Web-based Utility Figure C-28Appendix E How to Ping Your ISP’s E-mail & Web Addresses Appendix D Snmp FunctionsFigure E-1 Appendix F Installing the TCP/IP Protocol TCP/IP installation is now completeFigure G-1 For Windows NT, 2000, and XPFigure G-5 Appendix H Glossary 129 131 133 135 137 Appendix I Specifications EnvironmentalSales Information Appendix J Warranty InformationAppendix K Contact Information Web FTP SiteCopyright 2003 Linksys, All Rights Reserved