Linksys BEFSX41 manual 131

Page 69

Instant Broadband® Series

Firmware - Code that is written onto read-only memory (ROM) or program- mable read-only memory (PROM). Once firmware has been written onto the ROM or PROM, it is retained even when the device is turned off.

FTP (File Transfer Protocol) - A protocol used to transfer files over a TCP/IP network (Internet, UNIX, etc.). For example, after developing the HTML pages for a Web site on a local machine, they are typically uploaded to the Web serv- er using FTP.

FTP includes functions to log onto the network, list directories and copy files. It can also convert between the ASCII and EBCDIC character codes. FTP oper- ations can be performed by typing commands at a command prompt or via an FTP utility running under a graphical interface such as Windows. FTP transfers can also be initiated from within a Web browser by entering the URL preceded with ftp://.

Unlike e-mail programs in which graphics and program files have to be "attached," FTP is designed to handle binary files directly and does not add the overhead of encoding and decoding the data.

Full Duplex - The ability of a device or line to transmit data simultaneously in both directions.

Gateway - A device that interconnects networks with different, incompatible communications protocols.

Half Duplex - Data transmission that can occur in two directions over a single line, but only one direction at a time.

Hardware - Hardware is the physical aspect of computers, telecommunica- tions, and other information technology devices. The term arose as a way to dis- tinguish the "box" and the electronic circuitry and components of a computer from the program you put in it to make it do things. The program came to be known as the software.

Hop - The link between two network nodes.

HTTP (HyperText Transport Protocol) - The communications protocol used to connect to servers on the World Wide Web. Its primary function is to estab- lish a connection with a Web server and transmit HTML pages to the client browser.

EtherFast® Cable/DSL Firewall Router with 4-Port Switch/VPN Endpoint

Hub - The device that serves as the central location for attaching wires from workstations. Can be passive, where there is no amplification of the signals; or active, where the hubs are used like repeaters to provide an extension of the cable that connects to a workstation.

ICMP (Internet Control Message Protocol) - Part of the TCP/IP protocol. Network devices such as routers or servers use ICMP to transmit error mes- sages and control messages. For example, the PING program uses ICMP.

ICQ - A conferencing program for the Internet that provides interactive chat, e-mail and file transfer and can alert you when someone on your predefined list has also come online.

IEEE (The Institute of Electrical and Electronics Engineers) - The IEEE describes itself as "the world's largest technical professional society, promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members."

The IEEE fosters the development of standards that often become national and international standards. The organization publishes a number of journals, has many local chapters, and several large societies in special areas, such as the IEEE Computer Society.

IKE (Internet Key Exchange) - A negotiation and key exchange protocol spec- ified by the Internet Engineering Task Force. An IKE security association (SA) automatically negotiates encryption and authentication keys. With IKE, an ini- tial exchange authenticates the VPN session and automatically negotiates keys that will be used to pass encrypted data over the Internet or any other network.

IP (Internet Protocol) - The method or protocol by which data is sent from one computer to another on the Internet. It is a standard set of rules, procedures, or conventions relating to the format and timing of data transmission between two computers that they must accept and use to be able to understand each other.

IP Address - In the most widely installed level of the Internet Protocol (IP) today, an IP address is a 32-binary digit number that identifies each sender or receiver of information that is sent in packet across the Internet. When you request an HTML page or send e-mail, the Internet Protocol part of TCP/IP includes your IP address in the message (actually, in each of the packets if more than one is required) and sends it to the IP address that is obtained by looking up the domain name in the Uniform Resource Locator you requested or in the

130

131

Image 69
Contents User Guide Copyright & Trademarks Table of Contents Features IntroductionEnvironmental 139 IP Addresses An Introduction to LANs and WANsNetwork Setup Overview Why Do I Need a VPN?Your Virtual Private Network VPN Firewall Router to Firewall Router What is a Virtual Private Network?Router’s Back Panel PowerModem connection will not work from any other port PortsWAN and LAN LEDs Router’s Front Panel LEDsProceed to Connect the Router Router’s hardware installation is now complete Connecting Your Hardware Together and Booting UpConnect the Router OverviewConfiguring Windows 95, 98, and Millennium PCs Configure the PCsConfiguring Windows 2000 PCs Go to Configure the RouterConfiguring Windows XP PCs Configure the Router Static IP Address Obtain an IP Address AutomaticallyAdvanced Proxies. Click Direct Connection to the Internet Enter the Gateway AddressRAS PPPoECable/DSL Firewall Router’s Web-based Utility Quick and Easy Router AdministrationSetup Static IP User Name and PasswordWAN IP Firewall Block WAN Request Remote UpgradeMulticast Pass Through IPSec Pass ThroughVPN Establishing a TunnelLocal Secure Group and Remote Secure Group Remote Security Gateway Authentication EncryptionKey Management Instant Broadband Series Phase Advanced Settings for Selected IPSec TunnelPassword Other SettingsStatus Dhcp Log Help Filters AdvancedInstant Broadband Series Forwarding UPnP Forwarding Port Triggering Static Routing Dynamic RoutingDMZ Host DMZ PortDMZ Host Address MAC Address Clone Current DMZ HostDdns DynDNS.orgAppendix a Troubleshooting Common Problems and SolutionsTZO.com For Windows NT For Windows XPFor Windows 95, 98, and Me For Windows XP Am not able to access the Router’s web interface Setup Can’t get the Internet game, server, or application to work To start over, I need to set the Router to factory default Need to use port triggering Click the Advanced = Filter tabFrequently Asked Questions TCP/IP is compatible with the Router Appendix B Maximizing VPN Security Environment IntroductionWindows 2000 or Windows XP Step One Create an IPSec PolicyFilter List 1 win-router Step Two Build Filter ListsIP Address Figure C-6 Filter List 2 router=winTunnel 1 win-router Step Three Configure Individual Tunnel RulesString to Protect Negotiate Security Key exchange pre Respond Using IPSec XYZ12345. ClickShared key, as shown AcceptTunnel 2 router-win Key Exchange Action Require Security This string to protectPreshared key, XYZ12345Step Four Assign New IPSec Policy Figure C-24Figure C-28 Step Five Create a Tunnel Through the Web-based UtilityAppendix D Snmp Functions Appendix E How to Ping Your ISP’s E-mail & Web AddressesFigure E-1 TCP/IP installation is now complete Appendix F Installing the TCP/IP ProtocolFor Windows NT, 2000, and XP Figure G-1Figure G-5 Appendix H Glossary 129 131 133 135 137 Environmental Appendix I SpecificationsAppendix K Contact Information Appendix J Warranty InformationSales Information Web FTP SiteCopyright 2003 Linksys, All Rights Reserved