Wireless-G Broadband Router

The Security Tab - Firewall

Block WAN Requests. Enable the Block WAN Request feature by checking the box beside Block Anonymous Internet Requests and you can prevent your network from being “pinged,” or detected, by other Internet users. The Block WAN Request feature also reinforces your network security by hiding your network ports. Both functions of the Block WAN Request feature make it more difficult for outside users to work their way into your network. This feature is enabled by default. Select Disabled to allow anonymous Internet requests.

Filter Multicast. Multicasting allows for multiple transmissions to specific recipients at the same time. If multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate computers. Select Enabled to filter multicasting, or Disabled to disable this feature.

Filter Internet NAT Redirection. This feature uses port forwarding to block access to local servers from local networked computers. Select Enabled to filter Internet NAT redirection, or Disabled to disable this feature.

Filter IDENT (Port 113). This feature keeps port 113 from being scanned by devices outside of your local network. Select Enabled to filter port 113, or Disabled to disable this feature.

Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes.

The Security Tab - VPN Passthrough

Use the settings on this tab to allow VPN tunnels using IPSec, PPTP, or L2TP protocols to pass through the Router’s firewall.

IPSec Pass-through. Internet Protocol Security (IPSec), enabled by default, is a suite of protocols used to implement secure exchange of packets at the IP layer. To turn off this feature, click Disable.

PPTP Pass-through. Point-to-Point Tunneling Protocol (PPTP), enabled by default, allows the Point-to-Point Protocol (PPP) to be tunneled through an IP network. To turn off this feature, click Disable.

L2TP Pass-through. Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the Internet on the Layer 2 level. To allow L2TP tunnels to pass through the Router, click Enable. L2TP Pass-Through is enabled by default.

Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes.

Chapter 5: Configuring the Wireless-G Broadband Router

Figure 5-28: Security Tab - Firewall

NOTE: The Wireless-G Broadband Router always has its firewall protection enabled.

Figure 5-29: Security Tab - VPN Passthrough

27

The Security Tab - Firewall

Page 33
Image 33
Cisco Systems WRK54G manual Security Tab Firewall, Security Tab VPN Passthrough

WRK54G specifications

The Cisco Systems WRK54G is a versatile wireless router designed to meet the demands of home and small office networking. Renowned for its reliability, it offers a range of features that cater to both casual users and tech-savvy individuals.

At its core, the WRK54G is built on the IEEE 802.11g standard, which supports data transfer rates of up to 54 Mbps. This makes it suitable for various internet-based applications, including browsing, streaming, and online gaming. Additionally, it is backward compatible with the earlier 802.11b standard, ensuring that users with older devices can still enjoy connectivity.

One of the standout features of the WRK54G is its wireless connectivity, which allows users to connect multiple devices without the need for cumbersome cabling. This is especially beneficial in environments where mobility is essential. The router employs robust security protocols, including WEP, WPA, and WPA2, to safeguard the network from unauthorized access and ensure the integrity of data transmission.

In terms of hardware, the WRK54G is equipped with a built-in four-port Ethernet switch, enabling wired connections for devices that require stable and faster internet access, such as desktop computers and gaming consoles. This dual capability of wired and wireless networking makes it a flexible solution for diverse user needs.

Another noteworthy characteristic of the WRK54G is its support for Quality of Service (QoS) functionalities. QoS technology prioritizes bandwidth for specific applications, ensuring that essential services such as VoIP and video streaming receive the necessary resources for optimal performance. This feature is vital for users who rely on uninterrupted internet access for work or entertainment.

Additionally, the router features an intuitive web-based interface that simplifies setup and configuration. Users can easily manage their network settings, create a secure wireless environment, and monitor connected devices without requiring extensive technical knowledge.

In conclusion, the Cisco Systems WRK54G is a reliable and feature-rich wireless router that supports modern networking demands. With its solid performance, robust security measures, dual connectivity options, and user-friendly interface, it remains a practical choice for both home and small business users looking to establish a seamless network experience. Whether for streaming, gaming, or web browsing, the WRK54G provides a solid foundation for a comprehensive wireless networking solution.