Table of Contents

Chapter 1: Introduction

 

 

 

1

Chapter 2: Planning Your Wireless Network

 

 

 

2

Network Topology

. . . .

. .

 

2

Ad-Hoc versus Infrastructure Mode

. . . .

.

.

2

Network Layout

 

 

 

2

Chapter 3: Planning Your Virtual Private Network (VPN)

 

 

 

3

Why do I need a VPN?

 

 

 

3

1) MAC Address Spoofing

. . . .

.

.

3

2) Data Sniffing

. . . .

.

 

. 3

3) Man in the middle attacks

 

 

 

3

What is a VPN?

. . . .

.

 

. 3

VPN Router to VPN Router

. . . .

.

.

4

Computer (using the Linksys VPN client software) to VPN Router . .

. . . .

. .

 

4

Chapter 4: Product Overview

 

 

 

5

Front Panel

 

 

 

5

Back Panel

. . . .

.

 

. 5

Chapter 5: Configuring the Wireless-G VPN Router

 

 

 

6

Overview

 

 

 

6

How to Access the Web-based Utility

. . . .

. .

 

7

Setup

. . . .

.

 

. 7

Setup > Basic Settings

 

 

 

7

Setup > VLAN

. . . .

. .

 

10

Setup > DDNS

 

 

 

10

Setup > MAC Address Clone

 

 

 

11

Setup > Advanced Routing

. . . .

. .

 

12

Wireless

 

 

 

13

Wireless > Basic Wireless Settings

. . . .

.

 

13

Wireless > Wireless Security

. . . .

. .

 

13

Wireless > Wireless Network Access

. . . .

.

.16

Wireless > Advanced Wireless Settings

. . . .

.

 

17

Wireless > WDS

. . . .

.

 

17

Firewall

. . . .

.

.18

Firewall > General

. . . .

. .

 

18

Firewall > Port Forwarding

 

 

 

18

Firewall > Port Triggering

 

 

 

19

Firewall > DMZ

. . . .

.

 

19

Firewall > Access Restriction

 

 

 

20

Firewall > URL Filtering

. . . .

. .

 

20

VPN

. . . .

. .

 

20

VPN > VPN Client Access

. . . .

.

 

20

Wireless-G VPN Router with RangeBooster

Page 3
Image 3
Linksys WRV200 manual Table of Contents