Manuals
/
Brands
/
Computer Equipment
/
Network Router
/
Linksys
/
Computer Equipment
/
Network Router
Linksys
WRV54G manual
1
1
102
102
Download
102 pages, 2.45 Mb
A Division of Cisco Systems, Inc.
®
Model No.
VPN Broadband Router
Wireless-
G
WRV54G
User Guide
GHz
2.4
54Mbps
WIRELESS
Contents
Main
VPN Broadband Router
Wireless-G
User Guide
2.4
54Mbps
Copyright and Trademarks
How to Use this Guide
Table of Contents
Page
Chapter 1: Introduction
Welcome
Whats in this Guide?
Page
Chapter 2: Planning your Wireless Network
The Routers Functions
IP Addresses
Whats an IP Address?
Static IP Addresses
Why do I need a VPN?
What is a VPN?
VPN Router to VPN Router
Computer (using VPN client software that supports IPSec) to VPN Router
Chapter 3: Chapter 3: Getting to Know the Wireless-G VPN Broadband Router
The Back Panel
The Front Panel
Chapter 4: Connecting the Wireless-G Broadband Router
Wired Connection to a PC
Wireless Connection to a PC
Page
Chapter 5: Configuring the PCs
Configuring Windows 98 and Millennium PCs
Configuring Windows 2000 PCs
Configuring Windows XP PCs
Page
Chapter 6: Configuring the Router
Setup
Wireless
Security
Access Restrictions
Applications & Gaming
Administration
Status
How to Access the Web-based Utility
The Setup Tab
The Basic Setup Tab
Internet Setup
Page
Optional Settings (Required by some ISPs)
Network Setup
The DDNS Tab
DDNS
DynDNS.org
TZO.com Tab
MAC Address Clone Tab
MAC Clone
Advanced Routing Tab
Advanced Routing
Static Routing
Hot Spot
The Wireless Tab
Basic Wireless Settings
Wireless Network
Wireless Security
WEP
Wireless Network Access
Advanced Wireless Settings
The Security Tab
Firewall
VPN
Page
Advanced VPN Tunnel Setup
Security 802.1x
WEP
The Access Restrictions Tab
Access Restriction
Page
The Applications and Gaming Tab
Port Range Forwarding
Port Triggering
UPnP Forwarding
Page
DMZ
The Administration Tab
Management
Router Password
SNMP
UPnP
Log
Email Alert
Syslog Notification
Notification Qeue Length
Alert Log
Diagnostics
Ping Test
Factory Default
Firmware Upgrade
Status
Router
Information
WAN Connections
Local Network
Wireless
System Performance
Appendix A: Troubleshooting
Common Problems and Solutions
Page
Page
Page
Page
Page
Page
Page
Frequently Asked Questions
Page
Page
Page
Page
Page
Page
Appendix B: Wireless Security
A Brief Overview
What Are The Risks?
Passive Attacks
Jamming Attacks
Active Attacks
Dictionary-Building or Table Attacks
Man-in-the-Middle Attacks
Maximizing Wireless Security
Page
Page
Page
2.4GHz/802.11b and 802.11g WEP Encryption
Appendix C: Configuring IPSec between a Windows 2000 PC and the Router
Introduction
Environment
How to Establish a Secure IPSec Tunnel
Step 1: Create an IPSec Policy
Step 2: Build Filter Lists
Filter List 1: win->router
Filter List 2: router=>win
Page
Step 3: Configure Individual Tunnel Rules
Tunnel 1: win->router
Page
Tunnel 2: router->win
Page
Page
Step 4: Assign New IPSec Policy
Step 5: Create a Tunnel Through the Web-Based Utility
Appendix D: Finding the MAC Address and IP Address for Your Ethernet Adapter
Windows 98 or Me Instructions
Windows 2000 or XP Instructions
Appendix E: SNMP Functions
Appendix F: Upgrading Firmware
Appendix G: Windows Help
Appendix H: Glossary
Page
Page
Page
Page
Page
Appendix I: Specifications
Page
Appendix J: Warranty Information
Appendix K: Regulatory Information
Page
Appendix L: Contact Information