background image

30

Chapter 5: Configuring the Wireless-G Broadband Router
The Applications and Gaming Tab - Port Triggering

Wireless-G Broadband Router with SRX400

The Applications and Gaming Tab - Port Triggering

Port Triggering is used for special applications that can request a port to be opened on demand. For this feature, 
the Gateway will watch outgoing data for specific port numbers. The Gateway will remember the IP address of the 
computer that sends a transmission requesting data, so that when the requested data returns through the 
Gateway, the data is pulled back to the proper computer by way of IP address and port mapping rules. 

Port Triggering

Application

. In this field, enter the name you wish to give the application.

Triggered Range and Forwarded Range

Start Port and End Port

. Enter the starting and ending port numbers of the Triggered Range and Forwarded 

Range.

Enable

. Click the 

Enable

 checkbox to enable port triggering for the relevant application.

When finished making your changes on this tab, click the 

Save Settings

 button to save these changes, or click 

the 

Cancel Changes

 button to undo your changes. 

The Applications and Gaming Tab - DMZ

The DMZ feature allows one network user to be exposed to the Internet for use of a special-purpose service such 
as Internet gaming or videoconferencing. DMZ hosting forwards all the ports at the same time to one PC. The Port 
Range Forward feature is more secure because it only opens the ports you want to have opened, while DMZ 
hosting opens all the ports of one computer, exposing the computer to the Internet. 

Any PC whose port is being forwarded must have its DHCP client function disabled and should have a new static 
IP address assigned to it because its IP address may change when using the DHCP function.

DMZ

To expose one PC, select 

Enable

. Then, enter the computer's IP address in the 

DMZ Host IP Address

 field.

Change these settings as described here and click the 

Save Settings 

button to apply your changes or 

Cancel 

Changes 

to cancel your changes. 

Figure 5-30: Applications and Gaming Tab - Port 

Triggering

Figure 5-31: Applications and Gaming Tab - DMZ

Summary of Contents for LINKSYS WRT54GX4

Page 1: ...A Division of Cisco Systems Inc Model No Broadband Router Wireless G WRT54GX4 EU LA User Guide WIRELESS with SRX400 GHz 802 11g 2 4 ...

Page 2: ...dition to these symbols there are definitions for technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents This exclamation point means there is a caution or warning and is something that could da...

Page 3: ...Placement Options 9 Chapter 5 Configuring the Wireless G Broadband Router 10 Overview 10 The Setup Tab Basic Setup 11 The Setup Tab DDNS 16 The Setup Tab MAC Address Clone 17 The Setup Tab Advanced Routing 18 The Wireless Tab Basic Wireless Settings 20 The Wireless Tab Wireless Security 21 The Wireless Tab Wireless MAC Filter 23 The Wireless Tab Advanced Wireless Settings 24 The Security Tab Firew...

Page 4: ...on Problems and Solutions 45 Frequently Asked Questions 53 Appendix B Wireless Security 60 Security Precautions 60 Security Threats Facing Wireless Networks 60 Appendix C Upgrading Firmware 63 Appendix D Windows Help 64 Appendix E Finding the MAC Address and IP Address for Your Ethernet Adapter 65 Windows 98SE or Me Instructions 65 Windows 2000 or XP Instructions 66 For the Router s Web based Util...

Page 5: ...5 8 Optional Settings 14 Figure 5 9 Router IP 14 Figure 5 10 Network Address Server Settings 15 Figure 5 11 Time Setting 15 Figure 5 12 Setup Tab DDNS 16 Figure 5 13 Setup Tab MAC Address Clone 17 Figure 5 14 Setup Tab Advanced Routing 18 Figure 5 15 Setup Tab Advanced Routing NAT Mode 18 Figure 5 16 Setup Tab Advanced Routing NAT Mode Routing Table 19 Figure 5 17 Wireless Tab Basic Wireless Setti...

Page 6: ... Online Game 32 Figure 5 35 Administration Tab Management 34 Figure 5 36 Administration Tab Log 36 Figure 5 37 Administration Tab Diagnostics 37 Figure 5 38 Administration Tab Factory Defaults 38 Figure 5 39 Administration Tab Firmware Upgrade 38 Figure 5 40 Administration Tab Config Management 39 Figure 5 41 Status Tab Router 40 Figure 5 42 Status Tab Local Network 41 Figure 5 43 DHCP Active IP T...

Page 7: ...andard Wireless G But unlike other speed enhanced technologies SRX400 can dynamically enable this double speed mode for SRX400 devices while still connecting to non SRX400 wireless devices at their respective fastest speeds And SRX400 is a good neighbor always checking for other wireless devices in the area before gobbling up the radio band In addition the Router can encode all wireless transmissi...

Page 8: ...structions in this Guide to help you connect the Router set it up and configure it to bridge your different networks These instructions should be all you need to get the most out of the Wireless G Broadband Router with SRX400 What s in this Guide This user guide covers the steps for setting up and using the Wireless G Broadband Router with SRX400 Chapter 1 Introduction This chapter describes the R...

Page 9: ...dress and IP Address for your Ethernet Adapter This appendix describes how to find the MAC address for your computer s Ethernet adapter so you can use the Router s MAC filtering and or MAC address cloning feature Appendix F Glossary This appendix gives a brief glossary of terms frequently used in networking Appendix G Specifications This appendix provides the Router s technical specifications Appe...

Page 10: ...ter You can arrange the Router and multiple access points to work in succession to extend the roaming range and you can set up your wireless network to communicate with your Ethernet hardware as well If the wireless network is relatively small and needs to share resources only with the other computers on the wireless network then the Ad Hoc mode can be used Ad Hoc mode allows computers equipped wi...

Page 11: ... Wireless G PrintServer as well as 802 11b and 802 11g wireless Ethernet bridges When you wish to connect your wireless network with your wired network you can use the Wireless G Broadband Router s four Ethernet ports To add more ports any of the Wireless G Broadband Router s Ethernet ports can be connected to any of Linksys s switches With these and many other Linksys products your networking opt...

Page 12: ...ways to reset the Router s factory defaults Either press the Reset button which is color coded red for approximately five seconds using a object with a sharp point such as a ball point pen or restore the default settings from the Administration tab Factory Defaults in the Router s Web based Utility Power Color coded black the Power port is where you will connect the power adapter Figure 3 1 The Ro...

Page 13: ...ve two purposes If the LED is continuously lit the Router is successfully connected to a device through that port If the LED is flashing that port is actively transmitting or receiving data WIRELESS Green The WIRELESS LED lights up whenever there is a successful wireless connection If the LED is flashing the Router is actively sending or receiving data over the wireless network DMZ Green The DMZ L...

Page 14: ... with line of sight to all of your mobile stations 3 Fix the direction of the antennas Try to place the Router in a position that will best cover your wireless network Normally the higher you place the antennas the better the performance will be 4 Connect your network PCs or Ethernet devices to the Router s yellow Ethernet ports using standard Ethernet network cabling 5 Connect a standard Ethernet...

Page 15: ...he first way is to place it horizontally on a surface so it sits on its four rubber feet The second way is to stand the Router vertically on a surface this uses an optional stand The third way is to mount it on a wall The second and third options are explained in further detail below Wall Mount Option The Router has two wall mount slots on its back panel 1 Determine where you want to mount the Rou...

Page 16: ...n To secure the Router change the Password from its default There are seven main tabs Setup Wireless Security Access Restrictions Applications Gaming Administration and Status Additional tabs will be available after you click one of the main tabs To access the Web based Utility launch Internet Explorer or Netscape Navigator and enter the Router s default IP address 192 168 1 1 in the Address field...

Page 17: ...anges to cancel your changes Internet Setup The Internet Setup section configures the Router to your Internet connection Most of this information can be obtained through your ISP Internet Connection Type Choose the type of Internet connection your ISP provides from the drop down menu Automatic Configuration DHCP By default the Router s Internet Connection Type is set to Automatic Configuration DHC...

Page 18: ...e You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time Max Idle Time If your Internet connection has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again If you wish to activate Connect on Demand click the radio button ...

Page 19: ...bles the Router to automatically re establish your connection as soon as you attempt to access the Internet again If you wish to activate Connect on Demand click the radio button In the Max Idle Time field enter the number of minutes you want to have elapsed before your Internet connection terminates Keep Alive Option Redial Period If you select this option the Router will periodically check your ...

Page 20: ...n name In most cases leaving these fields blank will work MTU MTU is the Maximum Transmission Unit It specifies the largest packet size permitted for Internet transmission The default setting Manual allows you to enter the largest packet size that will be transmitted The recommended size entered in the Size field is 1492 You should leave this value in the 1200 to 1500 range To have the Router sele...

Page 21: ...92 168 1 253 The default Starting IP Address is 192 168 1 100 Maximum Number of DHCP Users Enter the maximum number of PCs that you want the DHCP server to assign IP addresses to This number cannot be greater than 253 The default is 50 Client Lease Time The Client Lease Time is the amount of time a network user will be allowed connection to the Router with their current dynamic IP address Enter th...

Page 22: ... To use DDNS select DynDNS org If you do not want to use DDNS keep the default Disable User Name Enter the User Name for your DDNS account Password Enter the Password for your DDNS account Host Name This is the DDNS URL assigned by the DDNS service Internet IP Address This displays the Router s current IP Address as seen on the Internet Status This displays the status of the DDNS connection Change...

Page 23: ...he MAC address you have currently registered with your ISP to the Router with the MAC Address Clone feature MAC Enable Disable To have the MAC Address cloned click the radio button beside Enable User Defined Entry Enter the MAC Address registered with your ISP here Clone Your PC s MAC Clicking this button will clone the MAC address of your registered PC Change these settings as described here and ...

Page 24: ...dynamic routing click the Enable radio button Receive RIP Version To use dynamic routing for reception of network data select the protocol you want Both RIP v1 and v2 RIPv1 or RIPv2 If you do not want to use this feature select None Transmit RIP Version To use dynamic routing for transmission of network data select the protocol you want Both RIP v1 and v2 RIPv1 or RIPv2 If you do not want to use t...

Page 25: ...he Router and the remote network or host Interface This interface tells you whether the Destination IP Address is on the LAN Wireless Ethernet and wireless networks the WAN Internet or Loopback a dummy network in which one PC acts like a network necessary for certain software programs Click the Show Routing Table button to view the Static Routes you ve already set up Change these settings as descr...

Page 26: ...ss network For added security you should change the default SSID linksys to a unique name Wireless Channel Select the appropriate channel from the list provided to correspond with your network settings All devices in your wireless network must be broadcast on the same channel in order to function correctly and to avoid interference with other wireless items in your home In most cases you should ke...

Page 27: ...cryption methods TKIP and AES with dynamic encryption keys Select the type of algorithm TKIP or AES Enter a Personal Key of 8 63 characters Then enter a Group Key Renewal period which instructs the Router how often it should change the encryption keys WPA WPA2 Enterprise This option features WPA WPA2 used in coordination with a RADIUS server This should only be used when a RADIUS server is connect...

Page 28: ...ese settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes For detailed instructions on configuring wireless security for the Router turn to Appendix B Wireless Security Figure 5 20 Wireless Tab Wireless Security WEP IMPORTANT If you are using wireless security always remember that each device in your wireless network MUST use t...

Page 29: ... are 50 fields provided in which you can list users by MAC Address whose access you wish to allow Just enter the MAC Address for the PC whose access you want to allow in one of the fields For a more convenient way to add MAC addresses click the Select MAC Address From Networked Computers button The Networked Computers screen will appear Select the MAC Addresses you want Then click the Select butto...

Page 30: ...less G products are not able to transmit to the Router in an environment with heavy 802 11b traffic the CTS Protection Mode will be used This function boosts the Router s ability to catch all Wireless G transmissions but will severely decrease performance Beacon Interval The default value is 100 Enter a value between 1 and 65 535 milliseconds The Beacon Interval value indicates the frequency inter...

Page 31: ...d use the shorter preamble type Select the appropriate preamble type Long default or Short Network Density This setting is a reflection of the Router s range Setting the density to Low provides you with a greater range Setting the density to High gives you a lower range The default setting is Low Compression This feature provides real time hardware data compression so pre compressed frames are use...

Page 32: ...VPN Pass Through These settings allow VPN tunnels using PPTP IPSec or L2TP protocols to pass through the Router s firewall PPTP Pass through Point to Point Tunneling Protocol PPTP allows the Point to Point Protocol PPP to be tunneled through an IP network To allow PPTP tunnels to pass through the Router click Enable IPSec Pass through Internet Protocol Security IPSec is a suite of protocols used t...

Page 33: ...lecting the policy or policies and clicking the Delete button To return to the Internet Access tab click the Close button Status Policies are disabled by default To enable a policy select the policy number from the drop down menu and click the radio button beside Enable You can create a policy to manage Internet access To create an Internet Access policy 1 Select a number from the Internet Access ...

Page 34: ...Select its protocol from the Protocol drop down menu and enter its range in the Port Range fields Then click the Add button To modify a service select it from the list on the right Change its name protocol setting or port range Then click the Modify button To delete a service select it from the list on the right Then click the Delete button When you are finished making changes on the Port Services...

Page 35: ... Range Forward To forward a port enter the necessary information Port Range Application In this field enter the name you wish to give the application Each name can be up to 12 characters Start End This is the port range Enter the number that starts the port range under Start and the number that ends the range under End Protocol Enter the protocol used for this application either TCP or UDP or Both...

Page 36: ...n When finished making your changes on this tab click the Save Settings button to save these changes or click the Cancel Changes button to undo your changes The Applications and Gaming Tab DMZ The DMZ feature allows one network user to be exposed to the Internet for use of a special purpose service such as Internet gaming or videoconferencing DMZ hosting forwards all the ports at the same time to ...

Page 37: ... this section you can set priority based on Application Port Range or MAC Address There are four priories you can set High Medium Normal or Low Enable Disable To limit outgoing bandwidth for the QoS policies in use select Enable Otherwise select Disable Set Internet Bandwidth This setting allows you to limit the outgoing bandwidth for the QoS policies in use so you can control how much bandwidth a...

Page 38: ...dentifier for your network device When the Router identifies the device entered the Router will allocate the priority set for that entry Check the device s documentation to obtain the MAC Address Priority Select the bandwidth priority for the application you selected Select High Medium Normal or Low for the bandwidth but don t set all applications to High Once you have made your selection click Ad...

Page 39: ...is button allows you to remove the application entry To remove the entry click the Remove button To save the configuration click the Save Settings button Otherwise to cancel click the Cancel Changes button Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes ...

Page 40: ...cess the Web based Utility click the Enable radio button Remote Router Access Remote Management and Management Port To access the Router remotely from outside the network verify that Enable is selected Then enter the port number that will be open to outside access You will need to enter the Router s password when accessing the Router this way as usual Use HTTPS If you want to require the use of SS...

Page 41: ...e IP address of the remote host computer that will receive the trap messages Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes UPnP UPnP UPnP allows Windows XP and Windows Me to automatically configure the Router for various Internet applications such as gaming and videoconferencing To enable UPnP check the Ena...

Page 42: ... enable and view the log System Log Show System Log You can view logs for events relating to your system Unauthorized Login Attempt Update Time By NTP Client and Authorized Login URL Filter Log Show URL Filter Log You can view logs for specific types of Internet attacks and events Syn Flooding IP Spoofing Deny Policies Allow Policies Content Filtering ICMP Redirect TCP Null Scan Smurf Attack RIP D...

Page 43: ...se connection you wish to test how many times you wish to test it and the size of the packet for testing Then click the Start Test button The test field will show if the test was successful To stop the test click the Abort Test button Click the Clear button to clear the field Traceroute Test Traceroute Parameters IP Address or Domain Name To test the performance of a connection enter the IP addres...

Page 44: ...b Firmware Upgrade Use this screen to upgrade the Router s firmware Do not upgrade your firmware unless you are experiencing problems with the Router For more information about upgrading firmware refer to Appendix C Upgrading Firmware Upgrade Firmware To upgrade the Router s firmware first download the firmware file from www linksys com international Then extract the file on your computer Please s...

Page 45: ...t screen allows you to backup the Router s settings and restore them later Backup Configuration Backup Simply click the Backup button and save the config file to your hard drive Restore Configuration Please select a file to restore When you wish to restore the configuration file click the Browse button to locate the file Then click the Restore button Figure 5 40 Administration Tab Config Managemen...

Page 46: ...IP Address Displayed here is the Internet IP Address of the Router Subnet Mask Displayed here is the Subnet Mask of the Router Default Gateway Displayed here is the IP address of the Default Gateway DNS IP Address Displayed here is IP address of the DNS server MAC Address This is the Router s MAC Address as seen by your ISP DHCP Release and DHCP Renew These buttons are available if the Router is u...

Page 47: ...shown here DHCP Server If you are using the Router as a DHCP server that will be displayed here Starting IP Address For the range of IP Addresses used by devices on your local Ethernet network the beginning of that range is shown here Ending IP Address For the range of IP Addresses used by devices on your local Ethernet network the end of that range is shown here DHCP Client Table Clicking this bu...

Page 48: ...s will display the wireless mode Mixed G Only or Disabled used by the network SSID As entered on the Wireless tab this will display the wireless network name or SSID Channel As entered on the Wireless tab this will display the channel on which your wireless network is broadcasting Encryption Mode As selected on the Wireless Security Tab this will display what type of encryption the Router uses for...

Page 49: ...ckets received are displayed here Connection The status of the connection is shown here Packets Sent The number of packets sent are displayed here Bytes Received The number of bytes received is shown here Bytes Sent The number of bytes sent is shown here Error Packets Received The number of error packets received is displayed here Dropped Packets Received The number of dropped packets received is ...

Page 50: ...Bytes Received The number of bytes received is shown here Bytes Sent The number of bytes sent is shown here Error Packets Received The number of error packets received is displayed here Dropped Packets Received The number of dropped packets received is displayed here Click the Refresh button to update the on screen information Help information is shown on the right hand side of the screen ...

Page 51: ... static IP address on a PC You can assign a static IP address to a PC by performing the following steps For Windows 98SE and Me 1 Click Start Settings and Control Panel Double click Network 2 In The following network components are installed box select the TCP IP associated with your Ethernet adapter If you only have one Ethernet adapter installed you will only see one TCP IP line with no associat...

Page 52: ...r if asked For Windows XP The following instructions assume you are running Windows XP with the default interface If you are using the Classic interface where the icons and menus look like previous Windows versions please follow the instructions for Windows 2000 1 Click Start and Control Panel 2 Click the Network and Internet Connections icon and then the Network Connections icon 3 Right click the...

Page 53: ...y the ping command from a different computer to verify that your original computer is not the cause of the problem If you do NOT get a reply there may be a problem with the connection Try the ping command from a different computer to verify that your original computer is not the cause of the problem 5 I am not getting an IP address on the Internet with my Internet connection Refer to Problem 3 I w...

Page 54: ... server you installed Follow these steps to set up port forwarding through the Router s web based utility We will be setting up web ftp and mail servers 1 Access the Router s web based utility by going to http 192 168 1 1 or the IP address of the Router Go to the Applications Gaming Port Forwarding tab 2 Enter any name you want to use for the Customized Application 3 Enter the External Port range ...

Page 55: ...k device that you want the port server to go to For example if the web server s Ethernet adapter IP address is 192 168 1 100 you would enter 100 in the field provided Check Appendix E Finding the MAC Address and IP Address for Your Ethernet Adapter for details on getting an IP address 6 Check the Enable option for the port services you want to use Consider the example below When you have completed...

Page 56: ...1 Access the Router s web based utility by going to http 192 168 1 1 or the IP address of the Router Enter the default password admin and click the Administrations Management tab 2 Enter a different password in the Router Password field and enter the same password in the second field to confirm the password 3 Click the Save Settings button 11 I am a PPPoE user and I need to remove the proxy settin...

Page 57: ...of inactivity just like a normal phone dial up connection to the Internet There is a setup option to keep alive the connection This may not always work so you may need to re establish connection periodically 1 To connect to the Router go to the web browser and enter http 192 168 1 1 or the IP address of the Router 2 Enter the password if asked The default password is admin 3 On the Setup screen se...

Page 58: ...is disabled For Internet Explorer click Tools Internet Options and then the Connection tab Make sure that Internet Explorer is set to Never dial a connection For Netscape Navigator click Edit Preferences Advanced and Proxy Make sure that Netscape Navigator is set to Direct connection to the Internet 18 I cannot connect to the Internet For Cable users Click on the Status tab and make sure you have ...

Page 59: ...lled between the cable DSL modem and the LAN Plug the Router into the cable DSL modem s Ethernet port Does the Router support IPX or AppleTalk No TCP IP is the only protocol standard for the Internet and has become the global standard for communications IPX a NetWare communications protocol used only to route messages from one node to another and AppleTalk a communications protocol used on Apple a...

Page 60: ... range of 7777 27900 If you want to use the UT Server Admin forward another port Port 8080 usually works well but is used for remote admin You may have to disable this Then in the UWeb WebServer section of the server ini file set the ListenPort to 8080 to match the mapped port above and ServerName to the IP assigned to the Router from your ISP Can multiple gamers on the LAN get on one game server ...

Page 61: ...that version contains new features that you would like to use Downloading a more current version of Router firmware will not enhance the quality or speed of your Internet connection and may disrupt your current connection stability Will the Router function in a Macintosh environment Yes but the Router s setup pages are accessible only through Internet Explorer 4 0 or Netscape Navigator 4 0 or high...

Page 62: ... mIRC Can the Router act as my DHCP server Yes The Router has DHCP server software built in Can I run an application from a remote computer over the wireless network This will depend on whether or not the application is designed to be used over a network Consult the application s documentation to determine if it supports operation over a network What is the IEEE 802 11g standard It is one of the I...

Page 63: ... a wired network through a wireless access point What is roaming Roaming is the ability of a portable computer user to communicate continuously while moving freely throughout an area greater than that covered by a single access point Before using the roaming function the workstation must make sure that it is the same channel number with the access point of dedicated coverage area To achieve true s...

Page 64: ...uder and thus easier to detect provided that the receiver knows the parameters of the spread spectrum signal being broadcast If a receiver is not tuned to the right frequency a spread spectrum signal looks like background noise There are two main alternatives Direct Sequence Spread Spectrum DSSS and Frequency Hopping Spread Spectrum FHSS What is DSSS What is FHSS And what are their differences Fre...

Page 65: ...art with the Router and your wireless PC in the same room and move it away in small increments to determine the maximum range in your environment You may also try using different channels as this may eliminate interference affecting only one channel I have excellent signal strength but I cannot see my network Wireless security is probably enabled on the Router but not on your wireless adapter or v...

Page 66: ...keys periodically For information on implementing these security features refer to Chapter 5 Configuring the Wireless G Broadband Router Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking products first listen for beacon messages These messages can be easily decrypted and contain much of the network...

Page 67: ...AC Addresses This makes it harder for a hacker to access your network with a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can only provide enough security to make a hacker s job more difficult There are several ways that WEP can be maximized 1 Use the highest level of en...

Page 68: ...y shared between the device and the server Last enter a Group Key Renewal period which instructs the device how often it should change the encryption keys RADIUS WEP used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router or other device First enter the RADIUS server s IP Address and port number along with a key shared between the device a...

Page 69: ...nstructions 1 Download the firmware from Linksys s website at www linksys com international 2 Extract the firmware file on your PC 3 Click Firmware Upgrade from the Web Utility s Administration tab and the Upgrade Firmware screen will appear 4 Enter the location of the firmware s file or click the Browse button to find the file 5 Then click the Upgrade button to upgrade the firmware Figure C 1 Upg...

Page 70: ...instructions or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing...

Page 71: ...0 or XP Windows 98SE or Me Instructions 1 Click Start and Run In the Open field enter winipcfg Then press the Enter key or the OK button 2 When the IP Configuration screen appears select the Ethernet adapter you have connected to the Router via a CAT 5 Ethernet network cable 3 Write down the Adapter Address as shown on your computer screen This is the MAC address for your Ethernet adapter and is s...

Page 72: ...r This appears as a series of numbers and letters The MAC address Physical Address is what you will use for MAC address cloning or MAC filtering Another screen will show the Ethernet adapter s IP address Shown in the example as 192 168 1 100 Your computer may show something different For the Router s Web based Utility For MAC address cloning enter the 12 digit MAC address in the MAC Address fields...

Page 73: ...device and cause it to start executing instructions Broadband An always on fast Internet connection Browser An application program that provides a way to look at and interact with all the information on the World Wide Web Byte A unit of data that is usually eight bits long Cable Modem A device that connects a computer to the cable television network which in turn connects to the Internet Daisy Cha...

Page 74: ...Ethernet IEEE standard network protocol that specifies how data is placed on and retrieved from a common transmission medium Firewall A set of related programs located at a network gateway server that protects the resources of a network from users from other networks Firmware The programming code that runs a networking device FTP File Transfer Protocol A protocol used to transfer files over a TCP ...

Page 75: ...g storage and or transmission between users Packet A unit of data sent over a network Passphrase Used much like a password a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products Ping Packet INternet Groper An Internet utility used to determine whether a particular IP address is online POP3 Post Office Protocol 3 A standard mail s...

Page 76: ... network s name Static IP Address A fixed address assigned to a computer or device that is connected to a network Static Routing Forwarding data in a network via a fixed path Subnet Mask An address code that determines the size of the network Switch 1 A data switch that connects computing devices to host computers allowing a large number of devices to share a limited number of ports 2 A device for...

Page 77: ...e address of a file located on the Internet VPN Virtual Private Network A security measure to protect data as it leaves one network and goes to another over the Internet WAN Wide Area Network The Internet WEP Wired Equivalent Privacy A method of encrypting network data transmitted on a wireless network for greater security WLAN Wireless Local Area Network A group of computers and associated device...

Page 78: ...ur 10 100 RJ 45 Switched Ports One Power Port One Reset Button Cabling Type UTP CAT 5 LEDs Power DMZ Wireless Ethernet 1 2 3 4 Internet Transmit Power 20 dBm for Wireless B 20 dBm for Wireless G UPnP able cert Able Security Features Stateful Packet Inspection SPI Firewall Wireless Security WPA WPA2 802 1x WEP and Wireless MAC Filtering Dimensions 140 mm x 140 mm x 36 mm W x H x D 5 51 x 5 51 x 1 4...

Page 79: ...pecifications Wireless G Broadband Router with SRX400 Operating Temp 0 C to 40 C 32 F to 104 F Storage Temp 10 C to 65 C 14 F to 149 F Operating Humidity 15 to 95 Non Condensing Storage Humidity 5 to 80 Non Condensing ...

Page 80: ...RRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except by Linksys b has not been installed operated repaired...

Page 81: ...try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult a dealer or an experienced radio TV technician for assistance FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set ...

Page 82: ...dband Router with SRX400 Compliance Information for 2 4 GHz Wireless Products Relevant to the EU and Other Countries Following the EU Directive 1999 5 EC R TTE Directive Declaration of Conformity with Regard to the EU Directive 1999 5 EC R TTE Directive ...

Page 83: ...es pays de l UE et dans tous les pays ayant transposés la directive 1999 5 CE sans aucune limitation excepté pour les pays mentionnés ci dessous Questo prodotto è utilizzabile in tutte i paesi EU ed in tutti gli altri paesi che seguono le direttive EU 1999 5 EC senza nessuna limitazione eccetto per i paesii menzionati di seguito Das Produkt kann in allen EU Staaten ohne Einschränkungen eingesetzt ...

Page 84: ... for more details Dans la cas d une utilisation en extérieur la puissance de sortie est limitée pour certaines parties de la bande Reportez vous à la table 1 ou visitez http www arcep fr pour de plus amples détails Italy This product meets the National Radio Interface and the requirements specified in the National Frequency Allocation Table for Italy Unless operating within the boundaries of the o...

Page 85: ...s and antennas resulting in a radiated power level exceeding 100 mW EIRP are illegal Power Output of Your Device To comply with your country s regulations you may have to change the power output of your wireless device Proceed to the appropriate section for your device Wireless Adapters Wireless adapters have the power output set to 100 by default Maximum power output on each adapter does not exce...

Page 86: ... other wireless product use its Web based Utility to configure its power output setting refer to the product s documentation for more information Technical Documents on www linksys com international Follow these steps to access technical documents 1 Enter http www linksys com international in your web browser 2 Select the country or region in which you live 3 Click the Products tab 4 Select the ap...

Page 87: ...s Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE This document contains important information for users with regards to the proper disposal and recycling of Linksys products Consumers are required to comply with this notice for all electronic products bearing the following symbol ...

Page 88: ...82 Appendix I Regulatory Information Wireless G Broadband Router with SRX400 ...

Page 89: ...83 Appendix I Regulatory Information Wireless G Broadband Router with SRX400 ...

Page 90: ...84 Appendix I Regulatory Information Wireless G Broadband Router with SRX400 ...

Page 91: ...85 Appendix I Regulatory Information Wireless G Broadband Router with SRX400 For more information visit www linksys com international ...

Page 92: ...ys com Denmark support dk linksys com France support fr linksys com Germany support de linksys com Italy support it linksys com Netherlands support nl linksys com Norway support no linksys com Portugal support pt linksys com Spain support es linksys com Sweden support se linksys com Switzerland support ch linksys com United Kingdom Ireland support uk linksys com Outside of Europe E mail Address As...

Reviews: