background image

25

Chapter 6: Configuring the Wireless-G Broadband Router with RangeBooster
The Security Tab - Firewall

Wireless-G Broadband Router with RangeBooster

The Security Tab - Firewall

The 

Firewall

 screen offers filters that block specific Internet data types and block anonymous Internet requests. 

Select the checkbox to enable a feature.

Firewall

SPI Firewall Protection

. Enable this feature to employ Stateful Packet Inspection (SPI) for more detailed review 

of data packets entering your network environment.

Internet Filter

Filter Anonymous Internet Requests

. When enabled, this feature keeps your network from being “pinged,” or 

detected, by other Internet users. It also reinforces your network security by hiding your network ports. Both 
functions of this feature make it more difficult for outside users to work their way into your network. This feature 
is enabled by default. Select 

Disabled

 to allow anonymous Internet requests.

Filter Multicast

. Multicasting allows for multiple transmissions to specific recipients at the same time. If 

multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate 
computers. Select 

Enabled

 to filter multicasting, or 

Disabled

 to disable this feature.

Filter Internet NAT Redirection

. This feature uses port forwarding to block access to local servers from local 

networked computers. Select 

Enabled

 to filter Internet NAT redirection, or 

Disabled

 to disable this feature.

Filter IDENT (Port 113)

. This feature keeps port 113 from being scanned by devices outside of your local 

network. Select 

Enabled

 to filter port 113, or 

Disabled

 to disable this feature.

Web Filters

Proxy

. Use of WAN proxy servers may compromise the Gateway's security. Denying Filter Proxy will disable 

access to any WAN proxy servers. To enable proxy filtering, click the checkbox. 

Java

. Java is a programming language for websites. If you deny Java, you run the risk of not having access to 

Internet sites created using this programming language. To enable Java filtering, click the checkbox.

ActiveX

. ActiveX is a programming language for websites. If you deny ActiveX, you run the risk of not having 

access to Internet sites created using this programming language. To enable ActiveX filtering, click the checkbox. 

Cookies

. A cookie is data stored on your computer and used by Internet sites when you interact with them. To 

enable cookie filtering, click the checkbox.

Figure 5-30: Security Tab - Firewall

Summary of Contents for WRT54GR

Page 1: ...A Division of Cisco Systems Inc Model No Broadband Router Wireless G WRT54GR ver 1 1 User Guide WIRELESS GHz 2 4802 11g with RangeBooster ...

Page 2: ... each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents This exclamation point means there is a caution or warning and is something that could damage your property or the Wireless G Broadband Router with RangeBooster This checkmark means there ...

Page 3: ...h RangeBooster 10 Overview 10 The Setup Tab Basic Setup 11 The Setup Tab DDNS 15 The Setup Tab MAC Address Clone 16 The Setup Tab Advanced Routing 17 The Wireless Tab Basic Wireless Settings 18 The Wireless Tab Wireless Security 19 The Wireless Tab Wireless MAC Filter 22 The Wireless Tab Advanced Wireless Settings 23 The Security Tab Firewall 25 The Security Tab VPN Passthrough 26 The Access Restr...

Page 4: ...ons 46 Appendix B Wireless Security 53 Security Precautions 53 Security Threats Facing Wireless Networks 53 Appendix C Upgrading Firmware 56 Appendix D Windows Help 57 Appendix E Finding the MAC Address and IP Address for Your Ethernet Adapter 58 Windows 98SE or Me Instructions 58 Windows 2000 or XP Instructions 58 For the Router s Web based Utility 59 Appendix F Glossary 60 Appendix G Specificati...

Page 5: ... IP 13 Figure 5 10 DHCP Server Settings 14 Figure 5 11 Static DHCP Client List 14 Figure 5 12 DHCP Client Table 14 Figure 5 13 Time Setting 14 Figure 5 14 Setup Tab DDNS com 15 Figure 5 15 Setup Tab TZO com 15 Figure 5 16 Setup Tab MAC Address Clone 16 Figure 5 17 Setup Tab Advanced Routing 17 Figure 5 18 Setup Tab Routing Table 17 Figure 5 19 Wireless Tab Basic Wireless Settings 18 Figure 5 20 Wi...

Page 6: ...ab DMZ 30 Figure 5 39 Administration Tab Management 31 Figure 5 40 Administration Tab Log 33 Figure 5 41 Administration Tab Incoming Log 33 Figure 5 42 Administration Tab Diagnostics 34 Figure 5 43 The Ping Test 34 Figure 5 44 The Traceroute Test 34 Figure 5 45 Administration Tab Factory Defaults 35 Figure 5 46 Administration Tab Firmware Upgrade 35 Figure 5 47 Status Tab Router 36 Figure 5 48 Sta...

Page 7: ...ate a LAN or Local Area Network They are connected with Ethernet cables which is why the network is called wired PCs equipped with wireless cards or adapters can communicate without cumbersome cables By sharing the same wireless settings within their transmission radius they form a wireless network This is sometimes called a WLAN or Wireless Local Area Network The Wireless G Broadband Router with ...

Page 8: ...y to configure the settings on the Wireless G Broadband Router with RangeBooster Appendix A Troubleshooting This appendix describes some problems and solutions as well as frequently asked questions regarding installation and use of the Wireless G Broadband Router with RangeBooster Appendix B Wireless Security This appendix explains the risks of wireless networking and some solutions to reduce the ...

Page 9: ...ecifications for the Router Appendix H Warranty Information This appendix supplies the warranty information for the Router Appendix I Regulatory Information This appendix supplies the regulatory information regarding the Router Appendix J Contact Information This appendix provides contact information for a variety of Linksys resources including Technical Support ...

Page 10: ... G Broadband Router with RangeBooster which serves as the main point of communications in a wireless network The Router transmits data to PCs equipped with wireless network adapters which can roam within a certain radial range of the Router You can arrange the Router and multiple access points to work in succession to extend the roaming range and you can set up your wireless network to communicate...

Page 11: ...mmunicate with the Wireless PrintServer WPS54G and Wireless Ethernet Bridges WET54G WET11 When you wish to connect your wireless network with your wired network you can use the Wireless G Broadband Router with RangeBooster s four LAN ports To add more ports any of the Wireless G Broadband Router with RangeBooster s LAN ports can be connected to any of Linksys s switches such as the SD205 or SD208 ...

Page 12: ...seconds or restore the defaults from the Administration tab Factory Defaults in the Router s Web based Utility Internet The Internet port is where you will connect your broadband Internet connection Ethernet 1 2 3 4 These ports 1 2 3 4 connect the Router to your networked PCs and other Ethernet network devices Power The Power port is where you will connect the power adapter IMPORTANT Resetting the...

Page 13: ...a device through that port A flashing LED indicates network activity over that port DMZ Green The DMZ LED indicates when the DMZ function is being used This LED will remain lit as long as DMZ is enabled Internet Green The Internet LED lights up when there is a connection made through the Internet port Wireless Green The Wireless LED lights up whenever there is a successful wireless connection If t...

Page 14: ... Power down your network devices 2 Locate an optimum location for the Router The best place for the Router is usually at the center of your wireless network with line of sight to all of your mobile stations 3 Fix the direction of the antennas Place the antennas at a 45 degree angle for best performance 4 Connect a standard Ethernet network cable to the Router s Internet port Then connect the other...

Page 15: ...ower port and the other end into an electrical outlet Only use the power adapter supplied with the Router Use of a different adapter may result in product damage Now that the hardware installation is complete proceed to Chapter 5 Setting up the Wireless G Broadband Router with RangeBooster for directions on how to configure the Router Figure 4 2 Connecting Your Network Devices Figure 4 3 Connectin...

Page 16: ... Router s default password is admin To secure the Router change the Password from its default There are seven main tabs Setup Wireless Security Access Restrictions Applications Gaming Administration and Status Additional tabs will be available after you click one of the main tabs To access the Web based Utility launch Internet Explorer or Netscape Navigator and enter the Router s default IP addres...

Page 17: ...pe is set to Automatic Configuration DHCP which should be kept only if your ISP supports DHCP or you are connecting through a dynamic IP address Static IP If you are required to use a permanent IP address to connect to the Internet select Static IP Internet IP Address This is the Router s IP address when seen from the Internet Your ISP will provide you with the IP Address you need to specify here ...

Page 18: ...e default Redial Period is 30 seconds PPTP Point to Point Tunneling Protocol PPTP is a service that applies to connections in Europe only Server IP Address This is the Router s IP address as seen from the Internet Your ISP will provide you with the IP Address you need to specify here Subnet Mask This is the Router s Subnet Mask as seen by users on the Internet including your ISP Your ISP will prov...

Page 19: ... name In most cases leaving these fields blank will work MTU MTU is the Maximum Transmission Unit It specifies the largest packet size permitted for Internet transmission The default setting Manual allows you to enter the largest packet size that will be transmitted You should leave this value in the 1200 to 1500 range To have the Router select the best MTU for your Internet connection select Auto...

Page 20: ... can type up to three DNS Server IP Addresses here The Router will use these for quicker access to functioning DNS servers WINS The Windows Internet Naming Service WINS manages each PC s interaction with the Internet If you use a WINS server enter that server s IP Address here Otherwise leave this blank Static DHCP Client button The Static DHCP Client button is used if you want to assign a fixed I...

Page 21: ... account Host Name The is the DDNS URL assigned by the DDNS service Internet IP Address This is the Router s current IP Address as seen on the Internet Status This displays the status of the DDNS connection Connect button Click this button to connect to the service Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your chan...

Page 22: ...o not wish to re register the MAC address with your ISP you may assign the MAC address you have currently registered with your ISP to the Router with the MAC Address Clone feature Enable Disable To have the MAC Address cloned click the radio button beside Enable MAC Address Enter the MAC Address registered with your ISP here Clone My PC s MAC Clicking this button will clone the MAC address Change ...

Page 23: ...ute is a pre determined pathway that network information must travel to reach a specific host or network Enter the information described below to set up a new static route Click the Delete This Entry button to delete a static route Enter Route Name Enter a name for the Route here using a maximum of 25 alphanumeric characters Destination LAN IP The Destination LAN IP is the address of the remote ne...

Page 24: ...ces in a wireless network The SSID must be identical for all devices in the wireless network It is case sensitive and must not exceed 32 characters use any of the characters on the keyboard Make sure this setting is the same for all devices in your wireless network For added security you should change the default SSID linksys to a unique name Channel Select the appropriate channel from the list pr...

Page 25: ...P encryption 40 64 bits 10 hex digits or 104 128 bits 26 hex digits Then either generate a WEP key using the Passphrase or enter the WEP key manually and select a TX Transmit Key choose which Key to use WPA Personal WPA gives you two encryption methods TKIP and AES with dynamic encryption keys Select the type of encryption TKIP or AES Enter a passphrase pre shared key of 8 63 characters Then enter...

Page 26: ...Then enter a Key Renewal period which instructs the Router how often it should change the encryption keys WPA Enterprise This option features WPA used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router First select the type of WPA encryption you want to use TKIP or AES Enter the RADIUS server s IP Address and port number along with a share...

Page 27: ...ncryption keys RADIUS This option features WEP used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router First enter the RADIUS server s IP Address and port number along with a shared secret authentic key shared between the Router and the server Then select a level of WEP encryption 40 64 bits 10 hex digits or 104 128 bits 26 hex digits and ...

Page 28: ...ss network Clicking this button will allow wireless access by MAC Address MAC Address Filter List You can manually enter a MAC address to filter or you can select one from the Wireless Client List Wireless Client List Click the Wireless Client MAC List button to display a list of wireless network users From the To Sort by drop down menu you can sort the table by Client Name IP Address MAC Address ...

Page 29: ...rates will be used The Router will also advertise that it will automatically select the best rate for transmission The default setting is Default when the Router can transmit at all standard wireless rates 1 2Mbps 5 5Mbps 11Mbps 18Mbps and 24Mbps Other options are 1 2Mbps for use with older wireless technology and All when the Router can transmit at all wireless rates The Basic Rate is not the act...

Page 30: ...icast messages for associated clients it sends the next DTIM with a DTIM Interval value Its clients hear the beacons and awaken to receive the broadcast and multicast messages The default value is 1 Fragmentation Threshold This value specifies the maximum size for a packet before data is fragmented into multiple packets If you experience a high packet error rate you may slightly increase the Fragm...

Page 31: ...arded to the appropriate computers Select Enabled to filter multicasting or Disabled to disable this feature Filter Internet NAT Redirection This feature uses port forwarding to block access to local servers from local networked computers Select Enabled to filter Internet NAT redirection or Disabled to disable this feature Filter IDENT Port 113 This feature keeps port 113 from being scanned by dev...

Page 32: ... through an IP network To allow PPTP tunnels to pass through the Router click Enable PPTP Pass Through is enabled by default Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes The Access Restrictions Tab Internet Access Policy The Internet Access Policy screen allows you to block or allow specific kinds of Inter...

Page 33: ... listed on the List of PCs screen 6 Decide which days and what times you want this policy to be enforced Select the individual days during which the policy will be in effect or select Everyday Then enter a range of hours and minutes during which the policy will be in effect or select 24 Hours 7 You can also block access by URL address by entering it in the Website Blocking by URL Address field or ...

Page 34: ...e port is being forwarded should have its DHCP client function disabled and should have a new static IP address assigned to it because its IP address may change when using the DHCP function Select the pre configured Application or manually enter it in the field Then enter the External and Internal Port numbers in the fields Select the type of protocol you wish to use for each application TCP UDP o...

Page 35: ...a port enter the information on each line for the criteria required The criteria are described here Application Name In this field enter the name you wish to give the application Each name can be up to 12 characters Start End Port This is the port range Enter the number that starts the port range under Start and the number that ends the range under End Protocol Enter the protocol used for this app...

Page 36: ...nabled to enable the application Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes The Applications and Gaming Tab DMZ The DMZ feature allows one network user to be exposed to the Internet for use of a special purpose service such as Internet gaming or videoconferencing DMZ hosting forwards all the ports at the...

Page 37: ...router s web based utility You will only be able to access the web based utility via a wired connection if you disable the setting Select Enable to enable wireless access to the Router s web based utility or Disable to disable wireless access to the utility Remote Access Remote Management To access the Router remotely from outside the local network select Enabled Otherwise keep the default setting...

Page 38: ...k this button and follow the on screen instructions You must have previously backed up the Router s configuration UPnP Universal Plug and Play UPnP allows Windows Me and XP to automatically configure the Router for various Internet applications such as gaming and videoconferencing UPnP If you want to use UPnP keep the default setting Enabled Otherwise select Disabled Allow Users to Configure Selec...

Page 39: ...PC View Log When you wish to view the logs click View Log A new screen will appear Select Incoming Log Outgoing Log Security Log or DHCP Client Log from the Type drop down menu The Incoming Log will display a temporary log of the Source IP Addresses and Port Numbers for the incoming Internet traffic The Outgoing Log will display a temporary log of the Source IP Addresses Destination IP Address and...

Page 40: ...lick the Start to Ping button The Ping screen will then display the test results Click the Close button to return to the Diagnostics screen Traceroute Test To test the performance of a connect enter the address of the PC whose connection you wish to test and click the Start to Traceroute button The Traceroute screen will then display the test results Click the Close button to return to the Diagnos...

Reviews: