background image

57

Appendix A: Troubleshooting
Frequently Asked Questions

Wireless-G Broadband Router with 2 Phone Ports

What is ad-hoc mode?

When a wireless network is set to ad-hoc mode, the wireless-equipped computers are configured to 
communicate directly with each other. The ad-hoc wireless network will not communicate with any wired 
network. 

What is infrastructure mode?

When a wireless network is set to infrastructure mode, the wireless network is configured to communicate with 
a wired network through a wireless access point.

What is roaming?

Roaming is the ability of a portable computer user to communicate continuously while moving freely throughout 
an area greater than that covered by a single access point. Before using the roaming function, the workstation 
must make sure that it is the same channel number with the access point of dedicated coverage area. 

To achieve true seamless connectivity, the wireless LAN must incorporate a number of different functions. Each 
node and access point, for example, must always acknowledge receipt of each message. Each node must 
maintain contact with the wireless network even when not actually transmitting data. Achieving these functions 
simultaneously requires a dynamic RF networking technology that links access points and nodes. In such a 
system, the user’s end node undertakes a search for the best possible access to the system. First, it evaluates 
such factors as signal strength and quality, as well as the message load currently being carried by each access 
point and the distance of each access point to the wired backbone. Based on that information, the node next 
selects the right access point and registers its address. Communications between end node and host computer 
can then be transmitted up and down the backbone.

As the user moves on, the end node’s RF transmitter regularly checks the system to determine whether it is in 
touch with the original access point or whether it should seek a new one. When a node no longer receives 
acknowledgment from its original access point, it undertakes a new search. Upon finding a new access point, it 
then re-registers, and the communication process continues.

What is ISM band?

The FCC and their counterparts outside of the U.S. have set aside bandwidth for unlicensed use in the ISM 
(Industrial, Scientific and Medical) band. Spectrum in the vicinity of 2.4 GHz, in particular, is being made available 
worldwide. This presents a truly revolutionary opportunity to place convenient high-speed wireless capabilities in 
the hands of users around the globe. 

What is Spread Spectrum?

Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in 
reliable, secure, mission-critical communications systems. It is designed to trade off bandwidth efficiency for 
reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband 
transmission, but the trade-off produces a signal that is, in effect, louder and thus easier to detect, provided that 

Summary of Contents for WRP200

Page 1: ...A Division of Cisco Systems Inc Model No Broadband Router Wireless G WRP200 User Guide GHz 2 4802 11g with 2 Phone Ports Voice ...

Page 2: ...there are definitions for technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section This exclamation point means there is a caution or warning and is something that could damage your property or the Router word definition ...

Page 3: ...iguring the Router 12 Overview 12 How to Access the Web based Utility 14 The Setup Tab Basic Setup 14 The Setup Tab DDNS 19 The Setup Tab MAC Address Clone 20 The Setup Tab Advanced Routing 21 The Wireless Tab Basic Wireless Settings 23 The Wireless Tab Wireless Security 24 The Wireless Tab Wireless MAC Filter 27 The Wireless Tab Advanced Wireless Settings 28 The Security Tab Firewall 29 The Secur...

Page 4: ...lems and Solutions 44 Frequently Asked Questions 52 Appendix B Wireless Security 60 Security Precautions 60 Security Threats Facing Wireless Networks 60 Appendix C Windows Help 63 Appendix D Finding the MAC Address and IP Address for Your Ethernet Adapter 64 Windows 98 or Me Instructions 64 Windows 2000 or XP Instructions 64 For the Router s Web based Utility 65 Appendix E Glossary 66 Appendix F S...

Page 5: ...Setup Automatic Configuration DHCP 14 Figure 5 4 Static IP 15 Figure 5 5 PPPoE 15 Figure 5 6 PPTP 16 Figure 5 7 Heart Beat Signal 16 Figure 5 8 Setup Tab DDNS DynDNS org 19 Figure 5 9 Setup Tab DDNS TZO com 19 Figure 5 10 Setup Tab MAC Clone 20 Figure 5 11 Setup Tab Advanced Routing Router 21 Figure 5 12 Advanced Routing Gateway 21 Figure 5 13 Wireless Tab Basic Wireless Settings 23 Figure 5 14 Wi...

Page 6: ...ement 35 Figure 5 30 Administration Tab Log 36 Figure 5 31 Incoming Log Table 36 Figure 5 32 Outgoing Log Table 36 Figure 5 33 Administration Tab Diagnostics 37 Figure 5 34 Ping Test 37 Figure 5 35 Traceroute Test 37 Figure 5 36 Administration Tab Factory Defaults 38 Figure 5 37 Administration Tab Firmware Upgrade 39 Figure 5 38 Status Tab Voice 40 Figure 5 39 Status Tab Router 41 Figure 5 40 Stat...

Page 7: ...ired PCs equipped with wireless cards or adapters can communicate without cumbersome cables By sharing the same wireless settings within their transmission radius they form a wireless network which is sometimes called a Wireless Local Area Network WLAN The Router bridges wireless networks of both 802 11b and 802 11g standards and wired networks allowing them to communicate with each other To creat...

Page 8: ...then you are ready to connect to the Internet You also have other chapter available for reference Chapter 1 Introduction This chapter describes the Router s applications and this User Guide Chapter 2 Planning Your Wireless Network This chapter describes the basics of wireless networking Appendix A Troubleshooting This appendix describes some possible problems and solutions as well as frequently as...

Page 9: ...ifications for the Router Appendix G Warranty Information This appendix supplies the warranty information for the Router Appendix H Regulatory Information This appendix supplies the regulatory information regarding the Router Appendix I Contact Information This appendix provides contact information for a variety of Linksys resources including Technical Support ...

Page 10: ...transmits data to PCs equipped with wireless network adapters which can roam within a certain radial range of the Router You can arrange the Router and multiple access points to work in succession to extend the roaming range and you can set up your wireless network to communicate with your Ethernet hardware as well If the wireless network is relatively small and needs to share resources only with ...

Page 11: ...joy USB connectivity The Router will also communicate with the Wireless PrintServer WPS54GU2 WPS54G WPS11 and Wireless Ethernet Bridges WET54G WET11 When you wish to connect your wireless network with your wired network you can use the Router s four Ethernet network ports To add more ports any of the Router s Ethernet network ports can be connected to any of Linksys s switches such as the SD205 or...

Page 12: ...e cable not included Ethernet 1 4 These three Ethernet ports connect to network devices such as PCs print servers or additional switches Reset Button There are two ways to reset the Router s factory defaults Either press the Reset button for approximately five seconds or restore the defaults from the Administration tab Factory Defaults in the Router s Web based Utility Power The Power port is wher...

Page 13: ... the wireless network PHONE 1 2 Blue The PHONE LED is solidly lit when a telephone or fax machine has a registered connection to your Internet phone service provider through the corresponding port Phone 1 or Phone 2 The connection is registered if your Internet phone service account is active This LED is not lit when there is no registered connection It flashes when the phone is being used or an i...

Page 14: ... s and cable or DSL modem The following connection diagram illustrates a basic network setup with wired connections to one desktop PC and telephone and a wireless connection to one notebook PC Figure 4 1 Router Connection Diagram NOTE If you already have a router in your network then replace your existing router with the Wireless G Broadband Router with 2 Phone Ports Telephone Router Cable DSL Mod...

Page 15: ... Repeat this step to connect more PCs or other network devices to the Router 8 Power on the broadband modem 9 Connect the included power adapter to the Router s Power port and then plug the power adapter into an electrical outlet The Power LED on the front panel will light up when the adapter is connected properly 10 Power on your PC s If you want to mount the Router on a wall proceed to the follo...

Page 16: ...sits on its four rubber feet The second way is to stand the Router vertically on a surface The third way is to mount it on a wall The second and third options are explained in further detail below Stand Option 1 Line up the center of the Router s stand with the center of the Router s labeled edge 2 Insert the Router into the stand Proceed to Chapter 5 Configuring the Router Figure 4 6 Attaching th...

Page 17: ...ement of 0 112 inches 2 845 mm 1 Determine where you want to mount the Router 2 Drill four holes into the wall Make sure adjacent holes are 62 mm 2 44 inches apart 3 Insert a screw into each hole and leave 5 mm 0 2 inches of its head exposed 4 Maneuver the Router so the wall mount slots line up with the four screws 5 Place the wall mount slots over the screws and slide the Router down until the sc...

Page 18: ...tings Once you have the setup information for your specific type of Internet connection then you can configure the Router Management Click the Administration tab and then the Management tab The Router s default password is admin To secure the Router change the Password from its default Wireless On the Basic Wireless Settings screen set the basic configuration for your wireless network There are se...

Page 19: ...services Administration Management On this screen alter the Router s password access privileges and UPnP settings Log If you want to view or save activity logs click this tab Diagnostics If you want to run a ping or traceroute test then use this screen Factory Defaults If you want to restore the Router s factory defaults then use this screen Firmware Upgrade Click this tab if you want to upgrade t...

Page 20: ... right hand side of a screen For additional help on a tab click More The Setup Tab Basic Setup The Basic Setup screen is the first screen you see when you access the Web based Utility Internet Setup The Internet Setup section configures the Router for your Internet connection type This information can be obtained from your ISP Internet Connection Type The Router supports six connection types Autom...

Page 21: ...s been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use Connect on Demand click the radio button If you want your Internet connection to remain on at all times enter 0 in the Max Idle Time field Otherwise enter the number of minutes you want to have elapsed before your Internet...

Page 22: ...ion the Router will periodically check your Internet connection If the connection is down then the Router will automatically re establish the connection To use this option click the radio button next to Keep Alive The default Redial Period is 30 seconds Click the Save Settings button Then click the Status tab and click the Connect button PPTP Point to Point Tunneling Protocol PPTP is a service tha...

Page 23: ...ess that the Router has when seen from the Internet Your ISP will provide you with the IP Address you need to specify here Click the Save Settings button Then click the Status tab and click the Connect button Optional Settings Some of these settings may be required by your ISP Verify with your ISP before making any changes Router Name Enter a descriptive name for the Router in this field Host Name...

Page 24: ...nt Lease Time is the amount of time a network user will be allowed connection to the Router with their current dynamic IP address Enter the amount of time in minutes that the user will be leased this dynamic IP address After the dynamic IP address has expired the user will be automatically assigned a new dynamic IP address The default is 0 minutes which means one day DNS 1 3 The Domain Name System...

Page 25: ...u set up with DynDNS org Internet IP Address The Router s current Internet IP Address is displayed here Because it is dynamic it will change Status The status of the DDNS service connection is displayed here When finished making your changes on this tab click the Update button to save these changes or click the Cancel Changes button to undo your changes For additional information click More TZO co...

Page 26: ...AC Address registered with your ISP Then click the Save Settings button Clone If you want to clone the MAC address of the PC you are currently using to configure the Router then click the Clone button The Router will automatically detect your PC s MAC address so you do NOT have to call your ISP to change the registered MAC address to the Router s MAC address It is recommended that the PC registere...

Page 27: ... static route is a pre determined pathway that network information must travel to reach a specific host or network To create a static route alter the following settings Select set number Select the number of the static route from the drop down menu The Router supports up to 20 static route entries Enter Route Name Enter a name for the static route using a maximum of 25 alphanumeric characters Dest...

Page 28: ...or each route the Destination LAN IP address Subnet Mask Gateway and Interface are displayed Click the Refresh button to update the information Click the Close button to exit this screen When you have finished making changes to this screen click the Save Settings button to save the changes or click the Cancel Changes button to undo your changes Help information is shown on the right hand side of a...

Page 29: ...aracters use any of the characters on the keyboard Make sure this setting is the same for all points in your wireless network For added security you should change the default SSID linksys to a unique name Wireless Channel Select the appropriate channel from the list provided to correspond with your network settings All devices in your wireless network must be broadcast on the same channel in order...

Page 30: ...sion of WPA Select the mode you want your network to use If you have devices using WPA and WPA2 select WPA and WPA2 Mixed mode WPA Algorithm If you chose WPA or WPA2 select the algorithm you want to use TKIP or AES AES is a stronger encryption method than TKIP If you chose WPA and WPA2 Mixed mode select the algorithms you want to use AUTO for WPA AES for WPA2 or AES for both WPA and WPA2 WPA Share...

Page 31: ...ADIUS Port Enter the port number of your RADIUS server Shared Key Enter the key shared by the Router and RADIUS server Key Renewal Timeout Enter the Key Renewal Timeout period which tells the Router how often it should change the encryption keys When you have finished making changes to this screen click the Save Settings button to save the changes or click the Cancel Changes button to undo your ch...

Page 32: ...n Select the appropriate level of encryption 64 bits 10 hex digits or 128 bits 26 hex digits Passphrase If you want to use a Passphrase then enter it in the Passphrase field and click the Generate button Key 1 4 If you want to manually enter the WEP keys then enter them in the Key 1 4 fields When you have finished making changes to this screen click the Save Settings button to save the changes or ...

Page 33: ...to permit or block For added convenience click the Wireless Client MAC List button to display a list of wireless network users by MAC Address Then click the Enable MAC Filter checkbox for any device you want to add to the MAC Address Filter List To update the information on this list click the Refresh button When you have finished making changes to the Wireless Client MAC List screen click the Upd...

Page 34: ... the Router to synchronize the wireless network The default value is 100 DTIM Interval This value between 1 and 255 indicates the interval of the Delivery Traffic Indication Message DTIM A DTIM field is a countdown field informing clients of the next window for listening to broadcast and multicast messages When the Router has buffered broadcast or multicast messages for associated clients it sends...

Page 35: ...led review of data packets entering your network environment Select Enable to use a firewall or Disable to disable this feature Block WAN Requests Block Anonymous Internet Requests This keeps your network from being pinged or detected and reinforces your network security by hiding your network ports so it is more difficult for intruders to work their way into your network Click the checkbox to blo...

Page 36: ...k the Enabled button To disable L2TP Passthrough click the Disabled button PPTP Passthrough PPTP Point to Point Tunneling Protocol Passthrough allows the Point to Point PPP to be tunneled through an IP network To allow PPTP Passthrough click the Enabled button To disable PPTP Passthrough click the Disabled button When you have finished making changes to this screen click the Save Settings button t...

Page 37: ...ind to manage inbound traffic To create an Internet Access policy 1 Select a number from the Internet Access Policy drop down menu 2 To enable this policy click the radio button beside Enable 3 Enter a Policy Name in the field provided 4 Click the Edit List button to select which PCs will be affected by the policy The List of PCs screen will appear You can select a PC by MAC Address or IP Address ...

Page 38: ...lick the Delete button When you are finished making changes on the Port Services screen click the Apply button to save changes If you want to cancel your changes click the Cancel button To close the Port Services screen and return to the Access Restrictions screen click the Close button 8 You can block websites with specific URL addresses or websites using specific keywords Enter each URL or keywo...

Page 39: ...range of external port s used by the server or Internet application Check with the Internet application software documentation for more information Protocol Select the protocol TCP or UDP or select Both IP Address Enter the IP address of the server that you want the Internet users to be able to access To find the IP address go to Appendix D Finding the MAC Address and IP Address for Your Ethernet ...

Page 40: ...forwarded must have its DHCP client function disabled and should have a new static IP address assigned to it because its IP address may change when using the DHCP function DMZ DMZ To use this feature select Enable To disable DMZ hosting select Disable Public IP Address The public IP address is displayed here Client PC IP Address To expose one PC enter the computer s IP address To get the IP addres...

Page 41: ...outer from a remote location via the Internet To enable Remote Administration click the Enabled radio button Administration Port Enter the port number you will use to remotely access the Router UPnP UPnP UPnP allows Windows XP to automatically configure the Router for various Internet applications such as gaming and videoconferencing If you want to use the UPnP feature click the Enabled radio butt...

Page 42: ...In the Logviewer IP Address field enter the fixed IP address of the PC running the Logviewer software The Router will now send updated logs to that PC Incoming Log Click the Incoming Log button to view a temporary log of the Source IP addresses and Destination Port Numbers for all the incoming Internet traffic Click the Refresh button to update the log Outgoing Log Click the Outgoing Log button to...

Page 43: ...whose connection you wish to test and how many times you wish to test it Then click the Ping button The Ping Test screen will then display the test results Click the Close button to return to the Diagnostics screen Traceroute Test To test the performance of a connect click the Traceroute button Enter the address of the PC whose connection you wish to test and click the Traceroute button The Tracer...

Page 44: ... Save Settings button to save the change or click the Cancel Changes button to undo your change Help information is shown on the right hand side of a screen Figure 5 37 Administration Tab Factory Defaults NOTE Do not restore the factory defaults unless you are having difficulties with the Router and have exhausted all other troubleshooting measures Once the Router is reset you will have to re ente...

Page 45: ...pgrade file or click the Browse button to find this file Upgrade After you have selected the appropriate file click the Upgrade button and follow the on screen instructions Figure 5 38 Administration Tab Firmware Upgrade download to receive a file transmitted over a network firmware the programming code that runs a networking device upgrade to replace existing software or firmware with a newer ver...

Page 46: ...ix A Troubleshooting Call1 Status The status of the active phone call is shown here Call2 Status If you are using call waiting the status of the incoming phone call is shown here Line2 Status Registration Status This indicates whether or not this phone line is registered with your Internet phone service provider If the phone line is not registered then you should register it with your Internet pho...

Page 47: ...o click if there is no connection and you want to establish an Internet connection Internet IP Address The Router s Internet IP Address is displayed here Subnet Mask and Default Gateway The Router s Subnet Mask and Default Gateway address are displayed here for DHCP and static IP connections DNS 1 3 Shown here are the DNS Domain Name System IP addresses currently used by the Router MTU Shown here ...

Page 48: ... The status of the DHCP server is displayed here DHCP Client Table Click the DHCP Clients Table button to view a list of PCs that have been assigned IP addresses by the Router The DHCP Active IP Table screen lists the DHCP Server IP Address Client Hostnames IP Addresses MAC Addresses and Interfaces Click the Delete checkbox to delete a DHCP client listing Click the Refresh button to update the inf...

Page 49: ...ixed G Only or Disabled used by the network SSID As entered on the Wireless tab this will display the wireless network name or SSID DHCP Server The status of the DHCP server is displayed here Channel As entered on the Wireless tab this will display the channel on which your wireless network is broadcasting Encryption Function As selected on the Security Tab this will indicate which wireless securi...

Page 50: ...m Wait 30 seconds and power on the cable DSL modem first Then power on the Router and other network devices Verify your account information and confirm that the phone line is registered with your Internet phone service provider 2 The Status Voice screen of the Web based Utility says that the registration for my Internet phone line has failed Go through this checklist until your problem is solved M...

Page 51: ...ept the entry 5 Click the DNS tab and make sure the DNS Enabled option is selected Enter the Host and Domain names e g John for Host and home for Domain Enter the DNS entry provided by your ISP If your ISP has not provided the DNS IP address contact your ISP to get that information or go to its website for the information 6 Click the OK button in the TCP IP properties window and click Close or the...

Page 52: ...roperties window Click the OK button in the Local Area Connection Properties window 5 I want to test my Internet connection A Check your TCP IP settings For Windows 98SE Me 2000 and XP Refer to Windows Help for details Make sure Obtain IP address automatically is selected in the settings B Open a command prompt For Windows 98SE and Me Click Start and Run In the Open field type command Press the En...

Page 53: ...ble Check to see if the Internet column has a solidly lit Link Act LED Make sure the cable connecting from your cable or DSL modem is connected to the Router s Internet port Verify that the Status page of the Router s web based utility shows a valid IP address from your ISP Turn off the computer Router and cable DSL modem Wait 30 seconds and then turn on the Router cable DSL modem and computer Che...

Page 54: ...out doing any port forwarding or DMZ hosting There may be cases when you want to host an online game or Internet application This would require you to set up the Router to deliver incoming packets or data to a specific computer This also applies to the Internet applications you are using The best way to get the information on what port services to use is to go to the website of the online game or ...

Page 55: ...rst by the forwarding settings If the port number that the data enters from does not have port forwarding then the Router will send the data to whichever PC or network device you set for DMZ hosting Follow these steps to set DMZ hosting 1 Access the Router s web based utility by going to http 192 168 1 1 or the IP address of the Router Go to the Applications Gaming Port Forwarding tab 2 Disable or...

Page 56: ...ings and that the browser you use is set to connect directly to the LAN For Microsoft Internet Explorer 5 0 or higher 1 Click Start Settings and Control Panel Double click Internet Options 2 Click the Connections tab 3 Click the LAN settings button and remove anything that is checked 4 Click the OK button to go back to the previous screen 5 Click the option Never dial a connection This will remove...

Page 57: ...alive the connection This may not always work so you may need to re establish connection periodically 1 To connect to the Router go to the web browser and enter http 192 168 1 1 or the IP address of the Router 2 Enter the password if asked The default password is admin 3 On the Setup screen select the option Keep Alive and set the Redial Period option at 20 seconds 4 Click the Save Settings button...

Page 58: ...l not working check the Router Ensure that it is connected and powered on Connect to it and check its settings If you cannot connect to it check the LAN and power connections If the Router is configured correctly check your Internet connection DSL cable modem etc to see if it is working correctly You can remove the Router to verify a direct connection Manually configure the TCP IP settings with a ...

Page 59: ... the Internet connection speed will vary depending on the speed of your broadband connection The Router also supports 100Mbps over the auto sensing Fast Ethernet 10 100 switch on the LAN side of the Router What is Network Address Translation and what is it used for Network Address Translation NAT translates multiple IP addresses on the private LAN to one public address that is sent out to the Inte...

Page 60: ...ers with the same CD key connect at the same time even if on the same LAN not a problem with 1 0 1 3 As far as hosting games the HL server does not need to be in the DMZ Just forward port 27015 to the local IP address of the server computer How can I block corrupted FTP downloads If you are experiencing corrupted files when you download a file with your FTP client try using another FTP program The...

Page 61: ...ions and then the Connection tab Make sure that Internet Explorer is set to Never dial a connection For Netscape Navigator click Edit Preferences Advanced and Proxy Make sure that Netscape Navigator is set to Direct connection to the Internet What is DMZ Hosting Demilitarized Zone DMZ allows one IP address computer to be exposed to the Internet Some applications require multiple TCP IP ports to be...

Page 62: ...d that the hardware complies with the 802 11b standard The 802 11b standard states a maximum data transfer rate of 11Mbps and an operating frequency of 2 4GHz What is the IEEE 802 11g standard It is one of the IEEE standards for wireless networks The 802 11g standard allows wireless networking hardware from different manufacturers to communicate provided that the hardware complies with the 802 11g...

Page 63: ...tors as signal strength and quality as well as the message load currently being carried by each access point and the distance of each access point to the wired backbone Based on that information the node next selects the right access point and registers its address Communications between end node and host computer can then be transmitted up and down the backbone As the user moves on the end node s...

Page 64: ...cted ignored by most narrowband receivers What is WEP WEP is Wired Equivalent Privacy a data privacy mechanism based on a shared key algorithm as described in the IEEE 802 11 standard What is WPA WPA is Wi Fi Protected Access a wireless security protocol that can be used in conjunction with a RADIUS server What is a MAC Address The Media Access Control MAC address is a unique number assigned by th...

Page 65: ...ed on the Router but not on your wireless adapter or vice versa Verify that the same WEP keys and levels 64 or 128 are being used on all nodes of your wireless network How many channels frequencies are available with the Router There are eleven available channels ranging from 1 to 11 in North America If your questions are not addressed here refer to the Linksys website www linksys com ...

Page 66: ...EP encryption keys periodically For information on implementing these security features refer to Chapter 5 Configuring the Router Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking products first listen for beacon messages These messages can be easily decrypted and contain much of the network s info...

Page 67: ...e MAC Address filtering MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses This makes it harder for a hacker to access your network with a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can only provide enough sec...

Page 68: ... server This should only be used when a RADIUS server is connected to the Router or other device First select the type of WPA algorithm TKIP or AES Enter the RADIUS server s IP Address and port number along with a key shared between the device and the server Last enter a Group Key Renewal period which instructs the device how often it should change the encryption keys Implementing encryption may h...

Page 69: ...is a set of instructions or protocol all PCs follow to communicate over a wired or wireless network Your PCs will not be able to utilize networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folders or files over your network Windows Help provides complete instructions on utilizing shared resources Net...

Page 70: ... In the Open field enter winipcfg Then press the Enter key or the OK button 2 When the IP Configuration screen appears select the Ethernet adapter you have connected to the Router via a CAT 5 Ethernet network cable 3 Write down the Adapter Address as shown on your computer screen This is the MAC address for your Ethernet adapter and is shown as a series of numbers and letters The MAC address Adapt...

Page 71: ...hows the Ethernet adapter s IP address as 192 168 1 100 Your computer may show something different For the Router s Web based Utility You can use MAC or IP addresses to designate computers for each Internet Access Policy you create To specify a computer enter its IP address or 12 digit MAC address For MAC address cloning enter the 12 digit MAC address in the fields provided two digits per field Fo...

Page 72: ... the use of an access point AES Advanced Encryption Standard A security method that uses symmetric 128 bit block data encryption Backbone The part of a network that connects most of the systems and networks together and handles the most data Bandwidth The transmission capacity of a given device or network Beacon Interval Data transmitted on your wireless network that keeps the network synchronized...

Page 73: ...ea network DHCP Dynamic Host Configuration Protocol A networking protocol that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited amount of time instead of assigning permanent IP addresses DMZ Demilitarized Zone Removes the Router s firewall protection from one PC allowing it to be seen from the Internet DNS Domain Name Serv...

Page 74: ...tects the resources of a network from users from other networks Firmware The programming code that runs a networking device Fragmentation Breaking a packet into smaller units when transmitting over a network medium that cannot support the original size of the packet FTP File Transfer Protocol A protocol used to transfer files over a TCP IP network Full Duplex The ability of a networking device to ...

Page 75: ... Chat program that runs under Windows Multicasting Sending data to a group of destinations at once NAT Network Address Translation NAT technology translates IP addresses of a local area network to a different IP address for the Internet NAT Network Address Translation Traversal A method of enabling specialized applications such as Internet phone calls video and audio to travel between your local n...

Page 76: ...f broadband connection in Europe Preamble Part of the wireless signal that synchronizes network traffic RADIUS Remote Authentication Dial In User Service A protocol that uses an authentication server to control network access RJ 45 Registered Jack 45 An Ethernet connector that holds up to eight wires Roaming The ability to take a wireless device from one access point s range to another without los...

Page 77: ...AT traversal Subnet Mask An address code that determines the size of the network Switch 1 A data switch that connects computing devices to host computers allowing a large number of devices to share a limited number of ports 2 A device for making breaking or changing the connections in an electrical circuit TCP Transmission Control Protocol A network protocol for transmitting data that requires ack...

Page 78: ... security measure to protect data as it leaves one network and goes to another over the Internet WAN Wide Area Network The Internet WEP Wired Equivalent Privacy A method of encrypting network data transmitted on a wireless network for greater security WINIPCFG A Windows 98 and Me utility that displays the IP address for a particular networking device WLAN Wireless Local Area Network A group of com...

Page 79: ...0 100 RJ 45 Network Ports Two Standard Phone Ports One Power Port Button Reset Cabling Type RJ 45 Ethernet Category 5 RJ 11 Standard Phone cable LEDs POWER INTERNET PHONE2 PHONE1 WIRELESS ETHERNET 1 4 UPnP able cert Certified Network Protocol TCP IP Voice Protocol Session Initiation Protocol SIP v2 Voice Codecs G 711 a law G 711µ Law G 726 G 729 A B E G 728 and G 723 1 Ringer Equivalence Number 5 ...

Page 80: ...mensions 6 69 x 6 69 x 1 22 W x H x D 170 mm x 170 mm x 31 mm Unit Weight 13 50 oz 0 38 kg Power External 12V DC 1 0A Certifications FCC CE cUL Operating Temp 0 C to 45 C 32 F to 113 F Storage Temp 20 C to 60 C 4 F to 140 F Operating Humidity 10 85 Non Condensing Storage Humidity 5 90 Non Condensing Warranty 3 Years Limited ...

Page 81: ...RESENTATIONS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except b...

Page 82: ...nd receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received includin...

Page 83: ...ent or its transmit antenna that is installed outdoors is subject to licensing EC Declaration of Conformity Europe Linksys declares that this product conforms to the specifications listed below following the provisions of the European R TTE directive 1999 5 EC EN 301 489 1 301 489 17 General EMC requirements for Radio equipment EN 609 50 Safety EN 300 328 1 EN 300 328 2 Technical requirements for ...

Page 84: ...ur de bâtiments une licence de l IBPT est requise Pour les enregistrements et licences veuillez contacter l IBPT France 2 4 GHz Bande les canaux 10 11 12 13 2457 2462 2467 et 2472 MHz respectivement sont complétement libres d utilisation en France en utilisation intérieur Pour ce qui est des autres canaux ils peuvent être soumis à autorisation selon le départment L utilisation en extérieur est sou...

Page 85: ...bout networking with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 823 3002 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorization de...

Reviews: