GNU General Public License or other open-source software licenses. Upon request, open-source software source code is available at cost from Linksys for at least While reading through the User Guide you may see three years from the product purchase date.
Ad-Hoc versus Infrastructure Mode ports. To add more ports, any of the Router’s LAN ports can be connected to any Linksys Business Series switch Unlike wired networks, wireless networks have two (such as the SLM series or SRW series switches).
(or fake) a MAC address allowed on the network. With VPN Router to VPN Router this spoofed MAC address, the hacker can also intercept • information meant for another user. Computer (using the Linksys VPN client software) to • VPN Router 2) Data Sniffing IMPORTANT: You must have at least one VPN Data “sniffing”...
The following is an example of a computer-to-VPN Router VPN. In her hotel room, a traveling businesswoman dials up her ISP. Her notebook computer has the Linksys VPN client software, which is configured with her office’s IP address. She accesses the Linksys VPN client software and connects to the VPN Router at the central office.
Chapter Product Overview Chapter : Back Panel Product Overview The Router’s ports and Reset button are located on the back panel of the Router. Front Panel The Router’s LEDs are located on the front panel of the Router. Back Panel POWER The Power port is where you will connect the AC power cable.
Overview • filters to enhance the security of your network. Linksys recommends using the Setup CD-ROM for first- Port Forwarding. To set up public services or other • time installation of the Router. If you do not wish to run...
Chapter Configuring the Wireless-G Router Diagnostics. Use this screen to check the connection A password request page will appear. (Windows XP users • between the Router and a PC. will see a similar screen.) The first time you open the web-based utility, enter admin (default user name) in Factory Default.
Page 13
Chapter Configuring the Wireless-G Router available features will differ depending on what kind of connection type you select. The connection types are: Automatic Configuration - DHCP • Static IP • PPPoE PPPoE • User Name and Password/Confirm Password Enter PPTP the User Name and Password provided by your ISP.
Page 14
Chapter Configuring the Wireless-G Router User Name and Password Enter the User Name and seconds of inactivity that must elapse before your Internet Password provided by your ISP. connection is terminated automatically. Connect on Demand: Max Idle Time Keep Alive You can configure If you select this option, the Router will the Router to cut the Internet connection after it has been...
Chapter Configuring the Wireless-G Router Automatically assigns an IP address to each PC on your network. Unless Select your time zone from the Time Zone you already have one, it is highly recommended that you drop-down menu. If you want to enable the Auto Daylight leave the Router enabled as a DHCP server.
Chapter Configuring the Wireless-G Router Status DDNS The status of the DDNS service connection is displayed here. If your DDNS service is provided by DynDNS.org, then When you have finished making changes to the screen, select DynDNS.org in the drop-down menu. If your DDNS click Save Settings to save the changes, or click Cancel service is provided by TZO, then select TZO.com.
Chapter Configuring the Wireless-G Router Setup > Advanced Routing Delete This Entry If you need to delete a route, select its number from the drop-down menu, and click Delete This Entry. Enter Router Name Enter the name of your Router. LAN IP Address The LAN IP Address is the address of the remote network or host to which you want to assign a...
For added security, you should change you enable this feature, wireless PCs will not be able to the default SSID (linksys-g) to a unique name. see each other. This is useful when setting up a wireless TX Rate Limitation The rate of data transmission should hotspot location.
Page 19
Chapter Configuring the Wireless-G Router server’s IP address. Select TKIP or AES from the WPA Algorithms drop-down menu. Enter the RADIUS server’s port number, along with the Shared Secret key, which is the key shared between the Router and the server. Last, enter the Key Renewal period, which instructs the Router how often it should change the encryption keys.
Page 20
Chapter Configuring the Wireless-G Router Renewal period, which instructs the Router how often it This option features WPA2 used in coordination with a should change the encryption keys. RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) Enter the RADIUS When you have finished making changes to the screen, server’s IP address and port number, along with the shared click Save Settings to save the changes, or click Cancel...
Chapter Configuring the Wireless-G Router Changes to undo your changes. For help information, using 64-bit WEP encryption, the key must be exactly 10 click More. hexadecimal characters in length. If you are using 128-bit WEP encryption, the key must be exactly 26 hexadecimal Wireless >...
Chapter Configuring the Wireless-G Router Wireless > Advanced Wireless Settings to catch all Wireless-G transmissions but will severely decrease performance. Beacon Interval The default value is 00. Enter a value between 1 and 65,535 milliseconds. The Beacon Interval value indicates the frequency interval of the beacon. A beacon is a packet broadcast by the Router to synchronize the wireless network.
Chapter Configuring the Wireless-G Router This tab is used for Wireless Distribution System (WDS). is more difficult for intruders to work their way into your WDS will ONLY work with SSID1. Make sure that the network. Click the checkbox to block anonymous Internet channel and security settings are the same for all WDS requests.
Chapter Configuring the Wireless-G Router Application The Port Forwarding screen sets up public services on your In this field, enter the name you wish to give network, such as web servers, ftp servers, e-mail servers, the application. Each name can be up to 12 characters. or other specialized Internet applications.
Chapter Configuring the Wireless-G Router Firewall > Access Restriction Firewall > URL Filtering The Access Restriction screen allows you to block or allow URL filtering is used to block access to specific sites on the specific kinds of Internet usage and traffic during specific Internet.
Chapter Configuring the Wireless-G Router Certificate Management This section allows you to manage the certificate used for securing the communication between the router and QuickVPN clients. Generate Click this button to generate a new certificate to replace the existing certificate on the router. Export for Admin Click this button to export the certificate for administrator.
Chapter Configuring the Wireless-G Router PPTP PassThrough Point-to-Point Tunneling Protocol traversal is enabled, the Remote Secure Group and Remote Secure Gateway must be set to Any. (PPTP) allows the Point-to-Point Protocol (PPP) to be tunneled through an IP network. PPTP Passthrough is Advanced Settings To define allowable remote private enabled by default.
Page 28
Chapter Configuring the Wireless-G Router the VPN will terminate at the Router, instead of the PC; same type of encryption that is being used by the VPN or Any, to allow any computer to access the tunnel. The device at the other end of the tunnel. screen will change depending on the selected option.
Chapter Configuring the Wireless-G Router DPD will issue DPD packets (ISAKMP format) to query a commanded to start/stop connection here. VPN Summary remote peer, and wait for a reply to recognize that it is can help an administrator to manage and examine all still alive.
Chapter Configuring the Wireless-G Router Detail Each Tunnel has a Detail button. This button will put into High or Low Priority Queue for the egress port of become available when a Tunnel Status reveals a “C”, “T”, WAN according to your settings. “Any”, and “...
Chapter Configuring the Wireless-G Router according to its priority value. If you select High for the Admin Password specific port, the packets received from this port would be To ensure the Router’s security, you will be asked for your put into High Priority Queue.
Chapter Configuring the Wireless-G Router SNMP When you have finished making changes to the screen, click Save Settings to save the changes, or click Cancel SNMP, Simple Network Management Protocol, is a Changes to undo your changes. For help information, network protocol that provides network administrators click More.
Chapter Configuring the Wireless-G Router Administration > Diagnostics click Stop. Click Clear Log to clear the screen. Click Close to return to the Administration > Diagnostics screen. The Administration > Diagnostics screen allows you to For help information, click More. check the connections of your network components. Administration >...
After you upgrade its firmware, you will have to re-enter all of your configuration settings. Before upgrading the firmware, download the Router’s latest firmware upgrade file from www.linksys.com. Then extract the file to your PC, and perform the steps below. File Path Enter the name of the extracted firmware upgrade file or click Browse to locate the file.
Chapter Configuring the Wireless-G Router Status > Local Network Click Refresh to update the on-screen information. For help information, click More. The Status > Local Network screen displays information Status > Wireless about the local network. The Status > Wireless screen displays status information about your wireless network.
Chapter Configuring the Wireless-G Router Bytes Received The number of bytes received is shown here. Bytes Sent The number of bytes sent is shown here. Error Packets Received The number of error packets received is displayed here. Dropped Packets Received The number of dropped packets received is displayed here.
Router. with your Ethernet adapter, and click Properties. Read the descriptions below to help solve your problems. If you can’t find an answer here, check the Linksys website In the This connection uses the following items box, at www.linksys.com.
Page 38
(for PPPoE users)” below. original computer is not the cause of the problem. I can’t get my Virtual Private Network (VPN) to work At the command prompt, type ping www.linksys.com through the Router. and press Enter. Access the Router’s web interface by going to If you get a reply, the computer is connected to •...
Page 39
Internet application: Internet applications” below for details. Access the Router’s Web-based Utility by going to Check the Linksys website at www.linksys.com for more http://9.8.. or the IP address of the Router. Go information. to the Firewall -> Port Forwarding tab.
Page 40
In order to upgrade the firmware with the latest features, I forgot my password, or the password prompt always you need to go to the Linksys website and download the appears when saving settings to the Router. latest firmware at www.linksys.com. Follow these steps: Reset the Router to factory defaults by pressing the Reset Go to the Linksys website at www.linksys.com and...
Page 41
Appendix A Troubleshooting DSL users, it is strongly recommended to use MTU 1492. If When I enter a URL or IP address, I get a time-out error or am prompted to retry. you are having difficulties, perform the following steps: To connect to the Router, go to the web browser, and Check if other PCs work.
Windows 2000 or Windows XP? What do I need to do? Yes, but Linksys does not, at this time, provide technical Force your Ethernet adapter to 10Mbps or half duplex support for setup, configuration or troubleshooting of any mode, and turn off the “Auto-negotiate”...
Page 43
Reset your cable or DSL modem by powering the unit off and then on. Obtain and flash the latest firmware The Router allows PPTP packets to pass through. release that is readily available on the Linksys website, www.linksys.com. Is the Router cross-platform compatible?
32 characters in length. Linksys wireless products General Network Security Guidelines use linksys as the default wireless network name. You should change the wireless network name to something Wireless network security is useless if the underlying unique to distinguish your wireless network from other network is not secure.
Overview This appendix explains how to install and use the Linksys QuickVPN software that can be downloaded from www. linksys.com. QuickVPN works with computers running Windows 2000, XP, or Vista. (Computers using other operating systems will have to use third-party VPN software.)
Appendix C Using Linksys QuickVPN for Windows 2000, XP, or Vista Using the Linksys QuickVPN Software Double-click the Linksys QuickVPN software icon on your desktop or in the system tray. QuickVPN Desktop Icon QuickVPN Tray Icon— No Connection QuickVPN Status The QuickVPN Login screen will appear.
Appendix C Using Linksys QuickVPN for Windows 2000, XP, or Vista Distributing Certificates to QuickVPN Users The following explains how to export a certificate from the WRV200 for distribution to QuickVPN users, as well as how to install the certificate on the QuickVPN users’ PCs.
Appendix D Configuring IPSec with a Windows 2000 or XP Computer Appendix D: How to Establish a Secure IPSec Tunnel Configuring IPSec with Step 1: Create an IPSec Policy a Windows 000 or XP Click Start, select Run, and type secpol.msc in the Open field.
Page 49
Appendix D Configuring IPSec with a Windows 2000 or XP Computer Make sure the IP Filter List tab is selected. Click Add. mask ...0. (These are the Router’s default settings. If you have changed these settings, enter your new values.) If you want to enter a description for your filter, click the Description tab and enter the description there.
Appendix D Configuring IPSec with a Windows 2000 or XP Computer Click the Filter Action tab, and click the filter action Require Security radio button. Then, click Edit. Filters Properties Filter Action Tab If you want to enter a description for your filter, click On the Security Methods tab, verify that the Negotiate the Description tab and enter the description there.
Page 51
Appendix D Configuring IPSec with a Windows 2000 or XP Computer Connection Type Tab Tunnel 2: Router->win Preshared Key This new Preshared key will be displayed. Click the In the new policy’s Properties screen, make sure Apply button to continue, if it appears on your screen; that win ->...
Page 52
Appendix D Configuring IPSec with a Windows 2000 or XP Computer Filter Action Tab New Preshared Key Click the Authentication Methods tab, and verify Click the Tunnel Setting tab. Click the radio button The that the authentication method Kerberos is selected. tunnel endpoint is specified by this IP Address, and Then, click Edit.
Appendix D Configuring IPSec with a Windows 2000 or XP Computer Step 4: Assign New IPSec Policy the Tunnel Name field. This is to allow you to identify multiple tunnels and does not have to match the In the IP Security Policies on Local Machine window, right- name used at the other end of the tunnel.
10/100 8-Port VPN Router, model number RV082 • (Any VPN Router can be deployed, such as the Linksys 10/100 16-, 8-, or 4-Port VPN Router (model numbers RV016, RV082, or RV042); however, this example uses the RV082) Configuration when the Remote Gateway...
Appendix E Gateway-to-Gateway VPN Tunnel Click Save Settings and proceed to the next section, “Configuration of the RV082. ” Configuration of the RV082 Follow similar instructions for the RV082. Launch the web browser for a networked computer, designated PC 2. Access the web-based utility of the RV082.
Appendix E Gateway-to-Gateway VPN Tunnel Configuration when the Remote Gateway Uses a Dynamic IP Address This example assumes the Remote Gateway is using a dynamic IP address. If the Remote Gateway uses a static IP address, refer to “Configuration when the Remote Gateway Uses a Static IP.
Appendix E Gateway-to-Gateway VPN Tunnel For the Local Security Group Type, select Subnet. Enter IP address, refer to “Configuration when the Remote the RV082’s local network settings in the IP Address and Gateway Uses a Dynamic IP. ” Subnet Mask fields. RV082 WRV200 Dynamic IP: B.B.B.B with Dynamic IP: A.A.A.A Domain Name: www.abc.com...
Appendix E Gateway-to-Gateway VPN Tunnel For the Remote Secure Group Type, select Subnet. Enter the RV082’s local network settings in the IP Address and Mask fields. For the Remote Secure Gateway Type, select FQDN. Enter the RV082’s domain name in the field provided. In the Key Management section, select the appropriate encryption, authentication, and other key management settings.
Domain A specific name for a network of computers. WEB: For additional terms, please visit the Download To receive a file transmitted over a network. glossary at www.linksys.com/glossary DSL (Digital Subscriber Line) An always-on broadband connection over traditional phone lines. Access Point A device that allows wireless-equipped...
Page 60
For example, all devices with a prefix of simplifies the WEP encryption process by automatically 157.100.100.100 are part of the same subnet. generating the WEP encryption keys for Linksys products. Subnet Mask An address code that determines the size Ping (Packet INternet Groper) An Internet utility used of the network.
Page 61
Appendix F Glossary URL (Uniform Resource Locator) The address of a file located on the Internet. VPN (Virtual Private Network) A security measure to protect data as it leaves one network and goes to another over the Internet. WAN (Wide Area Network) Networks that cover a large geographical area.
Page 63
Appendix G Specifications Routing Static and RIP v1, v2 Environmental Dimensions 6.69" x 1.65" x 7.62” W x H x D (170 x 42 x 193.5 mm) Unit Weight 0.78 lb (0.355 kg) Power 12V 1A Certification FCC Class B, CE, IC Operating Temp.
CONDITIONS, REPRESENTATIONS AND WARRANTIES, and the web pages referred to herein may be updated by INCLUDING, BUT NOT LIMITED TO, ANY IMPLIED Linksys from time to time; the version in effect at the date WARRANTY OF NON-INFRINGEMENT, ARE DISCLAIMED. of purchase shall apply.
RMA number and dated proof of original purchase will be rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge.
Appendix I Regulatory Information Appendix I: Safety Notices Regulatory Information Caution: To reduce the risk of fire, use only No.26 AWG • or larger telecommunication line cord. Do not use this product near water, for example, in a • FCC Statement wet basement or near a swimming pool.
Appendix I Regulatory Information Avis d’Industrie Canada Avis de non-responsabilité concernant les appareils sans fil Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. Les performances maximales pour les réseaux sans fil L’utilisation de ce dispositif est autorisée seulement aux sont tirées des spécifications de la norme IEEE 802.11.
úřady. Správná likvidace a recyklace pomáhá předcházet Linksys products. Consumers are required to comply with potenciálním negativním dopadům na životní prostředí a lidské this notice for all electronic products bearing the following zdraví.
Page 69
Appendix I Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
Page 70
Appendix I Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
Page 71
ľudí. Ak máte záujem o podrobnejšie WEB: For additional information, please visit informácie o likvidácii starého zariadenia, obráťte sa, prosím, na www.linksys.com miestne orgány, organizácie zaoberajúce sa likvidáciou odpadov alebo obchod, v ktorom ste si produkt zakúpili. Wireless-G VPN Router with RangeBooster...
Appendix J Contact Information Appendix J: Contact Information Linksys Contact Information Website http://www.linksys.com Support Site http://www.linksys.com/support FTP Site ftp.linksys.com Advice Line 800-546-5797 (LINKSYS) Support 800-326-7114 RMA (Return Merchandise http://www.linksys.com/warranty Authorization) NOTE: Details on warranty and RMA issues can be found in the Warranty section of this Guide.