Linksys WAP54GP - Wireless-G Access Point User Manual
Linksys WAP54GP - Wireless-G Access Point User Manual

Linksys WAP54GP - Wireless-G Access Point User Manual

Business series wireless-g vpn router with rangebooster
Hide thumbs Also See for WAP54GP - Wireless-G Access Point:
Table of Contents

Advertisement

Quick Links

USER GUIDE
BUSINESS SERIES
Wireless-G VPN Router
v
with RangeBooster
WRV200
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WAP54GP - Wireless-G Access Point

  • Page 1 USER GUIDE BUSINESS SERIES Wireless-G VPN Router with RangeBooster WRV200 Model:...
  • Page 2: About This Guide

    GNU General Public License or other open-source software licenses. Upon request, open-source software source code is available at cost from Linksys for at least While reading through the User Guide you may see three years from the product purchase date.
  • Page 3: Table Of Contents

    VPN Router to VPN Router ........4 Computer (using the Linksys VPN client software) to VPN Router ... . 4 Chapter 4: Product Overview Front Panel.
  • Page 4 Downloading and Installing from the Internet ......40 Using the Linksys QuickVPN Software ....... .41 Version Number of the QuickVPN Client .
  • Page 5 Table of Contents Step 4: Assign New IPSec Policy........48 Step 5: Create a Tunnel Through the Web-Based Utility .
  • Page 6: Chapter 1: Introduction

    Linksys stand alone access points. That, along with the ability to increase or decrease the RF output power, allows for optimal wireless coverage.
  • Page 7: Chapter 2: Planning Your Wireless Network

    Ad-Hoc versus Infrastructure Mode ports. To add more ports, any of the Router’s LAN ports can be connected to any Linksys Business Series switch Unlike wired networks, wireless networks have two (such as the SLM series or SRW series switches).
  • Page 8: Chapter 3: Planning Your Virtual Private Network (Vpn)

    (or fake) a MAC address allowed on the network. With VPN Router to VPN Router this spoofed MAC address, the hacker can also intercept • information meant for another user. Computer (using the Linksys VPN client software) to • VPN Router 2) Data Sniffing IMPORTANT: You must have at least one VPN Data “sniffing”...
  • Page 9: Vpn Router To Vpn Router

    The following is an example of a computer-to-VPN Router VPN. In her hotel room, a traveling businesswoman dials up her ISP. Her notebook computer has the Linksys VPN client software, which is configured with her office’s IP address. She accesses the Linksys VPN client software and connects to the VPN Router at the central office.
  • Page 10: Chapter 4: Product Overview

    Chapter  Product Overview Chapter : Back Panel Product Overview The Router’s ports and Reset button are located on the back panel of the Router. Front Panel The Router’s LEDs are located on the front panel of the Router. Back Panel POWER The Power port is where you will connect the AC power cable.
  • Page 11: Chapter 5: Configuring The Wireless-G Vpn Router

    Overview • filters to enhance the security of your network. Linksys recommends using the Setup CD-ROM for first- Port Forwarding. To set up public services or other • time installation of the Router. If you do not wish to run...
  • Page 12: How To Access The Web-Based Utility

    Chapter  Configuring the Wireless-G Router Diagnostics. Use this screen to check the connection A password request page will appear. (Windows XP users • between the Router and a PC. will see a similar screen.) The first time you open the web-based utility, enter admin (default user name) in Factory Default.
  • Page 13 Chapter  Configuring the Wireless-G Router available features will differ depending on what kind of connection type you select. The connection types are: Automatic Configuration - DHCP • Static IP • PPPoE PPPoE • User Name and Password/Confirm Password Enter PPTP the User Name and Password provided by your ISP.
  • Page 14 Chapter  Configuring the Wireless-G Router User Name and Password Enter the User Name and seconds of inactivity that must elapse before your Internet Password provided by your ISP. connection is terminated automatically. Connect on Demand: Max Idle Time Keep Alive You can configure If you select this option, the Router will the Router to cut the Internet connection after it has been...
  • Page 15: Setup > Vlan

    Chapter  Configuring the Wireless-G Router Automatically assigns an IP address to each PC on your network. Unless Select your time zone from the Time Zone you already have one, it is highly recommended that you drop-down menu. If you want to enable the Auto Daylight  leave the Router enabled as a DHCP server.
  • Page 16: Setup > Mac Address Clone

    Chapter  Configuring the Wireless-G Router Status DDNS The status of the DDNS service connection is displayed here. If your DDNS service is provided by DynDNS.org, then When you have finished making changes to the screen, select DynDNS.org in the drop-down menu. If your DDNS click Save Settings to save the changes, or click Cancel service is provided by TZO, then select TZO.com.
  • Page 17: Setup > Advanced Routing

    Chapter  Configuring the Wireless-G Router Setup > Advanced Routing Delete This Entry If you need to delete a route, select its number from the drop-down menu, and click Delete This Entry. Enter Router Name Enter the name of your Router. LAN IP Address The LAN IP Address is the address of the remote network or host to which you want to assign a...
  • Page 18: Wireless

    For added security, you should change you enable this feature, wireless PCs will not be able to the default SSID (linksys-g) to a unique name. see each other. This is useful when setting up a wireless TX Rate Limitation The rate of data transmission should hotspot location.
  • Page 19 Chapter  Configuring the Wireless-G Router server’s IP address. Select TKIP or AES from the WPA  Algorithms drop-down menu. Enter the RADIUS server’s port number, along with the Shared Secret key, which is the key shared between the Router and the server. Last, enter the Key Renewal period, which instructs the Router how often it should change the encryption keys.
  • Page 20 Chapter  Configuring the Wireless-G Router Renewal period, which instructs the Router how often it This option features WPA2 used in coordination with a should change the encryption keys. RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) Enter the RADIUS When you have finished making changes to the screen, server’s IP address and port number, along with the shared click Save Settings to save the changes, or click Cancel...
  • Page 21: Wireless > Wireless Network Access

    Chapter  Configuring the Wireless-G Router Changes to undo your changes. For help information, using 64-bit WEP encryption, the key must be exactly 10 click More. hexadecimal characters in length. If you are using 128-bit WEP encryption, the key must be exactly 26 hexadecimal Wireless >...
  • Page 22: Wireless > Advanced Wireless Settings

    Chapter  Configuring the Wireless-G Router Wireless > Advanced Wireless Settings to catch all Wireless-G transmissions but will severely decrease performance. Beacon Interval The default value is 00. Enter a value between 1 and 65,535 milliseconds. The Beacon Interval value indicates the frequency interval of the beacon. A beacon is a packet broadcast by the Router to synchronize the wireless network.
  • Page 23: Firewall

    Chapter  Configuring the Wireless-G Router This tab is used for Wireless Distribution System (WDS). is more difficult for intruders to work their way into your WDS will ONLY work with SSID1. Make sure that the network. Click the checkbox to block anonymous Internet channel and security settings are the same for all WDS requests.
  • Page 24: Firewall > Port Triggering

    Chapter  Configuring the Wireless-G Router Application The Port Forwarding screen sets up public services on your In this field, enter the name you wish to give network, such as web servers, ftp servers, e-mail servers, the application. Each name can be up to 12 characters. or other specialized Internet applications.
  • Page 25: Firewall > Access Restriction

    Chapter  Configuring the Wireless-G Router Firewall > Access Restriction Firewall > URL Filtering The Access Restriction screen allows you to block or allow URL filtering is used to block access to specific sites on the specific kinds of Internet usage and traffic during specific Internet.
  • Page 26: Vpn > Vpn Passthrough

    Chapter  Configuring the Wireless-G Router Certificate Management This section allows you to manage the certificate used for securing the communication between the router and QuickVPN clients. Generate Click this button to generate a new certificate to replace the existing certificate on the router. Export for Admin Click this button to export the certificate for administrator.
  • Page 27: Vpn > Ipsec Vpn

    Chapter  Configuring the Wireless-G Router PPTP PassThrough Point-to-Point Tunneling Protocol traversal is enabled, the Remote Secure Group and Remote  Secure Gateway must be set to Any. (PPTP) allows the Point-to-Point Protocol (PPP) to be tunneled through an IP network. PPTP Passthrough is Advanced Settings To define allowable remote private enabled by default.
  • Page 28 Chapter  Configuring the Wireless-G Router the VPN will terminate at the Router, instead of the PC; same type of encryption that is being used by the VPN or Any, to allow any computer to access the tunnel. The device at the other end of the tunnel. screen will change depending on the selected option.
  • Page 29: Vpn > Vpn Summary

    Chapter  Configuring the Wireless-G Router DPD will issue DPD packets (ISAKMP format) to query a commanded to start/stop connection here. VPN Summary remote peer, and wait for a reply to recognize that it is can help an administrator to manage and examine all still alive.
  • Page 30: Qos

    Chapter  Configuring the Wireless-G Router Detail Each Tunnel has a Detail button. This button will put into High or Low Priority Queue for the egress port of become available when a Tunnel Status reveals a “C”, “T”, WAN according to your settings. “Any”, and “...
  • Page 31: Administration

    Chapter  Configuring the Wireless-G Router according to its priority value. If you select High for the Admin Password specific port, the packets received from this port would be To ensure the Router’s security, you will be asked for your put into High Priority Queue.
  • Page 32: Administration > Log

    Chapter  Configuring the Wireless-G Router SNMP When you have finished making changes to the screen, click Save Settings to save the changes, or click Cancel SNMP, Simple Network Management Protocol, is a Changes to undo your changes. For help information, network protocol that provides network administrators click More.
  • Page 33: Administration > Diagnostics

    Chapter  Configuring the Wireless-G Router Administration > Diagnostics click Stop. Click Clear Log to clear the screen. Click Close to return to the Administration > Diagnostics screen. The Administration  >  Diagnostics screen allows you to For help information, click More. check the connections of your network components. Administration >...
  • Page 34: Administration > Reboot

    After you upgrade its firmware, you will have to re-enter all of your configuration settings. Before upgrading the firmware, download the Router’s latest firmware upgrade file from www.linksys.com. Then extract the file to your PC, and perform the steps below. File Path Enter the name of the extracted firmware upgrade file or click Browse to locate the file.
  • Page 35: Status > Local Network

    Chapter  Configuring the Wireless-G Router Status > Local Network Click Refresh to update the on-screen information. For help information, click More. The Status  >  Local  Network screen displays information Status > Wireless about the local network. The Status  >  Wireless screen displays status information about your wireless network.
  • Page 36: Status > Vpn Clients

    Chapter  Configuring the Wireless-G Router Bytes Received The number of bytes received is shown here. Bytes Sent The number of bytes sent is shown here. Error Packets Received The number of error packets received is displayed here. Dropped Packets Received The number of dropped packets received is displayed here.
  • Page 37: Appendix A: Troubleshooting

    Router. with your Ethernet adapter, and click Properties. Read the descriptions below to help solve your problems. If you can’t find an answer here, check the Linksys website In the This  connection  uses  the  following  items box, at www.linksys.com.
  • Page 38 (for PPPoE users)” below. original computer is not the cause of the problem. I can’t get my Virtual Private Network (VPN) to work At the command prompt, type ping www.linksys.com through the Router. and press Enter. Access the Router’s web interface by going to If you get a reply, the computer is connected to •...
  • Page 39 Internet application: Internet applications” below for details. Access the Router’s Web-based Utility by going to Check the Linksys website at www.linksys.com for more http://9.8.. or the IP address of the Router. Go information. to the Firewall -> Port Forwarding tab.
  • Page 40 In order to upgrade the firmware with the latest features, I forgot my password, or the password prompt always you need to go to the Linksys website and download the appears when saving settings to the Router. latest firmware at www.linksys.com. Follow these steps: Reset the Router to factory defaults by pressing the Reset Go to the Linksys website at www.linksys.com and...
  • Page 41 Appendix A Troubleshooting DSL users, it is strongly recommended to use MTU 1492. If When I enter a URL or IP address, I get a time-out error or am prompted to retry. you are having difficulties, perform the following steps: To connect to the Router, go to the web browser, and Check if other PCs work.
  • Page 42: Frequently Asked Questions

    Windows 2000 or Windows XP? What do I need to do? Yes, but Linksys does not, at this time, provide technical Force your Ethernet adapter to 10Mbps or half duplex support for setup, configuration or troubleshooting of any mode, and turn off the “Auto-negotiate”...
  • Page 43 Reset your cable or DSL modem by powering the unit off and then on. Obtain and flash the latest firmware The Router allows PPTP packets to pass through. release that is readily available on the Linksys website, www.linksys.com. Is the Router cross-platform compatible?
  • Page 44: Appendix B: Wireless Security Checklist

    32 characters in length. Linksys wireless products General Network Security Guidelines use linksys as the default wireless network name. You should change the wireless network name to something Wireless network security is useless if the underlying unique to distinguish your wireless network from other network is not secure.
  • Page 45: Appendix C: Using Linksys Quickvpn For Windows 2000, Xp, Or Vista

    Overview This appendix explains how to install and use the Linksys QuickVPN software that can be downloaded from www. linksys.com. QuickVPN works with computers running Windows 2000, XP, or Vista. (Computers using other operating systems will have to use third-party VPN software.)
  • Page 46: Using The Linksys Quickvpn Software

    Appendix C Using Linksys QuickVPN for Windows 2000, XP, or Vista Using the Linksys QuickVPN Software Double-click the Linksys QuickVPN software icon on your desktop or in the system tray. QuickVPN Desktop Icon QuickVPN Tray Icon— No Connection QuickVPN Status The QuickVPN Login screen will appear.
  • Page 47: Distributing Certificates To Quickvpn Users

    Appendix C Using Linksys QuickVPN for Windows 2000, XP, or Vista Distributing Certificates to QuickVPN Users The following explains how to export a certificate from the WRV200 for distribution to QuickVPN users, as well as how to install the certificate on the QuickVPN users’ PCs.
  • Page 48: Appendix D: Configuring Ipsec With A Windows 2000 Or Xp Computer

    Appendix D Configuring IPSec with a Windows 2000 or XP Computer Appendix D: How to Establish a Secure IPSec Tunnel Configuring IPSec with Step 1: Create an IPSec Policy a Windows 000 or XP Click Start, select Run, and type secpol.msc in the Open field.
  • Page 49 Appendix D Configuring IPSec with a Windows 2000 or XP Computer Make sure the IP Filter List tab is selected. Click Add. mask ...0. (These are the Router’s default settings. If you have changed these settings, enter your new values.) If you want to enter a description for your filter, click the Description tab and enter the description there.
  • Page 50: Step 3: Configure Individual Tunnel Rules

    Appendix D Configuring IPSec with a Windows 2000 or XP Computer Click the Filter  Action tab, and click the filter action Require Security radio button. Then, click Edit. Filters Properties Filter Action Tab If you want to enter a description for your filter, click On the Security Methods tab, verify that the Negotiate the Description tab and enter the description there.
  • Page 51 Appendix D Configuring IPSec with a Windows 2000 or XP Computer Connection Type Tab Tunnel 2: Router->win Preshared Key This new Preshared key will be displayed. Click the In the new policy’s Properties screen, make sure Apply button to continue, if it appears on your screen; that win ->...
  • Page 52 Appendix D Configuring IPSec with a Windows 2000 or XP Computer Filter Action Tab New Preshared Key Click the Authentication Methods tab, and verify Click the Tunnel Setting tab. Click the radio button The that the authentication method Kerberos is selected. tunnel endpoint is specified by this IP Address, and Then, click Edit.
  • Page 53: Step 4: Assign New Ipsec Policy

    Appendix D Configuring IPSec with a Windows 2000 or XP Computer Step 4: Assign New IPSec Policy the Tunnel Name field. This is to allow you to identify multiple tunnels and does not have to match the In the IP Security Policies on Local Machine window, right- name used at the other end of the tunnel.
  • Page 54: Appendix E: Gateway-To-Gateway Vpn Tunnel

    10/100 8-Port VPN Router, model number RV082 • (Any VPN Router can be deployed, such as the Linksys 10/100 16-, 8-, or 4-Port VPN Router (model numbers RV016, RV082, or RV042); however, this example uses the RV082) Configuration when the Remote Gateway...
  • Page 55: Configuration Of The Rv082

    Appendix E Gateway-to-Gateway VPN Tunnel Click Save Settings and proceed to the next section, “Configuration of the RV082. ” Configuration of the RV082 Follow similar instructions for the RV082. Launch the web browser for a networked computer, designated PC 2. Access the web-based utility of the RV082.
  • Page 56: Configuration When The Remote Gateway Uses A Dynamic Ip Address

    Appendix E Gateway-to-Gateway VPN Tunnel Configuration when the Remote Gateway Uses a Dynamic IP Address This example assumes the Remote Gateway is using a dynamic IP address. If the Remote Gateway uses a static IP address, refer to “Configuration when the Remote Gateway Uses a Static IP.
  • Page 57: Configuration Of Pc 1 And Pc 2

    Appendix E Gateway-to-Gateway VPN Tunnel For the Local Security Group Type, select Subnet. Enter IP address, refer to “Configuration when the Remote the RV082’s local network settings in the IP Address and Gateway Uses a Dynamic IP. ” Subnet Mask fields. RV082 WRV200 Dynamic IP: B.B.B.B with Dynamic IP: A.A.A.A Domain Name: www.abc.com...
  • Page 58: Configuration Of The Rv082

    Appendix E Gateway-to-Gateway VPN Tunnel For the Remote Secure Group Type, select Subnet. Enter the RV082’s local network settings in the IP  Address and Mask fields. For the Remote Secure Gateway Type, select FQDN. Enter the RV082’s domain name in the field provided. In the Key Management section, select the appropriate encryption, authentication, and other key management settings.
  • Page 59: Appendix F: Glossary

    Domain A specific name for a network of computers. WEB: For additional terms, please visit the Download To receive a file transmitted over a network. glossary at www.linksys.com/glossary DSL (Digital Subscriber Line) An always-on broadband connection over traditional phone lines. Access Point A device that allows wireless-equipped...
  • Page 60 For example, all devices with a prefix of simplifies the WEP encryption process by automatically 157.100.100.100 are part of the same subnet. generating the WEP encryption keys for Linksys products. Subnet Mask An address code that determines the size Ping (Packet INternet Groper) An Internet utility used of the network.
  • Page 61 Appendix F Glossary URL (Uniform Resource Locator) The address of a file located on the Internet. VPN (Virtual Private Network) A security measure to protect data as it leaves one network and goes to another over the Internet. WAN (Wide Area Network) Networks that cover a large geographical area.
  • Page 62: Appendix G: Specifications

    Appendix G Specifications Appendix G: Specifications Specifications Adjustable Power Model WRV200 Antenna Gain 2 dBi Standards IEEE802.11g, IEEE802.11b, Receiver Sensitivity 802.11.g: 54 Mbps @ -69 dBm IEEE802.3, IEEE802.3u, 802.1x (typical), (Security Authentication), 802.11.b: 11 Mbps @ -82 dBM 802.11i-Ready (Security WPA2), (typical) 802.11e-Ready (Wireless QoS) Wireless QoS...
  • Page 63 Appendix G Specifications Routing Static and RIP v1, v2 Environmental Dimensions 6.69" x 1.65" x 7.62” W x H x D (170 x 42 x 193.5 mm) Unit Weight 0.78 lb (0.355 kg) Power 12V 1A Certification FCC Class B, CE, IC Operating Temp.
  • Page 64: Appendix H: Warranty Information

    CONDITIONS, REPRESENTATIONS AND WARRANTIES, and the web pages referred to herein may be updated by INCLUDING, BUT NOT LIMITED TO, ANY IMPLIED Linksys from time to time; the version in effect at the date WARRANTY OF NON-INFRINGEMENT, ARE DISCLAIMED. of purchase shall apply.
  • Page 65: Technical Support

    RMA number and dated proof of original purchase will be rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge.
  • Page 66: Appendix I: Regulatory Information

    Appendix I Regulatory Information Appendix I: Safety Notices Regulatory Information Caution: To reduce the risk of fire, use only No.26 AWG • or larger telecommunication line cord. Do not use this product near water, for example, in a • FCC Statement wet basement or near a swimming pool.
  • Page 67: Avis D'industrie Canada

    Appendix I Regulatory Information Avis d’Industrie Canada Avis de non-responsabilité concernant les appareils sans fil Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. Les performances maximales pour les réseaux sans fil L’utilisation de ce dispositif est autorisée seulement aux sont tirées des spécifications de la norme IEEE 802.11.
  • Page 68: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    úřady. Správná likvidace a recyklace pomáhá předcházet Linksys products. Consumers are required to comply with potenciálním negativním dopadům na životní prostředí a lidské this notice for all electronic products bearing the following zdraví.
  • Page 69 Appendix I Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 70 Appendix I Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 71 ľudí. Ak máte záujem o podrobnejšie WEB: For additional information, please visit informácie o likvidácii starého zariadenia, obráťte sa, prosím, na www.linksys.com miestne orgány, organizácie zaoberajúce sa likvidáciou odpadov alebo obchod, v ktorom ste si produkt zakúpili. Wireless-G VPN Router with RangeBooster...
  • Page 72: Appendix J: Contact Information

    Appendix J Contact Information Appendix J: Contact Information Linksys Contact Information Website http://www.linksys.com Support Site http://www.linksys.com/support FTP Site ftp.linksys.com Advice Line 800-546-5797 (LINKSYS) Support 800-326-7114 RMA (Return Merchandise http://www.linksys.com/warranty Authorization) NOTE: Details on warranty and RMA issues can be found in the Warranty section of this Guide.

Table of Contents