Page of 80

Linksys WRK54G User Manual

User guide.
®
A Division of Cisco Systems, Inc.
2.4
GHz
Wireless-G
802.11g
User Guide
Broadband Router
WIRELESS
WRK54G
Model No.

   Summary of Contents for Linksys WRK54G

  • Page 1

    ® A Division of Cisco Systems, Inc. Wireless-G 802.11g User Guide Broadband Router WIRELESS WRK54G Model No.

  • Page 2

    Wireless-G Broadband Router Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2005 Cisco Systems, Inc. All rights reserved.

  • Page 3: Table Of Contents

    Wireless-G Broadband Router Table of Contents Chapter 1: Introduction Welcome What’s in this User Guide? Chapter 2: Planning Your Wireless Network Network Topology Ad-Hoc versus Infrastructure Mode Network Layout Chapter 3: Getting to Know the Wireless-G Broadband Router The Back Panel The Front Panel Chapter 4: Connecting the Wireless-G Broadband Router Overview...

  • Page 4: Table Of Contents

    Wireless-G Broadband Router The Administration Tab - Log The Administration Tab - Diagnostics The Administration Tab - Factory Defaults The Administration Tab - Firmware Upgrade The Administration Tab - Config Management The Status Tab - Router The Status Tab - Local Network The Status Tab - Wireless Appendix A: Troubleshooting Common Problems and Solutions...

  • Page 5: Table Of Contents

    Wireless-G Broadband Router List of Figures Figure 3-1: The Router’s Back Panel Figure 3-2: The Router’s Front Panel Figure 4-1: Connecting Your Internet Connection Figure 4-2: Connecting Your Network Devices Figure 4-3: Connecting the Power Figure 4-4: Diagram for Connection to Another Router Figure 4-5: Connecting Another Router Figure 4-6: Connecting Your Network Devices Figure 4-7: Connecting the Power...

  • Page 6: Table Of Contents

    Wireless-G Broadband Router Figure 5-23: Wireless Tab - Wireless Security (RADIUS) Figure 5-24: Wireless Tab - Wireless Security (WEP) Figure 5-25: Wireless Tab - Wireless MAC Filter Figure 5-26: MAC Address Filter List Figure 5-27: Wireless Tab - Advanced Wireless Settings Figure 5-28: Security Tab - Firewall Figure 5-29: Security Tab - VPN Passthrough Figure 5-30: Access Restrictions Tab - Internet Access...

  • Page 7: Chapter 1: Introduction, Welcome

    Linksys recommends using the Setup CD-ROM for first-time installation of the Router. If you do not wish to run the Setup Wizard on the Setup CD-ROM, then use the instructions in this Guide to help you connect the Wireless-G Broadband Router, set it up, and configure it to bridge your different networks.

  • Page 8: What's In This User Guide

    Wireless-G Broadband Router What’s in this User Guide? This user guide covers the steps for setting up and using the Wireless-G Broadband Router. • Chapter 1: Introduction This chapter describes the Router’s applications and this User Guide. • Chapter 2: Planning Your Wireless Network This chapter describes the basics of wireless networking.

  • Page 9

    • Appendix I: Regulatory Information This appendix supplies the regulatory information regarding the Router. • Appendix J: Contact Information This appendix provides contact information for a variety of Linksys resources, including Technical Support. Chapter 1: Introduction What’s in this User Guide?

  • Page 10: Chapter 2: Planning Your Wireless Network, Network Topology, Ad-hoc Versus Infrastructure Mode, Network Layout

    Wireless-G Broadband Router Chapter 2: Planning Your Wireless Network Network Topology A wireless local area network (WLAN) is exactly like a regular local area network (LAN), except that each computer in the WLAN uses a wireless device to connect to the network. Computers in a WLAN share the same frequency channel and SSID, which is an identification name shared by the wireless devices belonging to the ssid (service set identifier): your wireless network’s name.

  • Page 11

    Linksys's switches (such as the SD205 or SD208). With these, and many other, Linksys products, your networking options are limitless. Go to the Linksys website at www.linksys.com for more information about products that work with the Wireless-G Broadband Router.

  • Page 12: Chapter 3: Getting To Know The Wireless-g Broadband Router, The Back Panel

    Wireless-G Broadband Router Chapter 3: Getting to Know the Wireless-G Broadband Router The Back Panel The Router's ports, where the cables are connected, are located on the back panel. IMPORTANT: Resetting the Router will erase all of your settings (Internet connection, wireless Figure 3-1: The Router’s Back Panel security, and other settings) and replace them with the factory defaults.

  • Page 13: The Front Panel, Figure 3-2: The Router's Front Panel

    Wireless-G Broadband Router The Front Panel The Router’s SecureEasySetup button (the Cisco logo) and LEDs are located on the front panel. Figure 3-2: The Router’s Front Panel Power Green. The Power LED lights up and will stay on while the Router is powered on. When the Router goes through its self-diagnostic mode during every boot-up, this LED will flash.

  • Page 14: Chapter 4: Connecting The Wireless-g Broadband Router, Overview

    Wireless-G Broadband Router Chapter 4: Connecting the Wireless-G Broadband Router Overview This chapter includes two sets of instructions. If the Wireless-G Broadband Router will be the only router in your network, follow the instructions in “Hardware Installation for Connection to Your Broadband Modem.” If you want to install the Wireless-G Broadband Router behind another router in your network, then follow the instructions in “Hardware Installation for Connection to Another Router.”...

  • Page 15: Figure 4-2: Connecting Your Network Devices, Figure 4-3: Connecting The Power

    Wireless-G Broadband Router 5. Connect your network PCs or Ethernet devices to the Router’s numbered ports using standard Ethernet network cabling. Figure 4-2: Connecting Your Network Devices 6. Connect the AC power adapter to the Router's Power port and the other end into an electrical outlet. Only use the power adapter supplied with the Router.

  • Page 16: Hardware Installation For Connection To Another Router, Figure 4-4: Diagram For Connection To Another Router

    Wireless-G Broadband Router Hardware Installation for Connection to Another Router NOTE: Steps 1-4 are instructions for a typical Linksys Before you install the Router, you must change the default IP address of the other router. This is mandatory router; however, if you are using a non-Linksys router, because both routers may be set to the same IP address by default.

  • Page 17: Figure 4-6: Connecting Your Network Devices, Figure 4-7: Connecting The Power

    Wireless-G Broadband Router 9. Decide which network computers or Ethernet devices you want to connect to the Router. Disconnect the selected computers or devices from the other router, and then connect them to the Router’s numbered ports using standard Ethernet network cabling. Figure 4-6: Connecting Your Network Devices IMPORTANT: Make sure you use the power adapter 10.

  • Page 18: Chapter 5: Configuring The Wireless-g Broadband Router, Overview, Figure 5-1: Password Screen

    Overview NOTE: For first-time installation, Linksys Linksys recommends using the Setup CD-ROM for first-time installation of the Router. If you do not wish to run recommends using the Setup Wizard on the Setup the Setup Wizard on the Setup CD-ROM, then you can use the Web-based Utility to configure the Router. For CD-ROM.

  • Page 19: The Setup Tab - Basic Setup, Figure 5-2: Setup Tab - Basic Setup

    Wireless-G Broadband Router The Setup Tab - Basic Setup The first screen that appears displays the Setup tab. This allows you to change the Router's general settings. Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes.

  • Page 20: Figure 5-5: Pppoe Connection Type, Figure 5-6: Pptp Connection Type

    Wireless-G Broadband Router • PPPoE. Some DSL-based ISPs use PPPoE (Point-to-Point Protocol over Ethernet) to establish Internet connections. If you are connected to the Internet through a DSL line, check with your ISP to see if they use PPPoE. If they do, you will have to enable PPPoE. User Name and Password.

  • Page 21: Figure 5-7: L2tp Connection Type, Figure 5-8: Telestra Cable Connection Type

    Wireless-G Broadband Router • L2TP. Layer 2 Tunneling Protocol (L2TP) is a service that applies to connections in Europe only. User Name. Enter the User Name provided by your ISP. Password. Enter the Password provided by your ISP. L2TP Server. Enter the IP address of the L2TP server you are using; this should be provided by your ISP. Connect on Demand.

  • Page 22: Figure 5-9: Optional Settings, Figure 5-10: Router Ip

    Wireless-G Broadband Router Optional Settings Some of these settings may be required by your ISP. Verify with your ISP before making any changes. Router Name. In this field, you can type a name of up to 39 characters to represent the Router. Host Name/Domain Name.

  • Page 23: Figure 5-11: Network Address Server Settings, Figure 5-12: Time Setting

    Wireless-G Broadband Router Network Address Server Settings (DHCP) The settings allow you to configure the Router’s Dynamic Host Configuration Protocol (DHCP) server function. The Router can be used as a DHCP server for your network. A DHCP server automatically assigns an IP address to each computer on your network.

  • Page 24: The Setup Tab - Ddns, Figure 5-13: Setup Tab - Ddns - Dyndns Account

    Wireless-G Broadband Router The Setup Tab - DDNS The Router offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address. It is useful when you are hosting your own website, FTP server, or other server behind the Router.

  • Page 25: The Setup Tab - Mac Address Clone, Figure 5-15: Setup Tab - Mac Address Clone

    Wireless-G Broadband Router The Setup Tab - MAC Address Clone A MAC address is a 12-digit code assigned to a unique piece of hardware for identification. Some ISPs will require you to register a MAC address in order to access the Internet. If you do not wish to re-register the MAC address with your ISP, you may assign the MAC address you have currently registered with your ISP to the Router with the MAC Address Clone feature.

  • Page 26: The Setup Tab - Advanced Routing, Figure 5-16: Setup Tab - Advanced Routing (gateway)

    Wireless-G Broadband Router The Setup Tab - Advanced Routing This tab is used to set up the Router’s advanced functions. Operating Mode allows you to select the type(s) of advanced functions you use. Dynamic Routing will automatically adjust how packets travel on your network. Static Routing sets up a fixed route to another network destination.

  • Page 27: The Wireless Tab - Basic Wireless Settings, Figure 5-18: Wireless Tab - Basic Wireless Settings

    (use any of the characters on the keyboard). Make sure this setting is the same for all devices in your Figure 5-18: Wireless Tab - Basic Wireless Settings wireless network. For added security, you should change the default SSID (linksys) to a unique name. Wireless Channel. Select the appropriate channel from the list provided to correspond with your network settings.

  • Page 28: The Wireless Tab - Wireless Security, Figure 5-19: Wireless Tab - Wireless Security (wpa Personal)

    Wireless-G Broadband Router The Wireless Tab - Wireless Security IMPORTANT: If you are using WPA, always remember that each device in your wireless network MUST use The Wireless Security settings configure the security of your wireless network. There are four wireless security the same WPA method and shared key, or else the mode options supported by the Router: WPA Personal, WPA Enterprise, WPA2 Personal, WPA2 Enterprise, network will not function properly.

  • Page 29: Figure 5-21: Wireless Tab - Wireless Security (wpa2 Personal)

    Wireless-G Broadband Router WPA2 Personal. WPA2 gives you two encryption methods, TKIP and AES, with dynamic encryption keys. Select the type of algorithm, AES, or TKIP + AES. Enter a WPA Shared Key of 8-63 characters. Then enter a Group Key Renewal period, which instructs the Router how often it should change the encryption keys.

  • Page 30: Figure 5-23: Wireless Tab - Wireless Security (radius)

    Wireless-G Broadband Router RADIUS. This option features WEP used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) First, enter the RADIUS server’s IP Address and port number, along with a key shared between the Router and the server.

  • Page 31: The Wireless Tab - Wireless Mac Filter, Figure 5-25: Wireless Tab - Wireless Mac Filter

    Wireless-G Broadband Router The Wireless Tab - Wireless MAC Filter Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network’s radius. Wireless MAC Filter. To filter wireless users by MAC Address, either permitting or blocking access, click Enable. If you do not wish to filter users by MAC Address, select Disable.

  • Page 32: The Wireless Tab - Advanced Wireless Settings, Figure 5-27: Wireless Tab - Advanced Wireless Settings

    Wireless-G Broadband Router The Wireless Tab - Advanced Wireless Settings This tab is used to set up the Router’s advanced wireless functions. These settings should only be adjusted by an expert administrator as incorrect settings can reduce wireless performance. Transmission Rate. The rate of data transmission should be set depending on the speed of your wireless network.

  • Page 33: The Security Tab - Firewall, The Security Tab - Vpn Passthrough

    Wireless-G Broadband Router The Security Tab - Firewall Block WAN Requests. Enable the Block WAN Request feature by checking the box beside Block Anonymous Internet Requests and you can prevent your network from being “pinged,” or detected, by other Internet users. The Block WAN Request feature also reinforces your network security by hiding your network ports.

  • Page 34: The Access Restrictions Tab - Internet Access, Figure 5-30: Access Restrictions Tab - Internet Access

    Wireless-G Broadband Router The Access Restrictions Tab - Internet Access The Internet Access screen allows you to block or allow specific kinds of Internet usage and traffic, such as Internet access, designated services, websites, and inbound traffic during specific days and times. Internet Access Policy.

  • Page 35: Figure 5-33: Port Services

    Wireless-G Broadband Router Then, enter the range of ports you want to filter. If the service you want to block is not listed or you want to edit a service’s settings, then click the Add/Edit Service button. Then the Port Services screen will appear. To add a service, enter the service’s name in the Service Name field.

  • Page 36: The Applications And Gaming Tab - Port Range Forward

    Wireless-G Broadband Router The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized Internet applications. (Specialized Internet applications are any applications that use Internet access to perform functions such as videoconferencing or online gaming.

  • Page 37: The Applications & Gaming Tab - Port Triggering

    Wireless-G Broadband Router The Applications & Gaming Tab - Port Triggering The Port Triggering screen allows the Router to watch outgoing data for specific port numbers. The IP address of the computer that sends the matching data is remembered by the Router, so that when the requested data returns through the Router, the data is pulled back to the proper computer by way of IP address and port mapping rules.

  • Page 38: The Applications And Gaming Tab - Dmz, The Applications And Gaming Tab - Qos

    Wireless-G Broadband Router The Applications and Gaming Tab - DMZ The DMZ feature allows one network user to be exposed to the Internet for use of a special-purpose service such as Internet gaming or videoconferencing. DMZ hosting forwards all the ports at the same time to one PC. The Port Range Forward feature is more secure because it only opens the ports you want to have opened, while DMZ hosting opens all the ports of one computer, exposing the computer to the Internet.

  • Page 39: Figure 5-38: Applications And Gaming Tab - Qos Adding An New Application

    Wireless-G Broadband Router Category. From this drop-down menu, you can select the Category for which you will set bandwidth priority. These Categories include applications, ethernet ports, MAC addresses, and online games. Application. With this option you can select None, Add a New Application, Online Game, or select from the list of applications you want to set.

  • Page 40

    Wireless-G Broadband Router Summary. This section will display a summary of all the categories of applications with QoS assigned. Priority This displays the bandwidth allocation priority of High, Medium, Normal, or Low, that you set for the application. Name This displays the application name or the entries you entered to be allocated. Information This displays the Port Range or MAC Address entered when you added a new application.

  • Page 41: The Administration Tab - Management, The Administration Tab - Log

    Wireless-G Broadband Router The Administration Tab - Management This section of the Administration tab allows the network’s administrator to manage specific Router functions for access and security. Local Router Access. You can change the Router’s password from here. Enter a new Router password and then type it again in the Re-enter to confirm field to confirm.

  • Page 42: The Administration Tab - Diagnostics, Figure 5-41: Administration Tab - Diagnostics

    Wireless-G Broadband Router The Administration Tab - Diagnostics The diagnostic tests (Ping and Traceroute) allow you to check the connections of your network components. Ping Test. The Ping test will check the status of a connection. Click the Ping button to open the Ping Test screen. Enter the address of the PC whose connection you wish to test and how many times you wish to test it.

  • Page 43: The Administration Tab - Factory Defaults, The Administration Tab - Firmware Upgrade

    Firmware can be upgraded by clicking the Upgrade button after browsing for the firmware, which you can download from the Linksys website. Do not upgrade your firmware unless you are experiencing problems with the Router. For more information about upgrading firmware, refer to “Appendix C: Upgrading Firmware”.

  • Page 44: The Status Tab - Router, Figure 5-47: Status Tab - Router

    Wireless-G Broadband Router The Status Tab - Router The Router screen on the Status Tab displays the Router’s current status. Click the Refresh button to update the information displayed on this screen. Firmware Version. This is the Router’s current firmware. Current Time.

  • Page 45: The Status Tab - Local Network, The Status Tab - Wireless

    Wireless-G Broadband Router The Status Tab - Local Network The Local Network screen on the Status Tab displays the status of your network. Click the Refresh button to update the information displayed on this screen. MAC Address. This is the Router’s MAC Address, as seen on your local, Ethernet network. IP Address.

  • Page 46: Appendix A: Troubleshooting, Common Problems And Solutions

    Provided are possible solutions to problems that may occur during the installation and operation of the Router. Read the descriptions below to help you solve your problems. If you can’t find an answer here, check the Linksys website at www.linksys.com.

  • Page 47

    Wireless-G Broadband Router • For Windows 2000: 1. Click Start, Settings, and Control Panel. Double-click Network and Dial-Up Connections. 2. Right-click the Local Area Connection that is associated with the Ethernet adapter you are using, and select the Properties option. 3.

  • Page 48

    Wireless-G Broadband Router B Open a command prompt. For Windows 98SE and Me: • Click Start and Run. In the Open field, type command. Press the Enter key or click the OK button. For Windows 2000 and XP: • Click Start and Run. In the Open field, type cmd. Press the Enter key or click the OK button. In the command prompt, type ping 192.168.1.1 and press the Enter key.

  • Page 49

    Wireless-G Broadband Router 5. I am not able to access the Setup page of the Router’s web-based utility. • Refer to “Problem #3, I want to test my Internet connection” to verify that your computer is properly connected to the Router. •...

  • Page 50

    Wireless-G Broadband Router 7. I need to set up online game hosting or use other Internet applications. If you want to play online games or use Internet applications, most will work without doing any port forwarding or DMZ hosting. There may be cases when you want to host an online game or Internet application.

  • Page 51

    Wireless-G Broadband Router Follow these steps to set DMZ hosting: 1. Access the Router’s web-based utility by going to http://192.168.1.1 or the IP address of the Router. Go to the Applications & Gaming => Port Range Forward tab. 2. Disable or remove the entries you have entered for forwarding. Keep this information in case you want to use it at a later time.

  • Page 52

    Router to the factory default settings. In other words, the Router will revert to its original factory configuration. 12. I need to upgrade the firmware. In order to upgrade the firmware with the latest features, you need to go to the Linksys website and download the latest firmware at www.linksys.com. Follow these steps: 1.

  • Page 53

    Wireless-G Broadband Router 15. I can’t access my e-mail, web or I am getting corrupted data from the Internet. The Maximum Transmission Unit (MTU) setting may need to be adjusted. By default, the MTU is set at 1500. For most DSL users, it is strongly recommended to use MTU 1492. •...

  • Page 54: Frequently Asked Questions

    Wireless-G Broadband Router Frequently Asked Questions After using SecureEasySetup, my existing wireless devices can no longer connect to the Router. SecureEasySetup uses WPA-Personal encryption. If your current wireless devices do not support WPA-Personal security, then you cannot use SecureEasySetup on your network. You will need to manually configure your network security using the encryption supported by your existing devices.

  • Page 55

    Does the Router support any operating system other than Windows 98SE, Windows Millennium, Windows 2000, or Windows XP? Yes, but Linksys does not, at this time, provide technical support for setup, configuration or troubleshooting of any non-Windows operating systems. Does the Router support ICQ send file? Yes, with the following fix: click ICQ menu ->...

  • Page 56

    How will I be notified of new Router firmware upgrades? All Linksys firmware upgrades are posted on the Linksys website at www.linksys.com, where they can be downloaded for free. To upgrade the Router’s firmware, use the Administration - Firmware Upgrade tab of the Router’s web-based utility.

  • Page 57

    Wireless-G Broadband Router What is DMZ Hosting? Demilitarized Zone (DMZ) allows one IP address (computer) to be exposed to the Internet. Some applications require multiple TCP/IP ports to be open. It is recommended that you set your computer with a static IP if you want to use DMZ Hosting.

  • Page 58

    Wireless-G Broadband Router What is the IEEE 802.11b standard? It is one of the IEEE standards for wireless networks. The 802.11b standard allows wireless networking hardware from different manufacturers to communicate, provided that the hardware complies with the 802.11b standard. The 802.11b standard states a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GHz.

  • Page 59

    Wireless-G Broadband Router maintain contact with the wireless network even when not actually transmitting data. Achieving these functions simultaneously requires a dynamic RF networking technology that links access points and nodes. In such a system, the user’s end node undertakes a search for the best possible access to the system. First, it evaluates such factors as signal strength and quality, as well as the message load currently being carried by each access point and the distance of each access point to the wired backbone.

  • Page 60

    There are eleven available channels, ranging from 1 to 11, in North America. There may be additional channels available in other regions, subject to the regulations of your region and/or country. If your questions are not addressed here, refer to the Linksys website, www.linksys.com. Appendix A: Troubleshooting...

  • Page 61: Appendix B: Wireless Security, Security Precautions, Security Threats Facing Wireless Networks

    Wireless-G Broadband Router Appendix B: Wireless Security Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation.

  • Page 62

    This includes hackers. So, don’t broadcast the SSID. Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

  • Page 63

    These security recommendations should help keep your mind at ease while you are enjoying the most flexible and convenient technology Linksys has to offer. Appendix B: Wireless Security Security Threats Facing Wireless Networks...

  • Page 64: Appendix C: Upgrading Firmware, Figure C-1: Upgrade Firmware

    Appendix C: Upgrading Firmware The Router's firmware is upgraded through the Web-based Utility's Administration tab. Follow these instructions: 1. Download the firmware from Linksys's website at www.linksys.com. 2. Extract the firmware file on your computer. 3. Open the Router’s Web-based Utility, and click the Administration tab.

  • Page 65: Appendix D: Windows Help

    Wireless-G Broadband Router Appendix D: Windows Help Almost Linksys wireless products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix.

  • Page 66: Appendix E: Finding The Mac Address And Ip Address For Your Ethernet Adapter

    Wireless-G Broadband Router Appendix E: Finding the MAC Address and IP Address for Your Ethernet Adapter This section describes how to find the MAC address for your computer’s Ethernet adapter so you can use the MAC filtering and/or MAC address cloning feature of the Router. You can also find the IP address of your computer’s Ethernet adapter.

  • Page 67: For The Router's Web-based Utility, Figure E-4: Mac Address Filter List

    Wireless-G Broadband Router 3. Write down the Physical Address as shown on your computer screen; it is the MAC address for your Ethernet adapter. This appears as a series of numbers and letters. The MAC address/Physical Address is what you will use for MAC address cloning or MAC filtering. Note: The MAC address is also called the Physical Address.

  • Page 68: Appendix F: Glossary

    Wireless-G Broadband Router Appendix F: Glossary 802.11b - A wireless networking standard that specifies a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GHz. 802.11g - A wireless networking standard that specifies a maximum data transfer rate of 54Mbps, an operating frequency of 2.4GHz, and backward compatibility with 802.11b devices.

  • Page 69

    Wireless-G Broadband Router Cable Modem - A device that connects a computer to the cable television network, which in turn connects to the Internet. CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) - A method of data transfer that is used to prevent data collisions.

  • Page 70

    Wireless-G Broadband Router EAP (Extensible Authentication Protocol) - A general authentication protocol used to control network access. Many specific authentication methods work within this framework. EAP-PEAP (Extensible Authentication Protocol-Protected Extensible Authentication Protocol) - A mutual authentication method that uses a combination of digital certificates and another system, such as passwords. EAP-TLS (Extensible Authentication Protocol-Transport Layer Security) - A mutual authentication method that uses digital certificates.

  • Page 71

    Packet - A unit of data sent over a network. Passphrase - Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products. PEAP (Protected Extensible Authentication Protocol) - A mutual authentication method that uses a combination of digital certificates and another system, such as passwords.

  • Page 72

    Wireless-G Broadband Router Ping (Packet INternet Groper) - An Internet utility used to determine whether a particular IP address is online. POP3 (Post Office Protocol 3) - A standard mail server commonly used on the Internet. Port - The connection point on a computer or networking device used for plugging in cables or adapters. Power over Ethernet (PoE) - A technology enabling an Ethernet network cable to deliver both data and power.

  • Page 73

    Wireless-G Broadband Router Spread Spectrum - Wideband radio frequency technique used for more reliable and secure data transmission. SSID (Service Set IDentifier) - Your wireless network's name. Static IP Address - A fixed address assigned to a computer or device that is connected to a network. Static Routing - Forwarding data in a network via a fixed path.

  • Page 74

    Wireless-G Broadband Router VPN (Virtual Private Network) - A security measure to protect data as it leaves one network and goes to another over the Internet. WAN (Wide Area Network)- The Internet. WEP (Wired Equivalent Privacy) - A method of encrypting network data transmitted on a wireless network for greater security.

  • Page 75: Appendix G: Specifications

    Wireless-G Broadband Router Appendix G: Specifications Model WRK54G Standards IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.11b Channels 11 Channels (US, Canada) 13 Channels (Europe, Japan) Ports Internet: One 10/100 RJ-45 Port LAN: Four 10/100 RJ-45 Switched Ports One Power Port...

  • Page 76

    Wireless-G Broadband Router Operating Temp. 0ºC to 40ºC (32ºF to 104ºF) Storage Temp. -20ºC to 70ºC (-4ºF to 158ºF) Operating Humidity 10% to 85%, Non-Condensing Storage Humidity 5% to 90%, Non-Condensing Appendix G: Specifications...

  • Page 77: Appendix H: Warranty Information

    Your exclusive remedy and Linksys' entire liability under this warranty will be for Linksys at its option to repair or replace the Product or refund Your purchase price less any rebates.

  • Page 78: Appendix I: Regulatory Information

    Canadian regulations. EC DECLARATION OF CONFORMITY (EUROPE) Linksys declares that this product conforms to the specifications listed below, following the provisions of the European R&TTE directive 1999/5/EC: EN 301 489-1, 301 489-17 General EMC requirements for Radio equipment.

  • Page 79

    Linksys vakuuttaa täten että dieses produkt tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sitä koskevien näiden direktiivien muiden ehtojen mukainen. Linksys Group déclare que le produit est conforme aux conditions essentielles et aux dispositions relatives à la directive 1999/5/EC.

  • Page 80: Appendix J: Contact Information

    Can't find information about a product you want to buy on the web? Do you want to know more about networking with Linksys products? Give our advice line a call at: 800-546-5797 (LINKSYS) Or fax your request in to:...

Comments to this Manuals

Symbols: 0
Latest comments: