Page 1
Chapter 1: Introduction Welcome What’s in this Guide? Chapter 2: Planning your Wireless Network The Router’s Functions IP Addresses Why do I need a VPN? What is a VPN? Chapter 3: Getting to Know the The Back Panel The Front Panel Chapter 4: Connecting the Overview Wired Connection to a PC...
Page 2
Windows 2000 or XP Instructions Appendix E: SNMP Functions Appendix F: Upgrading Firmware Appendix G: Windows Help Appendix H: Glossary Appendix I: Specifications Appendix J: Warranty Information Appendix K: Regulatory Information Appendix L: Contact Information...
Chapter 1: Introduction Welcome Wireless-G is the upcoming 54Mbps wireless networking standard that’s almost five times faster than the widely deployed Wireless-B (802.11b) products found in homes, businesses, and public wireless hotspots around the country—but since they share the same 2.4GHz radio band, Wireless-G devices can also interoperate with existing 11Mbps Wireless-B equipment.
Page 4
• Appendix C: Configuring IPSec between a Windows 2000 Pc and the Router This appendix instructs you on how to establish a secure IPSec tunnel using preshared keys to join a private network inside the VPN Router and a Windows 2000 or XP PC. •...
Chapter 2: Planning your Wireless Network The Router’s Functions Simply put, a router is a network device that connects two networks together. In this instance, the Router connects your Local Area Network (LAN), or the group of PCs in your home or office, to the Internet.
Figure 2-1: Network If you use the Router to share your cable or DSL Internet connection, contact your ISP to find out if they have assigned a static IP address to your account. If so, you will need that static IP address when configuring the Router.
as follows: 1) MAC Address Spoofing Packets transmitted over a network, either your local network or the Internet, are preceded by a packet header. These packet headers contain both the source and destination information for that packet to transmit efficiently. A hacker can use this information to spoof (or fake) a MAC address allowed on the network.
•VPN Router to VPN Router •Computer (using VPN client software that supports IPSec) to VPN Router The VPN Router creates a “tunnel” or channel between two endpoints, so that data transmissions between them are secure. A computer with VPN client software that supports IPSec can be one of the two endpoints.
Chapter 3: Getting to Know the Wireless-G VPN Broadband Router The Back Panel The Router’s ports, where a network cable is connected, are located on the back panel. Internet The Internet port connects to your modem. LAN (1-4) The LAN (Local Area Network) ports connect to your PC and other network devices. Power The Power port is where you will connect the power adapter.
Page 10
Chapter 4: Connecting the Wireless-G VPN Broadband Router Overview The Router’s setup consists of more than simply plugging hardware together. You will have to configure your networked PCs to accept the IP addresses that the Router assigns them (if applicable), and you will also have to configure the Router with setting(s) provided by your Internet Service Provider (ISP).
Page 11
Router’s rear panel (see Figure 4-2). This is the only port that will work for your modem connection. 3. Power on the cable or DSL modem. 4. Connect the power adapter to the Power port (see Figure 4-3), and then plug the power adapter into a power outlet.
Chapter 5: Configuring the PCs Overview The instructions in this chapter will help you configure each of your computers to be able to communicate with the Router. To do this, you need to configure your PC’s network settings to obtain an IP (or TCP/IP) address automatically, so your PC can function as a DHCP client.
1. Click the Start button. Select Settings and click the Control Panel icon. Double-click the Network and Dialup Connections icon. 2. Select the Local Area Connection icon for the applicable Ethernet adapter (usually it is the first Local Area Connection listed). Double-click the Local Area Connection. Click the Properties button. (See Figure 5-3.) 3.
Chapter 6: Configuring the Router Overview Wireless AP VPN Router recommends using the Setup CD-ROM for first-time installation of the Router and setting up additional computers. If you do not wish to run the Setup Wizard on the Setup CD-ROM, then follow the steps in this chapter and use the Router’s web-based utility to configure the Router.
configuration or monitoring. • Advanced Wireless Settings. On this screen you can access the Advanced Wireless features of Authentication Type, Basic Data Rates, Control Tx Rates, Beacon Interval, DTIM Interval, RTS Threshold, and Fragmentation Threshold. Security • Filter. To block specific users from Internet access, you can set up IP address, port, and MAC address filtering on the Filter screen.
Router’s default IP address, 192.168.1.1, in the Address field. Then press Enter. A password request page, shown in Figure 6-1 will appear. (non-Windows XP users will see a similar screen.) Enter admin (the default user name) in the User Name field, and enter admin (the default password) in the Password field.
Page 17
terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again. If you wish to activate Connect Demand, click the radio button. In the Max Idle Time field, enter the number of minutes you want to have elapsed before your Internet connection terminates.
Page 18
• Host Name and Domain Name. These fields allow you to supply a host and domain name for the Router. Some ISPs require these names as identification. You may have to check with your ISP to see if your broadband Internet service has been configured with a host and domain name.
Page 19
changes, or click the Cancel Changes button to undo your changes. The DDNS Tab The Router offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address. It is useful when you are hosting your own website, FTP server, or other server behind the Router.
Page 20
• Clone My MAC Address. If you want to clone the MAC address of the PC you are currently using to configure the Router, then click the Clone My MAC Address button. The Router will automatically detect your PC’s MAC address, so you do NOT have to call your ISP to change the registered MAC address to the Router’s MAC address.
Router. • Subnet Mask. The Subnet Mask (also known as the Network Mask) determines which portion of an IP address is the network portion, and which portion is the host portion. Take, for example, a network in which Subnet Mask is 255.255.255.0. This determines (by using the values 255) that the first three numbers of a network IP address identify this particular network, while the last digit (from 1 to 254) identifies the specific...
Page 22
settings, between 1 and 11 (in North America). All devices in your wireless network must use the same channel in order to function correctly. • Wireless SSID Broadcast. When wireless clients survey the local area for wireless networks to associate with, they will detect the SSID broadcast by the Router.
Page 23
WEP. WEP is a basic encryption method, which is not as secure as WPA. To use WEP, select a Default Key (choose which Key to use), and a level of WEP encryption, 64 bits 10 hex digits or 128 bits 26 hex digits. Then either generate a WEP key using a Passphrase or enter the WEP key manually.
Page 24
To add a computer to the network, click the Permit to access button, and enter the MAC address in the fields. Click the Select MAC Address From Networked Computers button, and the screen in Figure 6- 18 will appear. Select the MAC Address from the list and click the Select button. To prevent access, click the Prevent from accessing button, then click Select MAC Address from the list.
Delivery Traffic Indication Message (DTIM). A DTIM field is a countdown field informing clients of the next window for listening to broadcast and multicast messages. When the Router has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value. Its clients hear the beacons and awaken to receive the broadcast and multicast messages.
Page 26
time. If multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate computers. Select Enabled to filter multicasting, or Disabled to disable this feature. • Block Anonymous Internet Requests. This keeps your network from being “pinged” or detected reinforces your network security by hiding your network ports, so it is more difficult for intruders to work their way into your network.
Page 27
VPN Gateway: Assign this VPN as default route Local Secure Group and Remote Secure Group. The Local Secure Group is the computer(s) on your LAN that can access the tunnel. Local Secure Group defines the endpoint on local site. It can be one IP address, IP Range, Subnet, or NONE (Host).
Page 28
tunnel. The remote VPN device can be another VPN Router, a VPN Server, or a computer with VPN client software that supports IPSec. The IP Address may either be static (permanent) (select IP Addr.) or dynamic (changing) (select FQDN for DDNS,or Any), depending on the settings of the remote VPN device. Make sure that you have entered the IP Address correctly, or the connection cannot be made.
Page 29
manual key management is used in small static environments or for troubleshooting purposes. Both sides must use the same Key Management method. Encryption Algorithm: There are two methods of encryption, DES and 3DES. The Encryption method determines the length of the key used to encrypt/decrypt ESP packets. DES is 56-bit encryption and 3DES is 168-bit encryption.
Page 30
for specific VPN tunnels. Phase 1 • Phase 1 is used to create a security association (SA), often called the IKE SA. After Phase 1 is completed, Phase 2 is used to create one or more IPSec SAs, which are then used to key IPSec sessions. •...
Page 31
Internet usage. You can set up Internet access policies for specific PCs and set up filters by using network port numbers. • Internet Access Policy. Multiple Filters can be saved as Internet Access Policies. When you wish to edit one, select the number of the Policy from the drop-down menu.
The Applications and Gaming Tab Port Range Forwarding The Port Forwarding screen sets up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized Internet applications. (Specialized Internet applications are any applications that use Internet access to perform functions such as videoconferencing or online gaming.
the Cancel Changes button to undo your changes. Figure 6-37: UPnP Forwarding The DMZ screen (see Figure 6-38) allows one local user to be exposed to the Internet for use of a special-purpose service such as Internet gaming and videoconferencing, through Software DMZ, or a user can use LAN Port 4 as a DMZ Port, through Hardware DMZ.
Page 34
Simple Network Management Protocol (SNMP) is a popular network monitoring and management protocol. To enable SNMP, click Enabled. To disable SNMP, click Disabled. • Identification. In the Contact field, enter contact information for the Router. In the Device Name field, enter the name of the Router.
Page 35
Select the type of attacks that you want to be alerted to. Select Syn Flooding, IP Spoofing, Win Nuke, Ping of Death, or Unauthorized Login attempt. General Log. Select the type of activity you would like to log. Select System Error Messages, Deny Policies, Allow Policies, Content Filtering, Data Inspection, authorized Login, or Configuration Changes.
Information The information displayed is the Hardware Version, Software Version, MAC Address, Local MAC Address, and System Up Time. WAN Connections The WAN Connections displayed are the Network Access, WAN IP Address, Subnet Mask, Default Gateway, and DNS. Click the Refresh button if you want to Refresh your screen. Figure 6-44: Router Local Network The Local Network information that is displayed is the IP Address, Subnet Mask, DHCP Server,...
Page 37
the information. 6. Click the OK button in the TCP/IP properties window, and click Close or the OK button for the Network window. 7. Restart the computer when asked. • For Windows 2000: 1. Click Start, Settings, and Control Panel. Double-click Network and Dial-Up Connections. 2.
Page 38
2. I want to test my Internet connection. A Check your TCP/IP settings. For Windows 98, Me, 2000, and XP: • Refer to “Chapter 4: Configure the PCs” for details. Make sure Obtain IP address automatically is selected in the settings. For Windows NT 4.0: •...
Page 39
2. Make sure you are using the right Internet connection settings. Contact your ISP to see if your Internet connection type is DHCP, Static IP Address, or PPPoE (commonly used by DSL consumers). Please refer to the Setup section of “Chapter 6: The Router’s Web-based Utility” for details on Internet connection settings.
Page 40
1 to 254). Note that each IP address must be unique within the network. • Your VPN may require port 500/UDP packets to be passed to the computer that is connecting to the IPSec server. Refer to “Problem #7, I need to set up online game hosting or use other Internet applications”...
Page 41
Unreal Tournament (UT), you would enter the range 7777 to 27900. 4. Check the protocol you will be using, TCP and/or UDP. 5. Enter the IP address of the PC or network device that you want the port server to go to. For example, if the web server’s Ethernet adapter IP address is 192.168.1.100, you would enter 100 in the field provided.
Page 42
If you have proxy settings, you need to disable these on your computer. Because the Router is the gateway for the Internet connection, the computer does not need any proxy settings to gain access. Please follow these directions to verify that you do not have any proxy settings and that the browser you use is set to connect directly to the LAN.
Page 43
• There is a setup option to “keep alive” the connection. This may not always work, so you may need to reestablish connection periodically. 1. To connect to the Router, go to the web browser, and enter http://192.168.1.1 or the IP address of the Router.
working correctly. You can remove the Router to verify a direct connection. • Manually configure the TCP/IP settings with a DNS address provided by your ISP. • Make sure that your browser is set to connect directly and that any dial-up is disabled. For Internet Explorer, click Tools, Internet Options, and then the Connection tab.
Page 45
If you have a dedicated Unreal Tournament server running, you need to create a static IP for each of the LAN computers and forward ports 7777, 7778, 7779, 7780, 7781, and 27900 to the IP address of the server. You can also use a port forwarding range of 7777 ~ 27900.
Page 46
that version contains new features that you would like to use. Downloading a more current version of Router firmware will not enhance the quality or speed of your Internet connection, and may disrupt your current connection stability. Will the Router function in a Macintosh environment? Yes, but the Router’s setup pages are accessible only through Internet Explorer 4.0 or Netscape Navigator 4.0 or higher for Macintosh.
Page 47
Can I run an application from a remote computer over the wireless network? This will depend on whether or not the application is designed to be used over a network. Consult application’s documentation to determine if it supports operation over a network. What is the IEEE 802.11g standard? It is one of the IEEE standards for wireless networks.
Page 48
touch with the original access point or whether it should seek a new one. When a node no longer receives acknowledgment from its original access point, it undertakes a new search. Upon finding a new access point, it then re-registers, and the communication process continues. What is ISM band? The FCC and their counterparts outside of the U.S.
any Ethernet networking device, such as a network adapter, that allows the network to identify it at the hardware level. For all practical purposes, this number is usually permanent. Unlike IP addresses, which can change every time a computer logs onto the network, the MAC address of a device stays the same, making it a valuable identifier for the network.
Page 50
their device set to the same channel or bandwidth can also receive those transmission. Wireless networks are easy to find. Hackers know that, in order to join a wireless network, your wireless PC will typically first listen for "beacon messages". These are identifying packets transmitted from the wireless network to announce its presence to wireless nodes looking to connect.
"packet sniffer", software available on the Internet, along with other freeware or shareware hacking utilities available on the Internet, to acquire your WEP keys and other network information to defeat security. Jamming Attacks Jamming Attacks, when a powerful signal is sent directly into your wireless network, can effectively shut down your wireless network.
being hacked into through one of the methods described here. With wireless networks, even with WEP encryption, open to the persistent hacker, how can you protect your data? The following section will tell you how to do just that. Maximizing Wireless Security Security experts will all tell you the same thing: Nothing is guaranteed.
Page 53
5)SSID There are a few things you can do to make your SSID more secure: a.Disable Broadcast b.Make it unique c.Change it often Most wireless networking devices will give you the option of broadcasting the SSID. This is a option for convenience, allowing anyone to log into your wireless network.
Page 54
Current encryption technology offers 64-bit and 128-bit WEP encryption. If you are using 64-bit WEP, swap out your old wireless units for 128-bit encryption right away. Where encryption is concerned, the bigger and more complex, the better. A WEP key is a string of hexadecimal characters that your wireless network uses in two ways.
length for 64-bit encryption or 26 characters in length for 128-bit encryption. All points in your wireless network must use the same WEP key to utilize WEP encryption. Once the Passphrase is entered, click the Generate key to generate a WEP key. When finished making your changes on this tab, click the Save Settings button to save these changes, or click the Cancel Changes button to undo your changes.
screen. How to Establish a Secure IPSec Tunnel Step 1: Create an IPSec Policy 1. Click the Start button, select Run, and type secpol.msc in the Open field. The Local Security Setting screen will appear as shown in Figure B-1. 2.
Page 57
8. The Filters Properties screen will appear, as shown in Figure B-8. Select the Addressing tab. In the Source address field, select A specific IP Subnet, and enter the IP Address: 192.168.1.0 and Subnet mask: 255.255.255.0. (Enter your new values if you have changed the default settings.) In the Destination address field, select My IP Address.
Figure C-17: Connection Type Tab Figure C-18: Properties Screen 10. Go to the IP Filter List tab, and click the filter list Router->win, as shown in Figure B-19. 11. Click the Filter Action tab, and select the filter action Require Security, as shown in Figure B-20.
5. Enter the IP Address and Subnet Mask of the local VPN Router in the Local Secure Group fields. To allow access to the entire IP subnet, enter 0 for the last set of IP Addresses. (e.g. 192.168.1.0). 6. Enter the IP Address and Subnet Mask of the VPN device at the other end of the tunnel (the remote VPN Router or device with which you wish to communicate) in the Remote Security Router fields.
for your Ethernet adapter and is shown as a series of numbers and letters. The MAC address/Adapter Address is what you will use for MAC address cloning or MAC filtering. The example in Figure E-3 shows the Ethernet adapter’s IP address as 192.168.1.100. Your computer may show something different.
Appendix G: Windows Help All wireless products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix. TCP/IP Before a computer can communicate with the Access Point, TCP/IP must be enabled.
Page 62
Boot - To start a device and cause it to start executing instructions. Bridge - A device that connects different networks. Broadband - An always-on, fast Internet connection. Browser - An application program that provides a way to look at and interact with all the information on the World Wide Web.
Page 63
Encryption - Encoding data transmitted in a network. Ethernet - IEEE standard network protocol that specifies how data is placed on and retrieved from a common transmission medium. Finger - A program that tells you the name associated with an e-mail address. Firewall - A set of related programs located at a network gateway server that protects the resources of a network from users from other networks.
Page 64
Node - A network junction or connection point, typically a computer or work station. OFDM (Orthogonal Frequency Division Multiplexing) - Frequency transmission that separates the data stream into a number of lower-speed data streams, which are then transmitted in parallel to prevent information from being lost in transit.
Static Routing - Forwarding data in a network via a fixed path. Subnet Mask - An address code that determines the size of the network. Switch - 1. A data switch that connects computing devices to host computers, allowing a large number of devices to share a limited number of ports.
LEDs Power, Internet, Ethernet (1, 2, 3, 4), Wireless-G, DMZ Security Features WEP, 802.1x Authentication WEP Key Bits 64, 128 Dimensions 7.32" x 6.89" x 1.89" (W x H x D) (186 mm x 175 mm x 48 mm) Unit Weight 1.26 lb (0.57 kg) Power External, 5V DC, 2.5A Certifications FCC, IC-03 Operating Temp.
Page 67
DAMAGES, HOWEVER CAUSED REGARDLESS OF THE THEORY OF LIABILITY, ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE PRODUCT, EVEN IF NEO-MERIDIAN HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILL NEO-MERIDIAN' LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT.
Appendix K: Regulatory Information Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Page 69
INDUSTRY CANADA (CANADA) This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. The use of this device in a system operating either partially or completely outdoors may require the user to obtain a license for the system according to the Canadian regulations.
MHz respectively) may be used in France. License required for every indoor and outdoor installations. Please contact ART for procedure to follow. Deutschland D: Anmeldung im Outdoor-Bereich notwending, aber nicht genehmigungspflichtig. Bitte mit Händler die Vorgehensweise abstimmen. Germany D: License required for outdoor installations. Check with reseller for procedure to follow Italia I: E' necessaria la concessione ministeriale anche per l'uso interno.
Need help?
Do you have a question about the R930706G and is the answer not in the manual?
Questions and answers