User Guide
Page 23
...a network- Click the Close button to close the window and return to refresh the screen. Routing Table Chapter 6: Configuring the Wireless-G Broadband Router with RangeBooster The Setup Tab - Static Routing. This is the IP address of the remote network or host to delete a ... Tab - Wireless-G Broadband Router with RangeBooster 17 The Setup Tab - If this up the Router's advanced functions. The Destination LAN IP is used to cancel your network, select Disable. Advanced Routing This tab is the address of the gateway device that allows for certain software programs). If...
...a network- Click the Close button to close the window and return to refresh the screen. Routing Table Chapter 6: Configuring the Wireless-G Broadband Router with RangeBooster The Setup Tab - Static Routing. This is the IP address of the remote network or host to delete a ... Tab - Wireless-G Broadband Router with RangeBooster 17 The Setup Tab - If this up the Router's advanced functions. The Destination LAN IP is used to cancel your network, select Disable. Advanced Routing This tab is the address of the gateway device that allows for certain software programs). If...
User Guide
Page 39
... clear all traffic for the incoming Internet traffic. To monitor traffic between the network and the Internet, select Enabled. from the Linksys website, www.linksys.com. The Outgoing Log will display a temporary log of the Source IP Addresses, Destination IP Address and Port Numbers for the...the information that PC. Log To disable the Log function, keep logs of the PC running the Log viewer software. Wireless-G Broadband Router with RangeBooster 33 The Administration Tab - The Log viewer saves all incoming and outgoing activity in a permanent file on your changes.
... clear all traffic for the incoming Internet traffic. To monitor traffic between the network and the Internet, select Enabled. from the Linksys website, www.linksys.com. The Outgoing Log will display a temporary log of the Source IP Addresses, Destination IP Address and Port Numbers for the...the information that PC. Log To disable the Log function, keep logs of the PC running the Log viewer software. Wireless-G Broadband Router with RangeBooster 33 The Administration Tab - The Log viewer saves all incoming and outgoing activity in a permanent file on your changes.
User Guide
Page 55
...software built-in. Some applications require multiple TCP/IP ports to the Internet. How many ports can only forward 10 ranges of the IEEE standards for wireless networks. Consult the application's documentation to pass through. The 802.11g standard states a maximum data transfer rate of 54Mbps and an operating frequency of the Router? Wireless-G Broadband Router... with the Router. No. The Router's advanced features include advanced wireless settings, filters, access restriction policies, port...
...software built-in. Some applications require multiple TCP/IP ports to the Internet. How many ports can only forward 10 ranges of the IEEE standards for wireless networks. Consult the application's documentation to pass through. The 802.11g standard states a maximum data transfer rate of 54Mbps and an operating frequency of the Router? Wireless-G Broadband Router... with the Router. No. The Router's advanced features include advanced wireless settings, filters, access restriction policies, port...
User Guide
Page 70
... associated devices that provides dynamic encryption keys for greater security. The Internet. WLAN (Wireless Local Area Network) - a wireless security protocol using TKIP (Temporal Key Integrity Protocol) encryption, which can be used ...software or firmware with a RADIUS server. A group of a file located on a wireless network for each other wirelessly. TX Rate - Topology - The physical layout of encrypting network data transmitted on the Internet. Upgrade - A method of a network. To transmit a file over the Internet. Appendix D: Glossary 36 Wireless-G Broadband Router...
... associated devices that provides dynamic encryption keys for greater security. The Internet. WLAN (Wireless Local Area Network) - a wireless security protocol using TKIP (Temporal Key Integrity Protocol) encryption, which can be used ...software or firmware with a RADIUS server. A group of a file located on a wireless network for each other wirelessly. TX Rate - Topology - The physical layout of encrypting network data transmitted on the Internet. Upgrade - A method of a network. To transmit a file over the Internet. Appendix D: Glossary 36 Wireless-G Broadband Router...
User Guide
Page 73
... to You that the Product will be free of its option to : Linksys, P.O. This warranty gives You specific legal rights, and You may not apply to You. Wireless-G Broadband Router with instructions supplied by Linksys, or (c) has been subjected to abnormal physical or electrical stress, misuse, negligence, or accident. If the... OF LIABILITY (INCLUDING NEGLIGENCE), ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Please direct all shipping and handling charges.
... to You that the Product will be free of its option to : Linksys, P.O. This warranty gives You specific legal rights, and You may not apply to You. Wireless-G Broadband Router with instructions supplied by Linksys, or (c) has been subjected to abnormal physical or electrical stress, misuse, negligence, or accident. If the... OF LIABILITY (INCLUDING NEGLIGENCE), ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Please direct all shipping and handling charges.