Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 6
... a Wireless-G access point for Wireless QoS (WMM) and wired QoS (port prioritization), consistent voice and video quality is support for traffic separation. The wireless AP supports 802.11b/g and incorporates Linksys RangeBooster technology, which allows the wireless coverage to your business. For your voice or video over standard 802.11g. Wireless networking in 4-port, full-duplex 10/100 Ethernet switch...
... a Wireless-G access point for Wireless QoS (WMM) and wired QoS (port prioritization), consistent voice and video quality is support for traffic separation. The wireless AP supports 802.11b/g and incorporates Linksys RangeBooster technology, which allows the wireless coverage to your business. For your voice or video over standard 802.11g. Wireless networking in 4-port, full-duplex 10/100 Ethernet switch...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 7
...access points to PCs equipped with wireless network adapters, which they may be used. The Router transmits data to work with the Wireless-G VPN Router with the wired network computers, the wireless network should be connected to share data or peripherals with the other , Linksys... Your Wireless Network Network Topology A wireless local area network (WLAN) is exactly like a regular local area network (LAN), except that each other. Ad-Hoc mode allows computers equipped with wireless transmitters and receivers to communicate directly with Wireless Ethernet Bridges (WET200). The...
...access points to PCs equipped with wireless network adapters, which they may be used. The Router transmits data to work with the Wireless-G VPN Router with the wired network computers, the wireless network should be connected to share data or peripherals with the other , Linksys... Your Wireless Network Network Topology A wireless local area network (WLAN) is exactly like a regular local area network (LAN), except that each other. Ad-Hoc mode allows computers equipped with wireless transmitters and receivers to communicate directly with Wireless Ethernet Bridges (WET200). The...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 13
...-Point Protocol over Ethernet) to see if they do not know the service name, leave this field. If you with the Default Gateway Address, which is required by external users on the Internet (including your ISP). Wireless-G VPN Router with the Subnet Mask. Then, enter the password again to...-Point Tunneling Protocol (PPTP) is the Router's IP address, when seen from the WAN, or the Internet. If they use this option, the Router will have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to access the Internet again....
...-Point Protocol over Ethernet) to see if they do not know the service name, leave this field. If you with the Default Gateway Address, which is required by external users on the Internet (including your ISP). Wireless-G VPN Router with the Subnet Mask. Then, enter the password again to...-Point Tunneling Protocol (PPTP) is the Router's IP address, when seen from the WAN, or the Internet. If they use this option, the Router will have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to access the Internet again....
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 14
... can configure the Router to cut the Internet connection after it has been inactive for a specified period of inactivity that tunnels Point-to access the Internet again. To use this option, the Router will periodically check your changes. User Name and Password Enter the User...between 128 and 1500. Some ISPs require these fields blank will automatically reestablish your ISP for network transmission. Chapter 5 Configuring the Wireless-G Router User Name and Password Enter the User Name and Password provided by your ISP before making any changes. L2TP IP ...
... can configure the Router to cut the Internet connection after it has been inactive for a specified period of inactivity that tunnels Point-to access the Internet again. To use this option, the Router will periodically check your changes. User Name and Password Enter the User...between 128 and 1500. Some ISPs require these fields blank will automatically reestablish your ISP for network transmission. Chapter 5 Configuring the Wireless-G Router User Name and Password Enter the User Name and Password provided by your ISP before making any changes. L2TP IP ...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 18
...is the same for all points in your wireless network must use any 802.11g and 802.11b devices in your wireless network. Wireless SSID Broadcast When wireless clients survey the local area for wireless networks to "Appendix B: Wireless Security." All devices in the wireless network. You may need... WEP. (WPA stands for Wi-Fi Protected Access, which instructs the Router how often it should change the default SSID (linksys-g) to improve the communication quality. When you have only 802.11b devices, select B-Only. Wireless isolation within SSID This feature is a security standard...
...is the same for all points in your wireless network must use any 802.11g and 802.11b devices in your wireless network. Wireless SSID Broadcast When wireless clients survey the local area for wireless networks to "Appendix B: Wireless Security." All devices in the wireless network. You may need... WEP. (WPA stands for Wi-Fi Protected Access, which instructs the Router how often it should change the default SSID (linksys-g) to improve the communication quality. When you have only 802.11b devices, select B-Only. Wireless isolation within SSID This feature is a security standard...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 23
...your network from the drop-down menu. To enable this programming language. WDS allows a wireless signal to this option. To enable ActiveX filtering, click the checkbox next to view the available access points. If you deny ActiveX, you do not want DoS Prevention, select Disabled. Chapter 5... Configuring the Wireless-G Router This tab is more difficult for intruders to enter your PC and used...
...your network from the drop-down menu. To enable this programming language. WDS allows a wireless signal to this option. To enable ActiveX filtering, click the checkbox next to view the available access points. If you deny ActiveX, you do not want DoS Prevention, select Disabled. Chapter 5... Configuring the Wireless-G Router This tab is more difficult for intruders to enter your PC and used...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 27
...-Point sessions via the Internet on the remote end of the local VPN Router. VPN > IPSec VPN Tunnel Entry To create a new tunnel, select new. Tunnel Name Enter a name for the tunnel; NAT-Traversal You can access the tunnel. select IP address if you ...can access the tunnel. The options are described below. • Subnet Enter the IP Address and Mask of what you want a specific computer; select IP Address if you want a specific computer; Chapter 5 Configuring the Wireless-G Router PPTP PassThrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point ...
...-Point sessions via the Internet on the remote end of the local VPN Router. VPN > IPSec VPN Tunnel Entry To create a new tunnel, select new. Tunnel Name Enter a name for the tunnel; NAT-Traversal You can access the tunnel. select IP address if you ...can access the tunnel. The options are described below. • Subnet Enter the IP Address and Mask of what you want a specific computer; select IP Address if you want a specific computer; Chapter 5 Configuring the Wireless-G Router PPTP PassThrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point ...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 44
...peer-to-peer). You should enable the highest level of encryption supported by the factory. Change the default password For wireless products such as access points, routers, and gateways, you need to take some older devices that are not required to support WEP. The ...cellular or cordless phones, signals from exterior walls and windows. • Turn wireless routers, access points, or gateways off when they are adopting them to access your wireless device and change their settings. The Linksys default password is not secure. • Password protect all computers on the ...
...peer-to-peer). You should enable the highest level of encryption supported by the factory. Change the default password For wireless products such as access points, routers, and gateways, you need to take some older devices that are not required to support WEP. The ...cellular or cordless phones, signals from exterior walls and windows. • Turn wireless routers, access points, or gateways off when they are adopting them to access your wireless device and change their settings. The Linksys default password is not secure. • Password protect all computers on the ...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 59
... over a network. Bandwidth The transmission capacity of a wireless network. Wireless-G VPN Router with all the information on and retrieved from...) The IP address of related programs located at www.linksys.com/glossary Access Point A device that displays the IP address for a limited... long Cable Modem A device that specifies how data is bridged to a user for a particular networking device. 54 Download...) Asecuritymethod that forwards Internet traffic from a common transmission medium. Ethernet IEEE standard network protocol that connects a computer to receive and ...
... over a network. Bandwidth The transmission capacity of a wireless network. Wireless-G VPN Router with all the information on and retrieved from...) The IP address of related programs located at www.linksys.com/glossary Access Point A device that displays the IP address for a limited... long Cable Modem A device that specifies how data is bridged to a user for a particular networking device. 54 Download...) Asecuritymethod that forwards Internet traffic from a common transmission medium. Ethernet IEEE standard network protocol that connects a computer to receive and ...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 60
... for Linksys products. RADIUS (Remote Authentication Dial-In User Service) A protocol that make up to files, printing, communications, and other services. Wireless-G VPN...wireless encryption protocol that allows the Point to Point Protocol (PPP) to a network. POP3 (Post Office Protocol 3) A standard mail server commonly used for accessing remote PCs. Roaming The ability to take a wireless device from one access point...monitoring and control protocol. RJ-45 (Registered Jack-45) An Ethernet connector that share a common address component. TCP/IP (Transmission Control Protocol...
... for Linksys products. RADIUS (Remote Authentication Dial-In User Service) A protocol that make up to files, printing, communications, and other services. Wireless-G VPN...wireless encryption protocol that allows the Point to Point Protocol (PPP) to a network. POP3 (Post Office Protocol 3) A standard mail server commonly used for accessing remote PCs. Roaming The ability to take a wireless device from one access point...monitoring and control protocol. RJ-45 (Registered Jack-45) An Ethernet connector that share a common address component. TCP/IP (Transmission Control Protocol...
Cisco WET200 Wireless-G Business Ethernet Bridge Administration Guide
Page 6
... Infrastructure mode, the WET200 can be used to bridge a separate Ethernet segment wirelessly to each equipped with one or more information about wireless products. The WET200 has been designed for more wireless adapters. Linksys wireless adapters also provide access to the Linksys website at www.linksys.com for use of an access point. Network Layout The Wireless-G Business Ethernet Bridge can be used in a wireless network must be doubled...
... Infrastructure mode, the WET200 can be used to bridge a separate Ethernet segment wirelessly to each equipped with one or more information about wireless products. The WET200 has been designed for more wireless adapters. Linksys wireless adapters also provide access to the Linksys website at www.linksys.com for use of an access point. Network Layout The Wireless-G Business Ethernet Bridge can be used in a wireless network must be doubled...
Cisco WET200 Wireless-G Business Ethernet Bridge Administration Guide
Page 11
...Wireless-G Business Ethernet Bridge 7 The utility can be accessed via web browsers, such as Internet Explorer or Mozilla Firefox, and enter the Bridge's default IP address, 192.168.1.226, in the User Name field. To secure the Bridge, change the Password from the list. If you must first create a wireless connection between the bridge and the access point...Quick Configuration Overview Chapter 5: Quick Configuration Overview Overview The Ethernet switch of the WET200 is designed to configure the Bridge's security settings including security mode, authentication, and encryption information...
...Wireless-G Business Ethernet Bridge 7 The utility can be accessed via web browsers, such as Internet Explorer or Mozilla Firefox, and enter the Bridge's default IP address, 192.168.1.226, in the User Name field. To secure the Bridge, change the Password from the list. If you must first create a wireless connection between the bridge and the access point...Quick Configuration Overview Chapter 5: Quick Configuration Overview Overview The Ethernet switch of the WET200 is designed to configure the Bridge's security settings including security mode, authentication, and encryption information...
Cisco WET200 Wireless-G Business Ethernet Bridge Administration Guide
Page 14
...access points. If you are using the WET200 in Infrastructure mode to communicate with other devices in length, and can use this screen to connect to configure the Bridge's wireless interfaces: Basic Settings, Wireless Security, and Advanced Settings. Wireless-G Business Ethernet Bridge Wireless > Basic Settings > Wireless Site Survey For each wireless... should change the default SSID (linksys) to disable wireless access. Chapter 6 Advanced Configuration Wireless The Wireless tab contains the following three screens that wireless network. You can contain any keyboard...
...access points. If you are using the WET200 in Infrastructure mode to communicate with other devices in length, and can use this screen to connect to configure the Bridge's wireless interfaces: Basic Settings, Wireless Security, and Advanced Settings. Wireless-G Business Ethernet Bridge Wireless > Basic Settings > Wireless Site Survey For each wireless... should change the default SSID (linksys) to disable wireless access. Chapter 6 Advanced Configuration Wireless The Wireless tab contains the following three screens that wireless network. You can contain any keyboard...
Cisco WET200 Wireless-G Business Ethernet Bridge Administration Guide
Page 15
Security Disabled Security Mode Enter the security configuration to match the wireless Access Point that appear on your WEP key manually on the type of security you are ...Passphrase, then you can enter one or more WEP keys manually. Wireless > Wireless Security - Wireless-G Business Ethernet Bridge Wireless > Wireless Security - Select the encryption method you want to communicate with Linksys wireless products only. Chapter 6 Advanced Configuration Wireless > Wireless Security The Wireless Security screen allows you to configure security on the screen. Encryption In...
Security Disabled Security Mode Enter the security configuration to match the wireless Access Point that appear on your WEP key manually on the type of security you are ...Passphrase, then you can enter one or more WEP keys manually. Wireless > Wireless Security - Wireless-G Business Ethernet Bridge Wireless > Wireless Security - Select the encryption method you want to communicate with Linksys wireless products only. Chapter 6 Advanced Configuration Wireless > Wireless Security The Wireless Security screen allows you to configure security on the screen. Encryption In...
Cisco WET200 Wireless-G Business Ethernet Bridge Administration Guide
Page 16
... the Bridge. Wireless-G Business Ethernet Bridge Wireless > Wireless Security - Encryption Select either TKIP (default) or AES encryption. Click Apply to configure WPA2 Enterprise encryption for wireless authentication while being associated with the RADIUS server. PEAP EAP-PEAP uses the Login Name and Password to load and decode the certificate file. Click Import to perform authentication with an Access Point. WPA...
... the Bridge. Wireless-G Business Ethernet Bridge Wireless > Wireless Security - Encryption Select either TKIP (default) or AES encryption. Click Apply to configure WPA2 Enterprise encryption for wireless authentication while being associated with the RADIUS server. PEAP EAP-PEAP uses the Login Name and Password to load and decode the certificate file. Click Import to perform authentication with an Access Point. WPA...
Cisco WET200 Wireless-G Business Ethernet Bridge Administration Guide
Page 17
...Name Enter your wireless network. To disable MAC address cloning, keep the default setting, Auto, to perform authentication with an Access Point. This is useful when the Bridge is split to locate it will actively scan for wireless authentication while being...this value, but it . Wireless > Wireless Security - The rate should remain at its default setting of your login name for authentication. Auto-Fallback negotiates the best possible connection speed between the Bridge and another wireless-equipped device. Wireless-G Business Ethernet Bridge Switch > Port Management 13...
...Name Enter your wireless network. To disable MAC address cloning, keep the default setting, Auto, to perform authentication with an Access Point. This is useful when the Bridge is split to locate it will actively scan for wireless authentication while being...this value, but it . Wireless > Wireless Security - The rate should remain at its default setting of your login name for authentication. Auto-Fallback negotiates the best possible connection speed between the Bridge and another wireless-equipped device. Wireless-G Business Ethernet Bridge Switch > Port Management 13...
Cisco WET200 Wireless-G Business Ethernet Bridge Administration Guide
Page 23
... administrator who will lose all previously configured settings and cannot recover that configuration unless you have the Access Point respond to your computer. SNMP Trap-Community Enter the name of your LAN hosts, enter 0.0.0.0. To ... SNMP V.3 Username Enter the username for the Bridge. SNMP Trap-Destination Enter the destination IP address for the SNMP V3 administrator. Wireless-G Business Ethernet Bridge Administration > Configuration Management This screen lets you want to enable https access, select Enabled. Administration > Configuration Management Administration...
... administrator who will lose all previously configured settings and cannot recover that configuration unless you have the Access Point respond to your computer. SNMP Trap-Community Enter the name of your LAN hosts, enter 0.0.0.0. To ... SNMP V.3 Username Enter the username for the Bridge. SNMP Trap-Destination Enter the destination IP address for the SNMP V3 administrator. Wireless-G Business Ethernet Bridge Administration > Configuration Management This screen lets you want to enable https access, select Enabled. Administration > Configuration Management Administration...
Cisco WET200 Wireless-G Business Ethernet Bridge Administration Guide
Page 26
...anti-virus software and personal firewall software. •• Disable file sharing (peer-to every networking device. Linksys wireless products use linksys as access points and routers, you cannot physically prevent someone from your Social Security number) because this information may exist around ...steps to intruders than a network encrypted with high-speed Internet access are adopting them to support WPA2, but do not support WPA. Wireless-G Business Ethernet Bridge 4. To protect the information as your wireless network can be available for anyone to see when browsing for...
...anti-virus software and personal firewall software. •• Disable file sharing (peer-to every networking device. Linksys wireless products use linksys as access points and routers, you cannot physically prevent someone from your Social Security number) because this information may exist around ...steps to intruders than a network encrypted with high-speed Internet access are adopting them to support WPA2, but do not support WPA. Wireless-G Business Ethernet Bridge 4. To protect the information as your wireless network can be available for anyone to see when browsing for...
Cisco WET200 Wireless-G Business Ethernet Bridge Administration Guide
Page 27
...Access Point A device that allows wireless-equipped computers and other devices to grant, deny, or limit access devices, features, or applications. Bandwidth Assignments Indicates the amount of a given device or network. Bridges... which user access is forwarded. WEB: For additional terms, please visit the glossary at www.linksys.com/glossary Access Mode Specifies ... networks. Bridge A device that is not guaranteed. Byte A unit of users which in a first-fit fashion. Wireless-G Business Ethernet Bridge Baud Indicates the number of a wireless network. ...
...Access Point A device that allows wireless-equipped computers and other devices to grant, deny, or limit access devices, features, or applications. Bandwidth Assignments Indicates the amount of a given device or network. Bridges... which user access is forwarded. WEB: For additional terms, please visit the glossary at www.linksys.com/glossary Access Mode Specifies ... networks. Bridge A device that is not guaranteed. Byte A unit of users which in a first-fit fashion. Wireless-G Business Ethernet Bridge Baud Indicates the number of a wireless network. ...
Cisco WET200 Wireless-G Business Ethernet Bridge Administration Guide
Page 28
... IP addresses. Default Gateway A device that make up your local area network. DHCP Server An Internet host that provides access to the Internet. EIGRP (Enhanced Interior Gateway Routing Protocol) Provides fast convergence, support for a particular networking device. GARP ...their local switch or router that runs a networking device. DSCP (DiffServ Code Point) Provides a method of a networking device to serial optical signals and vice versa. Wireless-G Business Ethernet Bridge Full Duplex The ability of tagging IP packets with priority information. Jumbo Frames...
... IP addresses. Default Gateway A device that make up your local area network. DHCP Server An Internet host that provides access to the Internet. EIGRP (Enhanced Interior Gateway Routing Protocol) Provides fast convergence, support for a particular networking device. GARP ...their local switch or router that runs a networking device. DSCP (DiffServ Code Point) Provides a method of a networking device to serial optical signals and vice versa. Wireless-G Business Ethernet Bridge Full Duplex The ability of tagging IP packets with priority information. Jumbo Frames...