User Guide
Page 2
... licence. " EC DECLARATION OF CONFORMITY (EUROPE) Linksys Group declares that every Instant Wireless Dual-Band Wireless A+B Broadband Router will not occur in all inquiries to obtain a Return Authorization number. When returning a product, mark the Return Authorization number clearly on legal combinations of their respective proprietors. Equipment (or its products, software, or documentation without obligation to follow...
... licence. " EC DECLARATION OF CONFORMITY (EUROPE) Linksys Group declares that every Instant Wireless Dual-Band Wireless A+B Broadband Router will not occur in all inquiries to obtain a Return Authorization number. When returning a product, mark the Return Authorization number clearly on legal combinations of their respective proprietors. Equipment (or its products, software, or documentation without obligation to follow...
User Guide
Page 14
...now. Instant Wireless® Series Chapter 5: Configure the Router's Basic Settings This chapter will show you how to configure the Router to function in your network and gain access to the Internet through the Password screen of Internet-sharing software are using the Router to ... of your Internet-sharing software: • If you are listed in Figure 5-2, will differ depending on all three boxes. Some examples of the web-based utility. 20 Dual-Band Wireless A+B Broadband Router 3. Figure 5-1 2. Proceed to continue. Windows XP users will appear with the Setup tab...
...now. Instant Wireless® Series Chapter 5: Configure the Router's Basic Settings This chapter will show you how to configure the Router to function in your network and gain access to the Internet through the Password screen of Internet-sharing software are using the Router to ... of your Internet-sharing software: • If you are listed in Figure 5-2, will differ depending on all three boxes. Some examples of the web-based utility. 20 Dual-Band Wireless A+B Broadband Router 3. Figure 5-1 2. Proceed to continue. Windows XP users will appear with the Setup tab...
User Guide
Page 29
...4GHz, 802.11b Instant Wireless® Series Beacon Interval The Beacon Interval value indicates the frequency interval of your wireless network. After receiving an RTS, the wireless station responds with 802.1x enabled, wireless clients, such as PCs, must use 802.1x client software or Windows XP,.... To access a network with a Clear to Send (CTS) frame to acknowledge the right to synchronize the wireless network. Enter a value between the Router and a roaming wireless network adapter. A beacon is recommended. In most cases, it should remain at its default value of a...
...4GHz, 802.11b Instant Wireless® Series Beacon Interval The Beacon Interval value indicates the frequency interval of your wireless network. After receiving an RTS, the wireless station responds with 802.1x enabled, wireless clients, such as PCs, must use 802.1x client software or Windows XP,.... To access a network with a Clear to Send (CTS) frame to acknowledge the right to synchronize the wireless network. Enter a value between the Router and a roaming wireless network adapter. A beacon is recommended. In most cases, it should remain at its default value of a...
User Guide
Page 30
Instant Wireless® Series Important: The Router's 802.1x feature works with a RADIUS server. RADIUS Server IP Address ... 600 seconds. To disable 802.1x authentication for the 2.4GHz, 802.11b network connection between a wireless client and a RADIUS server (the Router acts as an authenticator). The default is 300 seconds. 2.4GHz, 802.11b Disable/EAP-MD5/EAP... the port can be set up a static key for your PC's operating system and the 802.1x client software being used . Using MD5 authentication is less secure than using certificate-based authentication (TLS or TTLS), because keys...
Instant Wireless® Series Important: The Router's 802.1x feature works with a RADIUS server. RADIUS Server IP Address ... 600 seconds. To disable 802.1x authentication for the 2.4GHz, 802.11b network connection between a wireless client and a RADIUS server (the Router acts as an authenticator). The default is 300 seconds. 2.4GHz, 802.11b Disable/EAP-MD5/EAP... the port can be set up a static key for your PC's operating system and the 802.1x client software being used . Using MD5 authentication is less secure than using certificate-based authentication (TLS or TTLS), because keys...
User Guide
Page 44
...Router has DHCP server software built-in the Router? It is one of VPN sessions allowed by the Router? Does the Router replace a modem? What IEEE 802.11a features are compatible with a static IP if you are the advanced features of the IEEE standards for wireless networks. Can the Router...54Mbps and an operating frequency of 2.4GHz. Instant Wireless® Series your browser is set to Never dial a connection. The Router is compatible with virtually any dial-up is disabled. No. It is one of the Router? For Netscape Navigator, click Edit, Preferences,...
...Router has DHCP server software built-in the Router? It is one of VPN sessions allowed by the Router? Does the Router replace a modem? What IEEE 802.11a features are compatible with a static IP if you are the advanced features of the IEEE standards for wireless networks. Can the Router...54Mbps and an operating frequency of 2.4GHz. Instant Wireless® Series your browser is set to Never dial a connection. The Router is compatible with virtually any dial-up is disabled. No. It is one of the Router? For Netscape Navigator, click Edit, Preferences,...
User Guide
Page 45
... easier to the wired backbone. When a node no longer receives acknowledgment 82 Dual-Band Wireless A+B Broadband Router from its address. What is infrastructure mode? This presents a truly revolutionary opportunity to both... as well as low power wideband noise and is ad-hoc mode? On the software side, WLAN offers the encryption function (WEP) to the system. Each node must...supported? The FCC and their differences? What is roaming? This bit pattern is DSSS? Instant Wireless® Series What IEEE 802.11b features are damaged during transmission, statistical techniques embedded in ...
... easier to the wired backbone. When a node no longer receives acknowledgment 82 Dual-Band Wireless A+B Broadband Router from its address. What is infrastructure mode? This presents a truly revolutionary opportunity to both... as well as low power wideband noise and is ad-hoc mode? On the software side, WLAN offers the encryption function (WEP) to the system. Each node must...supported? The FCC and their differences? What is roaming? This bit pattern is DSSS? Instant Wireless® Series What IEEE 802.11b features are damaged during transmission, statistical techniques embedded in ...
User Guide
Page 49
...dynamic WEP keys, you have to enabling WEP, Linksys also recommends the following security implementations: • Change the SSID from the default "linksys" • Change the SSID on a regular ... operating system and the 802.1x client software being used. Therefore, make sure that all devices, including the Router. Important: The Router's 802.1x feature works with a 64-... On a wireless network, a 128-bit WEP encrypted device will , however, increase network security. Instant Wireless® Series Notebook with Wireless Adapter RADIUS Server Cable or DSL Modem Router Figure C-1 ...
...dynamic WEP keys, you have to enabling WEP, Linksys also recommends the following security implementations: • Change the SSID from the default "linksys" • Change the SSID on a regular ... operating system and the 802.1x client software being used. Therefore, make sure that all devices, including the Router. Important: The Router's 802.1x feature works with a 64-... On a wireless network, a 128-bit WEP encrypted device will , however, increase network security. Instant Wireless® Series Notebook with Wireless Adapter RADIUS Server Cable or DSL Modem Router Figure C-1 ...
User Guide
Page 50
... Pack 1 installed. Dual-Band Wireless A+B Broadband Router 2. Then click the OK button. If your computer's system tray. For instructions on whether or not you are the instructions and screenshots for your PC must use third-party 802.1x client software. Select the appropriate network, and... click the Advanced... Figure C-2 Note: These are using MD5 authentication, proceed to that appears will discuss 802.1x configuration for Windows XP." Instant Wireless® Series Windows XP supports 802.1x...
... Pack 1 installed. Dual-Band Wireless A+B Broadband Router 2. Then click the OK button. If your computer's system tray. For instructions on whether or not you are the instructions and screenshots for your PC must use third-party 802.1x client software. Select the appropriate network, and... click the Advanced... Figure C-2 Note: These are using MD5 authentication, proceed to that appears will discuss 802.1x configuration for Windows XP." Instant Wireless® Series Windows XP supports 802.1x...
User Guide
Page 60
...means transmit. A workstation or server software module that provides an interface between a network interface card and the upper-layer protocol software running in order to alter the ...that is installed during transmission, statistical techniques embedded in the receiver can adjust for a router to use DMZ Hosting. EAP-TTLS uses a combination of the communications circuits. Encryption...Many authentication methods, including passwords, certificates, and smart cards, work within this framework. Instant Wireless® Series DMZ - (DeMilitarized Zone) allows one or more bits in the ...
...means transmit. A workstation or server software module that provides an interface between a network interface card and the upper-layer protocol software running in order to alter the ...that is installed during transmission, statistical techniques embedded in the receiver can adjust for a router to use DMZ Hosting. EAP-TTLS uses a combination of the communications circuits. Encryption...Many authentication methods, including passwords, certificates, and smart cards, work within this framework. Instant Wireless® Series DMZ - (DeMilitarized Zone) allows one or more bits in the ...
User Guide
Page 61
...that interconnects networks with different, incompatible communications protocols. Basically, a firewall, working closely with a router, examines each sender or receiver of information that is designed to handle binary files directly and...the ROM or PROM, it toward its destination. FTP (File Transfer Protocol) - Instant Wireless® Series (The term also implies the security policy that is used with ...by first going through an access point. An infrastructure wireless network connected to a wired network is referred to as the software. Half Duplex - FTP includes functions to transmit ...
...that interconnects networks with different, incompatible communications protocols. Basically, a firewall, working closely with a router, examines each sender or receiver of information that is designed to handle binary files directly and...the ROM or PROM, it toward its destination. FTP (File Transfer Protocol) - Instant Wireless® Series (The term also implies the security policy that is used with ...by first going through an access point. An infrastructure wireless network connected to a wired network is referred to as the software. Half Duplex - FTP includes functions to transmit ...
User Guide
Page 65
...or WAN. Switch - 1. Throughput - A series of the spread-spectrum signal being broadcast. Software tells the hardware how to eliminate external interference. 122 Dual-Band Wireless A+B Broadband Router Subnet Mask - Static IP Address - Static Routing - TCP (Transmission Control Protocol) - ... The most important of subgroups, or subnets. Software - TCP/IP (Transmission Control Protocol/Internet Protocol) - Instant Wireless® Series hardware and/or software processes reporting activity in each network device (hub, router, bridge, etc.) to the workstation console used ...
...or WAN. Switch - 1. Throughput - A series of the spread-spectrum signal being broadcast. Software tells the hardware how to eliminate external interference. 122 Dual-Band Wireless A+B Broadband Router Subnet Mask - Static IP Address - Static Routing - TCP (Transmission Control Protocol) - ... The most important of subgroups, or subnets. Software - TCP/IP (Transmission Control Protocol/Internet Protocol) - Instant Wireless® Series hardware and/or software processes reporting activity in each network device (hub, router, bridge, etc.) to the workstation console used ...
User Guide
Page 66
...pairs of two or more pairs, all within a single cable. To replace existing software or firmware with each other Internet facility. Twisted pair is often through public networks...L2TP (Layer 2 Tunneling Protocol), and IPSec (Internet Protocol Security). 124 Dual-Band Wireless A+B Broadband Router WAN (Wide Area Network) - Each signal on the Win32 API for WAN ...the Internet). A group of data (called packets) that share files and databases. 125 Transmission Rate. Instant Wireless® Series TX Rate - WINIPCFG - Upgrade - A technique that allows two or more individuals ...
...pairs of two or more pairs, all within a single cable. To replace existing software or firmware with each other Internet facility. Twisted pair is often through public networks...L2TP (Layer 2 Tunneling Protocol), and IPSec (Internet Protocol Security). 124 Dual-Band Wireless A+B Broadband Router WAN (Wide Area Network) - Each signal on the Win32 API for WAN ...the Internet). A group of data (called packets) that share files and databases. 125 Transmission Rate. Instant Wireless® Series TX Rate - WINIPCFG - Upgrade - A technique that allows two or more individuals ...
User Guide
Page 68
... Information Instant Wireless® Series BE SURE TO HAVE YOUR PROOF OF PURCHASE AND A BARCODE FROM THE PRODUCT'S PACKAGING ON HAND WHEN CALLING. IN NO EVENT SHALL LINKSYS'S LIABILITY EXCEED THE PRICE PAID FOR THE PRODUCT FROM DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OF THE PRODUCT, ITS ACCOMPANYING SOFTWARE...
... Information Instant Wireless® Series BE SURE TO HAVE YOUR PROOF OF PURCHASE AND A BARCODE FROM THE PRODUCT'S PACKAGING ON HAND WHEN CALLING. IN NO EVENT SHALL LINKSYS'S LIABILITY EXCEED THE PRICE PAID FOR THE PRODUCT FROM DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OF THE PRODUCT, ITS ACCOMPANYING SOFTWARE...