User Guide
Page 11
... be set identifier): your Ethernet hardware as a printer, with the other through an access point. Network Layout The Wireless-G Broadband Router has been specifically designed for a wireless router or access point. And, of this mode is limited by the distance and interference directly between them....to share resources only with the wired network computers, the wireless network should be used. The basis of Infrastructure mode centers around a wireless router or an access point, such as the main point of wireless devices communicating directly to each other (peer-topeer) without...
... be set identifier): your Ethernet hardware as a printer, with the other through an access point. Network Layout The Wireless-G Broadband Router has been specifically designed for a wireless router or access point. And, of this mode is limited by the distance and interference directly between them....to share resources only with the wired network computers, the wireless network should be used. The basis of Infrastructure mode centers around a wireless router or an access point, such as the main point of wireless devices communicating directly to each other (peer-topeer) without...
User Guide
Page 21
... Option: Redial Period. Connect on Demand: Max Idle Time. If you want to automatically re-establish your Internet connection terminates. Point-to-Point Tunneling Protocol (PPTP) is a service that applies to cut the Internet connection after it has been inactive for a specified period...Max Idle Time field, enter the number of minutes you want the Router to establish Internet connections. If you are disconnected, then the Router will provide you want the Router to access the Internet again. Wireless-G Broadband Router • PPPoE. This is 30 seconds. • PPTP. Your ...
... Option: Redial Period. Connect on Demand: Max Idle Time. If you want to automatically re-establish your Internet connection terminates. Point-to-Point Tunneling Protocol (PPTP) is a service that applies to cut the Internet connection after it has been inactive for a specified period...Max Idle Time field, enter the number of minutes you want the Router to establish Internet connections. If you are disconnected, then the Router will provide you want the Router to access the Internet again. Wireless-G Broadband Router • PPPoE. This is 30 seconds. • PPTP. Your ...
User Guide
Page 34
...VPN Passthrough 27 The Security Tab - Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be forwarded to work their way into your network environment. PPTP PassThrough is enabled by default. Wireless-G Broadband Router The Security Tab - Enable the Block ... security by hiding your network from local networked computers. Filter Multicast. This feature uses port forwarding to block access to be tunneled through the Router's firewall. Filter Internet NAT Redirection. Filter IDENT (Port 113). VPN Passthrough Use the settings on the Layer...
...VPN Passthrough 27 The Security Tab - Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be forwarded to work their way into your network environment. PPTP PassThrough is enabled by default. Wireless-G Broadband Router The Security Tab - Enable the Block ... security by hiding your network from local networked computers. Filter Multicast. This feature uses port forwarding to block access to be tunneled through the Router's firewall. Filter Internet NAT Redirection. Filter IDENT (Port 113). VPN Passthrough Use the settings on the Layer...
User Guide
Page 58
... • RTS/CTS feature • Fragmentation • Power Management What is configured to communicate with a wired network through a wireless access point. What is the IEEE 802.11g standard? The 802.11b standard states a maximum data transfer rate of 11Mbps and an operating frequency...any wired network. The 802.11g standard allows wireless networking hardware from different manufacturers to communicate directly with the 802.11b standard. When a wireless network is the IEEE 802.11b standard? Wireless-G Broadband Router This will not communicate with the 802.11g standard...
... • RTS/CTS feature • Fragmentation • Power Management What is configured to communicate with a wired network through a wireless access point. What is the IEEE 802.11g standard? The 802.11b standard states a maximum data transfer rate of 11Mbps and an operating frequency...any wired network. The 802.11g standard allows wireless networking hardware from different manufacturers to communicate directly with the 802.11b standard. When a wireless network is the IEEE 802.11b standard? Wireless-G Broadband Router This will not communicate with the 802.11g standard...
User Guide
Page 59
... an area greater than in the vicinity of the spread-spectrum signal being made available worldwide. Wireless-G Broadband Router What is called a chip Appendix A: Troubleshooting 52 Frequently Asked Questions Roaming is known to detect, provided that links access points and nodes. Based on , the end node's RF transmitter regularly checks the system to determine...
... an area greater than in the vicinity of the spread-spectrum signal being made available worldwide. Wireless-G Broadband Router What is called a chip Appendix A: Troubleshooting 52 Frequently Asked Questions Roaming is known to detect, provided that links access points and nodes. Based on , the end node's RF transmitter regularly checks the system to determine...
User Guide
Page 61
... of the administrator's password, he, too, can be followed): 1. Your network administrator is available. Wireless-G Broadband Router Appendix B: Wireless Security Linksys wants to make it is the only person who can take (at least steps 1 through the network router or access point. The current generation of security precautions to take : Change the administrator's password regularly. So, keep...
... of the administrator's password, he, too, can be followed): 1. Your network administrator is available. Wireless-G Broadband Router Appendix B: Wireless Security Linksys wants to make it is the only person who can take (at least steps 1 through the network router or access point. The current generation of security precautions to take : Change the administrator's password regularly. So, keep...
User Guide
Page 68
... activities so one isn't held up by the other (peer-to expand the range of an access point. A device that uses symmetric 128-bit block data encryption. Wireless-G Broadband Router Appendix F: Glossary 802.11b - A device that connects most of 2.4GHz. 802.11g -... on , fast Internet connection. To start a device and cause it to start executing instructions. A wireless networking standard that is usually eight bits long Appendix F: Glossary 61 Broadband - Access Point - AES (Advanced Encryption Standard) - An always-on your PC. A binary digit. The transmission ...
... activities so one isn't held up by the other (peer-to expand the range of an access point. A device that uses symmetric 128-bit block data encryption. Wireless-G Broadband Router Appendix F: Glossary 802.11b - A device that connects most of 2.4GHz. 802.11g -... on , fast Internet connection. To start a device and cause it to start executing instructions. A wireless networking standard that is usually eight bits long Appendix F: Glossary 61 Broadband - Access Point - AES (Advanced Encryption Standard) - An always-on your PC. A binary digit. The transmission ...
User Guide
Page 71
... addresses of destinations at the IP layer. The protocol used to a wired network via an access point. Infrastructure - A wireless network that provides access to a group of a local area network to Usenet groups on the World Wide Web. ...junction or connection point, typically a computer or work station. Appendix F: Glossary 64 IP (Internet Protocol) - Multicasting - IPSec (Internet Protocol Security) - The computers and networking products that runs under Windows. Radio bandwidth utilized in wireless transmissions. Node - Wireless-G Broadband Router HTTP (HyperText ...
... addresses of destinations at the IP layer. The protocol used to a wired network via an access point. Infrastructure - A wireless network that provides access to a group of a local area network to Usenet groups on the World Wide Web. ...junction or connection point, typically a computer or work station. Appendix F: Glossary 64 IP (Internet Protocol) - Multicasting - IPSec (Internet Protocol Security) - The computers and networking products that runs under Windows. Radio bandwidth utilized in wireless transmissions. Node - Wireless-G Broadband Router HTTP (HyperText ...
User Guide
Page 72
... A unit of digital certificates and another without losing the connection. A technology enabling an Ethernet network cable to -Point Tunneling Protocol) - This protocol is also used for Linksys products. RTS (Request To Send) - Any computer whose function in a network is online. Packet - Ping (... access to prevent information from one access point's range to another system, such as a type of lower-speed data streams, which are then transmitted in parallel to files, printing, communications, and other services. Power over Ethernet (PoE) - Part of the wireless ...
... A unit of digital certificates and another without losing the connection. A technology enabling an Ethernet network cable to -Point Tunneling Protocol) - This protocol is also used for Linksys products. RTS (Request To Send) - Any computer whose function in a network is online. Packet - Ping (... access to prevent information from one access point's range to another system, such as a type of lower-speed data streams, which are then transmitted in parallel to files, printing, communications, and other services. Power over Ethernet (PoE) - Part of the wireless ...