User Guide
Page 3
... 31 The Applications and Gaming Tab - DMZ 32 The Applications and Gaming Tab - Wireless MAC Filter 24 The Wireless Tab - VPN Passthrough 27 The Access Restrictions Tab - Wireless-G Broadband Router Table of Contents Chapter 1: Introduction 1 Welcome 1 What's in this User Guide? 2 Chapter 2: Planning Your Wireless Network 4 Network Topology 4 Ad-Hoc versus Infrastructure Mode 4 Network Layout 4 Chapter 3: Getting...
... 31 The Applications and Gaming Tab - DMZ 32 The Applications and Gaming Tab - Wireless MAC Filter 24 The Wireless Tab - VPN Passthrough 27 The Access Restrictions Tab - Wireless-G Broadband Router Table of Contents Chapter 1: Introduction 1 Welcome 1 What's in this User Guide? 2 Chapter 2: Planning Your Wireless Network 4 Network Topology 4 Ad-Hoc versus Infrastructure Mode 4 Network Layout 4 Chapter 3: Getting...
User Guide
Page 6
... Gaming Tab - Wireless Security (WEP) 23 Figure 5-24: Wireless Tab - Wireless MAC Filter 24 Figure 5-25: MAC Address Filter List 24 Figure 5-26: Wireless Tab - Port Triggering 31 Figure 5-36: Applications and Gaming Tab - Firmware Upgrade 36 Figure 5-45: Administration Tab - Local Network 38 Figure 5-48: DHCP Clients Table 38 Figure 5-49: Status Tab - Wireless-G Broadband Router Figure 5-23: Wireless Tab -
... Gaming Tab - Wireless Security (WEP) 23 Figure 5-24: Wireless Tab - Wireless MAC Filter 24 Figure 5-25: MAC Address Filter List 24 Figure 5-26: Wireless Tab - Port Triggering 31 Figure 5-36: Applications and Gaming Tab - Firmware Upgrade 36 Figure 5-45: Administration Tab - Local Network 38 Figure 5-48: DHCP Clients Table 38 Figure 5-49: Status Tab - Wireless-G Broadband Router Figure 5-23: Wireless Tab -
User Guide
Page 9
... describes how to do so. • Appendix D: Windows Help This appendix describes how you can use the MAC filtering and/or MAC address cloning feature of the Router. • Appendix F: Glossary This appendix gives a brief glossary of wireless networking and some solutions to reduce the risks. • Appendix C: Upgrading Firmware This appendix instructs you on...
... describes how to do so. • Appendix D: Windows Help This appendix describes how you can use the MAC filtering and/or MAC address cloning feature of the Router. • Appendix F: Glossary This appendix gives a brief glossary of wireless networking and some solutions to reduce the risks. • Appendix C: Upgrading Firmware This appendix instructs you on...
User Guide
Page 31
Wireless-G Broadband Router The Wireless Tab - Wireless MAC Filter Wireless access can list users, by MAC Address. If you do not wish to cancel your network's radius. Clicking this button will allow wireless access by MAC Address, to whom you can be filtered by using the MAC addresses of network users by MAC Address. Wireless MAC Filter. Clicking this button will block wireless access by MAC Address. For easy...
Wireless-G Broadband Router The Wireless Tab - Wireless MAC Filter Wireless access can list users, by MAC Address. If you do not wish to cancel your network's radius. Clicking this button will allow wireless access by MAC Address, to whom you can be filtered by using the MAC addresses of network users by MAC Address. Wireless MAC Filter. Clicking this button will block wireless access by MAC Address. For easy...
User Guide
Page 57
...set to use DMZ Hosting. If DMZ Hosting is DMZ Hosting? The Router's advanced features include advanced wireless settings, filters, access restriction policies, port forwarding, advanced routing, and DDNS. The Router has DHCP server software built-in. Some applications require multiple TCP/IP... ports to get the LAN IP address, see "Appendix E: Finding the MAC Address and ...
...set to use DMZ Hosting. If DMZ Hosting is DMZ Hosting? The Router's advanced features include advanced wireless settings, filters, access restriction policies, port forwarding, advanced routing, and DDNS. The Router has DHCP server software built-in. Some applications require multiple TCP/IP... ports to get the LAN IP address, see "Appendix E: Finding the MAC Address and ...
User Guide
Page 61
... Router Appendix B: Wireless Security Linksys wants to make it is the only person who can be followed): 1. The current generation of the network's information, such as safe and easy for "beacon messages". Enable MAC Address Filtering. 5. So, make wireless networking as the network's SSID (Service Set Identifier). Change the SSID periodically. 6. Appendix B: Wireless Security Security Precautions NOTE...
... Router Appendix B: Wireless Security Linksys wants to make it is the only person who can be followed): 1. The current generation of the network's information, such as safe and easy for "beacon messages". Enable MAC Address Filtering. 5. So, make wireless networking as the network's SSID (Service Set Identifier). Change the SSID periodically. 6. Appendix B: Wireless Security Security Precautions NOTE...
User Guide
Page 62
...to something unique and not something related to break in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly. 55 Enable MAC Address filtering. Wi-Fi Protected Access (WPA) is often looked upon as... encryption method and incorporates Message Integrity Code (MIC) to log into your network. Wireless-G Broadband Router SSID. MAC Address filtering will give you a choice of dynamic TKIP, AES, or WEP. This is "linksys".) Hackers know these defaults and can only provide enough security to make a hacker's...
...to something unique and not something related to break in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly. 55 Enable MAC Address filtering. Wi-Fi Protected Access (WPA) is often looked upon as... encryption method and incorporates Message Integrity Code (MIC) to log into your network. Wireless-G Broadband Router SSID. MAC Address filtering will give you a choice of dynamic TKIP, AES, or WEP. This is "linksys".) Hackers know these defaults and can only provide enough security to make a hacker's...
User Guide
Page 66
... MAC address for MAC address cloning or MAC filtering. Figure E-1: MAC Address/Physical Address Windows Vista Instructions 1. At the command prompt, enter ipconfig /all . Windows 2000 or XP Instructions 1. Press the Enter key. 2. Write down the Physical Address as shown on your computer's Ethernet adapter so you will use for your computer screen (Figure E-1); Wireless-G Broadband Router...
... MAC address for MAC address cloning or MAC filtering. Figure E-1: MAC Address/Physical Address Windows Vista Instructions 1. At the command prompt, enter ipconfig /all . Windows 2000 or XP Instructions 1. Press the Enter key. 2. Write down the Physical Address as shown on your computer's Ethernet adapter so you will use for your computer screen (Figure E-1); Wireless-G Broadband Router...
User Guide
Page 67
Wireless-G Broadband Router The example in this format, XXXXXXXXXXXX, WITHOUT the hyphens. Your computer may show something different. Figure E-3: MAC Address Clone Appendix E: Finding the MAC Address and IP Address for Your Ethernet Adapter 60 For the Router's Web-based Utility See Figure E-2. See Figure E-3. For the Router's Web-based Utility For MAC filtering, enter the 12-digit MAC address...
Wireless-G Broadband Router The example in this format, XXXXXXXXXXXX, WITHOUT the hyphens. Your computer may show something different. Figure E-3: MAC Address Clone Appendix E: Finding the MAC Address and IP Address for Your Ethernet Adapter 60 For the Router's Web-based Utility See Figure E-2. See Figure E-3. For the Router's Web-based Utility For MAC filtering, enter the 12-digit MAC address...
User Guide
Page 75
Wireless-G Broadband Router Appendix G: Specifications Model WRT54G-TM Standards IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.11b Channels 11 Channels (US, Canada) Ports Internet: One 10/100 RJ-45 Port ..., WLAN, LAN (1-4), Internet RF Power Output 18 dBm UPnP able/cert Able Security Features Stateful Packet Inspection (SPI) Firewall, Internet Policy Wireless Security Wi-Fi Protected Access™ (WPA), WEP, Wireless MAC Filtering Wi-Fi Protected Access™2 (WPA2) Dimensions (W x H x D) 7.32" x 1.89" x 7.87" (186 mm x 48 mm x 200 mm) Unit Weight 17 oz. (0.482...
Wireless-G Broadband Router Appendix G: Specifications Model WRT54G-TM Standards IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.11b Channels 11 Channels (US, Canada) Ports Internet: One 10/100 RJ-45 Port ..., WLAN, LAN (1-4), Internet RF Power Output 18 dBm UPnP able/cert Able Security Features Stateful Packet Inspection (SPI) Firewall, Internet Policy Wireless Security Wi-Fi Protected Access™ (WPA), WEP, Wireless MAC Filtering Wi-Fi Protected Access™2 (WPA2) Dimensions (W x H x D) 7.32" x 1.89" x 7.87" (186 mm x 48 mm x 200 mm) Unit Weight 17 oz. (0.482...