ملخص المحتوى في الصفحة رقم 1
USER GUIDE
BUSINESS SERIES
v
Wireless-G VPN Router
with RangeBooster
Model: WRV200
ملخص المحتوى في الصفحة رقم 2
About This Guide Open Source About This Guide This product may contain material licensed to you under the GNU General Public License or other open-source Icon Descriptions software licenses. Upon request, open-source software While reading through the User Guide you may see source code is available at cost from Linksys for at least various icons that call attention to specific items. Below is three years from the product purchase date. a description of these icons: WEB: For detailed license
ملخص المحتوى في الصفحة رقم 3
Table of Contents Chapter 1: Introduction 1 Chapter 2: Planning Your Wireless Network 2 Network Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Ad-Hoc versus Infrastructure Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Network Layout. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Chapter 3: Planning Your Virtual Private Network (VPN) 3 Why do I need a VPN? . . . . .
ملخص المحتوى في الصفحة رقم 4
Table of Contents VPN > VPN Passthrough . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 VPN > IPSec VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22 VPN > VPN Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24 QoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25 QoS > Application-Based QoS. . . . . . . . . . . . . . . . . . .
ملخص المحتوى في الصفحة رقم 5
Table of Contents Step 4: Assign New IPSec Policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48 Step 5: Create a Tunnel Through the Web-Based Utility . . . . . . . . . . . . . . . . . . .48 Appendix E: Gateway-to-Gateway VPN Tunnel 49 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49 Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49 Configuration when
ملخص المحتوى في الصفحة رقم 6
Introduction Chapter Chapter : Introduction Thank you for choosing the Wireless-G VPN Router with RangeBooster. The WRV200 is a VPN router with a Wireless-G access point for small offices and home offices. The 10/100 Ethernet WAN interface connects directly to your broadband DSL or Cable modem. For the LAN interface, there is a built-in 4-port, full-duplex 10/100 Ethernet switch that can connect up to four devices. The wireless AP supports 802.11b/g and incorporates Linksys Range
ملخص المحتوى في الصفحة رقم 7
Networking and Security Basics Chapter Network Layout Chapter : The Wireless-G VPN Router has been specifically designed Planning Your Wireless for use with both your 802.11b and 802.11g products. Now, products using these standards can communicate Network with each other. The Wireless-G VPN Router is compatible with all 802.11g Network Topology and 802.11n adapters, such as the Notebook Adapters (WPC4400N, WPC200) for your laptop computers, PCI A wireless local area network (WLAN) i
ملخص المحتوى في الصفحة رقم 8
Planning Your Virtual Private Network (VPN) Chapter 3) Man in the middle attacks Chapter : Once the hacker has either sniffed or spoofed enough Planning Your Virtual information, he can now perform a “man in the middle” attack. This attack is performed, when data is being Private Network (VPN) transmitted from one network to another, by rerouting the data to a new destination. Even though the data is not received by its intended recipient, it appears that way to Why do I need a VPN?
ملخص المحتوى في الصفحة رقم 9
Planning Your Virtual Private Network (VPN) Chapter The VPN Router creates a “tunnel” or channel between two Office endpoints, so that data transmissions between them are secure. A computer with the Linksys VPN client software can be one of the two endpoints (refer to “Appendix B: Using Linksys QuickVPN for Windows 2000, XP, or Vista”).
ملخص المحتوى في الصفحة رقم 10
Product Overview Chapter Back Panel Chapter : The Router’s ports and Reset button are located on the Product Overview back panel of the Router. Front Panel The Router’s LEDs are located on the front panel of the Router. Back Panel POWER The Power port is where you will connect the AC power cable. RESET The Reset button has two functions. Front Panel • If pressed for one second, the Reset button causes a warm reboot—the Router POWER (Green) The Power LED lights up when restarts witho
ملخص المحتوى في الصفحة رقم 11
Configuring the Wireless-G Router Chapter • Advanced Wireless Settings. For advanced users, you Chapter : can alter data transmission settings on this screen. • WDS. This tab is used for Wireless Distribution System Configuring the Wireless-G (WDS). VPN Router Firewall • General. On this screen, you can configure a variety of Overview filters to enhance the security of your network. Linksys recommends using the Setup CD-ROM for first- • Port Forwarding. To set up public services or othe
ملخص المحتوى في الصفحة رقم 12
Configuring the Wireless-G Router Chapter • Diagnostics. Use this screen to check the connection A password request page will appear. (Windows XP users between the Router and a PC. will see a similar screen.) The first time you open the web-based utility, enter admin (default user name) in • Factory Default. If you want to restore the Router’s the User Name field, and enter admin (default password) factory defaults, then use this screen. in the Password field. Then click OK. You can cha
ملخص المحتوى في الصفحة رقم 13
Configuring the Wireless-G Router Chapter available features will differ depending on what kind of connection type you select. The connection types are: • Automatic Configuration - DHCP • Static IP PPPoE • PPPoE User Name and Password/Confirm Password Enter • PPTP the User Name and Password provided by your ISP. Then, enter the password again to confirm it. • L2TP Service Name This is required by some service providers. Automatic Configuration - DHCP If your service provider has given you
ملخص المحتوى في الصفحة رقم 14
Configuring the Wireless-G Router Chapter User Name and Password Enter the User Name and seconds of inactivity that must elapse before your Internet Password provided by your ISP. connection is terminated automatically. Connect on Demand: Max Idle Time You can configure Keep Alive If you select this option, the Router will the Router to cut the Internet connection after it has been periodically check your Internet connection. If you are inactive for a specified period of time (Max Idle Time
ملخص المحتوى في الصفحة رقم 15
Configuring the Wireless-G Router Chapter assigns an IP address to each PC on your network. Unless Automatically Select your time zone from the Time Zone you already have one, it is highly recommended that you drop-down menu. If you want to enable the Auto Daylight leave the Router enabled as a DHCP server. Savings feature, click Enabled. Local DHCP Server DHCP is already enabled by factory When you have finished making changes to the screen, default. If you already have a DHCP server on
ملخص المحتوى في الصفحة رقم 16
Configuring the Wireless-G Router Chapter Status The status of the DDNS service connection is DDNS displayed here. If your DDNS service is provided by DynDNS.org, then When you have finished making changes to the screen, select DynDNS.org in the drop-down menu. If your DDNS click Save Settings to save the changes, or click Cancel service is provided by TZO, then select TZO.com. The Changes to undo your changes. features available on the DDNS screen will vary, depending on which DDNS ser
ملخص المحتوى في الصفحة رقم 17
Configuring the Wireless-G Router Chapter Delete This Entry If you need to delete a route, select its Setup > Advanced Routing number from the drop-down menu, and click Delete This Entry. Enter Router Name Enter the name of your Router. LAN IP Address The LAN IP Address is the address of the remote network or host to which you want to assign a static route. Enter the IP address of the host for which you wish to create a static route. If you are building a route to an entire network, be s
ملخص المحتوى في الصفحة رقم 18
Configuring the Wireless-G Router Chapter It specifically supports priority tagging and queuing. Click Wireless the WMM check box to enable WMM. The Wireless tab is used to configure the Router’s wireless Wireless Channel Select the appropriate channel from network settings. the drop-down menu. All devices in your wireless network must transmit using the same channel in order to function Wireless > Basic Wireless Settings correctly. You may need to change the wireless channel to improve
ملخص المحتوى في الصفحة رقم 19
Configuring the Wireless-G Router Chapter server’s IP address. Select TKIP or AES from the WPA Algorithms drop-down menu. Enter the RADIUS server’s port number, along with the Shared Secret key, which is the key shared between the Router and the server. Last, enter the Key Renewal period, which instructs the Router how often it should change the encryption keys. Wireless Security - WPA Personal When you have finished making changes to the screen, click Save Settings to save the changes,
ملخص المحتوى في الصفحة رقم 20
Configuring the Wireless-G Router Chapter Renewal period, which instructs the Router how often it This option features WPA2 used in coordination with a should change the encryption keys. RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) Enter the RADIUS When you have finished making changes to the screen, server’s IP address and port number, along with the shared click Save Settings to save the changes, or click Cancel secret (authentication key)