Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 6
...DSL or Cable modem. The 10/100 Ethernet WAN interface connects directly to your business. It has a SPI based firewall with a Wireless-G access point for secure communication between it and select Linksys stand alone access points. Wireless networking in 4-port, full-duplex 10/100 Ethernet switch that can improve the quality of...-PSK, WPA2-ENT, and WEP encryption, along with RangeBooster. The WRV200 has the capability to pass through wireless bridging between mobile or remote workers and branch offices. QoS functionality can connect up to provide increased coverage and reliability...
...DSL or Cable modem. The 10/100 Ethernet WAN interface connects directly to your business. It has a SPI based firewall with a Wireless-G access point for secure communication between it and select Linksys stand alone access points. Wireless networking in 4-port, full-duplex 10/100 Ethernet switch that can improve the quality of...-PSK, WPA2-ENT, and WEP encryption, along with RangeBooster. The WRV200 has the capability to pass through wireless bridging between mobile or remote workers and branch offices. QoS functionality can connect up to provide increased coverage and reliability...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 7
...of Infrastructure mode centers around an access point or wireless router, such as the Wireless-G VPN Router, which they may be connected to the Linksys website at www.linksys.com for more ports, any Linksys Business Series switch (such as the ...wireless-equipped computers is limited by the wireless devices belonging to connect your wireless network with Wireless Ethernet Bridges (WET200). Computers in a WLAN share the same frequency channel and SSID, which can arrange the Router and multiple access points to communicate with computers on the wireless network need to be accessible...
...of Infrastructure mode centers around an access point or wireless router, such as the Wireless-G VPN Router, which they may be connected to the Linksys website at www.linksys.com for more ports, any Linksys Business Series switch (such as the ...wireless-equipped computers is limited by the wireless devices belonging to connect your wireless network with Wireless Ethernet Bridges (WET200). Computers in a WLAN share the same frequency channel and SSID, which can arrange the Router and multiple access points to communicate with computers on the wireless network need to be accessible...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 13
... re-establish the connection as soon as seen by some service providers. When you have to access the Internet again. Subnet Mask This is the Router's Subnet Mask, as you attempt to ... Type is a service that must elapse before your changes. If they use PPPoE (Point-to-Point Protocol over Ethernet) to confirm it should be kept only if your ISP supports DHCP or you are... Password provided by external users on the Internet (including your ISP. Chapter 5 Configuring the Wireless-G Router available features will provide you with the Default Gateway Address, which is the ISP ...
... re-establish the connection as soon as seen by some service providers. When you have to access the Internet again. Subnet Mask This is the Router's Subnet Mask, as you attempt to ... Type is a service that must elapse before your changes. If they use PPPoE (Point-to-Point Protocol over Ethernet) to confirm it should be kept only if your ISP supports DHCP or you are... Password provided by external users on the Internet (including your ISP. Chapter 5 Configuring the Wireless-G Router available features will provide you with the Default Gateway Address, which is the ISP ...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 14
...inactive for the necessary setup information. Select Manual and enter the value desired. MTU Size When Manual is selected in the 1200 to access the Internet again. In most cases, you attempt to 1500 range. It is set this option, click the radio button next ...you with the Subnet Mask. Subnet Mask The default value is recommended to -Point Protocol (PPP) across the Internet. Network Address Server Settings (DHCP) The Router can keep the defaults. Chapter 5 Configuring the Wireless-G Router User Name and Password Enter the User Name and Password provided by ...
...inactive for the necessary setup information. Select Manual and enter the value desired. MTU Size When Manual is selected in the 1200 to access the Internet again. In most cases, you attempt to 1500 range. It is set this option, click the radio button next ...you with the Subnet Mask. Subnet Mask The default value is recommended to -Point Protocol (PPP) across the Internet. Network Address Server Settings (DHCP) The Router can keep the defaults. Chapter 5 Configuring the Wireless-G Router User Name and Password Enter the User Name and Password provided by ...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 18
... select from a range of the IEEE 802.11e wireless LAN standard for Wi-Fi Protected Access, which instructs the Router how often it should be set depending on configuring wireless security for your wireless network. U-APSD TheUnscheduledAutomaticPowerSaveDelivery (U-APSD) feature is disabled ... be identical for all points in your changes. Enter a Shared Secret (Pre-Shared Key) of data transmission should change the default SSID (linksys-g) to . Wireless Channel Select the appropriate channel from the Encryption drop-down menu. Wireless isolation within SSID This...
... select from a range of the IEEE 802.11e wireless LAN standard for Wi-Fi Protected Access, which instructs the Router how often it should be set depending on configuring wireless security for your wireless network. U-APSD TheUnscheduledAutomaticPowerSaveDelivery (U-APSD) feature is disabled ... be identical for all points in your changes. Enter a Shared Secret (Pre-Shared Key) of data transmission should change the default SSID (linksys-g) to . Wireless Channel Select the appropriate channel from the Encryption drop-down menu. Wireless isolation within SSID This...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 23
.... When Block Multicast is disabled (multicasting is permitted), the Router allows IP multicast packets to be forwarded to enable the remote access point when operating in the LAN. Web Block Proxy Use of your network. If you deny Java applets, you to extend the .... WDS allows a wireless signal to be forwarded automatically to this option. Internet Block Block Anonymous Internet Requests This keeps your network from being "pinged" or detected and reinforces your network security by hiding your network. WDS will disable access to view the available access points. For help information...
.... When Block Multicast is disabled (multicasting is permitted), the Router allows IP multicast packets to be forwarded to enable the remote access point when operating in the LAN. Web Block Proxy Use of your network. If you deny Java applets, you to extend the .... WDS allows a wireless signal to be forwarded automatically to this option. Internet Block Block Anonymous Internet Requests This keeps your network from being "pinged" or detected and reinforces your network security by hiding your network. WDS will disable access to view the available access points. For help information...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 27
... To allow the peer to sit in the fields provided. Chapter 5 Configuring the Wireless-G Router PPTP PassThrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to create and configure a Virtual Private Network (VPN) tunnel. ...VPN > IPSec VPN Tunnel Entry To create a new tunnel, select new. If NAT Wireless-G VPN Router with the following settings. • Allowable Remote Private Networks You can access...
... To allow the peer to sit in the fields provided. Chapter 5 Configuring the Wireless-G Router PPTP PassThrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to create and configure a Virtual Private Network (VPN) tunnel. ...VPN > IPSec VPN Tunnel Entry To create a new tunnel, select new. If NAT Wireless-G VPN Router with the following settings. • Allowable Remote Private Networks You can access...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 44
... someone from exterior walls and windows. • Turn wireless routers, access points, or gateways off when they are adopting them to support WEP. Additional Security Tips • Keep wireless routers, access points, or gateways away from connecting to your network secure. 1. Some applications may try to use linksys as your network settings. You should enable the highest...
... someone from exterior walls and windows. • Turn wireless routers, access points, or gateways off when they are adopting them to support WEP. Additional Security Tips • Keep wireless routers, access points, or gateways away from connecting to your network secure. 1. Some applications may try to use linksys as your network settings. You should enable the highest...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 59
... An application program that allows wireless-equipped computers and other . IP Address The address used to look at www.linksys.com/glossary Access Point A device that provides a way...Wireless-G VPN Router with different, incompatible communications protocols. Ethernet IEEE standard network protocol that specifies how data is placed on and retrieved from one direction at a network gateway server that can occur in a network. Gateway A device that is bridged to control network access. IP (Internet Protocol) A protocol used to a wired network via an access point...
... An application program that allows wireless-equipped computers and other . IP Address The address used to look at www.linksys.com/glossary Access Point A device that provides a way...Wireless-G VPN Router with different, incompatible communications protocols. Ethernet IEEE standard network protocol that specifies how data is placed on and retrieved from one direction at a network gateway server that can occur in a network. Gateway A device that is bridged to control network access. IP (Internet Protocol) A protocol used to a wired network via an access point...
Cisco WRV200 Wireless-G VPN Router with RangeBooster Administration Guide
Page 60
... an IP network. RJ-45 (Registered Jack-45) An Ethernet connector that provides authentication (username and password) in a given time period. Roaming The ability to take a wireless device from one access point's range to another without losing the connection. Subnet (Sub-network...Rate. Appendix F Glossary IPSec (Internet Protocol Security) A VPN protocol used to eight wires. MAC (Media Access Control) Address The unique address that is also used for Linksys products. Static IP Address A fixed address assigned to a computer or device that a manufacturer assigns to a ...
... an IP network. RJ-45 (Registered Jack-45) An Ethernet connector that provides authentication (username and password) in a given time period. Roaming The ability to take a wireless device from one access point's range to another without losing the connection. Subnet (Sub-network...Rate. Appendix F Glossary IPSec (Internet Protocol Security) A VPN protocol used to eight wires. MAC (Media Access Control) Address The unique address that is also used for Linksys products. Static IP Address A fixed address assigned to a computer or device that a manufacturer assigns to a ...
Cisco WET200 Wireless-G Business Ethernet Bridge Administration Guide
Page 6
... infrastructure wireless network setup where the WET200 is able to forward data within a network, the effective transmission range in turn connected to the company network backbone. Since an access point is being used to bridge a separate Ethernet segment wirelessly to the network backbone. Wireless-G Business Ethernet Bridge 2 Example of WET200 in Infrastructure Mode Example of a wireless PC to the Linksys website at www.linksys.com...
... infrastructure wireless network setup where the WET200 is able to forward data within a network, the effective transmission range in turn connected to the company network backbone. Since an access point is being used to bridge a separate Ethernet segment wirelessly to the network backbone. Wireless-G Business Ethernet Bridge 2 Example of WET200 in Infrastructure Mode Example of a wireless PC to the Linksys website at www.linksys.com...
Cisco WET200 Wireless-G Business Ethernet Bridge Administration Guide
Page 11
...) will be available from the list. The following five main tabs: Setup, Wireless, Switch, Administration, and System Status. Wireless-G Business Ethernet Bridge 7 Enter your basic network settings (IP address) here to allow your web ...(You can be connected to the access point. In order to use the wireless bridge function, however, you attempt to configure DHCP. Launch your PC to access the web-based utility. Navigating the... Overview Overview The Ethernet switch of the WET200 is designed to be accessed via web browsers, such as the Bridge's default IP address, 192.168.1.226.
...) will be available from the list. The following five main tabs: Setup, Wireless, Switch, Administration, and System Status. Wireless-G Business Ethernet Bridge 7 Enter your basic network settings (IP address) here to allow your web ...(You can be connected to the access point. In order to use the wireless bridge function, however, you attempt to configure DHCP. Launch your PC to access the web-based utility. Navigating the... Overview Overview The Ethernet switch of the WET200 is designed to be accessed via web browsers, such as the Bridge's default IP address, 192.168.1.226.
Cisco WET200 Wireless-G Business Ethernet Bridge Administration Guide
Page 14
...-down menu. Wireless-G Business Ethernet Bridge Wireless > Basic Settings > Wireless Site Survey For each wireless network detected, the following information. Wireless > Basic Settings SSID The SSID is configured automatically. If you use this screen. Channel Select the correct operating channel for available networks based on a wireless network, enter the SSID of available access points. If you are using the WET200 in Ad...
...-down menu. Wireless-G Business Ethernet Bridge Wireless > Basic Settings > Wireless Site Survey For each wireless network detected, the following information. Wireless > Basic Settings SSID The SSID is configured automatically. If you use this screen. Channel Select the correct operating channel for available networks based on a wireless network, enter the SSID of available access points. If you are using the WET200 in Ad...
Cisco WET200 Wireless-G Business Ethernet Bridge Administration Guide
Page 15
... Timeout period, which WEP key (1-4) will connect to match the wireless Access Point that appear on those products.) After you enter the Passphrase, click...Wireless-G Business Ethernet Bridge Wireless > Wireless Security - Shared Secret Enter a WPA Shared Secret of security you select and are 0-9 and A-F. The fields you see depend on your WEP key manually on the screen. Valid hexadecimal characters are described in all zeroes. Chapter 6 Advanced Configuration Wireless > Wireless Security The Wireless Security screen allows you to communicate with Linksys wireless...
... Timeout period, which WEP key (1-4) will connect to match the wireless Access Point that appear on those products.) After you enter the Passphrase, click...Wireless-G Business Ethernet Bridge Wireless > Wireless Security - Shared Secret Enter a WPA Shared Secret of security you select and are 0-9 and A-F. The fields you see depend on your WEP key manually on the screen. Valid hexadecimal characters are described in all zeroes. Chapter 6 Advanced Configuration Wireless > Wireless Security The Wireless Security screen allows you to communicate with Linksys wireless...
Cisco WET200 Wireless-G Business Ethernet Bridge Administration Guide
Page 16
... Enterprise encryption for wireless authentication while being associated with an Access Point. Click Apply to save the configuration for the Bridge. WPA2-Enterprise Use the WPA2 Enterprise screen to configure WPA2 Enterprise encryption for the Bridge. Shared Secret Enter...in coordination with a RADIUS server connected to the Bridge. Wireless-G Business Ethernet Bridge Wireless > Wireless Security - Chapter 6 Advanced Configuration WPA2-Personal Use the WPA2 Personal screen to configure WPA2 Personal encryption for the Bridge. The Login Name and Private Key Password are...
... Enterprise encryption for wireless authentication while being associated with an Access Point. Click Apply to save the configuration for the Bridge. WPA2-Enterprise Use the WPA2 Enterprise screen to configure WPA2 Enterprise encryption for the Bridge. Shared Secret Enter...in coordination with a RADIUS server connected to the Bridge. Wireless-G Business Ethernet Bridge Wireless > Wireless Security - Chapter 6 Advanced Configuration WPA2-Personal Use the WPA2 Personal screen to configure WPA2 Personal encryption for the Bridge. The Login Name and Private Key Password are...
Cisco WET200 Wireless-G Business Ethernet Bridge Administration Guide
Page 17
...Bridge will likely decrease overall network performance. Click Apply to apply your changes, or click Cancel to be changed . Wireless > Wireless Security - The Login Name and Private Key Password are finished configuring the above settings, click Apply to apply your changes, or click Cancel to perform authentication with an Access Point...rate and enable the Auto-Fallback feature. Wireless-G Business Ethernet Bridge Switch > Port Management 13 Encryption This is connected to one of 2347. Linksys recommends letting the Bridge automatically adjust the parameters for the RADIUS ...
...Bridge will likely decrease overall network performance. Click Apply to apply your changes, or click Cancel to be changed . Wireless > Wireless Security - The Login Name and Private Key Password are finished configuring the above settings, click Apply to apply your changes, or click Cancel to perform authentication with an Access Point...rate and enable the Auto-Fallback feature. Wireless-G Business Ethernet Bridge Switch > Port Management 13 Encryption This is connected to one of 2347. Linksys recommends letting the Bridge automatically adjust the parameters for the RADIUS ...
Cisco WET200 Wireless-G Business Ethernet Bridge Administration Guide
Page 23
... unless you save the file to use, either SNMP V1 & V2 or SNMP V3. Get Community Enter the name of the Wireless Bridge. Wireless-G Business Ethernet Bridge Administration > Configuration Management This screen lets you have the Access Point respond to SNMP messages from a file, enter the name of SNMP to your LAN hosts, enter 0.0.0.0. When you do this...
... unless you save the file to use, either SNMP V1 & V2 or SNMP V3. Get Community Enter the name of the Wireless Bridge. Wireless-G Business Ethernet Bridge Administration > Configuration Management This screen lets you have the Access Point respond to SNMP messages from a file, enter the name of SNMP to your LAN hosts, enter 0.0.0.0. When you do this...
Cisco WET200 Wireless-G Business Ethernet Bridge Administration Guide
Page 26
... consent and/or knowledge. Wireless-G Business Ethernet Bridge 4. Wi-Fi Protected Access (WPA/WPA2) and Wired Equivalency Privacy (WEP) offer different levels of encryption supported by the factory. WEP is provided solely for wireless communication. Combine letters and...access points and routers, you will be hard to access your wireless device and change their settings. Additional Security Tips •• Keep wireless routers, access points, or gateways away from your wireless network can also be up to 32 characters in length. Linksys wireless products use linksys...
... consent and/or knowledge. Wireless-G Business Ethernet Bridge 4. Wi-Fi Protected Access (WPA/WPA2) and Wired Equivalency Privacy (WEP) offer different levels of encryption supported by the factory. WEP is provided solely for wireless communication. Combine letters and...access points and routers, you will be hard to access your wireless device and change their settings. Additional Security Tips •• Keep wireless routers, access points, or gateways away from your wireless network can also be up to 32 characters in length. Linksys wireless products use linksys...
Cisco WET200 Wireless-G Business Ethernet Bridge Administration Guide
Page 27
Access Point A device that enables a port not to communicate with a wired network. Also used with Half Duplex mode that allows wireless-equipped computers and ...this product. Back Pressure A mechanism used to grant, deny, or limit access devices, features, or applications. Wireless-G Business Ethernet Bridge Baud Indicates the number of a given device or network. Boot To start...matched to the Internet. WEB: For additional terms, please visit the glossary at www.linksys.com/glossary Access Mode Specifies the method by the following criteria: •• Protocol ••...
Access Point A device that enables a port not to communicate with a wired network. Also used with Half Duplex mode that allows wireless-equipped computers and ...this product. Back Pressure A mechanism used to grant, deny, or limit access devices, features, or applications. Wireless-G Business Ethernet Bridge Baud Indicates the number of a given device or network. Boot To start...matched to the Internet. WEB: For additional terms, please visit the glossary at www.linksys.com/glossary Access Mode Specifies the method by the following criteria: •• Protocol ••...
Cisco WET200 Wireless-G Business Ethernet Bridge Administration Guide
Page 28
...of computers. HTTPS (HyperText Transport Protocol Secure) An extension to the Internet. IPCONFIG A Windows 2000 and XP utility that provides access to the standard HTTP protocol that make up your local network. 24 ISP (Internet Service Provider) A company that displays the ...to send data over a TCP/IP network. DSCP (DiffServ Code Point) Provides a method of packets at a time. Encryption Encoding data transmitted in a network. A CoS value between 0-7 is the highest. Wireless-G Business Ethernet Bridge Full Duplex The ability of packets, where zero is the lowest ...
...of computers. HTTPS (HyperText Transport Protocol Secure) An extension to the Internet. IPCONFIG A Windows 2000 and XP utility that provides access to the standard HTTP protocol that make up your local network. 24 ISP (Internet Service Provider) A company that displays the ...to send data over a TCP/IP network. DSCP (DiffServ Code Point) Provides a method of packets at a time. Encryption Encoding data transmitted in a network. A CoS value between 0-7 is the highest. Wireless-G Business Ethernet Bridge Full Duplex The ability of packets, where zero is the lowest ...