Manual De UsuarioTabla de contenidosChapter 1: Introduction6Chapter 2: Planning Your Wireless Network7Network Topology7Ad-Hoc versus Infrastructure Mode7Network Layout7Chapter 3: Planning Your Virtual Private Network (VPN)8Why do I need a VPN?81) MAC Address Spoofing82) Data Sniffing83) Man in the middle attacks8What is a VPN?8VPN Router to VPN Router9Computer (using the Linksys VPN client software) to VPN Router9Chapter 4: Product Overview10Front Panel10Back Panel10Chapter 5: Configuring the Wireless-G VPN Router11Overview11How to Access the Web-based Utility12Setup12Setup > Basic Settings12Setup > VLAN15Setup > DDNS15Setup > MAC Address Clone16Setup > Advanced Routing17Wireless18Wireless > Basic Wireless Settings18Wireless > Wireless Security18Wireless > Wireless Network Access21Wireless > Advanced Wireless Settings22Wireless > WDS22Firewall23Firewall > General23Firewall > Port Forwarding23Firewall > Port Triggering24Firewall > DMZ24Firewall > Access Restriction25Firewall > URL Filtering25VPN25VPN > VPN Client Access25VPN > VPN Passthrough26VPN > IPSec VPN27VPN > VPN Summary29QoS30QoS > Application-Based QoS30QoS > Port-Based QoS30Administration31Administration > Management31Administration > Log32Administration > Diagnostics33Administration > Factory Default33Administration > Firmware Upgrade33Administration > Reboot34Status34Status > Router34Status > Local Network35Status > Wireless35Status > System Performance35Status > VPN Clients36Appendix A: Troubleshooting37Frequently Asked Questions42Appendix B: Wireless Security Checklist44General Network Security Guidelines44Additional Security Tips44Appendix C: Using Linksys QuickVPN for Windows 2000, XP, or Vista45Overview45Before You Begin45Installing the Linksys QuickVPN Software45Installing from the CD-ROM45Downloading and Installing from the Internet45Using the Linksys QuickVPN Software46Version Number of the QuickVPN Client46Distributing Certificates to QuickVPN Users47Appendix D: Configuring IPSec with a Windows 2000 or XP Computer48Introduction48Environment48How to Establish a Secure IPSec Tunnel48Step 1: Create an IPSec Policy48Step 2: Build Filter Lists48Step 3: Configure Individual Tunnel Rules50Step 4: Assign New IPSec Policy53Step 5: Create a Tunnel Through the Web-Based Utility53Appendix E: Gateway-to-Gateway VPN Tunnel54Overview54Before You Begin54Configuration when the Remote Gateway Uses a Static IP Address54Configuration of the WRV20054Configuration of the RV08255Configuration of PC 1 and PC 255Configuration when the Remote Gateway Uses a Dynamic IP Address56Configuration of the WRV20056Configuration of the RV08256Configuration of PC 1 and PC 257Configuration when Both Gateways Use Dynamic IP Addresses57Configuration of the WRV20057Configuration of the RV08258Configuration of PC 1 and PC 258Appendix F: Glossary59Appendix G: Specifications62Appendix H: Warranty Information64Exclusions and Limitations64Obtaining Warranty Service64Technical Support65Appendix I: Regulatory Information66FCC Statement66FCC Radiation Exposure Statement66Safety Notices66Industry Canada Statement66Industry Canada Radiation Exposure Statement:66Avis d’Industrie Canada67Avis d’Industrie Canada concernant l’exposition aux radiofréquences :67Wireless Disclaimer67Avis de non-responsabilité concernant les appareils sans fil67User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE)68Appendix J: Contact Information72Tamaño: 5 MBPáginas: 72Language: EnglishManuales abiertas