Tecnico
Wireless-G Access Point
Model: WAP54G
About This Guide
About This Guide
Icon Descriptions
While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using theproduct.
WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
WEB: This globe icon indicates a noteworthy website address or e-mail address.
Online Resources
Website addresses in this document are listed without http:// in front of the address because most current web browsers do not require it. If you usean older web browser, you may have to add http:// in front of the web address. Resource Linksys Linksys International Glossary Network Security Website www.linksys.com www.linksys.com/international www.linksys.com/glossary www.linksys.com/security
Copyright and Trademarks
Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates inthe U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
Wireless-G Access Point
i
Table of Contents
Chapter 1: Product Overview 4
Front Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Chapter 2: Wireless Security Checklist
5
General Network Security Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Additional Security Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Chapter 2: Using theLinksys Wireless Guard Service
6
Client Software Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Network Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Your Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Chapter 3: Configuring theWireless-G Access Point
12
How to Access the Web-Based Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12 How to Navigate within the Utility. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12 The Setup Tab > Network Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12 The Setup Tab > AP Mode . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . .13 The Wireless Tab > Basic Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14 The Wireless Tab > Wireless Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 The Wireless Tab > Wireless MAC Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18 The Wireless Tab > Advanced WirelessSettings. . . . . . . . . . . . . . . . . . . . . . . . . . .18 The Administration Tab > Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19 The Administration Tab > SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20 The Administration Tab > Log. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20 The Administration Tab >Factory Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 The Administration Tab > Firmware Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 The Status Tab > Local Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 The Status Tab > Wireless Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
Appendix...
Regístrate para leer el documento completo.