Premium Essay

Configuring a Wrt54G for Secure Use

In: Computers and Technology

Submitted By hogline
Words 822
Pages 4
Configuring the Linksys WRT54G Wireless Router for Home Office Use

Table of Contents Purpose 3 Network Address Translation (NAT) 4 Description 4 Instructions 4 Packet Filtering 6 Description 6 Instructions 6 Default Gateway 8 Description 8 Instructions 8 References 9


The purpose of this document is to instruct you in setting up the Linksys WRT54G for use on a home network.
Using this document you should be able to configure (or walk a customer through configuring) the following on their home router: 1) Network Address Translation (NAT) 2) Packet Filtering 3) Default Gateway Functionality

Network Address Translation (NAT)


Network Address Translation (or NAT) is a function built in to the router/firewall device that allows multiple systems or devices to use one public IP address. The “translation” happens at the router where outbound traffic from internal (LAN) IP addresses is sent out as if it originated from the public (WAN) IP address that was assigned by the Internet Service Provider. This capability is enabled by default on your router. The following instructions will help you ensure everything is configured correctly for NAT to function.


Log In

1) Using a web browser, visit the router configuration web page for your device. The default for this particular router would be
2) Log in to the router configuration page using your user name and password. If these are not known, you may have to reset the router to factory defaults (The procedure is in the router manual and is not part of this document).

Configure Public (WAN) IP Address

1) From the main setup page, check the entry for Internet Connection Type to be sure it is set properly. It will most likely be one of the following: A) DHCP- Most likely, this would be “Automatic Configuration –

Similar Documents

Premium Essay

Mr. Chan

...ones I have come across and worked with Many of the routers that are available at Best Buy are Linksys, D-Link and Netgear that are available for home/office use by regular users from just accessing Internet to playing games and running small home based business. Many of the Linksys SOHO, or small office/home office, routers offer an inexpensive way to add a powerful router/firewall to a small home or office network. Router- A device that forwards data packets along networks. Firewall- Software-based or hardware-based and is used to help keep a network secure SOHO- Small office/Home office. Almost all of the Linksys WRT54G are dual antenna 4 port wireless residential/small business router. From my configuration experience with routers, they all have a 16-32 MB or RAM and 2-8 MB FLASH memory that can be used for editing the firmware or upgrading the ROM to enable more updated features. All Linksys, netgear and D-link routers inter-operate with both 802.11b and 802.11g network protocols, and they are capable of 128 bit WEP, WPA, WPA2 encryption, MAC address filtering, IP address filtering and Internet services control. It allows web browser based configuration, and supports data throughput of up to54Mbps. Almost all time depending on Internet service provider. Security is very important when configuring home based routers. You don’t want to leave your home network venerable to unauthorized users. At all cost you have to protect your resources, assets and your network...

Words: 1248 - Pages: 5

Premium Essay

Secured Infrastructure Development for Educational University Using Servers, Firewalls and Biometric Devices

...------------------------------------------------- Department of Electrical, Computer & Communications Engineering ------------------------------------------------- MSc Project Final Project Report ------------------------------------------------- Title: Secured infrastructure development for educational university using servers, firewalls and biometric devices ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Author: Azhar ur Rehman ------------------------------------------------- ------------------------------------------------- Academic Session: 2008-2009 ------------------------------------------------- Supervisor: Mr.Manoj Pongubhati Course Title: Msc computer systems and networking Mode of Study: Full Time ACKNOWLEDGEMENT First and foremost I would like to dedicate my thesis to my parents and want to thank Prof. Mr. Manoj pongubhati, my research dissertation supervisor, for giving me an opportunity to work on the dissertation of my interest and encouraging me throughout my work. His support and patience helped me overcome many difficult times during my dissertation research. I am also deeply grateful to Mr Ali Ahmed, a good friend and guardian who is working as an Assistant Manager with Dynamic Associates Info Pvt Ltd was actively involved with my research. The day I started working under the professional guidance of Dynamic...

Words: 7221 - Pages: 29

Free Essay

Ethical Hacking

...This page was intentionally left blank This page was intentionally left blank Hands-On Ethical Hacking and Network Defense Second Edition Michael T. Simpson, Kent Backman, and James E. Corley ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit to search by ISBN#, author, title, or keyword for materials in your areas of interest. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated...

Words: 185373 - Pages: 742