Home
        User Manual
         Contents
1.      The Applications  amp  Gaming Tab   Port Triggering  The Applications and Gaming Tab   DMZ  The Applications and Gaming Tab   QoS  Wired QoS  Wireless QoS  The Administration Tab   Management  The Administration Tab   Log  The Administration Tab   Diagnostics  The Administration Tab   Factory Defaults  The Administration Tab   Firmware Upgrade  The Administration Tab   Config Management  The Status Tab   Router  The Status Tab   Local Network  The Status Tab   Wireless  Appendix A  Troubleshooting  Common Problems and Solutions  Frequently Asked Questions  Appendix B  Wireless Security  Security Precautions  security Threats Facing Wireless Networks  Appendix C  Upgrading Firmware    Appendix D  Windows Help    19    Appendix E  Finding the MAC Address and IP Address for Your Ethernet Adapter80    Windows 98SE or Me Instructions  Windows 2000 or XP Instructions  For the Router   s Web based Utility  Appendix F  Glossary  Appendix G  Specifications  Appendix H  Warranty Information  Appendix    Regulatory Information  Appendix J  Contact Information    80  80  81  82  89  91  92  99    List of Figures    Figure 3 1  The Router   s Back Panel   Figure 3 2  The Router   s Front Panel   Figure 4 1  Connecting Your Internet Connection   Figure 4 2  Connecting Your Network Devices   Figure 4 3  Connecting the Power   Figure 4 4  Diagram for Connection to Another Router   Figure 4 5  Connecting Another Router   Figure 4 6  Connecting Your Network Devices   Figure 4 7  Connectin
2.    Defaults in the Router s Web based Utility        Figure 3 1  The Router   s Back Panel    Internet The Internet port is where you will connect your broadband Internet connection    1  2  3  4 These ports  1  2  3  4  connect the Router to your networked PCs and other Ethernet network  devices    Power The Power port is where you will connect the power adapter     The Front Panel    The Router   s SecureEasySetup button  the Cisco logo  and LEDs are located on the front panel      Cisco logo     Power    DMZ    WLAN    1  2 3  4    Internet    Wireless G  Broadband Rouler    With d FPori eich       Figure 3 2  The Router   s Front Panel    Orange White  The Cisco logo is the Router   s SecureEasySetup button  It lights up and will stay NOTE  SecureEasySetup is a feature that makes it  orange when the Router is powered on  The color orange indicates that the Router is not using A easy to set up your wireless network  If you have  the SecureEasySetup feature  while the color white indicates that the Router is using the SecureEasySetup devices  run the Router   s Setup  SecureEasySetup feature  When the Router enters SecureEasySetup mode  the Cisco logo will Wizard CD ROM and follow the on screen   turn white and start flashing  After the Router has generated the SSID and WPA PSK  also instructions to use SecureEasySetup    called WPA Personal  key  the Cisco logo will stop flashing and stay white     To clear the SSID and WPA PSK key  press and hold down the Cisco logo for f
3.    END USER LICENSE AGREEMENT  FOR Linksys Wireless G Broadband     MPRATANT READ CAREFULLY Tha Linisya End Uner Licer  between you  ether an individual of A sighs entity  and Links Corporation for the  Linksys seg prod  denied ang eich hiu compe  Schtezeg bad may clade abaid media  pred materials  addhorul compeier sofware appl  OTEA  UF TARE PROUT   Dr every  inched  conpra  oF Gecr  ek    ben earn    he SOF WARE PROUT  you gre te Bound fy fhe banes cl ea EULA    My    H you accept the terms of this Agreement  click Mext to continue  if nol  choose Cancel and the Setup Wizard  will close  You must click Met to continue the installation process        Broadband Router Setup Wizard vc WRTS4G       Figure 5 3  Setup Wizard   s License Agreement Screen    5  The Setup Wizard will ask you to disconnect your broadband modem from your PC  After you have done so   click the Next button  LINKSYS     A free of Caco Sieg lic    Disconnect the Modem from the PC    Broadband Router Setup Wizard vun WRTS46       Figure 5 4  Setup Wizard   s Disconnect the Modem from  the PC Screen    Chapter 5  Setting up the Wireless G Broadband Router 13  Using the Setup Wizard    Wireless G Broadband Router    6  The Setup Wizard will ask you to connect your broadband modem to the Router  After you have done so  click  the Next button  Leave     A reen of Caco Sieg iic    Connect the Modem to the Router    Broadband Router Setup Wizard ween WRTS46       Figure 5 5  Setup Wizard   s Connect the Modem t
4.    www linksys com or  ftp linksys com   Can t find information about a product you want to buy   on the web  Do you want to know more about networking    with Linksys products  Give our advice line a call at  800 546 5797  LINKSYS   Or fax your request in to  949 823 3002   If you experience problems with any Linksys product    you can call us at  800 326 7114   Don t wish to call  You can e mail us at  support linksys com    lf any Linksys product proves defective during its warranty period    you can Call the Linksys Return Merchandise Authorization   department for obtaining a Return Authorization Number at  949 823 3000   Details on Warranty and RMA issues can be found in the Warranty   Information section in this Guide      99    
5.   9    and    A    to    F        Click the Next button to continue or the Back button to return to the previous screen     The Setup Wizard will ask you to review your settings before it saves them  Click the Yes button if you are  satisfied with your settings  or click the No button if you do not want to save your new settings       al  LU D UIS VWIICICSo gt   U DI OadDal a   aA    LInKSYS      A Diin of Cisco Systems  inc     Configure Wireless Security Settings  Optional     Ton may choote between three encryption methods  4 6  Whred Equivalent Privacy   WEP   128 Bit WEP of Wi Fi Protected Access    Personal  WPA PSK   The security  settings must be the same on all devices on your network  or they will mol be able to  communicaic  WPRA PSEK is the strongest of the three monition methods     Please choose WPA PSK  WEP  64 Bit   WEP  128 Bit  or    SS  te tne passphrase that wi be used to generate the WEP key   The passphrase is cane senuilive and should not be banger than  16 characters       In   you choose the Passphrase option for WEF a WEP key will  generate automatically  To manually enter a WEP key  select a  WEP algorithm and leave the Passphrase option blank              Broadband Router Setup Wizard vores WRT54G    Figure 5 30  Setup Wizard   s Wireless Security    WEP  64 Bit  Screen    vows WRT54G    Hroadband Router sep Wizard    Figure 5 32  Setup Wizard   s Confirm New Settings Screen    21    Wireless G Broadband Router    5  After the settings have been sa
6.   Advanced Routing  Router    Figure 6 18  Wireless Tab   Basic Wireless Settings    Figure 6 19  Wireless Tab   Wireless Security   Figure 6 20  Wireless Tab   Wireless Security  WPA Enterprise   Figure 6 21  Wireless Tab   Wireless Security  WPA2 Personal   Figure 6 22  Wireless Tab   Wireless Security  WPA2 Enterprise   Figure 6 23  Wireless Tab   Wireless Security  RADIUS    Figure 6 24  Wireless Tab   Wireless Security  WEP    Figure 6 25  Wireless Tab   Wireless MAC Filter   Figure 6 26  MAC Address Filter List   Figure 6 27  Wireless Tab   Advanced Wireless Settings  Figure 6 28  Security Tab   Firewall   Figure 6 29  Security Tab   VPN Passthrough   Figure 6 30  Access Restrictions Tab   Internet Access   Figure 6 31  Internet Policy Summary   Figure 6 32  List of PCs   Figure 6 33  Port Services   Figure 6 34  Applications and Gaming Tab   Port Range Forward  Figure 6 35  Applications and Gaming Tab   Port Triggering  Figure 6 36  Applications and Gaming Tab   DMZ   Figure 6 37  Applications and Gaming Tab   QoS   Figure 6 38  Administration Tab   Management   Figure 6 39  Administration Tab   Log   Figure 6 40  Administration Tab   Diagnostics   Figure 6 41  The Ping Test   Figure 6 42  The Traceroute Test   Figure 6 43  Administration Tab   Factory Defaults   Figure 6 44  Administration Tab   Firmware Upgrade   Figure 6 45  Administration Tab   Config Management   Figure 6 46  Status Tab   Router   Figure 6 47  Status Tab   Local Network   Figure 6 48  DHCP Clients
7.   Wireless Tab   Wireless Security  WEP     a    e gl La oa gea ell Daiite  dband Router 44       The Wireless Tab   Wireless MAC Filter    Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your  network   s radius     Wireless MAC Filter  To filter wireless users by MAC Address  either permitting or blocking access  click Enable   If you do not wish to filter users by MAC Address  select Disable     Prevent  Clicking this button will block wireless access by MAC Address   Permit Only  Clicking this button will allow wireless access by MAC Address     Edit MAC Address Filter List  Clicking this button will open the MAC Address Filter List  On this screen  you can  list users  by MAC Address  to whom you wish to provide or block access  For easy reference  click the Wireless  Client MAC List button to display a list of network users by MAC Address     Change these settings as described here and click the Save Settings button to apply your changes or Cancel  Changes to cancel your changes     A ivatan al Dees Speier  be    Wireless    Wireless MAC Filler    Freet DE Prevent PCs beled from accessing the wareiess    Paral oniy   O Permit oniy PCs teled bo emcees thee vrelens reegt    Figure 6 25  Wireless Tab   Wireless MAC Filter    T MAC Address Filter List   Microsofti Internet Explorer    MAC Address Filter List  Enter MAC Address in this ema  xsocee xen    MAC 11   MAC 12   MA 13   MA H   MAC 15   MAC ti   MACH   MAC 18   
8.   encryption  encoding data transmitted in a network     26    4     WEP  64 Bit   Enter a passphrase or WEP key     Passphrase   Enter a passphrase in the Passphrase field  so a WEP key is automatically generated  The  passphrase is case sensitive and should not be longer than 16 alphanumeric characters  It must match the  passphrase of your other wireless network devices and is compatible with Linksys wireless products only   If  you have any non Linksys wireless products  enter the WEP key manually on those products      WEP Key   The WEP key you enter must match the WEP key of your wireless network  For 64 bit encryption   enter exactly 10 hexadecimal characters  Valid hexadecimal characters are    0    to    9    and    A    to    F        Click the Next button to continue or the Back button to return to the previous screen    WEP  128 Bit    Enter a passphrase or WEP key    Passphrase   Enter a passphrase in the Passphrase field  so a WEP key is automatically generated  The  passphrase is case sensitive and should not be longer than 16 alphanumeric characters  It must match the  passphrase of your other wireless network devices and is compatible with Linksys wireless products only   If    you have any non Linksys wireless products  enter the WEP key manually on those products      WEP Key   The WEP key you enter must match the WEP key of your wireless network  For 128 bit encryption   enter exactly 26 hexadecimal characters  Valid hexadecimal characters are    0    to  
9.   entsorgen  Ordnungsgem    es Entsorgen und Recyceln tr  gt dazu bei   potentielle negative Folgen f  r Umwelt und die menschliche Gesundheit zu  vermeiden  Wenn Sie weitere Informationen zur Entsorgung Ihrer Altger  te  ben  tigen  wenden Sie sich bitte an die   rtlichen Beh  rden oder st  dtischen  Entsorgungsdienste oder an den H  ndler  bei dem Sie das Produkt erworben  haben     Eesti Estonian  Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele    Euroopa Liidu direktiivi 2002 96 EU n  uete kohaselt on seadmeid  millel on tootel  v  i pakendil k  esolev s  mbol  keelatud k  rvaldada koos sorteerimata  olmejaatmetega  See s  mbol n  itab  et toode tuleks k  rvaldada eraldi tavalistest  olmej    tmevoogudest  Olete kohustatud k  rvaldama k  esoleva ja ka muud  elektri  ja elektroonikaseadmed riigi v  i kohalike ametiasutuste poolt ette n  htud  kogumispunktide kaudu  Seadmete korrektne k  rvaldamine ja ringlussev  tt aitab  v  ltida v  imalikke negatiivseid tagaj  rgi keskkonnale ning inimeste tervisele   Vanade seadmete k  rvaldamise kohta t  psema informatsiooni saamiseks v  tke  palun   hendust kohalike ametiasutustega  j    tmek  itlusfirmaga v  i kauplusega   kust te toote ostsite     Appendix l  Regulatory Information    Espa  ol Spanish  Informaci  n medioambiental para clientes de la Uni  n Europea    La Directiva 2002 96 CE de la UE exige que los equipos que lleven este simbolo  en el propio aparato y o en su embalaje no deben eliminarse junto con 
10.   gre potenci  lisan   rtalmas negativ hat  sok megel  z  s  ben  Ha elavult  berendezeseinek felsz  mol  s  hoz tov  bbi r  szletes inform  ci  ra van szuksege   k  rj  k  lepjen kapcsolatba a helyi hat  s  gokkal  a hulladekfeldolgozasi  szolg  lattal  vagy azzal   zlettel  ahol a term  ket vasarolta     96    Wireless G Broadband Router    Nederlands Dutch  Milieu informatie voor klanten in de Europese Unie    De Europese Richtlijn 2002 96 EC schrijft voor dat apparatuur die is voorzien van  dit symbool op het product of de verpakking  niet mag worden ingezameld met  niet gescheiden huishoudelijk afval  Dit symbool geeft aan dat het product apart  moet worden ingezameld  U bent zelf verantwoordelijk voor de vernietiging van  deze en andere elektrische en elektronische apparatuur via de daarvoor door de  landelijke of plaatselijke overheid aangewezen inzamelingskanalen  De juiste  vernietiging en recycling van deze apparatuur voorkomt mogelijke negatieve  gevolgen voor het milieu en de gezondheid  Voor meer informatie over het  vernietigen van uw oude apparatuur neemt u contact op met de plaatselijke  autoriteiten of afvalverwerkingsdienst  of met de winkel waar u het product hebt  aangeschaft     Norsk Norwegian  Milj  informasjon for kunder i EU    EU direktiv 2002 96 EF krever at utstyr med f  lgende symbol avbildet p    produktet og eller pakningen  ikke m   kastes sammen med usortert avfall   Symbolet indikerer at dette produktet skal h  ndteres atskilt fra ordin  r  a
11.   s advanced features include advanced wireless settings  filters  access restriction policies  port  forwarding  advanced routing  and DDNS     How do I get mIRC to work with the Router   Under the Port Forwarding tab  set port forwarding to 113 for the PC on which you are using mIRC     Can the Router act as my DHCP server   Yes  The Router has DHCP server software built in     Can  run an application from a remote computer over the wireless network   This will depend on whether or not the application is designed to be used over a network  Consult the  application   s documentation to determine if it supports operation over a network     What is the IEEE 802 119 standard    lt is one of the IEEE standards for wireless networks  The 802 119 standard allows wireless networking hardware  from different manufacturers to communicate  provided that the hardware complies with the 802 119 standard   The 802 119 standard states a maximum data transfer rate of 54Mbps and an operating frequency of 2 4GHz     71    What is the IEEE 802 11b standard    lt is one of the IEEE standards for wireless networks  The 802 11b standard allows wireless networking hardware  from different manufacturers to communicate  provided that the hardware complies with the 802 11b standard   The 802 11b standard states a maximum data transfer rate of 11Mbps and an operating frequency of 2 4GHz     What IEEE 802 119 features are supported    The product supports the following IEEE 802 119 functions   e CSMA C
12.  168 1 50 and Subnet Mask  255 255 255 0     17  When I enter a URL or IP address  I get a time out error or am prompted to retry     Check if other PCs work  If they do  ensure that your workstation   s IP settings are correct  IP Address   Subnet Mask  Default Gateway  and DNS   Restart the computer that is having a problem    lf the PCs are configured correctly  but still not working  check the Router  Ensure that it is connected and  powered on  Connect to it and check its settings   If you cannot connect to it  check the LAN and power  connections     lf the Router is configured correctly  check your Internet connection  DSL cable modem  etc   to see if it is  working correctly  You can remove the Router to verify a direct connection    Manually configure the TCP IP settings with a DNS address provided by your ISP    Make sure that your browser is set to connect directly and that any dial up is disabled  For Internet  Explorer  click Tools  Internet Options  and then the Connection tab  Make sure that Internet Explorer is  set to Never dial a connection  For Netscape Navigator  click Edit  Preferences  Advanced  and Proxy   Make sure that Netscape Navigator is set to Direct connection to the Internet     67    Frequently Asked Questions    After using SecureEasySetup  my existing wireless devices can no longer connect to the Router   SecureEasySetup uses WPA Personal encryption  If your current wireless devices do not support WPA Personal  security  then you cannot use S
13.  Connected   e Click the Save Settings button to continue   e If the connection is lost again  follow steps 1  6 to re establish connection     PO ba    66    15  I can   t access my e mail  web or   am getting corrupted data from the Internet   The Maximum Transmission Unit  MTU  setting may need to be adjusted  By default  the MTU is set at 1500   For most DSL users  it is strongly recommended to use MTU 1492     If you are having some difficulties  perform the following steps    1  To connect to the Router  go to the web browser  and enter http   192 168 1 1 or the IP address of the  Router    2  Enter the password  if asked   The default password is admin     3  Look for the MTU option  and select Manual  In the Size field  enter 1492    4  Click the Save Settings button to continue    lf your difficulties continue  change the Size to different values  Try this list of values  one value at a time    in this order  until your problem is solved    1462   1400   1362   1300    16  The Power LED keeps flashing   The Power LED flashes when the device is first powered up  Meantime  the system will boot up itself and  check for proper operation  After finishing the checking procedure  the LED stays solid to show that the  system is working fine  If the LED keeps flashing after this time  the device is not working properly  Try to  flash the firmware by assigning a static IP address to the computer  and then upgrade the firmware  Try using  the following settings  IP Address  192
14.  Forwarding data in a network via a fixed path    Subnet Mask   An address code that determines the size of the network     Switch   1  A data switch that connects computing devices to host computers  allowing a large number of  devices to share a limited number of ports  2  A device for making  breaking  or changing the connections in an  electrical circuit     TCP  Transmission Control Protocol    A network protocol for transmitting data that requires acknowledgement  from the recipient of data sent     TCP IP  Transmission Control Protocol Internet Protocol    A set of instructions PCs use to communicate over a  network     Telnet   A user command and TCP IP protocol used for accessing remote PCs     TFTP  Trivial File Transfer Protocol    A version of the TCP IP FTP protocol that has no directory or password  capability     Throughput   The amount of data moved successfully from one node to another in a given time period     TKIP  Temporal Key Integrity Protocol    a wireless encryption protocol that provides dynamic encryption keys for  each packet transmitted     Topology   The physical layout of a network   TX Rate   Transmission Rate     UDP  User Datagram Protocol    A network protocol for transmitting data that does not require acknowledgement  from the recipient of the data that is sent     Upgrade   To replace existing software or firmware with a newer version   Upload   To transmit a file over a network     URL  Uniform Resource Locator    The address of a file l
15.  Incoming Log or Outgoing Log  depending on which you wish to view     Change these settings as described here and click the Save Settings button to apply your changes or Cancel  Changes to cancel your changes     A froe d Dote Gyati  ke     Administration           Loca  Rewer Aren    dband Aowter       Amem Zeg   Lier  res    na Accets   r   iri   fngbte     Demat  Maagtegrt Pet           REN Cancel rangas      Figure 6 38  Administration Tab   Management    Li    L pree of Finca est  ps    Administration       Figure 6 39  Administration Tab   Log    99    The Administration Tab   Diagnostics    The diagnostic tests  Ping and Traceroute  allow you to check the connections of your network components     Ping Test  The Ping test will check the status of a connection  Click the Ping button to open the Ping Test screen   Enter the address of the PC whose connection you wish to test and how many times you wish to test it  Then   click the Ping button  The Ping Test screen will then display the test results  To stop the test  click the Stop    button  Click the Clear Log button to clear the screen  Click the Close button to return to the Diagnostics screen     Traceroute Test  To test the performance of a connect  click the Traceroute button  Enter the address of the PC  whose connection you wish to test and click the Traceroute button  The  raceroute screen will then display the   test results  To stop the test  click the Stop button  Click the Clear Log button to clear the scr
16.  Portugu  s Portuguese  Informa    o ambiental para clientes da Uni  o Europeia    A Directiva Europeia 2002 96 CE exige que o equipamento que exibe este  simbolo no produto e ou na sua embalagem n  o seja eliminado junto com os  residuos municipais n  o separados  O simbolo indica que este produto deve ser  eliminado separadamente dos residuos dom  sticos regulares     da sua  responsabilidade eliminar este e qualquer outro equipamento el  ctrico e  electr  nico atraves dos instala    es de recolha designadas pelas autoridades  governamentais ou locais  A elimina    o e reciclagem correctas ajudar  o a  prevenir as consequ  ncias negativas para o ambiente e para a sa  de humana   Para obter informa    es mais detalhadas sobre a forma de eliminar o seu  equipamento antigo  contacte as autoridades locais  os servi  os de elimina    o  de residuos ou o estabelecimento comercial onde adquiriu o produto     Sloven  ina Slovak  Informacie o ochrane   ivotn  ho prostredia pre z  kaznikov v Eur  pskej   nii    Pod  a eur  pskej smernice 2002 96 ES zariadenie s t  mto symbolom na produkte  alalebo jeho baleni nesmie byt likvidovane spolu s netriedenym komun  lnym  odpadom  Symbol znamen      e produkt by sa mal likvidova   oddelene od  bezneho odpadu z dom  cnosti  Je va  ou povinnos  ou likvidova   toto i ostatn    elektrick   a elektronick   zariadenia prostrednictvom   pecializovan  ch zbern  ch  zariadeni urcenych vl  dou alebo miestnymi org  nmi  Spr  vna likvidacia   a recykl  
17.  Table   Figure 6 49  Status Tab   Wireless   Figure C 1  Upgrade Firmware   Figure E 1  IP Configuration Screen   Figure E 2  MAC Address Adapter Address   Figure E 3  MAC Address Physical Address    Figure E 4  MAC Address Filter List  Figure E 5  MAC Address Clone    81  81    Chapter 1  Introduction    Welcome    Thank you for choosing the Linksys Wireless G Broadband Router  The Wireless G Broadband Router will allow  you to network wirelessly better than ever  sharing Internet access  files and fun  easily and securely     How does the Wireless G Broadband Router do all of this  A router is a device that allows access to an Internet  connection over a network  With the Wireless G Broadband Router  this access can be shared over the four  switched ports and via the wireless broadcast at up to 11Mbps for Wireless B or up to 54Mbps for Wireless G     Use the WPA standard to secure your wireless network while the whole network is protected through a Stateful  Packet Inspection  SPI  firewall and Network Address Translation  NAT  technology  The Router   s  SecureEasySetup    feature makes it a snap to set up WPA when you have other SecureEasySetup devices     notebooks  printers  other peripherals   comprising your network  Run the Setup Wizard and it will guide you  through the steps  You can also access the Router   s features through the easy to use  browser based utility     But what does all of this mean     Networks are useful tools for sharing computer resources  You
18.  can access one printer from different computers  and access data located on another computer s hard drive  Networks are even used for playing multiplayer video  games  So  networks are not only useful in homes and offices  they can also be fun     PCs on a wired network create a LAN  or Local Area Network  They are connected with Ethernet cables  which is  why the network is called    wired        PCs equipped with wireless cards or adapters can communicate without cumbersome cables  By sharing the  same wireless settings  within their transmission radius  they form a wireless network  This is sometimes called  a WLAN  or Wireless Local Area Network  The Wireless G Broadband Router bridges wireless networks of both  802 11b and 802 11g standards and wired networks  allowing them to communicate with each other     With your networks all connected  wired  wireless  and the Internet  you can now share files and Internet  access   and even play games  All the while  the Wireless G Broadband Router protects your networks from  unauthorized and unwelcome users     Linksys recommends using the Setup CD ROM for first time installation of the Router  If you do not wish to run  the Setup Wizard on the Setup CD ROM  then use the instructions in this Guide to help you connect the  Wireless G Broadband Router  set it up  and configure it to bridge your different networks  These instructions  should be all you need to get the most out of the Wireless G Broadband Router     WPA  Wi fi Prot
19.  current wireless devices do not  AN support WPA Personal security  then you cannot use SecureEasySetup on your network  You will   need to manually configure your network security using the encryption supported by your  existing devices        Norton Internet Security   Click the Norton Internet Security button to install the Norton Internet Security  software program     User Guide   Click the User Guide button to open the PDF file of this User Guide     Exit   Click the Exit button to exit the Setup Wizard              The setup wizard has automatically  detected the language settings of  your PC  Please click Next to  continue the wizard in the current  language  H you would like to use a    different language  please select from  the list of languages and click Next     Broadband Router    vo WART5S4G    Figure 5 1  Setup Wizard   s Welcome   Language  Selection Screen    Welcome    Thank you for che mg   inksys  Thi tiup rard will  help you install the Wireless G  Broadband Router    Click Here to Start    Broadband Router     wo WRTS4G    Figure 5 2  Setup Wizard   s Welcome   Start  Wizard Screen  12    Wireless G Broadband Router    4  After reading the License Agreement  click the Next button if you accept  or click the Cancel button to end    the installation  LINKSYS      A Division of Cisco Systems  ine   End User License Agreement      P Please review the license agreement below     Press the PAGE DOWN key or use the Scroll Bar to see the rest of the agreement  
20.  is clicked   Selecting a policy from the drop down menu will  display that policy   s settings  To delete a policy  select that policy   s number and click the Delete button  To view  all the policies  click the Summary button   Policies can be deleted from the Summary screen by selecting the  policy or policies and clicking the Delete button  To return to the Internet Access tab  click the Close button      Status  Policies are disabled by default  To enable a policy  select the policy number from the drop down menu   and select Enable     To create an Internet Access policy    1  Select a number from the  nternet Access Policy drop down menu   2  To enable this policy  select Enable    3  Enter a Policy Name in the field provided     4  Click the Edit List of PC   s button to select which PCs will be affected by the policy  The List of PCs screen will  appear  You can select a PC by MAC Address or IP Address  You can also enter a range of IP Addresses if you  want this policy to affect a group of PCs  After making your changes  click the Save Settings button to apply  your changes or Cancel Changes to cancel your changes  Then click the Close button     5  Click the appropriate option  Deny or Allow  depending on whether you want to block or allow Internet access  for the PCs you listed on the List of PCs screen     6  Decide which days and what times you want this policy to be enforced  Select the individual days during  which the policy will be in effect  or select Every
21.  network  This includes hackers  So  don   t broadcast  the SSID     Wireless networking products come with a default SSID set by the factory   The Linksys default SSID is    linksys       Hackers know these defaults and can check these against your network  Change your SSID to something unique  and not something related to your company or the networking products you use     Change your SSID regularly so that any hackers who have gained access to your wireless network will have to  start from the beginning in trying to break in     MAC Addresses  Enable MAC Address filtering  MAC Address filtering will allow you to provide access to only  those wireless nodes with certain MAC Addresses  This makes it harder for a hacker to access your network with  a random MAC Address     WEP Encryption  Wired Equivalent Privacy  WEP  is often looked upon as a cure all for wireless security  concerns  This is overstating WEP   s ability  Again  this can only provide enough security to make a hacker   s job  more difficult     There are several ways that WEP can be maximized   1  Use the highest level of encryption possible   2  Use    Shared Key    authentication   3  Change your WEP key regularly    WPA  Wi Fi Protected Access  WPA  is the newest and best available standard in Wi Fi security  Two modes are  available  Pre Shared Key and RADIUS  Pre Shared Key gives you a choice of two encryption methods  TKIP   Temporal Key Integrity Protocol   which utilizes a stronger encryption method an
22.  on your browser  Check with your browser documentation  and make  sure that your browser is set to connect directly and that any dial up is disabled  Make sure that your browser is  set to connect directly and that any dial up is disabled  For Internet Explorer  click Tools  Internet Options  and  then the Connection tab  Make sure that Internet Explorer is set to Never dial a connection  For Netscape  Navigator  click Edit  Preferences  Advanced  and Proxy  Make sure that Netscape Navigator is set to Direct  connection to the Internet     70    What is DMZ Hosting    Demilitarized Zone  DMZ  allows one IP address  computer  to be exposed to the Internet  Some applications  require multiple TCP IP ports to be open  It is recommended that you set your computer with a static IP if you  want to use DMZ Hosting  To get the LAN IP address  see    Appendix E  Finding the MAC Address and IP Address  for Your Ethernet Adapter        If DMZ Hosting is used  does the exposed user share the public IP with the Router   No     Does the Router pass PPTP packets or actively route PPTP sessions   The Router allows PPTP packets to pass through     Is the Router cross platform compatible   Any platform that supports Ethernet and TCP IP is compatible with the Router     How many ports can be simultaneously forwarded   Theoretically  the Router can establish 520 sessions at the same time  but you can only forward 10 ranges of  ports     What are the advanced features of the Router   The Router 
23.  other devices on your wireless network that support  WMM  select Enable  Otherwise  keep the default  Disable     No Acknowledgement  If you want to disable the Router   s Acknowledgement feature  so that the Router will not  re send data if an error occurs select Enable  Otherwise  keep the default  Disable     Change these settings as described here and click the Save Settings button to apply your changes or Cancel  Changes to cancel your changes     A Tn a Deano Peter  E    Wila Hrosdfan uber    Applications     amp  Gaming              Deia Priceity Priseity Mi Adchenn  Low wei 00   0  00  00  Dn  op  Low wei D  I On 00  Op OO  0g   Fr  ecpet Port Price ity Priority Fise Control    feet  L   wi Enable     Fort 2 Low wl Enable ze     Peet 3 Low   Enable     Feria Low wi Ensbie al  AppBeation Priority CI Splinize Gaming Apsge geg  Priory Spro Fori  Application Hama       Appl gin Hame KS a  Appir aian Hama ES e  Appii sman Hemna  Lever     Appi sion Mame Tr  Hama  Appli son Low   e  Appin sion Mame  Liw D  Appli sann Hama tow mm     WAM Support  Disable     Teisal  Diraba   Ho Acknoied german   etiam eb     Figure 6 37  Applications and Gaming Tab   QoS    54    The Administration Tab   Management    This section of the Administration tab allows the network   s administrator to manage specific Router functions for  access and security     Local Router Access  You can change the Router   s password from here  Enter a new Router password and then  type it again in the Re ent
24.  oz   0 391 kg   External  12V DC  0 5A    FCC  IC 03  CE  Wi Fi  802 11b  802 119   WPA2  WMM    89    Operating Temp   Storage Temp   Operating Humidity    Storage Humidity    0  C to 40  C  32  F to 104  F    20  C to 70  C   4  F to 158  F   10  to 85   Non Condensing    5  to 90   Non Condensing    90    Appendix H  Warranty Information    LIMITED WARRANTY    Linksys warrants to You that  for a period of three years  the    Warranty Period      your Linksys Product will be substantially  free of defects in materials and workmanship under normal use  Your exclusive remedy and Linksys    entire liability under  this warranty will be for Linksys at its option to repair or replace the Product or refund Your purchase price less any  rebates  This limited warranty extends only to the original purchaser     If the Product proves defective during the Warranty Period call Linksys Technical Support in order to obtain a Return  Authorization Number  if applicable  BE SURE TO HAVE YOUR PROOF OF PURCHASE ON HAND WHEN CALLING  If You are  requested to return the Product  mark the Return Authorization Number clearly on the outside of the package and include a  copy of your original proof of purchase  RETURN REQUESTS CANNOT BE PROCESSED WITHOUT PROOF OF PURCHASE  You  are responsible for shipping defective Products to Linksys  Linksys pays for UPS Ground shipping from Linksys back to You  only  Customers located outside of the United States of America and Canada are responsible for all 
25.  produkt zakoupili     Appendix I  Regulatory Information       94    Wireless G Broadband Router    Dansk Danish  Miljoinformation for kunder i EU    EU direktiv 2002 9G6 EF kr  ver  at udstyr der b  rer dette symbol pa produktet  og eller emballagen ikke ma bortskaffes som usorteret kommunalt affald   Symbolet betyder  at dette produkt skal bortskaffes adskilt fra det almindelige  husholdningsaffald  Det er dit ansvar at bortskaffe dette og andet elektrisk og  elektronisk udstyr via bestemte indsamlingssteder udpeget af staten eller de  lokale myndigheder  Korrekt bortskaffelse og genvinding vil hj  lpe med til at  undg   mulige skader for milj  et og menneskers sundhed  Kontakt venligst de  lokale myndigheder  renovationstjenesten eller den butik  hvor du har k  bt  produktet  ang  ende mere detaljeret information om bortskaffelse af dit gamle  udstyr     Deutsch German  Umweltinformation f  r Kunden innerhalb der Europ  ischen Union    Die Europ  ische Richtlinie 2002 96 EC verlangt  dass technische Ausr  stung   die direkt am Ger  t und oder an der Verpackung mit diesem Symbol versehen ist  nicht zusammen mit unsortiertem Gemeindeabfall entsorgt werden darf  Das  Symbol weist darauf hin  dass das Produkt von regul  rem Haushaltm  ll getrennt  entsorgt werden sollte  Es liegt in Ihrer Verantwortung  dieses Ger  t und andere  elektrische und elektronische Ger  te   ber die daf  r zust  ndigen und von der  Regierung oder   rtlichen Beh  rden dazu bestimmten Sammelstellen zu
26.  try to correct the  interference by one or more of the following measures     e Reorient or relocate the receiving antenna   e increase the separation between the equipment or devices   e Connect the equipment to an outlet other than the receiver s   e Consult a dealer or an experienced radio TV technician for assistance    FCC Caution  Any changes or modifications not expressly approved by the party responsible for compliance could void the  user   s authority to operate this equipment     FCC Radiation Exposure Statement    This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment  This equipment  should be installed and operated with minimum distance 20cm between the radiator and your body     This transmitter must not be co located or operating in conjunction with any other antenna or transmitter  IEEE 802 11b or  802 119 operation of this product in the USA is firmware limited to channels 1 through 11     Safety Notices   Caution  To reduce the risk of fire  use only No 26 AWG or larger telecommunication line cord    Do not use this product near water  for example  in a wet basement or near a swimming pool    Avoid using this product during an electrical storm  There may be a remote risk of electric shock from lightning     92    Industry Canada Statement  This device complies with Industry Canada ICES 003 and RSS210 rules     Declaration d   Industrie Canada  Cet appareil est conforme aux normes NMB003 et RSS210 d Industrie Ca
27.  type that IP Address in one of these fields  You can type up to three DNS Server IP Addresses here  The   Router will use these for quicker access to functioning DNS servers     36    WINS  The Windows Internet Naming Service  WINS  manages each PC   s interaction with the Internet  If you use  a WINS server  enter that server   s IP Address here  Otherwise  leave this blank     Time Setting    Change the time zone in which your network functions from this pull down menu   You can even automatically  adjust for daylight savings time      Time Setting    Time Zone    GMT 08 00  Pacific Time  USA  amp  Canada   Automatically adjust clock for daylight saving changes    Figure 6 12  Time Setting    37    The Setup Tab   DDNS    The Router offers a Dynamic Domain Name System  DDNS  feature  DDNS lets you assign a fixed host and domain  name to a dynamic Internet IP address  It is useful when you are hosting your own website  FTP server  or other  server behind the Router     Before you can use this feature  you need to sign up for DDNS service with a DDNS service provider   www dyndns org or www TZ0 com  If you do not want to use this feature  keep the default setting  Disable     DDNS    DDNS Service    If your DDNS service is provided by DynDNS org  then select DynDNS org from the drop down menu  If your  DDNS service is provided by TZO  then select TZ0 com  The features available on the DDNS screen will vary   depending on which DDNS service provider you use     DynDNS org   D
28.  usually cable ISPs  require these names as identification  You may have to check with your ISP to see if your Router IP Local iP Address  192 168 1  1  broadband Internet service has been configured with a host and domain name  In most cases  leaving these Subnet Mask  256 256 266 D v  fields blank will work    Figure 6 10  Router IP    35    MTU  MTU is the Maximum Transmission Unit  It specifies the largest packet size permitted for Internet  transmission  The default setting is Auto  You should leave this value in the 1200 to 1500 range  To have the Network Address E    i Server Settings  DHCP  Enable     Disable  Router select the best MTU for your Internet connection  leave the default as Auto  santa agent eo sena 0d    Maximum Number of 50    Network Setup DHCP Users    Cieni Lease Time  0 minutes  0 means one day   Network Setup changes the settings on the network connected to the Router   s Ethernet ports  Wireless Setup is RER u LS LI LA  performed through the Wireless tab  Static ONS 2  0 L   L   Lu   Static DNS 3  0   0 Hr   0  Router IP WINS o   fo   fo ll  This presents both the Router   s IP Address and Subnet Mask as seen by your network  Figure 6 11  Network Address Server Settings    Network Address Server Settings  DHCP     The settings allow you to configure the Router   s Dynamic Host Configuration Protocol  DHCP  server function  The  Router can be used as a DHCP server for your network and will automatically assign an IP address to each  computer on you
29.  you want that period of  inactivity to last     Click the Next button to continue or the Back button to return to the previous screen     Advanced Internet Settings  Your Internet connection must be configured manually  Please  contact your ISP and select the proper Internet Connection type     i wn O Z o o      Enter the Usor Mamo and Password as insiruciad by your ISP   Confirm the password by entering tho password again in the Conima    GE   be    O Connect on Demand       Broadband Router Setup Wizard viau  WRTS46       Figure 5 16  Setup Wizard   s Advanced Internet Settings      Telstra Screen    20    Wireless G Broadband Router   12  The Router provides a Web based Utility you can use for configuring the Router from any networked PC   Password   Enter a password that will control access to the Utility   Confirm   Enter the password again in the Confirm field     Click the Next button to continue or the Back button to return to the previous screen     13  There are two ways to configure the Router   s wireless settings  SecureEasySetup and manual configuration     If you have other SecureEasySetup devices  such as notebook adapters or printers  then you can use the  Router   s SecureEasySetup feature to create your wireless network  Proceed to the section     Using the  Router   s SecureEasySetup Feature        If you do not have other SecureEasySetup devices  then proceed to the section     Manually Configuring the  Router   s Wireless Settings        Chapter 5  Sett
30.  your ISP     Can multiple gamers on the LAN get on one game server and play simultaneously with just one public IP  address    It depends on which network game or what kind of game server you are using  For example  Unreal Tournament  supports multi login with one public IP     How do I get Half Life  Team Fortress to work with the Router    The default client port for Half Life is 27005  The computers on your LAN need to have     clientport 2700x     added to the HL shortcut command line  the x would be 6  7  8  and on up  This lets multiple computers connect  to the same server  One problem  Version 1 0 1 6 won   t let multiple computers with the same CD key connect at    69    the same time  even if on the same LAN  not a problem with 1 0 1 3   As far as hosting games  the HL server does  not need to be in the DMZ  Just forward port 27015 to the local IP address of the server computer     How can I block corrupted FTP downloads   If you are experiencing corrupted files when you download a file with your FTP client  try using another FTP  program     The web page hangs  downloads are corrupt  or nothing but junk characters are being displayed on the  screen  What do I need to do    Force your Ethernet adapter to 10Mbps or half duplex mode  and turn off the    Auto negotiate    feature of your  Ethernet adapter as a temporary measure   Please look at the Network Control Panel in your Ethernet adapter   s  Advanced Properties tab   Make sure that your proxy setting is disabl
31.  your ISP    Gateway   Enter the Gateway IP address provided by your ISP    Click the Next button to continue or the Back button to return to the previous screen    Keep Alive   If you want the Router to periodically check your Internet connection  select Keep Alive  Then  specify how often you want the Router to check the Internet connection  If the connection is down  the Router  will automatically re establish your connection    Connect on Demand If you want the Router to end the Internet connection after it has been inactive for a  period of time  select Connect on Demand and designate the number of minutes you want that period of    inactivity to last     Click the Next button to continue or the Back button to return to the previous screen           LINKSsys      A kee of Crane Sater  be        Advanced Internet Settings    Your Internet connection must be configured manually  Please    WARNING  contact your ISP and select the proper Internet Connection type     desist Enter the User Name and Password as instructed by your    xz     ISP  Conlinn the password by enering the password agai  in the Gonfinn Rold     EE   Enter the setings provided by your Intamet Service Provider       ISP    Exit   Back      Broadband Router Setup Wizard wi WATSAG    Figure 5 13  Setup Wizard   s Advanced Internet  Settings   PPTP Screen    Linksys       A Division of Caton Systems  inc     Keep Alive   Connect on Demand  PPTP Continued     With Keep Alive  the Router will periodically check
32.  your Intemet connection and  automatically re establish connection H you are disconnected  Wilh Connect on  Demand  the Router can cul the Internet connection after it has been inactive  for a specific period of time     EF  Choose Keep Alive and specily a time interval    a       Keep Alive to always keep the Internat connection active   es Seng i  Choose Connect on Demand to disconnect fom  L 1 Connect on Demand minutes the intemal alter a pariod of inactivity           Bach        Broadband Router Setup Wizard vores WRT54G    Figure 5 14  Setup Wizard   s Keep Alive Connect on  Demand  PPTP Continued  Screen    18    L2TP    Connection   If you are using an L2TP  Layer 2 Tunneling Protocol  connection  select L2TP from the drop     Advanced Internet Settings  down menu     Your Internet connection must be configured manually  Please  contact your ISP and select the proper Internet Connection type   User Name   Enter the User Name provided by your ISP     Password   Enter the Password provided by your ISP  D  Enim he password by ermcg ge  S  tes    Confirm   To confirm the Password  enter it again in this field      Choose Keep Alive and specty a lime interval  fo always keep the iniemet connecton activa    L2TP Server   Enter the IP address of the L2TP server you are using  this should be provided by your ISP  O Connect on Demand weg Ser      seconds       E Back H      Keep Alive   If you want the Router to periodically check your Internet connection  select Keep Alive  
33. 96 EC richiede che le apparecchiature contrassegnate  con questo simbolo sul prodotto e o sull imballaggio non siano smaltite insieme ai  rifiuti urbani non differenziati  I  simbolo indica che questo prodotto non deve  essere smaltito insieme ai normali rifiuti domestici  E responsabilit   del  proprietario smaltire sia questi prodotti sia le altre apparecchiature elettriche ed  elettroniche mediante le specifiche strutture di raccolta indicate dal governo o  dagli enti pubblici locali  Il corretto smaltimento ed il riciclaggio aiuteranno a  prevenire conseguenze potenzialmente negative per l ambiente e per la salute  dell essere umano  Per ricevere informazioni pi   dettagliate circa lo smaltimento  delle vecchie apparecchiature in Vostro possesso  Vi invitiamo a contattare gli  enti pubblici di competenza  il servizio di smaltimento rifiuti o il negozio ne  quale  avete acquistato il prodotto     Latvie  u valoda Latvian  Ekologiska inform  cija klientiem Eiropas Savien  bas jurisdikcij      Direkt  v   2002 96 EK ir pras  ba  ka apr  kojumu  kam pievienota z  me uz pa  a  izstr  d  juma vai uz t   iesai  ojuma  nedr  kst izmest ne    irot   veid   kop   ar  komun  lajiem atkritumiem  tiem  ko rada viet  ji iedz  vot  ji un uz    mumi         z  me noz  m   to  ka  i ier  ce ir j  izmet atkritumos ta  lai t   nenon  ktu kop   ar  parastiem m  jsaimniec  bas atkritumiem  J  su pien  kums ir   o un citas  elektriskas un elektroniskas ier  ces izmest atkritumos  izmantojot ip
34. A plus Acknowledge protocol   OFDM protocol   Multi Channel Roaming   Automatic Rate Selection   RTS CTS feature   Fragmentation   Power Management    What IEEE 802 11b features are supported    The product supports the following IEEE 802 11b functions   CSMA CA plus Acknowledge protocol   Multi Channel Roaming   Automatic Rate Selection   RTS CTS feature   Fragmentation   Power Management    What is ad hoc mode    When a wireless network is set to ad hoc mode  the wireless equipped computers are configured to  communicate directly with each other  The ad hoc wireless network will not communicate with any wired  network     What is infrastructure mode   When a wireless network is set to infrastructure mode  the wireless network is configured to communicate with  a wired network through a wireless access point     What is roaming    Roaming is the ability of a portable computer user to communicate continuously while moving freely throughout  an area greater than that covered by a single access point  Before using the roaming function  the workstation  must make sure that it is the same channel number with the access point of dedicated coverage area     To achieve true seamless connectivity  the wireless LAN must incorporate a number of different functions  Each  node and access point  for example  must always acknowledge receipt of each message  Each node must    72    maintain contact with the wireless network even when not actually transmitting data  Achieving these function
35. DNS Service  From this pull down menu  enter the DDNS service with which you have membership   User Name  Enter the User Name for your DDNS account   Password  Enter the Password for your DDNS account    Host Name  The is the DDNS URL assigned by the DDNS service    Internet IP Address  This is the Router   s current IP Address as seen on the Internet    Status  This displays the status of the DDNS connection    TZ0 com    E mail Address  TZO Key  and Domain Name  Enter the settings of the account you set up with TZO     Internet IP Address  The Router   s Internet IP address is displayed here  Because it is dynamic  it will change     Status  The status of the DDNS service connection is displayed here     Change these settings as described here and click the Save Settings button to apply your changes or Cancel  Changes to cancel your changes     A Division of Caco Systems  inc    Setup       Figure 6 13  Setup Tab   DDNS   DynDNS    Linksys     A Ipeere gd Zero tin ine     Selup       Figure 6 14  Setup Tab   DDNS   TZO    38    The Setup Tab   MAC Address Clone    A MAC address is a 12 digit code assigned to a unique piece of hardware for identification  Some ISPs will  require you to register a MAC address in order to access the Internet  If you do not wish to re register the MAC  address with your ISP  you may assign the MAC address you have currently registered with your ISP to the Router  with the MAC Address Clone feature     Enable Disable  To have the MAC Address clo
36. Dial In User Service    A protocol that uses an authentication server to control  network access     RJ 45  Registered Jack 45    An Ethernet connector that holds up to eight wires     Roaming   The ability to take a wireless device from one access point s range to another without losing the  connection     Router   A networking device that connects multiple networks together   RTS  Request To Send    A networking method of coordinating large packets through the RTS Threshold setting     Server   Any computer whose function in a network is to provide user access to files  printing  communications   and other services     SMTP  Simple Mail Transfer Protocol    The standard e mail protocol on the Internet   SNMP  Simple Network Management Protocol    A widely used network monitoring and control protocol     Software   Instructions for the computer  A series of instructions that performs a particular task is called a     program        SOHO  Small Office Home Office    Market segment of professionals who work at home or in small offices     SPI  Stateful Packet Inspection  Firewall   A technology that inspects incoming packets of information before  allowing them to enter the network     86    Spread Spectrum   Wideband radio frequency technique used for more reliable and secure data transmission   SSID  Service Set IDentifier    Your wireless network s name    Static IP Address   A fixed address assigned to a computer or device that is connected to a network    Static Routing  
37. EVENT  WILL LINKSYS    LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT  The foregoing limitations will apply even  if any warranty or remedy provided under this Agreement fails of its essential purpose  Some jurisdictions do not allow the  exclusion or limitation of incidental or consequential damages  so the above limitation or exclusion may not apply to You     Please direct all inquiries to  Linksys  P O  Box 18558  Irvine  CA 92623 USA     91    Appendix l  Regulatory Information    FCC Statement    This device complies with Part 15 of the FCC Rules  Operation is subject to the following two conditions   1  This device  may not cause harmful interference  and  2  this device must accept any interference received  including interference that  may cause undesired operation     This product has been tested and complies with the specifications for a Class B digital device  pursuant to Part 15 of the  FCC Rules  These limits are designed to provide reasonable protection against harmful interference in a residential  installation  This equipment generates  uses  and can radiate radio frequency energy and  if not installed and used  according to the instructions  may cause harmful interference to radio communications  However  there is no guarantee  that interference will not occur in a particular installation  If this equipment does cause harmful interference to radio or  television reception  which is found by turning the equipment off and on  the user is encouraged to
38. Hardware Installation for Connection to Another Router    Before you install the Router  you must change the default IP address of the other router  This is mandatory   because both routers may be set to the same IP address by default  If you do not change the other router   s default  IP address  then you may not be able to set up the Router  NOTE  Steps 1 4 are instructions for a typical  AN Linksys router  however  if you are using a non     First  make sure the Router is NOT connected to your network  Then follow these instructions  i  Linksys router  refer to the other router   s    1  To access the other router   s Web based Utility  launch Internet Explorer or Netscape Navigator  and enter the documentation for instructions on how to change its  other router   s default IP address  192 168 1 1  in the Address field  Then press Enter  local IP address to 192 168 2 1   2  Apassword request page will appear  Leave the User Name field blank  In the Password field  enter the  password you have set  the default password is admin   Then click the OK button  Broadband  Internet Modem    3  The first screen that appears will display the Setup tab  In the Network Setup section  there is a setting called  Local IP Address  which is set to 192 168 1 1  Change this to 192 168 2 1     4  Click the Save Settings button to save your change  and then exit the Web based Utility     5  Power down your network devices  Now you will begin the hardware installation of Router        6  Locat
39. KAWON  OUUBGAAE  otv TIPOANWN TEGVWY GPVNTIKWY OUVETTEWV VIG TO TTEPIBGAAOV Kal  TV uyeia  To TEPIOOOTEPES TTANPOMOPIES OXETIKG UE TNV ATTOOPIWN TOU TTAaAIOU  Gag E   OTTAIGUOU  TAPAKAAW ETTIKOIVWVNOTE HE TIC TOTTIKES GPXEC  TIC UTINPETIES  GTOPPIWNS    TO KATAOTNUG OTTO TO OTOIO AYOPACATE TO TTDOION     95    Wireless G Broadband Router    Fran  ais French  Informations environnementales pour les clients de l Union europ  enne    La directive europ  enne 2002 96 CE exige que l equipement sur lequel est appose ce  symbole sur le produit et ou son emballage ne soit pas jet   avec les autres ordures  menageres  Ce symbole indique que le produit doit   tre     limin   dans un circuit  distinct de celui pour les d  chets des m  nages  II est de votre responsabilit   de jeter  ce materiel ainsi que tout autre materiel   lectrique ou electronique par les moyens de  collecte indiques par le gouvernement et les pouvoirs publics des collectivit  s  territoriales  L elimination et le recyclage en bonne et due forme ont pour but de lutter  contre l impact nefaste potentiel de ce type de produits sur l environnement et la sante  publique  Pour plus d informations sur le mode d   limination de votre ancien  equipement  veuillez prendre contact avec les pouvoirs publics locaux  le service de  traitement des d  chets  ou l endroit ou vous avez achet   le produit     Italiano Italian  Informazioni relative all ambiente per i clienti residenti nell Unione Europea    La direttiva europea 2002 
40. LINKSYS     A Division of Cisco Systems  Inc     aa    ep  wm i WT       j SC e S d eps G    EE E  Ce  i    k che    G  Kg       2AGHz    Cisco SYSTEMS    Model No  WRT54GL       Copyright and Trademarks    Specifications are subject to change without notice  Linksys is a registered trademark or trademark of Cisco  systems  Inc  and or its affiliates in the U S  and certain other countries  Copyright    2007 Cisco Systems  Inc  All  rights reserved  Other brands and product names are trademarks or registered trademarks of their respective  holders     WARNING  This product contains chemicals  including lead  known  to the State of California to cause cancer  and birth defects or other  reproductive harm  Wash hands after handling     How to Use This User Guide    This User Guide has been designed to make understanding networking with the Wireless G Broadband Router  easier than ever  Look for the following items when reading this User Guide     This checkmark means there is a note of interest and  is something you should pay special attention to  while using the Wireless G Broadband Router     This exclamation point means there is a caution or  warning and is something that could damage your  property or the Wireless G Broadband Router     This question mark provides you with a reminder  about something you might need to do while using  the Wireless G Broadband Router      gt   gt   gt        In addition to these symbols  there are definitions for technical terms that are pre
41. MAC 19   MAC 20     MAC 7i   MAC 32   MAC 33   HAC H   MAC 35   MAC 36   MAC 37   MAC 39   HAC ag   MAC H       Seve Settings     Cancel Changes         Figure 6 26  MAC Address Filter List         45    The Wireless Tab   Advanced Wireless Settings    This tab is used to set up the Router   s advanced wireless functions  These settings should only be adjusted by an  expert administrator as incorrect settings can reduce wireless performance     Authentication Type  The default is set to Auto  which allows either Open System or Shared Key authentication  to be used  With Open System authentication  the sender and the recipient do NOT use a WEP key for  authentication  With Shared Key authentication  the sender and recipient use a WEP key for authentication     Basic Rate  The Basic Rate setting is not actually one rate of transmission but a series of rates at which the  Router can transmit  The Router will advertise its Basic Rate to the other wireless devices in your network  so  they know which rates will be used  The Router will also advertise that it will automatically select the best rate  for transmission  The default setting is Default  when the Router can transmit at all standard wireless rates   1 2Mbps  5 5Mbps  11Mbps  18Mbps  and 24Mbps   Other options are 1 2Mbps  for use with older wireless  technology  and All  when the Router can transmit at all wireless rates  The Basic Rate is not the actual rate of  data transmission  If you want to specify the Router   s ra
42. P Address field  enter the IP address of the computer you  want exposed to the Internet  This will bypass the NAT technology for that computer  Please refer to     Appendix E  Finding the MAC Address and IP Address for Your Ethernet Adapter    for details on getting  an IP address    5  Once completed with the configuration  click the Save Settings button     9    forgot my password  or the password prompt always appears when   am saving settings to the  Router   Reset the Router to factory default by pressing the Reset button for 10 seconds and then releasing it  If you  are still getting prompted for a password when saving settings  then perform the following steps   1  Access the Router   s web based utility by going to http   192 168 1 1 or the IP address of the Router   Enter the default password admin  and click the Administration   gt  Management tab   2  Enter a different password in the Router Password field  and enter the same password in the second  field to confirm the password   3  Click the Save Settings button     10 1 am a PPPoE user  and I need to remove the proxy settings or the dial up pop up window   If you have proxy settings  you need to disable these on your computer  Because the Router is the gateway for  the Internet connection  the computer does not need any proxy settings to gain access  Please follow these  directions to verify that you do not have any proxy settings and that the browser you use is set to connect  directly to the LAN   e For Micros
43. Sieg lac    Check the Router s Status       Broadband Router Setup Wizard wsi WRTS4G    Figure 5 9  Setup Wizard   s Check the Router   s  Status Screen    11  The Setup Wizard will automatically detect the Internet connection type you use  Gable or DHCP or DSL   PPPoE   If the Setup Wizard cannot detect your Internet connection type  you will see the Advanced Internet  Settings screen  and you will be asked to select your Internet connection type  Static IP  PPTP  L2TP  or    Telstra  Proceed to the appropriate section for your Internet connection type  Configure Cable or DHCP Settings    if you are unsure of these settings  do not make any changes   Changes to the settings below may disrupt the operation of your    Cable or DHCP existing network     Host Name   Enter the Host Name if required by your ISP  otherwise  leave this field blank  pene Sage    Hout rame   Enter the Hos  Name and Domain Mame  if instructed by    your ISP  Othenase  you can lieawe Ihe Seid blank   Domain Name   Enter the Domain Name if required by your ISP  otherwise  leave this field blank     Click the Next button to continue or the Back button to return to the previous screen          exit Back In    Broadband Router Setup Wizard votes WRTS4G    Figure 5 10  Setup Wizard   s Configure Cable or DHCP  Settings Screen       Chapter 5  Setting up the Wireless G Broadband Router 16  Using the Setup Wizard    DSL  PPPoE    User Name   Enter the User Name provided by your ISP    Password   Enter the Pass
44. Then   specify how often you want the Router to check the Internet connection  If the connection is down  the Router sas SL eine maa  MOREE   will automatically re establish your connection  Figure 5 15  Setup Wizard   s Advanced Internet Settings    L2TP Screen       Connect on Demand If you want the Router to end the Internet connection after it has been inactive for a  period of time  select Connect on Demand and designate the number of minutes you want that period of  inactivity to last     Click the Next button to continue or the Back button to return to the previous screen     19    Telstra    Connection   Telstra is a service used in Australia only  If you are using this service  select Telstra from the  drop down menu     User Name   Enter the User Name provided by your ISP   Password   Enter the Password provided by your ISP   Confirm   To confirm the Password  enter it again in this field     Heart Beat Server   Enter the IP address of the Heart Beat Server server you are using  this should be  provided by your ISP      Keep Alive   If you want the Router to periodically check your Internet connection  select Keep Alive  Then  specify how often you want the Router to check the Internet connection  If the connection is down  the Router  will automatically re establish your connection     Connect on Demand If you want the Router to end the Internet connection after it has been inactive for a  period of time  select Connect on Demand and designate the number of minutes
45. an unintended receiver  DSSS appears as low  power wideband noise and is rejected  ignored  by most narrowband receivers     73    What is WEP   WEP is Wired Equivalent Privacy  a data privacy mechanism based on a 64 bit or 128 bit shared key algorithm  as  described in the IEEE 802 11 standard     What is a MAC Address    The Media Access Control  MAC  address is a unique number assigned by the manufacturer to any Ethernet  networking device  such as a network adapter  that allows the network to identify it at the hardware level  For all  practical purposes  this number is usually permanent  Unlike IP addresses  which can change every time a  computer logs onto the network  the MAC address of a device stays the same  making it a valuable identifier for  the network     How do I reset the Router     Press the Reset button on the back panel for about five seconds  This will reset the Router to its default settings     How do I resolve issues with signal loss    There is no way to know the exact range of your wireless network without testing  Every obstacle placed between  the Router and a wireless PC will create signal loss  Lead glass  metal  concrete floors  water and walls will  inhibit the signal and reduce range  Start with the Router and your wireless PC in the same room and move it  away in small increments to determine the maximum range in your environment     You may also try using different channels  as this may eliminate interference affecting only one channel    I 
46. asus  atkritumu sav  k  anas veidus un l  dzek  us  ko nodro  ina valsts un pa  vald  bu  iest  des  Ja izme  ana atkritumos un p  rstr  de tiek veikta pareizi  tad mazin  s  iesp  jamais kait  jums dabai un cilv  ku vesel  bai  S  k  kas zi  as par novecoju  a  apr  kojuma izme  anu atkritumos j  s varat sa  emt viet  j   pa  vald  b    atkritumu  sav  k  anas dienest    k   ar   veikal    kur iegadajaties So izstr  d  jumu     Appendix l  Regulatory Information    Lietuv  kai Lithuanian  Aplinkosaugos informacija  skirta Europos S  jungos vartotojams    Europos direktyva 2002 96 EC numato  kad irangos  kuri ir  arba  kurios pakuot    yra pa  ym  ta   iuo simboliu  negalima   alinti kartu su ner    iuotomis  komunalin  mis atliekomis    is simbolis rodo  kad gaminj reikia   alinti atskirai nuo  bendro buitini   atlieku srauto  J  s privalote u  tikrinti  kad   i ir kita elektros ar  elektronin   jranga b  t     alinama per tam tikras nacionalin  s ar vietin  s vald  ios  nustatytas atlieku rinkimo sistemas  Tinkamai   alinant ir perdirbant atliekas  bus  i  vengta galimos   alos aplinkai ir   moni   sveikatai  Daugiau informacijos apie  j  su senos jrangos   alinim   gali pateikti vietin  s vald  ios institucijos  atlieku    alinimo tarnybos arba parduotuv  s  kuriose isigyote t   gamini     Malti Maltese  Informazzjoni Ambjentali ghal Klijenti fl Unjoni Ewropea    Id Direttiva Ewropea 2002 96 KE titlob li t tag  mir li jkun fih is simbolu fuq il   prodott u jew fuq l ippakk
47. ation  enter the IP Address of the PC running the specific application   Enable  Click the Enable checkbox to enable port forwarding for the relevant application     Change these settings as described here and click the Save Settings button to apply your changes or Cancel  Changes to cancel your changes        Afen g Dn Sipe  pe    HR ER    Wireless G Broadband Heute    Applications   amp  Gaming          ups H       Boh   one 0    Bo     tab H  Bot   gp D  Bom   gur H  Bet   eur H    Boh   ur i    Boh   iia D    Go  e e e e e e  e a e    Dog    prima 8    Bot   ua    E ES ES ETETE ETE    Figure 6 34  Applications and Gaming Tab   Port  Range Forward    51    The Applications  amp  Gaming Tab   Port Triggering    The Port Triggering screen allows the Router to watch outgoing data for specific port numbers  The IP address of  the computer that sends the matching data is remembered by the Router  so that when the requested data  returns through the Router  the data is pulled back to the proper computer by way of IP address and port mapping  rules     Port Triggering  Application  Enter the application name of the trigger   Triggered Range    For each application  list the triggered port number range  Check with the Internet application documentation for  the port number s  needed     Start Port  Enter the starting port number of the Triggered Range     End Port  Enter the ending port number of the Triggered Range   Forwarded Range    For each application  list the forwarded por
48. can manually configure any non  enced nel eer gg ees   SecureEasysetup devices you may have   E  ne TREE  aia ee   To exit the Wireless Setup Wizard  click the Exit button  If you need more information  click the Help button  Ss    To return to the previous screen  click the Back button     Wireless Sattings    Congratulations  The installation of the Wireless G Broadband Router is complete     If you want to make advanced configuration changes  proceed to    Chapter 6  Configuring the Wireless G  Broadband Router           SecuregasySetup    Figure 5 38  Your Wireless Settings Screen       hawt yk  Ca  Chapter 5  Se  if     F    tting up the Wireless G Broadband Router    eEasySetup to Configure Your Notebook    31    Chapter 6  Configuring the Wireless G Broadband  Router    NOTE  For first time installation  Linksys  Overview AN recommends using the Setup Wizard on the Setup   CD ROM  If you want to configure advanced settings   Linksys recommends using the Setup CD ROM for first time installation of the Router  If you do not wish to run use this chapter to learn about the Web based Utility     the Setup Wizard on the Setup CD ROM  then you can use the Web based Utility to configure the Router  For    advanced users  you may configure the Router   s advanced settings through the Web based Utility  HAVE YOU  Enabled TCP IP on your PCs  PCs       l l l l 7 A communicate over the network with this protocol   This chapter will describe each web page in the Utility and each pag
49. cia pom    e zabr  ni   pripadnym negativnym dopadom na   ivotn    prostredie a zdravie   udi  Ak mate z  ujem o podrobnej  ie inform  cie o likvid  cii  star  ho zariadenia  obratte sa  prosim  na miestne organy  organiz  cie  zaoberaj  ce sa likvid  ciou odpadov alebo obchod  v ktorom ste si produkt  zak  pili     Sloven  ina Slovene  Okoljske informacije za stranke v Evropski uniji    Evropska direktiva 2002 96 EC prepoveduje odlaganje opreme  ozna  ene s tem  simbolom     na izdelku in ali na embala  i     med obicajne  nerazvr    ene odpadke   Ta simbol opozarja  da je treba izdelek odvre  i lo  eno od preostalih  gospodinjskih odpadkov  Va  a odgovornost je  da to in preostalo elektri  no in  elektronsko opremo odnesete na posebna zbirali    a  ki jih dolo  ijo dr  avne  ustanove ali lokalna uprava  S pravilnim odlaganjem in recikliranjem boste  prepre  ili morebitne   kodljive vplive na okolje in zdravje ljudi    e   elite izvedeti  vec o odlaganju stare opreme  se obrnite na lokalno upravo  odpad ali trgovino   kjer ste izdelek kupili     97    Wireless G Router for Mobile Broadband    Suomi Finnish  Ymp  rist     koskevia tietoja EU alueen asiakkaille    EU direktiivi 2002 96 EY edellytt      ett   jos laitteistossa on t  m   symboli itse  tuotteessa ja tai sen pakkauksessa  laitteistoa ei saa h  vitt     lajittelemattoman  yhdyskuntaj  tteen mukana  Symboli merkitsee sit    ett   t  m   tuote on  h  vitett  v   erill    n tavallisesta kotitalousj  tteest    Sinun va
50. ck the Browse button to find the file     Then click the Upgrade button and follow the on screen instructions     A Droge pg Da brii E    Administration    Sas aly B  ka   of  Ba mover or preti Fa reset bunis    kv ate ead DT Bee t parigel E    Figure C 1  Upgrade Firmware       78    Appendix D  Windows Help    Almost Linksys wireless products require Microsoft Windows  Windows is the most used operating system in the  world and comes with many features that help make networking easier  These features can be accessed through  Windows Help and are described in this appendix     TCP IP    Before a computer can communicate with the Router  TCP IP must be enabled  TCP IP is a set of instructions  or  protocol  all PCs follow to communicate over a network  This is true for wireless networks as well  Your PCs will  not be able to utilize wireless networking without having TCP IP enabled  Windows Help provides complete  instructions on enabling TCP IP     Shared Resources    If you wish to share printers  folder  or files over your network  Windows Help provides complete instructions on  utilizing shared resources     Network Neighborhood My Network Places    Other PCs on your network will appear under Network Neighborhood or My Network Places  depending upon the  version of Windows you re running   Windows Help provides complete instructions on adding PCs to your  network     79    Appendix E Finding the MAC Address and IP Address for    Your Ethernet Adapter    This section descr
51. cted  by other Internet users   The Block WAN Request feature also reinforces your network security by hiding your network ports  Both  functions of the Block WAN Request feature make it more difficult for outside users to work their way into your  network  This feature is enabled by default  Select Disabled to allow anonymous Internet requests     Filter Multicast  Multicasting allows for multiple transmissions to specific recipients at the same time  If  multicasting is permitted  then the Router will allow IP multicast packets to be forwarded to the appropriate  computers  Select Enabled to filter multicasting  or Disabled to disable this feature     Filter Internet NAT Redirection  This feature uses port forwarding to block access to local servers from local  networked computers  Select Enabled to filter Internet NAT redirection  or Disabled to disable this feature     Filter IDENT  Port 113   This feature keeps port 113 from being scanned by devices outside of your local  network  Select Enabled to filter port 113  or Disabled to disable this feature     Change these settings as described here and click the Save Settings button to apply your changes or Cancel  Changes to cancel your changes     The Security Tab   VPN Passthrough    Use the settings on this tab to allow VPN tunnels using IPSec  PPTP  or L2TP protocols to pass through the  Router   s firewall     IPSec Pass through  Internet Protocol Security  IPSec  is a suite of protocols used to implement secure  exchan
52. d Router is compatible with all 802 11b and 802 119 adapters  such as the Notebook  Adapters  WPC54G  WPC11  for your laptop computers  PCI Adapter  WMP54G  WMP11  for your desktop PC  and  USB Adapter  WUSB54G  WUSB11  when you want to enjoy USB connectivity  The Broadband Router will also  communicate with the Wireless PrintServer  WPS54G  and Wireless Ethernet Bridges  WET54G  WET11      When you wish to connect your wireless network with your wired network  you can use the Wireless G  Broadband Router   s four LAN ports  To add more ports  any of the Wireless G Broadband Router s LAN ports can  be connected to any of Linksys s switches  such as the SD205 or  D208      With these  and many other  Linksys products  your networking options are limitless  Go to the Linksys website at  www linksys com for more information about products that work with the Wireless G Broadband Router     Chapter 3  Getting to Know the Wireless G Broadband  Router    The Back Panel    The Router s ports  where the cables are connected  are located on the back panel        IMPORTANT  Resetting the Router will erase  all of your settings  Internet connection   wireless security  and other settings  and  replace them with the factory defaults  Do not  Reset Button There are two ways to reset the Router s factory defaults  Either press the Reset Button  for reset the Router if you want to retain these  approximately five seconds  or restore the defaults from the Administration tab   Factory settings
53. d incorporates Message  Integrity Code  MIC  to provide protection against hackers  and AES  Advanced Encryption System   which utilizes  a symmetric 128 Bit block data encryption  RADIUS  Remote Authentication Dial In User Service  utilizes a  RADIUS server for authentication and the use of dynamic TKIP  AES  or WEP     A    Important  Always remember that each  device in your wireless network MUST use  the same encryption method and encryption  key or your wireless network will not function    properly     76    WPA Pre Shared Key  If you do not have a RADIUS server  select the type of algorithm  TKIP or AES  enter a  password in the Pre Shared key field of 8 64 characters  and enter a Group Key Renewal period time  between 0 and 99 999 seconds  which instructs the Router or other device how often it should change the  encryption keys     WPA RADIUS  WPA used in coordination with a RADIUS server   This should only be used when a RADIUS  server is connected to the Router or other device   First  select the type of WPA algorithm  TKIP or AES  Enter  the RADIUS server   s IP Address and port number  along with a key shared between the device and the server   Last  enter a Group Key Renewal period  which instructs the device how often it should change the encryption  keys     RADIUS  WEP used in coordination with a RADIUS server   This should only be used when a RADIUS server is  connected to the Router or other device   First  enter the RADIUS server   s IP Address and port nu
54. d to specify here     Connect on Demand and Max Idle Time  You can configure the Router to cut the Internet connection after it  has been inactive for a specific period of time  Max Idle Time   If your Internet connection has been    terminated due to inactivity  Connect on Demand enables the Router to automatically re establish your EE Router Name  WRTS4GL  connection as soon as you attempt to access the Internet again  To use Connect on Demand  click the button  Host Name    If you want your Internet connection to remain on at all times  enter 0 in the Max Idle Time field  Otherwise  Domain Name    enter the number of minutes you want to have elapsed before your Internet access disconnects  MTU  Manual v    e G   DEE Size  1492  Keep Alive and Redial Period  This option keeps your Internet access connected indefinitely  even when it sits      idle  If you select this option  the Router will periodically check your Internet connection  If the connection is Figure 6 9  Optional Settings  down  then the Router will automatically re establish the connection  To use this option  click the button next  to Keep Alive  The default Redial Period is 30 seconds     Optional Settings  some of these settings may be required by your ISP  Verify with your ISP before making any changes   Router Name  In this field  you can type a name of up to 39 characters to represent the Router     Host Name Domain Name  These fields allow you to supply a host and domain name for the Router  Some ISPs  
55. day  Then enter a range of hours and minutes during which  the policy will be in effect  or select 24 Hours     Wareless GH    Airean       Taus   Cnebte     f  eetde  Erie Poley hame tat  We  Foueapo      Were eet SE are iaiia ikiyi Srel Tanz    Figure 6 32  List of PCs    49    Blocked Services    You can filter access to various services accessed over the Internet  such as FTP or telnet  by selecting  services from the drop down menus next to Blocked Services   You can block up to 20 services    Then enter the range of ports you want to filter     lf the service you want to block is not listed or you want to edit a service   s settings  then click the Add   Edit Service button  Then the Port Services screen will appear     To add a service  enter the service   s name in the Service Name field  Select its protocol from the Proto   col drop down menu  and enter its range in the Port Range fields  Then click the Add button     To modify a service  select it from the list on the right  Change its name  protocol setting  or port range   Then click the Modify button     To delete a service  select it from the list on the right  Then click the Delete button     When you are finished making changes on the Port Services screen  click the Apply button to save  changes  If you want to cancel your changes  click the Cancel button  To close the Port Services screen  and return to the Access Restrictions screen  click the Close button     Website Blocking by URL Address    lf you want t
56. ddress cloning  enter the 12 digit MAC address in the MAC Address fields provided  two digits per field      wen    See Figure E 5  SC  Sanat Sang       Figure E 4  MAC Address Filter List       Figure E 5  MAC Address Clone    Appendix E  Finding the MAC Address and IP Address for Your Ethernet Adapter    For the Router   s Web based Utility    Appendix E Glossary    802 11b   A wireless networking standard that specifies a maximum data transfer rate of 11Mbps and an  operating frequency of 2 4GHz     802 11g   A wireless networking standard that specifies a maximum data transfer rate of 54Mbps  an operating  frequency of 2 4GHz  and backward compatibility with 802 11b devices     Access Point   A device that allows wireless equipped computers and other devices to communicate with a  wired network  Also used to expand the range of a wireless network     Adapter   A device that adds network functionality to your PC     Ad hoc   A group of wireless devices communicating directly with each other  peer to peer  without the use of  an access point     AES  Advanced Encryption Standard    A security method that uses symmetric 128 bit block data encryption     Backbone   The part of a network that connects most of the systems and networks together  and handles the  most data     Bandwidth   The transmission capacity of a given device or network    Beacon Interval   Data transmitted on your wireless network that keeps the network synchronized   Bit   A binary digit    Boot   To star
57. down  menu     Passphrase   Enter a Passphrase  also called a pre shared key  of 8 32 characters in the Passphrase field   The longer and more complex your Passphrase is  the more secure your network will be     Click the Next button to continue or the Back button to return to the previous screen     Linksys      A Dison of Cisco Systems  inc     Please choose WPA PSK  WEP  B4 Bil   WEP  128 51  or    Disabled     Configure Wireless Security Settings  Optional     Wi Fi Protected Access  WPA  allows you to ise either a Pre Shared Koy WPA PSK   ar RAMUS authentication  WPA PLADIUS   To use WPA PSK   enter the moguired  settings below  To use WPRA HRADIUS  reler lo the User Guide on the Setup CO tow  imstruciions    ESCH    F  Select the type of Encryption your Network uses         Enter the Passphrase used by your network  The passphrase  can use any keyboard character and be between 8 and 33  characters in length        ZZ   ua  an    Broadband Router Setup Wizard viau WATS4G       Figure 5 29  Setup Wizard   s Wireless Security    WPA PSK Screen    wpa  wi fi protected access  a wireless security  protocol using TKIP  Temporal Key Integrity Protocol   encryption  which can be used in conjunction with a  RADIUS server     wep  wired equivalent privacy   a method of  encrypting network data transmitted on a  wireless network for greater security     radius  remote authentication dial in user service   a  protocol that uses an authentication server to control  network access   
58. e   s key functions  The utility can be accessed Refer to    Appendix D  Windows Help    for more  via your web browser through use of a computer connected to the Router  For a basic network setup  most users information on TCP IP  will use these two screens of the Utility     e Basic Setup  On the Basic Setup screen  enter the settings provided by your ISP     Connect to 197 168 1 1    e Management  Click the Administration tab and then the Management tab  The Router   s default password is  admin  To secure the Router  change the Password from its default     There are seven main tabs  Setup  Wireless  Security  Access Restrictions  Applications  amp  Gaming  Administration     and Status  Additional tabs will be available after you click one of the main tabs  SS  User name  fi  To access the Web based Utility  launch Internet Explorer or Netscape Navigator  and enter the Router   s default IP Ze    address  192 168 1 1  in the Address field  Then press Enter      Remember my password    A password request page  shown in Figure 6 1 will appear   Non Windows XP users will see a similar screen    Leave the User Name field blank  The first time you open the Web based Utility  use the default password admin      You can set a new password from the Administration tab   s Management screen   Then click the OK button  __ Cancel       Figure 6 1  Password Screen    32    The Setup Tab   Basic Setup    The first screen that appears displays the Setup tab  This allows you to change t
59. e an optimum location for the Router  The best place for the Router is usually at the center of your  wireless network  with line of sight to all of your mobile stations     7  Fix the direction of the antennas  Try to place the Router in a position that will best cover your wireless  network  Normally  the higher you place the antenna  the better the performance will be        8  Connect a standard Ethernet network cable to the Router   s Internet port  Then  connect the other end of the e  Wireless G  Ethernet cable to one of the numbered Ethernet ports on your other router  Broadband  amp     Router    Multiple PCs  Figure 4 4  Diagram for Connection to Another Router       Figure 4 5  Connecting Another Router    10    9  Decide which network computers or Ethernet devices you want to connect to the Router     Disconnect the selected computers or devices from the other router  and then connect them to the Router   s  numbered ports using standard Ethernet network cabling        Figure 4 6  Connecting Your Network Devices    10  Connect the AC power adapter to the Router s Power port and the other end into an electrical outlet  Only use  the power adapter supplied with the Router  Use of a different adapter may result in product damage     Interne       Figure 4 7  Connecting the Power    Now that the hardware installation is complete  proceed to    Chapter 5  Setting up the Wireless G  Broadband Router     for directions on how to configure the Router     IMPORTANT  Make s
60. e default setting  Mixed Mode  If you have only   en   ten  e  802 119 devices  select G Only  If you have only 802 11b devices  select B Only  If you want to disable your Broadband Router Setup Wizard su WRT546    wireless network  select Disable  Figure 5 28  Setup Wizard   s Wireless Settings Screen       Enter a name for the Router in the Device Name field     Click the Next button to continue or the Back button to return to the previous screen     Chapter 5  Setting up the Wireless G Broadband Router 25  Using the Setup Wizard    3  Select the method of security you want to use  WPA PSK  also called WPA Personal   WEP  64 Bit   or WEP     128 Bit   WPA stands for Wi Fi Protected Access  and WEP stands for Wired Equivalent Privacy  WPA is a  stronger security method than WEP  Proceed to the appropriate section for your security method     If you want to use WPA RADIUS  also called WPA Enterprise   then you should select Disabled and use the  Router   s Web based Utility to configure your wireless security settings  Click the Next button and proceed to  step 4     If you do not want to use any wireless security method  select Disabled and then click the Next button   Proceed to step 4     WPA PSK    WPA PSK offers two encryption methods  TKIP and AES  with dynamic encryption keys  Select TKIP or AES  for encryption  Then enter a Passphrase that is 8 32 characters in length     Encryption   Select the type of algorithm you want to use  TKIP or AES  from the Encryption drop 
61. eEasySetup button        Broadband Router Setup Wizard voor WRTS46       Figure 5 27  Setup Wizard   s Configure Wireless  Settings Screen    2  The Setup Wizard will ask you to enter the settings for your wireless network     In the SS D field  enter the name of your wireless network  The SSID must be identical for all devices in the    network  The default setting is linksys  all lowercase   Dsg Settings   abarrika the box  Peace ie tetas aioe miy ae settings ol WO  existing wireless network Make sure you remember these settings as they will be  heeded when setting up your wireless computari     NOTE  An SSID is the network name shared by all devices in a wireless network  Your network   s  AN SSID should be unique to your network and identical for all devices within the network  0   re     cabo sensitive and should nol exceed J2 characters          The Channel setting i a unique number shared among all computers within  jour winners oohwork  Channels 1  6  and  1 are proioened    Select the operating channel for your wireless network  All of your wireless devices will use this channel to mene Ea Wk Cael cal ihc EE    communicate  lge  riet Penna       Upra Ma H ere The Device Name is a unique name for your Wireless G Broadband Rouler  and should be changed d you hare muibpie Roulers in your network        From the Network Mode drop down menu  select the wireless standards running on your network  If you have ge e    both 802 119 and 802 11b devices in your network  keep th
62. eb  port 21  FTP  is used for FTP  and port 25  SMTP outgoing  and  port 110  POP3 incoming  are used for the mail server  You can get more information by viewing the  documentation provided with the server you installed     Follow these steps to set up port forwarding through the Router   s web based utility  We will be setting up  web  ftp  and mail servers     1     2   3     4   5     Access the Router   s web based utility by going to http   192 168 1 1 or the IP address of the Router   Go to the Applications  amp  Gaming   gt  Port Range Forward tab    Enter any name you want to use for the Application    Enter the Start and End Port range of the service you are using  For example  if you have a web server   you would enter the range 80 to 80    Select the protocol s  you will be using  TCP and or UDP    Enter the IP address of the PC or network device that you want the port server to go to  For example   if the web server   s Ethernet adapter IP address is 192 168 1 100  you would enter 100 in the field  provided  Check    Appendix E  Finding the MAC Address and IP Address for Your Ethernet Adapter    for  details on getting an IP address     6  Check the Enable option for the port services you want to use  Consider the example below     Application Start and End IP Address Enabled       POP3  incoming    110 to 110 192 168 1 102    When you have completed the configuration  click the Save Settings button     63    7    need to set up online game hosting or use other I
63. ected Access   a wireless security  protocol using TKIP  Temporal Key Integrity Protocol   encryption  which can be used in conjunction with a  RADIUS server     SPI  Stateful Packet Inspection  firewall  a technology  that inspects incoming packets of information before  allowing them to enter the network     firewall  Security measures that protect the  resources of a local network from intruders     NAT  Network AddressTranslation   NAT technology  translates IP addresses of a local area network to a  different IP address for the Internet     LAN  Local Area Network   The computers and  networking products that make up the network in  your home or office     What   s in this User Guide     This user guide covers the steps for setting up and using the Wireless G Broadband Router     Chapter 1  Introduction  This chapter describes the Router   s applications and this User Guide     Chapter 2  Planning Your Wireless Network  This chapter describes the basics of wireless networking     Chapter 3  Getting to Know the Wireless G Broadband Router  This chapter describes the physical features of the Router     Chapter 4  Connecting the Wireless G Broadband Router  This chapter instructs you on how to connect the Router to your network     Chapter 5  Setting up the Wireless G Broadband Router   This chapter walks you through the steps of the Wireless G Broadband Router   s Setup Wizard to configure its  settings  It also covers the instructions for using the Router   s SecureEasySe
64. ecureEasySetup on your network  You will need to manually configure your  network security using the encryption supported by your existing devices  Re run the Setup Wizard  On the  Welcome screen for the Setup Wizard  click Click Here to Start and follow the on screen instructions  On the  Configure Wireless Settings screen  click Enter Wireless Settings Manually and continue to follow the on   screen instructions  For more information  refer to    Chapter 5  Setting up the Wireless G Broadband Router        How do I set up additional devices using SecureEasySetup   Repeat the SecureEasySetup process for each device until all of your devices have been configured     Where is my SecureEasySetup button    On the Router  the SecureEasySetup button is located on the front panel  The button should be lighted either  orange or white  For other SecureEasySetup devices  refer to each wireless device s documentation to locate the  button on that device     I have devices that support WPA Personal security  but do not have SecureEasySetup  Can I still use  SecureEasySetup    Yes  Print out the wireless security settings at the end of the SecureEasySetup process  and then manually  configure the settings for your non SecureEasySetup devices  Refer to each wireless device   s documentation for  instructions on how to enter these settings     What is the maximum number of IP addresses that the Router will support   The Router will support up to 253 IP addresses     Is IPSec Pass Through s
65. ed in the browser  Check our website at  www linksys com for more information     If all else fails in the installation  what can   do    Reset the Router by holding down the reset button until the Power LED fully turns on and off  Reset your cable or  DSL modem by powering the unit off and then on  Obtain and flash the latest firmware release that is readily  available on the Linksys website  www linksys com     How will I be notified of new Router firmware upgrades    All Linksys firmware upgrades are posted on the Linksys website at www linksys com  where they can be  downloaded for free  To upgrade the Router   s firmware  use the Administration   Firmware Upgrade tab of the  Router   s web based utility  If the Router   s Internet connection is working well  there is no need to download a  newer firmware version  unless that version contains new features that you would like to use  Downloading a  more current version of Router firmware will not enhance the quality or speed of your Internet connection  and  may disrupt your current connection stability     Will the Router function in a Macintosh environment   Yes  but the Router   s setup pages are accessible only through Internet Explorer 4 0 or Netscape Navigator 4 0 or  higher for Macintosh     Tam not able to get the web configuration screen for the Router  What can I do    You may have to remove the proxy settings on your Internet browser  e g   Netscape Navigator or Internet  Explorer  Or remove the dial up settings
66. ed to    Chapter 6  Configuring the Wireless G  Broadband Router        Chapter 5  Setting up the Wireless G Broadband Router  Using the Setup Wizard          Morton Intemet Seourity    trom Symantec    is the award winning suite  which protects your Pts and your family from the perils of the internet     Ssymantec      Martan AntiVirus     protects email and iastan messages      Morton    Personal Firewall protects agains  hackers and inirusions   inim l    Porcatal Control shields chikiren from obpectponabbe web sites   Internet Security   Blocks spam  banner ads  pap up windows  and more     A special edition of Norton interne  Security with a G0 day free trial of  wirus E firewall updates is included on this Setup CH   Click below to lastall it     Setup Wizard    Back   Finish    Figure 5 25  Setup Wizard   s Safe Surfing Screen    The Wireless G Broadband Router    has been successfully configured     Broadband Router Setup Wizard ver 2    Online Registration         WRT546    Figure 5 26  Setup Wizard   s Congratulations Screen    24    Wireless G Broadband Router    Manually Configuring the Router   s Wireless Settings    i i LINKSYS     1  If you do not have other SecureEasySetup devices  then click the Enter Wireless Settings Manually button  Aaaa ice SNR    Configure Wireless Settings    if you have other SecureEasySetup devices on your network  simply  push the button to add the device to the network  H you do not have a  SecureEasySetup    Where is my other Secur
67. een  Click the Close  button to return to the Diagnostics screen        A Tian te eng    Administration       Adie es Domai Base  150108111    Buerg of ga ga Diet  8    OCH 190 RES LL It II S   Zen been    Eag ingl Ra mees F ea  s   182 AE LL reg gengen    J pii temic  S patka recanted  Dk padue ko  Peete inp Ee   0 S   ALT Ben    Traceroute Test  EP Adii ay amain Harst 1971631   _Tracencute      traceroute to 192 168 6 1  192 1E8 1 D  30 hope mum  40  Le packets  L052 16E DT GD pe ee OS es D Hd ee     See    _Clearlog     Clone            Figure 6 42  The Traceroute Test    56    Wisrweanlace C Draadhans Darkar  Wireless G Broadband Router    The Administration Tab   Factory Defaults    Select the Yes button and then click the Save Settings button to reset all configuration settings to their default  values  Any settings you have saved will be lost when the default settings are restored     The Administration Tab   Firmware Upgrade    Firmware can be upgraded by clicking the Upgrade button after browsing for the firmware  which you can  download from the Linksys website  Do not upgrade your firmware unless you are experiencing problems with  the Router  For more information about upgrading firmware  refer to    Appendix C  Upgrading Firmware        The Administration Tab   Config Management  This screen is used to back up or restore the Router   s configuration file   To back up the Router   s configuration file  click the Backup button  Then follow the on screen instruction
68. entication Dial In User Service   These are briefly discussed  here  For detailed instructions on configuring wireless security for the Router  turn to    Appendix B  Wireless  security        WPA Personal  WPA gives you two encryption methods  TKIP and AES  with dynamic encryption keys  Select the  type of algorithm  TKIP or AES  Enter a WPA Shared Key of 8 63 characters  Then enter a Group Key Renewal  period  which instructs the Router how often it should change the encryption keys     WPA Enterprise  This option features WPA used in coordination with a RADIUS server   This should only be used  when a RADIUS server is connected to the Router   First  select the type of WPA algorithm you want to use  TKIP  or AES  Enter the RADIUS server   s IP Address and port number  along with a key shared between the Router and  the server  Last  enter a Key Renewal Timeout  which instructs the Router how often it should change the  encryption keys        IMPORTANT  If you are using WPA  always  remember that each device in your wireless  network MUST use the same WPA method  and shared key  or else the network will not  function properly     A    A Dram al Daes Smiem ke    Wireless          A fiiin of Chee Eerst  be     Wireless    S  EEKSICE       Seve Seung  Cancel Changes      Figure 6 20  Wireless Tab   Wireless Security   WPA Enterprise     42    Wh F Ale ag 8 DN aa e J Eo T a  J D An geng  Wireless G Broadband Router    WPA2 Personal  WPA2 gives you two encryption methods  TKIP a
69. er to confirm field to confirm     Web Access  HTTP  HyperText Transport Protocol    The communications protocol used to connect to servers on  the World Wide Web  HTTPS   Uses SSL  Secured Socket Layer  to encrypt data transmitted for higher security   Select HTTP or HTTPS  Wireless Access Web   If you are using your Wireless Router in a public domain where you  are giving wireless access to your guests  you can disable wireless access to the router   s web based utility  You  will only be able to access the web based utility via a wired connection if you disable the setting  Select Enable  to enable wireless access to the Router   s web based utility or Disable to disable wireless access to the utility     Remote Router Access  To access the Router remotely  from outside the network  select Enable  Then  enter the  port number that will be open to outside access  You will need to enter the Router   s password when accessing  the Router this way  as usual     UPnP  Select Enable to use the UPnP feature  select Disable otherwise  The default setting is Enable     Change these settings as described here and click the Save Settings button to apply your changes or Cancel  Changes to cancel your changes     The Administration Tab   Log    The Router can keep logs of all traffic for your Internet connection  To disable the Log function  keep the default  setting  Disable  To monitor traffic between the network and the Internet  select Enable  When you wish to view  the logs  click
70. etwork devices    select Enable  To disable this feature  select Disable     A Cited g aa bya Ke    Applications     amp  Gaming    Figure 6 36  Applications and Gaming Tab   DMZ       53    Ethernet Port Priority QoS does not require support from your ISP because the prioritized ports are LAN ports  1 4   in your network     Application Port Priority    Application Port Priority QoS manages information as it is transmitted and received  Depending on the settings of  the QoS screen  this feature will assign information a high or low priority for the applications that you specify     Optimize Gaming Applications  Check this box to automatically allow common game application ports to have a  higher priority  These games include  but are not limited to  Counter Strike  Half Life  Age of Empires  Everquest   Quake2 Quake3 and Diablo Il  The default setting is unchecked     Application Name  Enter the name you wish to give the application   Priority  Select High or Low to assign priority to the application     Specific Port    Enter the port number for the application     Wireless QoS    WMM Support  Wi Fi Multimedia  WMM   formerly known as Wireless Multimedia Extensions  WME   is a Wi Fi  Alliance certified feature  based on the IEEE 802 11e draft standard  This feature provides Quality of Service  QoS   to wireless networks  It is especially suitable for voice  music and video applications  for examples  Voice over IP   VoIP   video streaming and interactive gaming  If you have
71. eveloped by the military for use in  reliable  secure  mission critical communications systems  It is designed to trade off bandwidth efficiency for  reliability  integrity  and security  In other words  more bandwidth is consumed than in the case of narrowband  transmission  but the trade off produces a signal that is  in effect  louder and thus easier to detect  provided that  the receiver knows the parameters of the spread spectrum signal being broadcast  If a receiver is not tuned to  the right frequency  a spread spectrum signal looks like background noise  There are two main alternatives   Direct Sequence Spread Spectrum  DSSS  and Frequency Hopping Spread Spectrum  FHSS      What is DSSS  What is FHSS  And what are their differences    Frequency Hopping Spread Spectrum  FHSS  uses a narrowband carrier that changes frequency in a pattern that  is known to both transmitter and receiver  Properly synchronized  the net effect is to maintain a single logical  channel  To an unintended receiver  FHSS appears to be short duration impulse noise  Direct Sequence Spread   Spectrum  DSSS  generates a redundant bit pattern for each bit to be transmitted  This bit pattern is called a chip   or chipping code   The longer the chip  the greater the probability that the original data can be recovered  Even if  one or more bits in the chip are damaged during transmission  statistical techniques embedded in the radio can  recover the original data without the need for retransmission  To 
72. fields below     ai ii Enter the Usar Mamo and Password  as insirucied by your ISP    Confirm the password by entering the password again in the Canim        ES     Choose Keep Ave and specty a lime interval   fo always keep the inlemet connecton active   Choose Connect on Demand to disconnect be     minutes the niemal after a period of inactivity     a         Keep Alive   seconds    CH Connect on Demand          7 0 E DE      Broadband Router Setup Wizard wi WRT546    Figure 5 11  Setup Wizard   s Configure DSL  PPPoE   Settings Screen    LINKSYS       Afen of Genco Systems  Fe   Advanced Internet Settings    Your Internet connection must be configured manually  Please  contact your ISP and select the proper Internet Connection type     k    Enter the settings provided by your Intemet Service Provider  ISP         Edt   Back   n    Broadband Router Setup Wizard wann  WRT5S46    Figure 5 12  Setup Wizard   s Advanced Internet  Settings   Static IP Screen    17    TATE m Fa laee C BDrenaadhane Darkar  Wireless G Broadband Router    PPTP    Connection   PPTP  Point to Point Tunneling Protocol  service is used in Europe only  If you are using a PPTP  connection  select PPTP from the drop down menu     User Name   Enter the User Name provided by your ISP    Password   Enter the Password provided by your ISP    Confirm   To confirm the Password  enter it again in this field    IP Address   Enter the IP address provided by your ISP    Subnet Mask  Enter the Subnet Mask provided by
73. for each of your other SecureEasySetup  devices  If you are not sure where to find this button  click Where is my other SecureEasySetup button     You will see a screen showing the SecureEasySetup logo  Click the Next button to continue or the Close ee  button to return to the Configure Wireless Settings screen  geeiert he logo below  your wires Sek canbe    configured and secured with a simple push of a baion  Simply locale    You will see a screen with instructions on how to locate the SecureEasySetup hardware button  If your device  does not have a hardware button  it most likely will have a software button  Click the Next button for  instructions to locate the software button  or click the Close button to return to the Configure Wireless  Settings screen     You will see a screen with instructions on how to locate the SecureEasySetup software button  Click the e  Close button to return to the Configure Wireless Settings screen  eege tap waar    dekas user manual ke instructions on hoe bo locate Se  SecurEasySetup bution        Figure 5 22  Additional Information   Software Button  22    Wireless G Broadband Router    2  Press the Router   s orange Cisco logo on its front panel  When the logo turns white and begins to flash  press  the SecureEasySetup button on another device  The Router   s Cisco logo will stop flashing when the device  has been added to the network  Then repeat this procedure for each additional SecureEasySetup device     Configure Wireless Settings  if 
74. g the Power   Figure 5 1  Setup Wizard   s Welcome   Language Selection Screen  Figure 5 2  Setup Wizard   s Welcome   Start Wizard Screen   Figure 5 3  Setup Wizard   s License Agreement Screen   Figure 5 4  Setup Wizard   s Disconnect the Modem from the PC Screen  Figure 5 5  Setup Wizard   s Connect the Modem to the Router Screen  Figure 5 6  Setup Wizard   s Connect a Network Cable to a PC Screen  Figure 5 7  Setup Wizard   s Connect the Network Cable to the Router Screen  Figure 5 8  Setup Wizard   s Power on the Router Screen   Figure 5 9  Setup Wizard   s Check the Router   s Status Screen   Figure 5 10  Setup Wizard   s Configure Cable or DHCP Settings Screen  Figure 5 11  Setup Wizard   s Configure DSL  PPPoE  Settings Screen  Figure 5 12  Setup Wizard   s Advanced Internet Settings   Static IP Screen  Figure 5 13  Setup Wizard   s Advanced Internet Settings   PPTP Screen  Figure 5 14  Setup Wizard   s Keep Alive Connect on Demand  PPTP Continued  Screen  Figure 5 15  Setup Wizard   s Advanced Internet Settings   L2TP Screen  Figure 5 16  Setup Wizard   s Advanced Internet Settings   Telstra Screen  Figure 5 17  Setup Wizard   s Set the Router   s Password Screen   Figure 5 18  Setup Wizard   s Configure Wireless Settings Screen   Figure 5 19  Setup Wizard   s SecureEasySetup Screen   Figure 5 20  SecureEasySetup Logo   Figure 5 21  Additional Information   Hardware Button   Figure 5 22  Additional Information   Software Button    Figure 5 23  Setup Wizard   s Config
75. ge of packets at the IP layer  To allow IPSec tunnels to pass through the Router  click Enable  IPSec Pass   Through is enabled by default     PPTP Pass through  Point to Point Tunneling Protocol  PPTP  allows the Point to Point Protocol  PPP  to be  tunneled through an IP network  To allow PPTP tunnels to pass through the Router  click Enable  PPTP Pass   Through is enabled by default     L2TP Pass through  Layer 2 Tunneling Protocol is the method used to enable Point to Point sessions via the  Internet on the Layer 2 level  To allow L2TP tunnels to pass through the Router  click Enable  L2TP Pass Through  is enabled by default           8 Deven pf Dece Agent  Re     Demana    rete eT    Wirelecs G Broadband Powter WETS Wl    Security       WEN    Figure 6 28  Security Tab   Firewall    Li    A Dian of pcg rri  ire     Wheless G Broadband Rowe    Security    Figure 6 29  Security Tab   VPN Passthrough    48    Change these settings as described here and click the Save Settings button to apply your changes or Cancel  Changes to cancel your changes     Restrictions    The Access Restrictions Tab   Internet Access    The Internet Access screen allows you to block or allow specific kinds of Internet usage and traffic  such as  Internet access  designated services  websites  and inbound traffic during specific days and times     Internet Access Policy  Access can be managed by a policy  Use the settings on this screen to establish an  access policy  after the Save Settings button
76. h no association to an Ethernet adapter  Highlight it and click the Properties button    In the TCP IP properties window  select the IP address tab  and select Specify an IP address  Enter  a unique IP address that is not used by any other computer on the network connected to the Router   Make sure that each IP address is unique for each PC or network device    Click the Gateway tab  and in the New Gateway prompt  enter 192 168 1 1  which is the default IP  address of the Router  Click the Add button to accept the entry    Click the DNS tab  and make sure the DNS Enabled option is selected  Enter the Host and Domain  names  e g   John for Host and home for Domain   Enter the DNS entry provided by your ISP  If your  ISP has not provided the DNS IP address  contact your ISP to get that information or go to its website  for the information    Click the OK button in the TCP IP properties window  and click Close or the OK button for the Network  window    Restart the computer when asked     60    e For Windows 2000     1   2     3     8     9   e For    Click Start  Settings  and Control Panel  Double click Network and Dial Up Connections   Right click the Local Area Connection that is associated with the Ethernet adapter you are using  and  select the Properties option    In the Components checked are used by this connection box  highlight Internet Protocol  TCP IP    and click the Properties button  Select Use the following IP address option    Enter a unique IP address that is 
77. have excellent signal strength  but   cannot see my network    Wireless security is probably enabled on the Router  but not on your wireless adapter  or vice versa   Verify that  the same wireless security method and passphrase keys are being used on all devices of your wireless network   How many channels frequencies are available with the Router    There are eleven available channels  ranging from 1 to 11  in North America  There may be additional channels  available in other regions  subject to the regulations of your region and or country     If your questions are not addressed here  refer to the Linksys website  www linksys com     74    Appendix B  Wireless Security    Linksys wants to make wireless networking as safe and easy for you as possible  The current generation of  Linksys products provide several network security features  but they require specific action on your part for  implementation  So  keep the following in mind whenever you are setting up or using your wireless network     Security Precautions    The following is a complete list of security precautions to take  as shown in this User Guide   at least steps 1  through 5 should be followed      1  Change the default SSID    2  Disable SSID Broadcast    3  Change the default password for the Administrator account   4  Enable MAC Address Filtering    5  Change the SSID periodically     6  Use the highest encryption algorithm possible  Use WPA if it is available  Please note that this may reduce  your networ
78. he Power LED stop flashing    e If the firmware upgrade failed  use the TFTP program  it was downloaded along with the firmware   Open  the pdf that was downloaded along with the firmware and TFTP program  and follow the pdf   s  instructions    e Seta static IP address on the PC  refer to    Problem  2    need to set a static IP address     Use the following  IP address settings for the computer you are using    IP Address  192 168 1 50  Subnet Mask  255 255 255 0  Gateway  192 168 1 1  e Perform the upgrade using the TFTP program or the Administration tab of the Router   s web based utility     14  My DSL service   s PPPoE is always disconnecting   PPPoE is not actually a dedicated or always on connection  The DSL ISP can disconnect the service after a  period of inactivity  just like a normal phone dial up connection to the Internet   e There is a setup option to    keep alive    the connection  This may not always work  so you may need to re   establish connection periodically   1  To connect to the Router  go to the web browser  and enter http   192 168 1 1 or the IP address of the  Router   Enter the password  if asked   The default password is admin    On the Setup screen  select the option Keep Alive  and set the Redial Period option at 20  seconds    Click the Save Settings button   Click the Status tab  and click the Connect button   You may see the login status display as Connecting  Press the F5 key to refresh the screen  until you  see the login status display as
79. he Router s general settings   Change these settings as described here and click the Save Settings button to apply your changes or Cancel  Changes to cancel your changes     Internet Setup    The Internet Setup section configures the Router to your Internet connection  Most of this information can be  obtained through your ISP     Internet Connection Type  Choose the type of Internet connection your ISP provides from the drop down menu     e DHCP  By default  the Router   s Internet Connection Type is set to Automatic Configuration   DHCP  which  should be kept only if your ISP supports DHCP or you are connecting through a dynamic IP address     e Static IP  If you are required to use a permanent IP address to connect to the Internet  select Static IP     Internet IP Address  This is the Router   s IP address  when seen from the Internet  Your ISP will provide you  with the IP Address you need to specify here     Subnet Mask  This is the Router   s Subnet Mask  as seen by users on the Internet  including your ISP   Your ISP  will provide you with the Subnet Mask     Gateway  Your ISP will provide you with the Gateway Address  which is the ISP server   s IP address   Static DNS  1  3   Your ISP will provide you with at least one DNS  Domain Name System  Server IP Address     e PPPOE  Some DSL based ISPs use PPPoE  Point to Point Protocol over Ethernet  to establish Internet  connections  If you are connected to the Internet through a DSL line  check with your ISP to see if the
80. ibes how to find the MAC address for your computer   s Ethernet adapter so you can use the MAC  filtering and or MAC address cloning feature of the Router  You can also find the IP address of your computer   s  Ethernet adapter  This IP address is used for the Router   s filtering  forwarding  and or DMZ features  Follow the  steps in this appendix to find the adapter   s MAC or IP address in Windows 98  Me  2000  or XP     Windows 98SE or Me Instructions    1  Click Start and Run  In the Open field  enter winipcfg  Then press the Enter key or the OK button     2  When the  P Configuration screen appears  select the Ethernet adapter you have connected to the Router via a  CAT 5 Ethernet network cable  See Figure E 1     3  Write down the Adapter Address as shown on your computer screen  see Figure E 2   This is the MAC address  for your Ethernet adapter and is shown as a series of numbers and letters     The MAC address Adapter Address is what you will use for MAC address cloning or MAC filtering     The example in Figure E 3 shows the Ethernet adapter   s IP address as 192 168 1 100  Your computer may  show something different     Note  The MAC address is also called the Adapter Address     Windows 2000 or XP Instructions  1  Click Start and Run  In the Open field  enter cmd  Press the Enter key or click the OK button     2  Atthe command prompt  enter ipconfig  all  Then press the Enter key        REIP Configuration sg Iti       Ethemet Adapter Infomation         7p     Lin
81. ing up the Wireless G Broadband Router  Using the Setup Wizard       LINKSYS       A Division of Cisco Systems  ine     Set the Router   s Password    Ch For security reasons  you should change your password          Crmate a password and enter it in the Password beld   Re enter the password in the Comimn field           Note  You will need this password to access the   tility     Router   s web based ublity              Back T  Broadband Router Setup Wizard ven WATS4G  Figure 5 17  Setup Wizard   s Set the Router   s  Password Screen    Configure Wireless Settings    if you have other SecureEasySetup devices on your network  simply  push the button to add the device to the network  H you do not have a    Where is my other SecureEasySetup button           Broadband Router Setup Wizard vc WRTS4G    Figure 5 18  Setup Wizard   s Configure Wireless  Settings Screen    21    Using the Router   s SecureEasySetup Feature    Read these instructions before you press any SecureEasySetup buttons  You should locate the SecureEasySetup  buttons of your devices before using the Router   s SecureEasySetup feature     NOTE  SecureEasySetup uses WPA Personal encryption  If your current wireless devices do not   A support WPA Personal security  then you cannot use SecureEasySetup on your network  You will  need to manually configure your network security using the encryption supported by your   existing devices  Tin naiai       1  Before you push any button  locate the SecureEasySetup button 
82. ive seconds  The  Cisco logo will flash slowly as the Router resets itself  The Cisco logo will turn orange to  indicate a successful reset     Green  The Power LED lights up and will stay on while the Router is powered on  When the  Router goes through its self diagnostic mode during every boot up  this LED will flash  When  the diagnostic is complete  the LED will be solidly lit     Green  The DMZ LED indicates when the DMZ function is being used  This LED will remain lit  as long as DMZ is enabled     Green  The WLAN LED lights up when the wireless feature is enabled  If the LED is flashing   the Router is actively sending or receiving data over the network     Green  These numbered LEDs  corresponding with the numbered ports on the Router   s back  panel  serve two purposes  If the LED is continuously lit  the Router is successfully connected  to a device through that port  A flashing LED indicates network activity over that port     Green  The Internet LED lights up when there is a connection made through the Internet port     Chapter 4  Connecting the Wireless G Broadband Router    Overview    This chapter includes two sets of instructions  If the Wireless G Broadband Router will be the only router in your  network  follow the instructions in    Hardware Installation for Connection to Your Broadband Modem     If you want  to install the Wireless G Broadband Router behind another router in your network  then follow the instructions in     Hardware Installation for Connec
83. jar ma jistax jintrema ma  skart muni  ipali li ma   iex  isseparat  Is simbolu jindika li dan il prodott g  andu jintrema separatament minn  ma l iskart domestiku regolari  Hija responsabbilt   tieg  ek li tarmi dan it tag  mir  u kull tag  mir ie  or ta    l elettriku u elettroniku permezz ta    fa  ilitajiet ta      bir  appuntati apposta mill gvern jew mill awtoritajiet lokali  Ir rimi b mod korrett u r   ri  ikla     jg  in jipprevjeni konsegwenzi negattivi potenzjali g  all ambjent u g  as   sa    a tal bniedem  G  al aktar informazzjoni dettaljata dwar ir rimi tat tag  mir  antik tieg  ek  jekk jog    bok ikkuntattja lill awtoritajiet lokali tieg  ek  is servizzi  g  ar rimi ta  l iskart  jew il   anut minn fejn xtrajt il prodott     Magyar Hungarian  K  rnyezetv  delmi inform  ci   az eur  pai uni  s v  s  rl  k sz  m  ra    A 2002 96 EC sz  m   eur  pai uni  s ir  nyelv megkiv  nja  hogy azokat a  term  keket  amelyeken    s vagy amelyek csomagol  s  n az alabbi cimke  megjelenik  tilos a t  bbi szelektalatlan lakoss  gi hullad  kkal egy  tt kidobni  A  cimke azt jel  li  hogy az adott term  k kidobasakor a szokvanyos h  ztart  si  hullad  kelszallitasi rendszerekt  l elk  l  n  tett elj  r  st kell alkalmazni  Az On  felel  ss  ge  hogy ezt    s mas elektromos es elektronikus berendez  seit a  korm  nyzati vagy a helyi hat  s  gok   ltal kijel  lt gyujtoredszereken kereszt  l  szamolja fel  A megfelel   hulladekfeldolgozas segit a k  rnyezetre   s az emberi  eg  szs
84. k performance     7  Change the WEP encryption keys periodically     To ensure network security  steps one through five should be followed  at least     Security Threats Facing Wireless Networks    Wireless networks are easy to find  Hackers know that in order to join a wireless network  wireless networking  products first listen for    beacon messages     These messages can be easily decrypted and contain much of the  network   s information  such as the network   s SSID  Service Set Identifier   Here are the steps you can take     Change the administrator   s password regularly  With every wireless networking device you use  keep in  mind that network settings  SSID  WEP keys  etc   are stored in its firmware  Your network administrator is the  only person who can change network settings  If a hacker gets a hold of the administrator   s password  he  too   can change those settings  So  make it harder for a hacker to get that information  Change the administrator   s  password regularly     A    Note  Some of these security features are  available only through the network router or  access point  Refer to the router or access  point   s documentation for more information     19    SSID  There are several things to keep in mind about the SSID   1  Disable Broadcast   2  Make it unique   3  Change it often    Most wireless networking devices will give you the option of broadcasting the SSID  While this option may be  more convenient  it allows anyone to log into your wireless
85. ksys LNE100TS Fast Etherrve         Lirikave LHE TOOTA Fast Ethernet Ad  Adapter Address PPP Adap e o Se       IP Address  192168145  Subnet Mask 255 255 255 0    Default Gateway   192 168 1 254    D oO n  io    Release All   Renew All   Mote Info  gt  gt             Figure E 1  IP Configuration Screen    TAP contusion TE  m Ethemet Adapter Infomation     Linksys LNE1TO0TA Fast Ethene       Adapter Address  IPAddess   492168 1 100  Subnet Mask 255 255 255 0    Default Gateway   152 168 1 1    Release   Renew    Release All Renew All More Info  gt  gt       Figure E 2  MAC Address Adapter Address       Figure E 3  MAC Address Physical Address    80    Wireless G Broadband Router    3  Write down the Physical Address as shown on your computer screen  Figure E 3   it is the MAC address for Sb WAC Address Filter ist   Micresoft internet Explorer  your Ethernet adapter  This appears as a series of numbers and letters  FER    The MAC address Physical Address is what you will use for MAC address cloning or MAC filtering     MAC 11     MAC 13     MACH   MAC 15   MAC Pes  MAC 17     Note  The MAC address is also called the Physical Address  MAC 12     The example in Figure E 3 shows the Ethernet adapter   s IP address as 192 168 1 100  Your computer may   mt    show something different    SEN    For the Router   s Web based Utility   ue      For MAC filtering  enter the 12 digit MAC address in this format  XXXXXXXXXXXX  WITHOUT the hyphens  See MAC 6   Figure E 4  MAC 37     For MAC a
86. low  only minor reduction of the default value  2347  is  recommended  If a network packet is smaller than the preset RTS threshold size  the RTS CTS mechanism will  not be enabled  The Router sends Request to Send  RTS  frames to a particular receiving station and negotiates  the sending of a data frame  After receiving an RTS  the wireless station responds with a Clear to Send  CTS   frame to acknowledge the right to begin transmission  The RTS Threshold value should remain at its default value  of 2347     AP Isolation  This isolates all wireless clients and wireless devices on your network from each other  Wireless  devices will be able to communicate with the Router but not with each other  To use this function  select On  AP  Isolation is Off by default     Secure Easy Setup  This feature allows you to enable or disable the SecureEasySetup feature  Select Disable to  disable the feature and turn off the button   s light  The feature is enabled by default     Change these settings as described here and click the Save Settings button to apply your changes or Cancel  Changes to cancel your changes     47    The Security Tab   Firewall    Firewall Protection  This feature employs Stateful Packet Inspection  SPI  for a more detailed review of data  packets entering your network environment     Block WAN Requests  Enable the Block WAN Request feature by checking the box beside Block Anonymous  Internet Requests and you can prevent your network from being    pinged     or dete
87. mber  along  with a key shared between the device and the server  Then  select a WEP key and a level of WEP encryption   and either generate a WEP key through the Passphrase or enter the WEP key manually     Implementing encryption may have a negative impact on your network   s performance  but if you are transmitting  sensitive data over your network  encryption should be used     These security recommendations should help keep your mind at ease while you are enjoying the most flexible  and convenient technology Linksys has to offer     NOTE  The maximum performance for wireless is derived from IEEE Standard 802 11 specifications  Actual  performance can vary  including lower wireless network capacity  data throughput rate  range and coverage   Performance depends on many factors  conditions and variables  including distance from the access point   volume of network traffic  building materials and construction  operating system used  mix of wireless products  used  interference and other adverse conditions     11    Appendix C  Upgrading Firmware    The Router s firmware is upgraded through the Web based Utility s Administration tab  Follow these instructions   1     2     Download the firmware from Linksys s website at www linksys com    Extract the firmware file on your computer    Open the Router   s Web based Utility  and click the Administration tab    Click Firmware Upgrade  and the Upgrade Firmware screen will appear    Enter the location of the firmware s file or cli
88. ming clients of the next window for listening to broadcast and  multicast messages  When the Router has buffered broadcast or multicast messages for associated clients  it  sends the next DTIM with a DTIM Interval value  Its clients hear the beacons and awaken to receive the broadcast  and multicast messages  The default value is 1     Arens of Conte Lea  ee     Wireless    Figure 6 27     V  vpleas       Aufterdrg  ee  Type Push   iieii Auto  Bazie Kee Detauh am fami   Deel    ul al Oe on your renters  Treni tior Bee Aay  7 ea Aget ust gan nuppi Shared Kg  CTS Progen Wipe  Disable   ten g Conable  andere   Fr irna Ben Drisble    peist Quate   Dini i 100    feint 100  Militecords  Ranga     B05   Deini 1  Range 1  2281   Deist F346  Range  258 245     DTM interval 1  Frogenepntation Tseztept 2345    ATS Threthold faa  Dais S47  Range  0  EHT   AP hobo Of    Geif Gg  Secuelary setup Eneblad O peii Enabled        Seve Setngs lf  Conce Changes      Wireless Tab   Advanced Wireless Settings    46    Fragmentation Threshold  This value specifies the maximum size for a packet before data is fragmented into  multiple packets  If you experience a high packet error rate  you may slightly increase the Fragmentation  Threshold  Setting the Fragmentation Threshold too low may result in poor network performance  Only minor  reduction of the default value is recommended  In most cases  it should remain at its default value of 2346     RTS Threshold  Should you encounter inconsistent data f
89. nada     Industry Canada Statement    Operation is subject to the following two conditions     1   2     This device may not cause interference and    This device must accept any interference  including interference that may cause undesired operation of the device   This device has been designed to operate with an antenna having a maximum gain of 2dBi  An antenna having a higher  gain is strictly prohibited per regulations of Industry Canada  The required antenna impedance is 50 ohms    To reduce potential radio interference to other users  the antenna type and its gain should be so chosen that the EIRP is  not more than required for successful communication     Industry Canada Radiation Exposure Statement    This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment  This equipment  should be installed and operated with minimum distance 20cm between the radiator  amp  your body    This transmitter must not be co located or operating in conjunction with any other antenna or transmitter     Avis d Industrie Canada    L utilisation de ce dispositif est autoris  e seulement aux conditions suivantes      1   2     il ne doit pas produire de brouillage et    il doit accepter tout brouillage radio  lectrique re  u  m  me si ce brouillage est susceptible de compromettre le  fonctionnement du dispositif  Le dispositif a   t   con  u pour fonctionner avec une antenne ayant un gain maximum de 2  dBi  Les r  glements d industrie Canada interdisen
90. ncryption   Encoding data transmitted in a network     Ethernet   A networking protocol that specifies how data is placed on and retrieved from a common transmission  medium     Finger   A program that tells you the name associated with an e mail address     Firewall   A set of related programs located at a network gateway server that protects the resources of a  network from users from other networks     Firmware   The programming code that runs a networking device     Fragmentation  Breaking a packet into smaller units when transmitting over a network medium that cannot  support the original size of the packet     FTP  File Transfer Protocol    A protocol used to transfer files over a TCP IP network   Full Duplex   The ability of a networking device to receive and transmit data simultaneously   Gateway   A device that interconnects networks with different  incompatible communications protocols     Half Duplex   Data transmission that can occur in two directions over a single line  but only one direction at a  time     Hardware   The physical aspect of computers  telecommunications  and other information technology devices     HTTP  Hypertext Transport Protocol    The communications protocol used to connect to servers on the World  Wide Web     Infrastructure   A wireless network that is bridged to a wired network via an access point   IP  Internet Protocol    A protocol used to send data over a network     IP Address   The address used to identify a computer or device on a 
91. nd AES  with dynamic encryption keys  Select      the type of algorithm  AES  or TKIP   AES  Enter a WPA Shared Key of 8 63 characters  Then enter a Group Key   Ve Pome to et     Wirelessf Broadband Hower WT SG    Renewal period  which instructs the Router how often it should change the encryption keys      r    Wireless       L Seve Settings      Figure 6 21  Wireless Tab   Wireless Security   WPA2 Personal     Teapa    Lbs  pall ST    Witelest G Broadband Router    WPAZ2 Enterprise  This option features WPA2 used in coordination with a RADIUS server   This should only be  used when a RADIUS server is connected to the Router   First  select the type of WPA algorithm you want to use   AES  or TKIP   AES  Enter the RADIUS server   s IP Address and port number  along with a key shared between the         WA  Entanpeisa      Router and the server  Last  enter a Key Renewal Timeout  which instructs the Router how often it should change anii BLE  the encryption keys   lt u CR     Seve Setings H _ Concei Changes    Figure 6 22  Wireless Tab   Wireless Security     WPA2 Enterprise   Chapter 6  Configuring the Wireless G Broadband Router 43  The Wireless Tab   Wireless Security    WAT swe alinee C Draadhangel H nitar  Wireless G Broadband Router    RADIUS  This option features WEP used in coordination with a RADIUS server   This should only be used when a  RADIUS server is connected to the Router   First  enter the RADIUS server   s IP Address and port number  along encryption  alway
92. ned  select Enable   User Defined Entry  Enter the MAC Address registered with your ISP here   Clone Your PC   s MAC Address  Clicking this button will clone the MAC address     Change these settings as described here and click the Save Settings button to apply your changes or Cancel  Changes to cancel your changes     A Gree of Deco Serna  ke    Setup            Seve sennae H Cancel Changes    Figure 6 15  Setup Tab   MAC Address Clone       39    The Setup Tab   Advanced Routing    This tab is used to set up the Router   s advanced functions  Operating Mode allows you to select the type s  of  advanced functions you use  Dynamic Routing will automatically adjust how packets travel on your network  Static  Routing sets up a fixed route to another network destination     Operating Mode  Select the mode in which this Router will function  If this Router is hosting your network   s  connection to the Internet  select Gateway  If another Router exists on your network  select Router  When Router is  chosen  the Dynamic Routing option will be available     Dynamic Routing  This feature enables the Router to automatically adjust to physical changes in the network   s  layout and exchange routing tables with the other router s   The Router determines the network packets    route  based on the fewest number of hops between the source and the destination  This feature is Disabled by default   From the drop down menu  you can also select LAN  amp  Wireless  which performs dynamic routi
93. network     84    IPCONFIG   A Windows 2000 and XP utility that displays the IP address for a particular networking device    IPSec  Internet Protocol Security    A VPN protocol used to implement secure exchange of packets at the IP layer   ISM band   Radio bandwidth utilized in wireless transmissions    ISP  Internet Service Provider    A company that provides access to the Internet    LAN  Local Area Network    The computers and networking products that make up your local network     LEAP  Lightweight Extensible Authentication Protocol    A mutual authentication method that uses a username  and password system     MAC  Media Access Control  Address   The unique address that a manufacturer assigns to each networking  device     Mbps  MegaBits Per Second    One million bits per second  a unit of measurement for data transmission   mIRC   An Internet Relay Chat program that runs under Windows   Multicasting   Sending data to a group of destinations at once     NAT  Network Address Translation    NAT technology translates IP addresses of a local area network to a different  IP address for the Internet     Network   A series of computers or devices connected for the purpose of data sharing  storage  and or  transmission between users     NNTP  Network News Transfer Protocol    The protocol used to connect to Usenet groups on the Internet   Node   A network junction or connection point  typically a computer or work station     OFDM  Orthogonal Frequency Division Multiplexing    F
94. ng over your  Ethernet and wireless networks  You can also select WAN  which performs dynamic routing with data coming from  the Internet  Finally  selecting Both enables dynamic routing for both networks  as well as data from the Internet     Static Routing  To set up a static route between the Router and another network  select a number from the Static  Routing drop down list   A static route is a pre determined pathway that network information must travel to reach a  specific host or network   Enter the information described below to set up a new static route   Click the Delete This  Entry button to delete a static route      Enter Route Name  Enter a name for the Route here  using a maximum of 25 alphanumeric characters     Destination LAN IP  The Destination LAN IP is the address of the remote network or host to which you want to  assign a static route     Subnet Mask  The Subnet Mask determines which portion of a Destination LAN IP address is the network  portion  and which portion is the host portion     Default Gateway  This is the IP address of the gateway device that allows for contact between the Router and  the remote network or host     Interface  This interface tells you whether the Destination IP Address is on the LAN  amp  Wireless  Ethernet and  wireless networks   the WAN  Internet   or Loopback  a dummy network in which one PC acts like a network     necessary for certain software programs      Click the Show Routing Table button to view the Static Routes y
95. not be disposed of with unsorted  municipal waste  The symbol indicates that this product should be disposed of  separately from regular household waste streams  It is your responsibility to  dispose of this and other electric and electronic equipment via designated  collection facilities appointed by the government or local authorities  Correct  disposal and recycling will help prevent potential negative consequences to the  environment and human health  For more detailed information about the disposal  of your old equipment  please contact your local authorities  waste disposal  service  or the shop where you purchased the product     Cestina Czech    Informace o ochran   zivotniho prostredi pro zakazniky v zemich Evropsk    unie    Evropsk   sm  rnice 2002 96 ES zakazuje  aby zafizeni oznacen   timto  symbolem na produktu anebo na obalu bylo likvidovano s netrid  nym  komunalinim odpadem  Tento symbol ud  v    ze dan   produkt musi byt likvidov  n  odd  len   od b  zn  ho komunalniho odpadu  Odpovidate za likvidaci tohoto  produktu a dal  ich elektrick  ch a elektronick  ch zarizeni prostrednictvim  ur  en  ch sb  rn  ch mist stanovenych vl  dou nebo mistnimi     ady  Spr  vn    likvidace a recyklace pomaha p  edch  zet potencialnim negativnim dopad  m na    ivotn   prost  ed   a lidsk   zdrav    Podrobn  j     informace o likvidaci star  ho  vybaveni si laskav   vy    dejte od mistnich     ad    podniku zabyvajiciho se  likvidaci Komunalnich odpad   nebo obchodu  kde jste
96. not used by any other computer on the network connected to the  Router    Enter the Subnet Mask  255 255 255 0    Enter the Default Gateway  192 168 1 1  Router   s default IP address     Toward the bottom of the window  select Use the following DNS server addresses  and enter the  Preferred DNS server and Alternative DNS server  provided by your ISP   Contact your ISP or go on its  website to find the information    Click the OK button in the Internet Protocol  TCP IP  Properties window  and click the OK button in the  Local Area Connection Properties window    Restart the computer if asked     Windows XP     The following instructions assume you are running Windows XP with the default interface  If you are using  the Classic interface  where the icons and menus look like previous Windows versions   please follow the  instructions for Windows 2000     k  2   3     4     Click Start and Control Panel    Click the Network and Internet Connections icon and then the Network Connections icon   Right click the Local Area Connection that is associated with the Ethernet adapter you are using   and select the Properties option    In the This connection uses the following items box  highlight Internet Protocol  TCP IP   Click the  Properties button    Enter a unique IP address that is not used by any other computer on the network connected to the  Router    Enter the Subnet Mask  255 255 255 0    Enter the Default Gateway  192 168 1 1  Router   s default IP address     Toward the bott
97. nternet applications   If you want to play online games or use Internet applications  most will work without doing any port  forwarding or DMZ hosting  There may be cases when you want to host an online game or Internet  application  This would require you to set up the Router to deliver incoming packets or data to a specific  computer  This also applies to the Internet applications you are using  The best way to get the information on  what port services to use is to go to the website of the online game or application you want to use  Follow  these steps to set up online game hosting or use a certain Internet application    1  Access the Router   s web interface by going to http   192 168 1 1 or the IP address of the Router  Go to  the Applications  amp  Gaming   gt  Port Range Forward tab    2  Enter any name you want to use for the Application    3  Enter the Start and End Port range of the service you are using  For example  if you want to host  Unreal Tournament  UT   you would enter the range 7777 to 27900    4  Select the protocol s  you will be using  TCP and or UDP    5  Enter the IP address of the PC or network device that you want the port server to go to  For example   if the web server   s Ethernet adapter IP address is 192 168 1 100  you would enter 100 in the field  provided  Check    Appendix E  Finding the MAC Address and IP Address for Your Ethernet Adapter    for  details on getting an IP address    6  Check the Enable option for the port services you want 
98. o block websites with specific URL addresses  enter each URL in a separate field next to  Website Blocking by URL Address     Website Blocking by Keyword    If you want to block websites using specific keywords  enter each keyword in a separate field next to  Website Blocking by Keyword     Click the Save Settings button to save the policy   s settings  To cancel the policy   s settings  click the  Cancel Changes button        Beetoacel     Tee       Part Range    CZE  Dada   wel Gees        SHME   1511p    TFTP ieres           Figure 6 33  Port Services    The Applications and Gaming Tab   Port Range Forward    The Applications and Gaming Tab allows you to set up public services on your network  such as web servers  ftp  servers  e mail servers  or other specialized Internet applications   Specialized Internet applications are any  applications that use Internet access to perform functions such as videoconferencing or online gaming  Some  Internet applications may not require any forwarding      To forward a port  enter the information on each line for the criteria required  The criteria are described here     Application  In this field  enter the name you wish to give the application  Each name can be up to 12 characters     Start End  This is the port range  Enter the number that starts the port range under Start and the number that  ends the range under End     Protocol  Enter the protocol used for this application  either TCP or UDP  or Both   IP Address  For each applic
99. o the  Router Screen    7  The Setup Wizard will ask you to connect a network cable to your PC  After you have done so  click the Next  button  Linksys      A Division of Deco Systeme  be     Connect the Router to a PC    Broadband Router Setup Wizard weir WRTS46       Figure 5 6  Setup Wizard   s Connect a Network Cable to a  PC Screen    Chapter 5  Setting up the Wireless G Broadband Router 14  Using the Setup Wizard    Wireless G Broadband Router  8  The Setup Wizard will ask you to connect the other end of the network cable to the Router   Then you can also connect additional PCs to the Router     After you have done so  click the Next button     9  The Setup Wizard will ask you to power on the Router  After you have done so  click the Next button     Chapter 5  Setting up the Wireless G Broadband Router  Using the Setup Wizard          LINKSYS      A Cevision ol Cisco Systeme  tae     Connect the Router to a PC    Broadband Router Setup Wizard wain WRATS46    Figure 5 7  Setup Wizard   s Connect the Network Cable  to the Router Screen    LINKSYS      A Rivision ol Cisco Systema  be    Power on the Router      exit Back      Broadband Router Setup Wizard wsi WRTS46    Figure 5 8  Setup Wizard   s Power on the Router Screen    15    Wireless G Broadband Router    10  Make sure the Router   s Power  Internet  and numbered LEDs  depending on the number of PCs connected  are    lit on its front panel  After you have done so  click the Next button  LINKSYS     A freie of Caco 
100. ocated on the Internet     87    VPN  Virtual Private Network    A security measure to protect data as it leaves one network and goes to another  over the Internet     WAN  Wide Area Network   The Internet     WEP  Wired Equivalent Privacy    A method of encrypting network data transmitted on a wireless network for  greater security     WINIPGFG   A Windows 98 and Me utility that displays the IP address for a particular networking device     WLAN  Wireless Local Area Network    A group of computers and associated devices that communicate with  each other wirelessly     WPA  Wi Fi Protected Access    a wireless security protocol using TKIP  Temporal Key Integrity Protocol   encryption  which can be used in conjunction with a RADIUS server     88    Appendix G  Specifications    Model  Standards    Channels    Ports    Buttons   Cabling Type  LEDs   RF Power Output  UPnP able cert  Security Features  Wireless Security    Dimensions   W x H x D     Unit Weight  Power    Certifications    WRT54GL  IEEE 802 3  IEEE 802 3u  IEEE 802 11g  IEEE 802 11b    11 Channels  US  Canada   13 Channels  Europe  Japan     Internet  One 10 100 RJ 45 Port  LAN  Four 10 100 RJ 45 Switched Ports  One Power Port    Reset  SecureEasySetup   CAT5   Power  DMZ  WLAN  LAN  1 4   Internet  SecureEasySetup   18 dBm   Able   Stateful Packet Inspection  SPI  Firewall  Internet Policy   Wi Fi Protected Access    2  WPA2   WEP  Wireless MAC Filtering    7 32  x 1 89  x 6 06    186 mm x 48 mm x 154 mm     13 8
101. oft Internet Explorer 5 0 or higher   1  Click Start  Settings  and Control Panel  Double click Internet Options   Click the Connections tab   Click the LAN settings button and remove anything that is checked   Click the OK button to go back to the previous screen     Click the option Never dial a connection  This will remove any dial up pop ups for PPPoE users   e For Netscape 4 7 or higher   1  Start Netscape Navigator  and click Edit  Preferences  Advanced  and Proxies   2  Make sure you have Direct connection to the Internet selected on this screen   3  Close all the windows to finish     ney    65    11  To start over    need to set the Router to factory default   Hold the Reset button for 10 seconds and then release it  This will return the password  forwarding  and other    settings on the Router to the factory default settings  In other words  the Router will revert to its original  factory configuration     12 1 need to upgrade the firmware   In order to upgrade the firmware with the latest features  you need to go to the Linksys website and download  the latest firmware at www linksys com   Follow these steps   1  Go to the Linksys website at http   www linksys com and download the latest firmware   2  To upgrade the firmware  follow the steps in    Appendix C  Upgrading Firmware        13  The firmware upgrade failed  and or the Power LED is flashing    The upgrade could have failed for a number of reasons  Follow these steps to upgrade the firmware and or   make t
102. om of the window  select Use the following DNS server addresses  and enter the  Preferred DNS server and Alternative DNS server  provided by your ISP   Contact your ISP or go on its  website to find the information    Click the OK button in the Internet Protocol  TCP IP  Properties window  Click the OK button in the  Local Area Connection Properties window     3  I want to test my Internet connection   A Check your TCP IP settings   For Windows 98SE  Me  2000  and XP   e Refer to Windows Help for details  Make sure Obtain IP address automatically is selected in the settings     61    B Open acommand prompt    For Windows 98SE and Me    e Click Start and Run  In the Open field  type command  Press the Enter key or click the OK button    For Windows 2000 and XP    e Click Start and Run  In the Open field  type cmd  Press the Enter key or click the OK button  In the  command prompt  type ping 192 168 1 1 and press the Enter key    e If you get a reply  the computer is communicating with the Router    e If you do NOT get a reply  please check the cable  and make sure Obtain an IP address automatically is  selected in the TCP IP settings for your Ethernet adapter    C Inthe command prompt  type ping followed by your Internet or WAN IP address and press the Enter key    The Internet or WAN IP Address can be found on the Status screen of the Router   s web based utility  For   example  if your Internet or WAN IP address is 1 2 3 4  you would enter ping 1 2 3 4 and press the Enter ke
103. onfiguring the Wireless G Broadband Router    for details on Internet  connection settings    e Make sure you have the right cable  Check to see if the Internet column has a solidly lit Link Act LED    e Make sure the cable connecting from your cable or DSL modem is connected to the Router   s Internet port   Verify that the Status page of the Router   s web based utility shows a valid IP address from your ISP    e Turn off the computer  Router  and cable DSL modem  Wait 30 seconds  and then turn on the Router   cable DSL modem  and computer  Check the Status tab of the Router   s web based utility to see if you get  an IP address     5  I am not able to access the Setup page of the Router   s web based utility    e Refer to    Problem  3    want to test my Internet connection    to verify that your computer is properly  connected to the Router    e Refer to    Appendix E  Finding the MAC Address and IP address for Your Ethernet Adapter    to verify that  your computer has an IP Address  Subnet Mask  Gateway  and DNS    e Seta static IP address on your system  refer to    Problem  2    need to set a static IP address       e Refer to    Problem  10    am a PPPoE user  and I need to remove the proxy settings or the dial up pop up  window        6  I need to set up a server behind my Router and make it available to the public   To use a server like a web  ftp  or mail server  you need to know the respective port numbers they are using   For example  port 80  HTTP  is used for w
104. onsists of two parts     Common Problems and Solutions    and    Frequently Asked Questions      Provided are possible solutions to problems that may occur during the installation and operation of the Router   Read the descriptions below to help you solve your problems  If you can   t find an answer here  check the Linksys  website at www linksys com     Common Problems and Solutions    1  Pm trying to access the Router   s Web based Utility  but   do not see the login screen  Instead  I see a  screen saying     404 Forbidden      If you are using Windows Explorer  perform the following steps until you see the Web based Utility   s login  screen  Netscape Navigator will require similar steps      1   2     3     Click File  Make sure Work Offline is NOT checked    Press CTRL   F5  This is a hard refresh  which will force Windows Explorer to load new webpages   not cached ones    Click Tools  Click Internet Options  Click the Security tab  Click the Default level button  Make sure  the security level is Medium or lower  Then click the OK button     2   need to set a static IP address on a PC   You can assign a static IP address to a PC by performing the following steps   e For Windows 98SE and Me     1   2     Click Start  Settings  and Control Panel  Double click Network    In The following network components are installed box  select the TCP IP  gt  associated with your  Ethernet adapter  If you only have one Ethernet adapter installed  you will only see one TCP IP line  wit
105. otros  residuos urbanos no seleccionados  El simbolo indica que el producto en  cuesti  n debe separarse de los residuos dom  sticos convencionales con vistas  a su eliminaci  n  Es responsabilidad suya desechar este y cualesquiera otros  aparatos electricos y electr  nicos a traves de los puntos de recogida que ponen  a su disposici  n el gobierno y las autoridades locales  Al desechar y reciclar  correctamente estos aparatos estar   contribuyendo a evitar posibles  consecuencias negativas para el medio ambiente y la salud de las personas  Si  desea obtener informaci  n m  s detallada sobre la eliminaci  n segura de su  aparato usado  consulte a las autoridades locales  al servicio de recogida y  eliminaci  n de residuos de su zona o pregunte en la tienda donde adquiri   el  producto      AAnvika Greek    ZTOIXEIA TIEPIBAGAAOVTIKNS TIPOOTAGIAS YIA TEAGTES EvTOS  mc Eupwrtraikns     Evwons    H Koivotikh OSnyia 2002 96 EC artraitei 6110 c  omMou     o OTTOIOS PEPE  AUTO  TO GULBOAO GOTO TIDOIOV KOU OTN OGUOKEUOOIO TOU GEV TTPETTE  VA ATTOPPITTTETAI  pa  i UE Ta UIKTO KOIVOTIKG aTtoppiuparta  To GOULBOAO UTTOOEIKVUE  OTI GUTO TO  TIPOIOV Ba TIPETTE  va ATTOOPITITETAI EEyWPIOTG OTTO Ta ouv    N OIKIOkO  aTroppiwwarta  Eiote uTrevQuvoc yia Thy aTTOpPIWN TOU TTapOVTOC KOL GAAOU  NAEKTPIKOU KOL NAEKTPOVIKOU ELOTTAIGHOU EGU TWV KOBOPIOLEVWV  EYKATACTACEWY CUYKEVTOWONS ATIODPIUUGTUWV OI OTTOIES TIAPEXOVTAI ATTO TO  KpaTocs D Tic app    ie   TOTTIKEG opvtc H OWoTh aTTOppIWN Kal avaKU
106. ou   ve already set up     Change these settings as described here and click the Save Settings button to apply your changes or Cancel  Changes to cancel your changes          Select set umber 1   Y   Delete This Entry      Destination LANIP  0 0 Up O8  Subnet Mask 0 0 D 0    DetautGstewry 0 0 pn 0  Intertace  LAN  amp  Wireless v    Show Routing Table    Figure 6 16  Setup Tab   Advanced Routing  Gateway     Router    RF  Disabled k    Select sei number  111     Delete This Enty      Enter Roube Mame    Desination LANP  O Dn O   0  Steet Mask  H D o 0  Defaut G  ewgg O Oo oO 0  Fieriece  LAN 5 Wireless ze      Show Routing Table      __Save Setings    Cencel Changes _     Figure 6 17  Setup Tab   Advanced Routing  Router     40    The Wireless Tab   Basic Wireless Settings    A fame d Deg Pratama  es    The basic settings for wireless networking are set on this screen  Wireless    Wireless Network Mode  From this drop down menu  you can select the wireless standards running on your  network  If you have both 802 119 and 802 11b devices in your network  keep the default setting  Mixed  If you  have only 802 119 devices  select G Only  If you have only 802 11b devices  select B Only  If you do not have any  802 11g and 802 11b devices in your network  select Disable     Wireless Network Name  SSID   The SSID is the network name shared among all devices in a wireless network   The SSID must be identical for all devices in the wireless network  It is case sensitive and must not e
107. outer     Appendix J  Contact Information  This appendix provides contact information for a variety of Linksys resources  including Technical Support     Chapter 2  Planning Your Wireless Network    Network Topology    A wireless local area network  WLAN  is exactly like a regular local area network  LAN   except that each  computer in the WLAN uses a wireless device to connect to the network  Computers in a WLAN share the same  frequency channel and SSID  which is an identification name shared by the wireless devices belonging to the  same wireless network     Ad Hoc versus Infrastructure Mode    Unlike wired networks  wireless networks have two different modes in which they may be set up  infrastructure  and ad hoc  An infrastructure configuration is a WLAN and wired LAN communicating to each other through an  access point  An ad hoc configuration is wireless equipped computers communicating directly with each other   Choosing between these two modes depends on whether or not the wireless network needs to share data or  peripherals with a wired network or not     If the computers on the wireless network need to be accessible by a wired network or need to share a peripheral   such as a printer  with the wired network computers  the wireless network should be set up in Infrastructure  mode  The basis of Infrastructure mode centers around a wireless router or an access point  such as the  Wireless G Broadband Router  which serves as the main point of communications in a wirele
108. ows the current network information stored in the router  Information being  shown depends on the Internet Connection type you had entered under the Setup Tab         a D   Laan AAT pen len e pn A DR za en ell ta en tal ER aan bet  f the Wireless G Broadband Router            Tas Vere ed BT  Wireless Broadband Haute    Apps ginn    Trews temo HL  ke 29  Sp  Canai Tee Weg Arild   ML hadar  Beie ae  Pat Wee Lach   Feel Hare   onan Hare    Figure 6 46  Status Tab   Router    58    TL   ep PF r  Wiiralace  A      Tel      fireless G Broadband Router  The Status Tab   Local Network    A Daia of Coco ier   ie    The Local Network screen on the Status Tab displays the status of your network  See       MAC Address  This is the Router   s MAC Address  as seen on your local  Ethernet network        IP Address  This shows the Router   s IP Address  as it appears on your local  Ethernet network  e ee    Subnet Mask  This displays the current subnet mask being configured for your local network  saciid    End F Adem Te    DHCP Server  If you are using the Router as a DHCP server  that will be displayed here  Kees       Start IP Address  For the range of IP Addresses used by devices on your local  Ethernet network  the beginning Keng  of that range Is shown here  Figure 6 47  Status Tab   Local Network    End IP Address  For the range of IP Addresses used by devices on your local  Ethernet network  the end of that  range is shown here        Y CHEP Active IP Table   Microsef  Internet Explo
109. pe    Internet Connection Type LTF      User Name   Passoni  L2TP Server     0 0 D    O Connect on Demand  Macc kie Time   Vo       Keep Alve Redal Period 20   Sec     Figure 6 7  L2TP Connection Type    34    terminated due to inactivity  Connect on Demand enables the Router to automatically re establish your ee i    connection as soon as you attempt to access the Internet again  To use Connect on Demand  click the button  User Name   If you want your Internet connection to remain on at all times  enter 0 in the Max Idle Time field  Otherwise     enter the number of minutes you want to have elapsed before your Internet access disconnects  Ee wm         Keep Aive  Redin Period 30   Sec     Keep Alive and Redial Period  This option keeps your Internet access connected indefinitely  even when it sits   idle  If you select this option  the Router will periodically check your Internet connection  If the connection is Figure 6 8  Telstra Cable Connection Type  down  then the Router will automatically re establish the connection  To use this option  click the button next   to Keep Alive  The default Redial Period is 30 seconds     e Telstra Cable  Telstra Cable is a service used in Australia only  Check with your ISP for the necessary setup  information     User Name and Password  Enter the User Name and Password provided by your ISP     Server IP Address  This is the IP address that the Router has  when seen from the Internet  Your ISP will  provide you with the IP address you nee
110. r Internet  connection  If you are disconnected  then the Router will automatically re establish your connection  To use  this option  click the button next to Keep Alive  In the Redial Period field  you specify how often you want the  Router to check the Internet connection  The default Redial Period is 30 seconds     PPTP  Point to Point Tunneling Protocol  PPTP  is a service that applies to connections in Europe only     Specify Internet IP Address  This is the Router   s IP address  as seen from the Internet  Your ISP will provide  you with the IP Address you need to specify here     Subnet Mask  This is the Router   s Subnet Mask  as seen by users on the Internet  including your ISP   Your ISP  will provide you with the Subnet Mask     Gateway  Your ISP will provide you with the Gateway Address   User Name and Password  Enter the User Name and Password provided by your ISP     Connect on Demand  Max Idle Time  You can configure the Router to cut the Internet connection after it has  been inactive for a specified period of time  Max Idle Time   If your Internet connection has been terminated  due to inactivity  Connect on Demand enables the Router to automatically re establish your connection as  soon as you attempt to access the Internet again  If you wish to activate Connect on Demand  click the button   In the Max Idle Time field  enter the number of minutes you want to have elapsed before your Internet  connection terminates     Keep Alive Option  Redial Period  If yo
111. r network  If you choose to enable the Router   s DHCP server option  your network PCs must  connect to a DHCP server  the Router   and there cannot be any other DHCP server on your network     DHCP Server  DHCP is enabled by factory default  If you already have a DHCP server on your network  or you  don   t want a DHCP server  then select Disable  no other DHCP features will be available      Starting IP Address  Enter a value for the DHCP server to start with when issuing IP addresses  Because the  Router   s default IP address is 192 168 1 1  the Starting IP Address must be 192 168 1 2 or greater  but smaller  than 192 168 1 253  The default Starting IP Address is 192 168 1 100     Maximum Number of DHCP Users  Enter the maximum number of PCs that you want the DHCP server to assign  IP addresses to  This number cannot be greater than 253  The default is 50     Client Lease Time  Client Lease Time is the amount of time a network user will be allowed connection to the  Router with their current dynamic IP address  Enter the amount of time  in minutes  that the user will be    leased     this dynamic IP address  After the time is up  the user will be automatically assigned a new dynamic IP address   The default is 0 minutes  which means one day     Static DNS  1 3   The Domain Name System  DNS  is how the Internet translates domain or website names into  Internet addresses or URLs  Your ISP will provide you with at least one DNS Server IP Address  If you wish to use  another 
112. requency transmission that separates the data stream  into a number of lower speed data streams  which are then transmitted in parallel to prevent information from  being lost in transit     Packet   A unit of data sent over a network     Passphrase   Used much like a password  a passphrase simplifies the WEP encryption process by automatically  generating the WEP encryption keys for Linksys products     PEAP  Protected Extensible Authentication Protocol    A mutual authentication method that uses a combination  of digital certificates and another system  such as passwords     85    Ping  Packet INternet Groper    An Internet utility used to determine whether a particular IP address is online   POP3  Post Office Protocol 3    A standard mail server commonly used on the Internet    Port   The connection point on a computer or networking device used for plugging in cables or adapters   Power over Ethernet  PoE    A technology enabling an Ethernet network cable to deliver both data and power     PPPoE  Point to Point Protocol over Ethernet    A type of broadband connection that provides authentication   username and password  in addition to data transport     PPTP  Point to Point Tunneling Protocol    A VPN protocol that allows the Point to Point Protocol  PPP  to be  tunneled through an IP network  This protocol is also used as a type of broadband connection in Europe     Preamble   Part of the wireless signal that synchronizes network traffic     RADIUS  Remote Authentication 
113. rer    DHCP Clients Table  Clicking this button will open a screen to show you which PCs are utilizing the Router as a    DHCP server  You can delete PCs from that list  and sever their connections  by checking a Delete box and mieten    Gage DHCP Server IP Address  192 168 1 1   Retesh    clicking the Delete button  EE Ee Bn Bees  KT 152 958 1101 OA TI Fan a   LJ  i  Ov  Ercecrepmin 1521681 Ane DOE 2 A2 Be BE Pay bi  a  The Status Tab   Wireless a  lose    The Wireless screen on the Status Tab displays the status of your wireless network     Figure 6 48  DHCP Clients Table  MAC Address  This is the Router   s MAC Address  as seen on your local  wireless network     Mode  As selected from the Wireless tab  this will display the wireless mode  Mixed  G Only  or Disabled  used by  the network  LINKSYS     Tepepe eps e  HS i d    Wireless G Broadband Router    SSID  As entered on the Wireless tab  this will display the wireless network name or SSID  Status       DHCP Server  If you are using the Router as a DHCP server  that will be displayed here     Channel  As entered on the Wireless tab  this will display the channel on which your wireless network is  broadcasting     Encryption Function  As selected on the Security Tab  this will display what type of encryption the Router uses  for security        Figure 6 49  Status Tab   Wireless    Chapter 6  Configuring the Wireless G Broadband Router 59    The Status Tab   Local Network    Appendix A  Troubleshooting    This appendix c
114. s     To restore the Router   s configuration file  click the Browse button to locate the file  and follow the on screen  instructions  After you have selected the file  click the Restore button     a      reacaelkacatael Raiita  roadbpand Route        Temara ee ed 97    Wireless G froadbend Rowted    Administration       A Comes pg Da Drie    Administration               ki oh he ere aio  amp   bemi Pe freen She Bo ber  Fy ae    Firmware Upgrade  Deatg poisi a Sa ta peche   Brow      Werning pa irg Itzeg Cer ine a Pre ered pinasa ch  ka   of  h   proti or prii iFa resell buon    Ligege athe cad MOT Ber t pappal E    Figure 6 44  Administration Tab   Firmware Upgrade    Fima Wipe ol  Wiles Broadband Rootes  Administration KEE     Be E       Figure 6 45  Administration Tab   Config Management    WUiiralace_  Drenaadhangsl D pae  Wireless G Broadband Router    The Status Tab   Router       Dn if Caa Dam  ge    The Router screen on the Status Tab displays the Router   s current status  Status  Firmware Version  This is the Router   s current firmware    Current Time  This shows the time  as you set on the Setup Tab    MAC Address  This is the Router   s MAC Address  as seen by your ISP    Router Name  This is the specific name for the Router  which you set on the Setup Tab   Host Name  If required by your ISP  this would have been entered on the Setup Tab   Domain Name  If required by your ISP  this would have been entered on the Setup Tab     Configuration Type  This section sh
115. s  simultaneously requires a dynamic RF networking technology that links access points and nodes  In such a  system  the user   s end node undertakes a search for the best possible access to the system  First  it evaluates  such factors as signal strength and quality  as well as the message load currently being carried by each access  point and the distance of each access point to the wired backbone  Based on that information  the node next  selects the right access point and registers its address  Communications between end node and host computer  can then be transmitted up and down the backbone     As the user moves on  the end node   s RF transmitter regularly checks the system to determine whether it is in  touch with the original access point or whether it should seek a new one  When a node no longer receives  acknowledgment from its original access point  it undertakes a new search  Upon finding a new access point  it  then re registers  and the communication process continues     What is ISM band    The FCC and their counterparts outside of the U S  have set aside bandwidth for unlicensed use in the ISM   Industrial  Scientific and Medical  band  Spectrum in the vicinity of 2 4 GHz  in particular  is being made available  worldwide  This presents a truly revolutionary opportunity to place convenient high speed wireless capabilities in  the hands of users around the globe     What is Spread Spectrum    Spread Spectrum technology is a wideband radio frequency technique d
116. s remember that each   with a key shared between the Router and the server  Then  select a Default Transmit Key  choose which Key to device in your wireless network MUST use  use   and a level of WEP encryption  64 bits 10 hex digits or 128 bits 26 hex digits  Last  either generate a the same WEP encryption method and   WEP key using the Passphrase or enter the WEP key manually  encryption key  or else your wireless network    will not function properly     IMPORTANT  If you are using WEP       Fes leas si 0    Wireless G Broadband Rowter    Wireless       Dete   Tranamd Ree Sq Ce Ca O4   WEP Enenerben Gibas 1Ohexdigts        Fatsptenne   Generate    Rey    Key 2   Rey 3   Nee     Cancel Changes    Figure 6 23  Wireless Tab   Wireless Security  RADIUS     WEP  WEP is a basic encryption method  which is not as secure as WPA  To use WER select a Default Transmit Key Naua  TERR   choose which Key to use   and a level of WEP encryption  64 bits 10 hex digits or 128 bits 26 hex digits  Then Wireless G Broadband Beier  either generate a WEP key using the Passphrase or enter the WEP key manually  wirslees e Pesan       Change these settings as described here and click the Save Settings button to apply your changes or Cancel         WEP E  Changes to cancel your changes  For detailed instructions on configuring wireless security for the Router  turn to oematna Key   4 O2 O3 O4 PACK RAR At isens     Appendix B  Wireless Security     aril 64 ats 10 hex ips a       REN WE    Figure 6 24
117. sed with low cost Internet  accounts  such as DSL or cable modems  when only one TCP IP address is provided by the ISP  The user may  have many private addresses behind this single address provided by the ISP     Does the Router support any operating system other than Windows 98SE  Windows Millennium   Windows 2000  or Windows XP    Yes  but Linksys does not  at this time  provide technical support for setup  configuration or troubleshooting of  any non Windows operating systems     Does the Router support ICQ send file    Yes  with the following fix  click ICQ menu   gt  preference   gt  connections tab  gt   and check   am behind a firewall  or proxy  Then set the firewall time out to 80 seconds in the firewall setting  The Internet user can then send a file  to a user behind the Router     I set up an Unreal Tournament Server  but others on the LAN cannot join  What do I need to do    lf you have a dedicated Unreal Tournament server running  you need to create a static IP for each of the LAN  computers and forward ports 7777  7778  7779  7780  7781  and 27900 to the IP address of the server  You can  also use a port forwarding range of 7777   27900  If you want to use the UT Server Admin  forward another port    Port 8080 usually works well but is used for remote admin  You may have to disable this   Then in the   UWeb WebServer  section of the server ini file  set the ListenPort to 8080  to match the mapped port above  and  ServerName to the IP assigned to the Router from
118. sented like this     word  definition     Also  each figure  diagram  screenshot  or other image  is provided with a figure number and description  like  this   Figure 0 1  Sample Figure Description    Figure numbers and descriptions can also be found in the    List of Figures    section in the    Table of Contents        WRT54GL UG 70125A DF    Table of Contents    Chapter 1  Introduction  Welcome  What   s in this User Guide   Chapter 2  Planning Your Wireless Network  Network Topology  Ad Hoc versus Infrastructure Mode  Network Layout  Chapter 3  Getting to Know the Wireless G Broadband Router  The Back Panel  The Front Panel  Chapter 4  Connecting the Wireless G Broadband Router  Overview  Hardware Installation for Connection to Your Broadband Modem  Hardware Installation for Connection to Another Router  Chapter 5  Setting up the Wireless G Broadband Router  Overview  Using the Setup Wizard  Using SecureEasySetup to Configure Your Notebook  Chapter 6  Configuring the Wireless G Broadband Router  Overview  The Setup Tab   Basic Setup  The Setup Tab   DDNS  The Setup Tab   MAC Address Clone  The Setup Tab   Advanced Routing  The Wireless Tab   Basic Wireless Settings  The Wireless Tab   Wireless Security  The Wireless Tab   Wireless MAC Filter  The Wireless Tab   Advanced Wireless Settings  The Security Tab   Firewall  The Security Tab   VPN Passthrough  The Access Restrictions Tab   Internet Access  The Applications and Gaming Tab   Port Range Forward    CO CN ORR ER PMH 
119. shipping and handling  charges     ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE ARE LIMITED  TO THE DURATION OF THE WARRANTY PERIOD  ALL OTHER EXPRESS OR IMPLIED CONDITIONS  REPRESENTATIONS AND  WARRANTIES  INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT  ARE DISCLAIMED  Some jurisdictions do not  allow limitations on how long an implied warranty lasts  so the above limitation may not apply to You  This warranty gives  You specific legal rights  and You may also have other rights which vary by jurisdiction     This warranty does not apply if the Product  a  has been altered  except by Linksys   b  has not been installed  operated   repaired  or maintained in accordance with instructions supplied by Linksys  or  c  has been subjected to abnormal  physical or electrical stress  misuse  negligence  or accident  In addition  due to the continual development of new  techniques for intruding upon and attacking networks  Linksys does not warrant that the Product will be free of  vulnerability to intrusion or attack     TO THE EXTENT NOT PROHIBITED BY LAW  IN NO EVENT WILL LINKSYS BE LIABLE FOR ANY LOST DATA  REVENUE OR  PROFIT  OR FOR SPECIAL  INDIRECT  CONSEQUENTIAL  INCIDENTAL OR PUNITIVE DAMAGES  REGARDLESS OF THE THEORY  OF LIABILITY  INCLUDING NEGLIGENCE   ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE PRODUCT   INCLUDING ANY SOFTWARE   EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES  IN NO 
120. ss network  The  Router transmits data to PCs equipped with wireless network adapters  which can roam within a certain radial  range of the Router  You can arrange the Router and multiple access points to work in succession to extend the  roaming range  and you can set up your wireless network to communicate with your Ethernet hardware as well     lf the wireless network is relatively small and needs to share resources only with the other computers on the  wireless network  then the Ad Hoc mode can be used  Ad Hoc mode allows computers equipped with wireless  transmitters and receivers to communicate directly with each other  eliminating the need for a wireless router or  access point  The drawback of this mode is that in Ad Hoc mode  wireless equipped computers are not able to  communicate with computers on a wired network  And  of course  communication between the wireless   equipped computers is limited by the distance and interference directly between them     Network Layout    The Wireless G Broadband Router has been specifically designed for use with both your 802 11b and 802 119  products  Now  products using these standards can communicate with each other     SSID  service set identifier   your wireless network   s name     infrastructure  a wireless network that is bridged  to a wired network via an access point     ad hoc  a group of wireless devices  communicating directly to each other  peer to   peer  without the use of an access point     The Wireless G Broadban
121. ss the lighted Cisco logo on the Router  After you have pressed the logo   Click the Next button to continue     To exit the Wireless Setup Wizard  click the Exit button  If you need more information  click the Help button     3  Click the on screen START button to continue     To exit the Wireless Setup Wizard  click the Exit button  If you need more information  click the Help button   To return to the previous screen  click the Back button     Chapter 5  Setting up the Wireless G Broadband Router  Using SecureEasySetup to Configure Your Notebook          Configure Wireless Settings    SecureEasySetup is a fast  secure way of configuring and  connecting your computer with your wireless router or  access point  Follow the steps below to begin the process     SecuregasySetup    Figure 5 36  Configure Wireless Settings  1 Screen    Configure Wireless Settings   You must click the START button below while the Cisco logo is flashing  rapidly  H the Cisco logo is not flashing  press the logo again to restart  the process     SecureEasySetup    Figure 5 37  Configure Wireless Settings  2 Screen    30    LATS emia ec g gt  Dee e Aa angel D outen  Wireless G Broadband Router    4  The Your Wireless Settings screen will appear when the wireless settings have been configured  To save your  configuration settings to a text file on your computer  click the Save button  To print your configuration         LINKSYS      settings  click the Print button   You may need these settings so you 
122. stuullasi on h  vitt      tama elektroniikkatuote ja muut vastaavat elektroniikkatuotteet viem  ll   tuote tai  tuotteet viranomaisten m    r    m    n ker  yspisteeseen  Laitteiston oikea  h  vitt  minen est     mahdolliset kielteiset vaikutukset ymp  rist    n ja ihmisten  terveyteen  Lis  tietoja vanhan laitteiston oikeasta h  vitystavasta saa paikallisilta  viranomaisilta  j  tteenh  vityspalvelusta tai siit   myym  l  st    josta ostit tuotteen     Svenska Swedish  Milj  information f  r kunder i Europeiska unionen    Det europeiska direktivet 2002 96 EC kr  ver att utrustning med denna symbol p    produkten och eller f  rpackningen inte f  r kastas med osorterat kommunalt avfall  Symbolen visar att denna produkt b  r kastas efter att den avskiljts fr  n vanligt  hush  llsavfall  Det faller p   ditt ansvar att kasta denna och annan elektrisk och  elektronisk utrustning p   fastst  llda insamlingsplatser utsedda av regeringen  eller lokala myndigheter  Korrekt kassering och atervinning skyddar mot  eventuella negativa konsekvenser f  r miljon och personhalsa  For mer detaljerad  information om kassering av din gamla utrustning kontaktar du dina lokala  myndigheter  avfallshanteringen eller butiken d  r du k  pte produkten     For more information  visit www linksys com     Appendix l  Regulatory Information    Appendix   Contact Information    Need to contact Linksys    Visit us online for information on the latest products and updates   to your existing products at  http
123. t a device and cause it to start executing instructions    Bridge   A device that connects different networks    Broadband   An always on  fast Internet connection     Browser   An application program that provides a way to look at and interact with all the information on the  World Wide Web     Buffer   A shared or assigned memory area that is used to support and coordinate different computing and  networking activities so one isn t held up by the other     Byte   A unit of data that is usually eight bits long    82    Cable Modem   A device that connects a computer to the cable television network  which in turn connects to the  Internet     CSMA CA  Carrier Sense Multiple Access Collision Avoidance    A method of data transfer that is used to prevent  data collisions     CTS  Clear To Send    A signal sent by a wireless device  signifying that it is ready to receive data   Daisy Chain   A method used to connect devices in a series  one after the other     Database   A collection of data that is organized so that its contents can easily be accessed  managed  and  updated     DDNS  Dynamic Domain Name System    Allows the hosting of a website  FTP server  or e mail server with a  fixed domain name  e g   www xyz com  and a dynamic IP address     Default Gateway   A device that forwards Internet traffic from your local area network     DHCP  Dynamic Host Configuration Protocol    A networking protocol that allows administrators to assign  temporary IP addresses to network comp
124. t function disabled and should have a new static  IP address assigned to it because its IP address may change when using the DHCP function     To expose one PC  select Enable  Then  enter the computer s IP address in the DMZ Host IP Address field     Change these settings as described here and click the Save Settings button to apply your changes or Cancel  Changes to cancel your changes     The Applications and Gaming Tab   QoS    Quality of Service  QoS  ensures better service to high priority types of network traffic  which may involve  demanding  real time applications  such as videoconferencing and gaming     Wired QoS    There are three types of QoS available  Device Priority  Ethernet Port Priority and Application Priority   Enable Disable  To enable Wired QoS  select Enable  Otherwise  select Disable     Upstream Bandwidth  Select Auto or Manual from the drop down menu  Manual allows you to specify the max   imum outgoing bandwidth that applications can utilize     Device Priority    Enter the name of your network device in the Device name field  select its priority from the drop down menu and  enter its MAC Address     Ethernet Port Priority    Ethernet Port Priority QoS allows you to prioritize performance for four of the Router   s ports  LAN Ports 1 4  For  each of these ports  select High or Low for Priority  The Router   s four ports have been assigned low priority by  default  For Flow Control  if you want the Router to control the transmission of data between n
125. t number range  Check with the Internet application documentation for  the port number s  needed     Start Port  Enter the starting port number of the Forwarded Range   End Port  Enter the ending port number of the Forwarded Range   Enable  Click the Enable check box to enable port triggering for the relevant application     Change these settings as described here and click the Save Settings button to apply your changes or Cancel  Changes to cancel your changes     A Den g Da open  pe    Wireless ft Broadband Heute  Applic ations    N      r Appi gdvug A ETN   amp  Gaming Pjan Bimani             Port Taggernng         Application Bert fent End fon Ge feet Ered Port natis ffas         mS  is  0 i d o se  Caine          te H i Oo    oo    mn H i D    i H pe 8    H a  H a  DH D  D D  H fe 6 a CW  D H  H a  H D  D H  D D    oo    w D a j    bm D pe 8    ood    w H i H    w H a       oa    ie D i      Figure 6 35  Applications and Gaming Tab    Port Triggering    52    The Applications and Gaming Tab   DMZ    The DMZ feature allows one network user to be exposed to the Internet for use of a special purpose service such  as Internet gaming or videoconferencing  DMZ hosting forwards all the ports at the same time to one PC  The Port  Range Forward feature is more secure because it only opens the ports you want to have opened  while DMZ  hosting opens all the ports of one computer  exposing the computer to the Internet     Any PC whose port is being forwarded must have its DHCP clien
126. t strictement l utilisation d antennes dont le gain est sup  rieur a  cette limite  L impedance requise de l antenne est de 50 ohms    Afin de reduire le risque d interference aux autres utilisateurs  le type d antenne et son gain doivent   tre choisis de  fa  on a ce que la puissance isotrope rayonn  e   quivalente  p i r e   ne soit pas sup  rieure au niveau requis pour obtenir  une communication satisfaisante     Avis d industrie Canada concernant l exposition aux radiofrequences     Ce materiel est conforme aux limites etablies par IC en matiere d exposition aux radiofrequences dans un  environnement non contr  l    Ce mat  riel doit   tre install   et utilis   a une distance d au moins 20 cm entre l antenne et  le corps de l utilisateur    L emetteur ne doit pas   tre place pres d une autre antenne ou d un autre emetteur  ou fonctionner avec une autre  antenne ou un autre emetteur     93    Wireless G Broadband Router    User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic  Equipment  WEEE     This document contains important information for users with regards to the proper disposal and recycling of Linksys  products  Consumers are required to comply with this notice for all electronic products bearing the following symbol     English  Environmental Information for Customers in the European Union    European Directive 2002 96 EC requires that the equipment bearing this symbol  on the product and or its packaging must 
127. te of data transmission  configure the Transmission Rate  setting     Transmission Rate  The rate of data transmission should be set depending on the speed of your wireless  network  You can select from a range of transmission speeds  or you can select Auto to have the Router  automatically use the fastest possible data rate and enable the Auto Fallback feature  Auto Fallback will    negotiate the best possible connection speed between the Router and a wireless client  The default value is Auto     CTS Protection Mode  CTS  Clear To Send  Protection Mode should remain disabled unless you are having  severe problems with your Wireless G products not being able to transmit to the Router in an environment with  heavy 802 11b traffic  This function boosts the Router   s ability to catch all Wireless G transmissions but will  severely decrease performance     Frame Burst  Enabling this option should provide your network with greater performance  depending on the  manufacturer of your wireless products  If you are not sure how to use this option  keep the default  Disable     Beacon Interval  The default value is 100  Enter a value between 1 and 65 535 milliseconds  The Beacon Interval  value indicates the frequency interval of the beacon  A beacon is a packet broadcast by the Router to synchronize  the wireless network     DTIM Interval  This value  between 1 and 255  indicates the interval of the Delivery Traffic Indication Message   DTIM   A DTIM field is a countdown field infor
128. ter 28  Using the Setup Wizard    Wireless G Broadband Router    Using SecureEasySetup to Configure Your Notebook    This section explains how to use SecureEasySetup if you have a computer displaying the SecureEasySetup logo     Welcome  NOTE  SecureEasySetup uses WPA Personal encryption  If your current wireless devices do not EE eg  A support WPA Personal security  then you cannot use SecureEasySetup on your network  You will help you install the Wireless G       need to manually configure your network security using the encryption supported by your DEES    existing devices     2AGHz Wireless  G    Broadband Router            WRT54G    Figure 5 34  Setup Wizard   s Welcome   Start  Wizard Screen    1  After you have clicked Wireless Setup on the Welcome screen  the first screen that appears will describe the  two steps you will take to configure your notebook  Click the Next button to continue     To exit the Wireless Setup Wizard  click the Exit button  If you need more information  click the Help button     Securecasyoelup is a fast  secure way of configuring and  connecting your computer  with your wirelss router o  access point    There are two steps in the    SECUPEEAS Setup Process  Click Next to begin  Privacy Noten       SecuregasySetup    Figure 5 35  SecureEasySetup Welcome Screen    Chapter 5  Setting up the Wireless G Broadband Router  Using SecureEasySetup to Configure Your Notebook    29    Wireless G Broadband Router    2  The next screen will tell you to pre
129. tion to Another Router        Hardware Installation for Connection to Your Broadband Modem    1  Power down your network devices     2  Locate an optimum location for the Router  The best place for the Router is usually at the center of your  wireless network  with line of sight to all of your mobile stations     3  Fix the direction of the antennas  Try to place the Router in a position that will best cover your wireless  network  Normally  the higher you place the antenna  the better the performance will be     4  Connect a standard Ethernet network cable to the Router   s Internet port  Then  connect the other end of the  Ethernet cable to your cable or DSL broadband modem        Figure 4 1  Connecting Your Internet Connection    5  Connect your network PCs or Ethernet devices to the Router   s numbered ports using standard Ethernet  network cabling        Figure 4 2  Connecting Your Network Devices    6  Connect the AC power adapter to the Router s Power port and the other end into an electrical outlet  Only use  the power adapter supplied with the Router  Use of a different adapter may result in product damage  IMPORTANT  Make sure you use the power  adapter that is supplied with the Router  Use of a  different power adapter could damage the Router     Internet       Figure 4 3  Connecting the Power    Now that the hardware installation is complete  proceed to    Chapter 5  Setting up the Wireless G  Broadband Router     for directions on how to configure the Router     
130. to use  Consider the example below     Application Start and End IP Address Enabled    PC Anywhere 5631 to 5631 mm 192 168 1 102  VPN IPSEC 500 to 500 mm 192 168 1 100       When you have completed the configuration  click the Save Settings button     8    can   t get the Internet game  server  or application to work   If you are having difficulties getting any Internet game  server  or application to function properly  consider  exposing one PC to the Internet using DeMilitarized Zone  DMZ  hosting  This option is available when an  application requires too many ports or when you are not sure which port services to use  Make sure you  disable all the forwarding entries if you want to successfully use DMZ hosting  since forwarding has priority  over DMZ hosting   In other words  data that enters the Router will be checked first by the forwarding  settings  If the port number that the data enters from does not have port forwarding  then the Router will send  the data to whichever PC or network device you set for DMZ hosting      Follow these steps to set DMZ hosting    1  Access the Router   s web based utility by going to http   192 168 1 1 or the IP address of the Router   Go to the Applications  amp  Gaming   gt  Port Range Forward tab    2  Disable or remove the entries you have entered for forwarding  Keep this information in case you  want to use it at a later time    3  Go to the Applications  amp  Gaming   gt  DMZ tab    4  Select Enable next to DMZ  In the Client PC I
131. tup feature to create your  wireless network     Chapter 6  Configuring the Wireless G Broadband Router  This chapter explains how to use the Web based Utility to configure the settings on the Wireless G Broadband  Router     Appendix A  Troubleshooting  This appendix describes some problems and solutions  as well as frequently asked questions  regarding  installation and use of the Wireless G Broadband Router     Appendix B  Wireless Security  This appendix explains the risks of wireless networking and some solutions to reduce the risks     Appendix C  Upgrading Firmware  This appendix instructs you on how to upgrade the firmware on the Router should you need to do so     Appendix D  Windows Help  This appendix describes how you can use Windows Help for instructions about networking  such as installing  the TCP IP protocol     Appendix E  Finding the MAC Address and IP Address for your Ethernet Adapter   This appendix describes how to find the MAC address for your computer   s Ethernet adapter so you can use  the MAC filtering and or MAC address cloning feature of the Router     Appendix F  Glossary  This appendix gives a brief glossary of terms frequently used in networking     Appendix G  Specifications  This appendix provides the technical specifications for the Router     Appendix H  Warranty Information  This appendix supplies the warranty information for the Router     Appendix I  Regulatory Information  This appendix supplies the regulatory information regarding the R
132. u select this option  the Router will periodically check your Internet  connection  If you are disconnected  then the Router will automatically re establish your connection  To use  this option  click the button next to Keep Alive  In the Redial Period field  you specify how often you want the  Router to check the Internet connection  The default Redial Period is 30 seconds     L2TP  Layer 2 Tunneling Protocol  L2TP  is a service that applies to connections in Israel only  Check with your  ISP for the necessary setup information     User Name and Password  Enter the User Name and Password provided by your ISP     Server IP Address  This is the IP address that the Router has  when seen from the Internet  Your ISP will  provide you with the IP address you need to specify here     Connect on Demand and Max Idle Time  You can configure the Router to cut the Internet connection after it  has been inactive for a specific period of time  Max Idle Time   If your Internet connection has been    Internet Connection Type PPPoE v  User Name  linksys  Password Ggggpggegpgeggegpegeg    L Connect on Demand  Max Idle Time   k  n       Keep Alive  Redial Period 30 Sec     Figure 6 5  PPPoE Connection Type    internet Connection Type PPTP hd    internet P Address  63   205 134 71  Subnet Mask  255   255   255   0    Gateway  O O  O  0  User Name  linksys  Password  gegeegegeeeeeeeg    C Connect on Demant Max kie Tene   Min      Keep Alive  RedialPeriod 30 Sec     Figure 6 6  PPTP Connection Ty
133. upported by the Router   Yes  it is a built in feature that the Router automatically enables     Where is the Router installed on the network   In a typical environment  the Router is installed between the cable DSL modem and the LAN  Plug the Router into  the cable DSL modem   s Ethernet port     Does the Router support IPX or AppleTalk    No  TCP IP is the only protocol standard for the Internet and has become the global standard for communications   IPX  a NetWare communications protocol used only to route messages from one node to another  and AppleTalk   a communications protocol used on Apple and Macintosh networks  can be used for LAN to LAN connections  but  those protocols cannot connect from the Internet to a LAN     68    Does the Internet connection of the Router support 100Mbps Ethernet    The Router   s current hardware design supports up to 100Mbps Ethernet on its Internet port  however  the Internet  connection speed will vary depending on the speed of your broadband connection  The Router also supports  100Mbps over the auto sensing Fast Ethernet 10 100 switch on the LAN side of the Router     What is Network Address Translation and what is it used for    Network Address Translation  NAT  translates multiple IP addresses on the private LAN to one public address that  is sent out to the Internet  This adds a level of security since the address of a PC connected to the private LAN is  never transmitted on the Internet  Furthermore  NAT allows the Router to be u
134. ure Wireless Settings Screen  Figure 5 24  Setup Wizard   s Confirm New Settings Screen  Figure 5 25  Setup Wizard   s Safe Surfing Screen   Figure 5 26  Setup Wizard   s Congratulations Screen   Figure 5 27  Setup Wizard   s Configure Wireless Settings Screen  Figure 5 28  Setup Wizard   s Wireless Settings Screen   Figure 5 29  Setup Wizard   s Wireless Security   WPA PSK Screen  Figure 5 30  Setup Wizard   s Wireless Security   WEP  64 Bit  Screen  Figure 5 32  Setup Wizard   s Confirm New Settings Screen  Figure 5 31  Setup Wizard   s Norton Screen   Figure 5 33  Setup Wizard   s Congratulations Screen   Figure 5 34  Setup Wizard   s Welcome   Start Wizard Screen  Figure 5 35  SecureEasySetup Welcome Screen   Figure 5 36  Configure Wireless Settings  1 Screen   Figure 5 37  Configure Wireless Settings  2 Screen   Figure 5 38  Your Wireless Settings Screen   Figure 6 1  Password Screen   Figure 6 2  Setup Tab   Basic Setup   Figure 6 3  DHCP Connection Type   Figure 6 4  Static IP Connection Type   Figure 6 5  PPPoE Connection Type   Figure 6 6  PPTP Connection Type   Figure 6 7  L2TP Connection Type   Figure 6 8  Telstra Cable Connection Type   Figure 6 9  Optional Settings   Figure 6 10  Router IP   Figure 6 11  Network Address Server Settings   Figure 6 12  Time Setting   Figure 6 13  Setup Tab   DDNS   DynDNS   Figure 6 14  Setup Tab   DDNS   TZO   Figure 6 15  Setup Tab   MAC Address Clone   Figure 6 16  Setup Tab   Advanced Routing  Gateway    Figure 6 17  Setup Tab 
135. ure you use the power  adapter that is supplied with the Router  Use of a  different power adapter could damage the Router     11    Broadband Router    Chapter 5  Setting up the Wireless G Broadband Router    Overview    The Wireless G Broadband Router Setup Wizard will guide you through the installation procedure  It will go  through the instructions for configuring the Router   s network and wireless settings     Using the Setup Wizard    1        Insert the Setup Wizard CD ROM into your CD ROM drive  The Setup Wizard should run automatically  and  the Welcome screen should appear  If it does not  click the Start button and choose Run  In the field that  appears  enter D  setup exe  if    D    is the letter of your CD ROM drive      The Setup Wizard will automatically detect the language setting of your PC  On the initial Welcome screen   click the Next button if you want to proceed with the Setup Wizard using the current language  If you want to  use a different language  select the appropriate language  and then click the Next button     On the following Welcome screen  click the Click Here to Start button if this is the first time you are running  the Setup Wizard  These are your other choices     Wireless Setup   If you have a computer displaying the SecureEasySetup logo  then click Wireless Setup  and proceed to the section at the end of this chapter     Using SecureEasySetup to Configure Your Notebook        NOTE  SecureEasySetup uses WPA Personal encryption  If your
136. uters by    leasing    an IP address to a user for a limited amount of time   instead of assigning permanent IP addresses     DMZ  Demilitarized Zone    Removes the Router s firewall protection from one PC  allowing it to be    seen    from  the Internet     DNS  Domain Name Server    The IP address of your ISP s server  which translates the names of websites into IP  addresses     Domain   A specific name for a network of computers   Download   To receive a file transmitted over a network   DSL  Digital Subscriber Line    An always on broadband connection over traditional phone lines     DSSS  Direct Sequence Spread Spectrum    Frequency transmission with a redundant bit pattern resulting in a  lower probability of information being lost in transit     DTIM  Delivery Traffic Indication Message    A message included in data packets that can increase wireless  efficiency     Dynamic IP Address   A temporary IP address assigned by a DHCP server     83    EAP  Extensible Authentication Protocol    A general authentication protocol used to control network access   Many specific authentication methods work within this framework     EAP PEAP  Extensible Authentication Protocol Protected Extensible Authentication Protocol    A mutual  authentication method that uses a combination of digital certificates and another system  such as passwords     EAP TLS  Extensible Authentication Protocol Transport Layer Security    A mutual authentication method that  uses digital certificates     E
137. ved  the Safe Surfing screen will appear  Click the Norton Internet Security  Suite button to install the special edition of Norton Internet Security on your computer  or click the Finish  button to complete the Setup Wizard  Morton Internet Security  from Symantec    is the award winning suite    which protects your PCs and your family from the perils of the internet     I symantec    Horton AniiVirus    proiecta email and instant messager      Horton    Personal Firewall probecis agains  hackers and inirusions   be ken       Parental Control shields chikiren from obpeciponabbe web sites   Internet Security     Blocks spam  banner ads  pop up windows  and more     A special edition of Norton interne  Security with a 0 day free trial of  wirus  amp  firewall updates is included on this Setup CO   Click below to imafall it     Setup Wizard    Back   Finish    6  The Congratulations screen will appear  Click the Online Registration button to register the Router  or click  the Exit button to exit the Setup Wizard     Congratulations  The installation of the Wireless G Broadband Router is complete     If you want to make advanced configuration changes  proceed to    Chapter 6  Configuring the Wireless G  Broadband Router        The Wireless G Broadband Router    has been successfully configured     Broadband Router Setup Wizard vor 2  Online Registration         WRT546       Figure 5 33  Setup Wizard   s Congratulations Screen    Chapter 5  Setting up the Wireless G Broadband Rou
138. vfallsinnsamling for husholdningsavfall  Det er ditt ansvar a kvitte deg med dette  produktet og annet elektrisk og elektronisk avfall via egne innsamlingsordninger  slik myndighetene eller kommunene bestemmer  Korrekt avfallsh  ndtering og  gjenvinning vil v  re med pa    forhindre mulige negative konsekvenser for milj    og helse  For n  rmere informasjon om h  ndtering av det kasserte utstyret ditt   kan du ta kontakt med kommunen  en innsamlingsstasjon for avfall eller butikken  der du kj  pte produktet     Polski Polish    Informacja dla klient  w w Unii Europejskiej o przepisach dotycz  cych  ochrony   rodowiska    Dyrektywa Europejska 2002 96 EC wymaga  aby sprz  t oznaczony symbolem  znajduj  cym sie na produkcie i lub jego opakowaniu nie by   wyrzucany razem z  innymi niesortowanymi odpadami komunalnymi  Symbol ten wskazuje    e  produkt nie powinien by   usuwany razem ze zwyk  ymi odpadami z gospodarstw  domowych  Na Panstwu spoczywa obowi  zek wyrzucania tego i innych urz  dze    elektrycznych oraz elektronicznych w punktach odbioru wyznaczonych przez  w  adze krajowe lub lokalne  Pozbywanie sie sprz  tu we w  a  ciwy spos  b i jego  recykling pomog   zapobiec potencjalnie negatywnym konsekwencjom dla    rodowiska i zdrowia ludzkiego  W celu uzyskania szczeg    owych informacji     usuwaniu starego sprz  tu  prosimy zwr  ci   si   do lokalnych w  adz  s  u  b  oczyszczania miasta lub sklepu  w kt  rym produkt zosta   nabyty     Appendix I  Regulatory Information   
139. word provided by your ISP    Confirm   To confirm the Password  enter it again in this field    Keep Alive   If you want the Router to periodically check your Internet connection  select Keep Alive  Then  specify how often you want the Router to check the Internet connection  If the connection is down  the Router  will automatically re establish your connection    Connect on Demand If you want the Router to end the Internet connection after it has been inactive for a  period of time  select Connect on Demand and designate the number of minutes you want that period of    inactivity to last     Click the Next button to continue or the Back button to return to the previous screen     Static IP    Connection   If you are required to use a permanent IP address to connect to the Internet  select Static IP  from the drop down menu     IP Address   Enter the IP address provided by your ISP   Subnet Mask  Enter the Subnet Mask provided by your ISP   Gateway   Enter the Gateway IP address provided by your ISP     DNS 1 2   Enter the DNS  Domain Name System  server IP address es  provided by your ISP  You need to enter  at least one DNS address     Click the Next button to continue or the Back button to return to the previous screen     ess G Broadband Router             LInKksys      A Diin of Caen Systems  inc     Configure DSL  PPPoE  Settings    lf your Internet Service Provider  ISP  requires you to log in  before accessing the Internet  then enter your account information  in the 
140. xceed 32   characters  use any of the characters on the keyboard   Make sure this setting is the same for all devices in your  wireless network  For added security  you should change the default SSID  linksys  to a unique name  Figure 6 18  Wireless Tab   Basic Wireless Settings       Wireless Channel  Select the appropriate channel from the list provided to correspond with your network  settings  All devices in your wireless network must be broadcast on the same channel in order to function  correcily     Wireless SSID Broadcast  When wireless clients survey the local area for wireless networks to associate with   they will detect the SSID broadcast by the Router  To broadcast the Router s SSID  keep the default setting   Enable  If you do not want to broadcast the Router s SSID  then select Disable     Change these settings as described here and click the Save Settings button to apply your changes or Cancel  Changes to cancel your changes     41    The Wireless Tab   Wireless Security    The Wireless Security settings configure the security of your wireless network  There are four wireless security  mode options supported by the Router  WPA Personal  WPA Enterprise  WPA2 Personal  WPA2 Enterprise  RADIUS   and WEP   WEP stands for Wired Equivalent Privacy  WPA stands for Wi Fi Protected Access  which is a security  standard stronger than WEP encryption  WPA2 is stronger than WPA  WPA Enterprise is WPA used in coordination  with a RADIUS server  RADIUS stands for Remote Auth
141. y    e If you get a reply  the computer is connected to the Router    e lf you do NOT get a reply  try the ping command from a different computer to verify that your original  computer is not the cause of the problem   In the command prompt  type ping www yahoo com and press the Enter key    e If you get a reply  the computer is connected to the Internet  If you cannot open a webpage  try the ping  command from a different computer to verify that your original computer is not the cause of the problem    e lf you do NOT get a reply  there may be a problem with the connection  Try the ping command from a  different computer to verify that your original computer is not the cause of the problem       I am not getting an IP address on the Internet with my Internet connection    e Refer to    Problem  3    want to test my Internet connection    to verify that you have connectivity    e If you need to register the MAC address of your Ethernet adapter with your ISP  please see    Appendix E   Finding the MAC address and IP Address for Your Ethernet Adapter     If you need to clone the MAC address  of your Ethernet adapter onto the Router  see the System section of    Chapter 6  Configuring the  Wireless G Broadband Router    for details    e Make sure you are using the right Internet connection settings  Contact your ISP to see if your Internet  connection type is DHCP  Static IP Address  or PPPoE  commonly used by DSL consumers   Please refer to  the Setup section of    Chapter 6  C
142. y use  PPPoE  If they do  you will have to enable PPPoE     User Name and Password  Enter the User Name and Password provided by your ISP     Connect on Demand  Max Idle Time  You can configure the Router to cut the Internet connection after it has  been inactive for a specified period of time  Max Idle Time   If your Internet connection has been terminated  due to inactivity  Connect on Demand enables the Router to automatically re establish your connection as  soon as you attempt to access the Internet again  If you wish to activate Connect on Demand  click the button     oes oF Comoe eri Fe    Setup       bmn F Lef tty ity I E i     adler Rech ATI 299 28 8 e    zereck ka een  enen tent EET vc Sine    Beckie    le og Tee Zoe  AT OH 21 Eege Zeg  LAA L Carada       ee ee Se ee    Figure 6 2  Setup Tab   Basic Setup    Internet Connection Type   Automatic Configuration   DHCP v       Figure 6 3  DHCP Connection Type    Internet Connection Type Static IF we      internet E Address     0    o  Subnel Mask  255 255 255 0  Gataway  0  J0 IA IJ  Static DMS 1  0 0  Static DNS    o 6 0 D U  Static ONS 3  0  o Up Lg    Figure 6 4  Static IP Connection Type    Static IP address  a fixed address  assigned to a computer or device  connected to a network     33    In the Max Idle Time field  enter the number of minutes you want to have elapsed before your Internet  connection terminates     Keep Alive Option  Redial Period  If you select this option  the Router will periodically check you
143. you have other SecureEasySetup devices on your network  simply    When you have finished configuring the devices in your wireless network  click the Next button to continue       NOTE  You can only add one SecureEasySetup device at a time        Where is my other SecureEasySetup button           Broadband Router Setup Wizard oc WRTS4G    Figure 5 23  Setup Wizard   s Configure Wireless  Settings Screen       3  The Setup Wizard will ask you to review your settings before it saves them  Write down these settings if you  need to manually configure any non SecureEasySetup devices     Click the Yes button if you are satisfied with your settings  or click the No button if you do not want to save  your new settings           Broadband Router unn WRTS4G    Figure 5 24  Setup Wizard   s Confirm New Settings Screen    Chapter 5  Setting up the Wireless G Broadband Router 23  Using the Setup Wizard    Wireless G Broadband Router    4  After the settings have been saved  the Safe Surfing screen will appear  Click the Norton Internet Security  Suite button to install the special edition of Norton Internet Security on your computer  or click the Finish  button to complete the Setup Wizard     5  The Congratulations screen will appear  Click the Online Registration button to register the Router  or click  the Exit button to exit the Setup Wizard     Congratulations  The installation of the Wireless G Broadband Router is complete     If you want to make advanced configuration changes  proce
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
ÍNDICE 1. Instruções de Segurança 2. Especificações Técnicas 3  Philips AD315  LG LRM LRM-519 User's Manual  Improved! - KellySolutions.com  P`tit Agora – N°25 – Juin 2013 – Break Enchanté#1  → DOSSIER DE SOUSCRIPTION  LE MANUEL DE L`UTILISATEUR Wilderness  キャブレタークリーナー  Notice d`utilisation  manuale d`istruzioni attenzione    Copyright © All rights reserved. 
   Failed to retrieve file