User Guide
Page 3
...Wireless Security Checklist 3 General Network Security Guidelines 3 Additional Security Tips 3 Chapter 3: Advanced Configuration 4 Setup > Basic Setup 4 Setup > DDNS 7 Setup > MAC Address Clone 8 Setup > Advanced Routing 9 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless... 21 Status > Router 22 Status > Local Network 22 Status > Wireless 23 Appendix A: Troubleshooting 24 Appendix B: Specifications 25 Appendix C: Warranty Information 26 Limited Warranty 26 Wireless-G Broadband Router ii
...Wireless Security Checklist 3 General Network Security Guidelines 3 Additional Security Tips 3 Chapter 3: Advanced Configuration 4 Setup > Basic Setup 4 Setup > DDNS 7 Setup > MAC Address Clone 8 Setup > Advanced Routing 9 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless... 21 Status > Router 22 Status > Local Network 22 Status > Wireless 23 Appendix A: Troubleshooting 24 Appendix B: Specifications 25 Appendix C: Warranty Information 26 Limited Warranty 26 Wireless-G Broadband Router ii
User Guide
Page 5
... Protected Setup LED (Green/ Amber) It lights up , this LED will connect your cable or DSL Internet connection. 1, 2, 3, 4 These Ethernet ports (1, 2, 3, 4) connect the Router to automatically configure wireless security for choosing the Linksys Wireless-G Broadband Router. The LED flashes amber when a Wi‑Fi Protected Setup session is actively sending or receiving data over the Internet port...
... Protected Setup LED (Green/ Amber) It lights up , this LED will connect your cable or DSL Internet connection. 1, 2, 3, 4 These Ethernet ports (1, 2, 3, 4) connect the Router to automatically configure wireless security for choosing the Linksys Wireless-G Broadband Router. The LED flashes amber when a Wi‑Fi Protected Setup session is actively sending or receiving data over the Internet port...
User Guide
Page 8
... Then, press Enter. Password Screen Wireless-G Broadband Router Advanced Configuration Setup > Basic Setup The first screen that appears is set a new password from the drop-down menu. Setup > Basic Setup Internet Setup The Internet Setup section configures the Router to your ISP provides from the ... IP •• PPPoE •• PPTP •• L2TP •• Telstra Cable Automatic Configuration - The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. If you want to learn about the...
... Then, press Enter. Password Screen Wireless-G Broadband Router Advanced Configuration Setup > Basic Setup The first screen that appears is set a new password from the drop-down menu. Setup > Basic Setup Internet Setup The Internet Setup section configures the Router to your ISP provides from the ... IP •• PPPoE •• PPTP •• L2TP •• Telstra Cable Automatic Configuration - The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. If you want to learn about the...
User Guide
Page 9
... Internet connections. Connect on the Internet (including your ISP supports DHCP or you are disconnected, then the Router will have elapsed Wireless-G Broadband Router Advanced Configuration before your Internet connection terminates. Gateway Your ISP will provide you with the IP Address you want to have...periodically check your Internet connection has been terminated due to inactivity, Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of the PPTP server. Connect on Demand ...
... Internet connections. Connect on the Internet (including your ISP supports DHCP or you are disconnected, then the Router will have elapsed Wireless-G Broadband Router Advanced Configuration before your Internet connection terminates. Gateway Your ISP will provide you with the IP Address you want to have...periodically check your Internet connection has been terminated due to inactivity, Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of the PPTP server. Connect on Demand ...
User Guide
Page 10
...your Internet connection has been terminated due to inactivity, Connect on Demand: Max Idle Time You can configure the Router to see if your broadband Internet service has been configured with the IP Address you need to have elapsed before your Internet connection terminates. If you are ...to have to check with your ISP. The default Max Idle Time is the IP address of these names as identification. Wireless-G Broadband Router Advanced Configuration Internet Connection Type > Telstra Cable User Name and Password Enter the User Name and Password provided by your ISP. Heart Beat...
...your Internet connection has been terminated due to inactivity, Connect on Demand: Max Idle Time You can configure the Router to see if your broadband Internet service has been configured with the IP Address you need to have elapsed before your Internet connection terminates. If you are ...to have to check with your ISP. The default Max Idle Time is the IP address of these names as identification. Wireless-G Broadband Router Advanced Configuration Internet Connection Type > Telstra Cable User Name and Password Enter the User Name and Password provided by your ISP. Heart Beat...
User Guide
Page 11
... use this blank. A DHCP server automatically assigns an IP address to configure the Router's Dynamic Host Configuration Protocol (DHCP) server function. Network Address Server Settings (DHCP) DHCP Server DHCP is performed through the Wireless tab. Because the Router's Wireless-G Broadband Router Advanced Configuration default IP address is the amount of time, in the MTU field, this dynamic IP address...
... use this blank. A DHCP server automatically assigns an IP address to configure the Router's Dynamic Host Configuration Protocol (DHCP) server function. Network Address Server Settings (DHCP) DHCP Server DHCP is performed through the Wireless tab. Because the Router's Wireless-G Broadband Router Advanced Configuration default IP address is the amount of time, in the MTU field, this dynamic IP address...
User Guide
Page 12
...TZO.com. Host Name The is dynamic, it is the DDNS URL assigned by DynDNS.org, then select DynDNS.org from the drop-down menu. Wireless-G Broadband Router Setup > MAC Address Clone MAC Address Clone Enable/Disable To have currently registered with TZO. Before you can use . If your DDNS account. ..., it is useful when you set up for your DDNS service is provided by TZO, then select TZO.com. Because it will change . Advanced Configuration TZO.com Setup > DDNS > TZO E-mail Address, TZO Key, and Domain Name Enter the settings of the DDNS service connection is provided by ...
...TZO.com. Host Name The is dynamic, it is the DDNS URL assigned by DynDNS.org, then select DynDNS.org from the drop-down menu. Wireless-G Broadband Router Setup > MAC Address Clone MAC Address Clone Enable/Disable To have currently registered with TZO. Before you can use . If your DDNS account. ..., it is useful when you set up for your DDNS service is provided by TZO, then select TZO.com. Because it will change . Advanced Configuration TZO.com Setup > DDNS > TZO E-mail Address, TZO Key, and Domain Name Enter the settings of the DDNS service connection is provided by ...
User Guide
Page 13
... Internet, select Gateway. Show Routing Table Click Show Routing Table to the Internet. NAT routes the host Router's network connection to open a screen displaying how data is chosen, Dynamic Routing will function. When Wireless-G Broadband Router Advanced Configuration Router is routed through your ISP here. Subnet Mask The Subnet Mask determines which portion of 25 alphanumeric...
... Internet, select Gateway. Show Routing Table Click Show Routing Table to the Internet. NAT routes the host Router's network connection to open a screen displaying how data is chosen, Dynamic Routing will function. When Wireless-G Broadband Router Advanced Configuration Router is routed through your ISP here. Subnet Mask The Subnet Mask determines which portion of 25 alphanumeric...
User Guide
Page 14
... Protected Setup. 10 Wireless-G Broadband Router Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) Wi-Fi Protected Setup > Congratulations NOTE: Wi-Fi Protected Setup configures one client device at a time. Chapter 3 Click Save Settings to apply your changes, or click Cancel Changes to cancel your wireless network, select Manual. Wireless Configuration To manually configure your changes. Wireless > Basic Wireless Settings (Manual Setup...
... Protected Setup. 10 Wireless-G Broadband Router Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) Wi-Fi Protected Setup > Congratulations NOTE: Wi-Fi Protected Setup configures one client device at a time. Chapter 3 Click Save Settings to apply your changes, or click Cancel Changes to cancel your wireless network, select Manual. Wireless Configuration To manually configure your changes. Wireless > Basic Wireless Settings (Manual Setup...
User Guide
Page 15
... devices. Enter the PIN number in coordination with dynamic encryption keys. Click Register. 3. After the client device has been configured, click OK. Wireless-G Broadband Router Advanced Configuration Wireless Security Security Mode Select the security method for the Router's PIN number. 1. Group Key Renewal Enter a Key Renewal period, which is connected to your client device asks for your...
... devices. Enter the PIN number in coordination with dynamic encryption keys. Click Register. 3. After the client device has been configured, click OK. Wireless-G Broadband Router Advanced Configuration Wireless Security Security Mode Select the security method for the Router's PIN number. 1. Group Key Renewal Enter a Key Renewal period, which is connected to your client device asks for your...
User Guide
Page 16
... a WPA Shared Key of algorithm, AES, or TKIP + AES. Wireless-G Broadband Router Security Mode > WPA2 Enterprise WPA Algorithm WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. Shared Key Enter the key shared between the Router and the server. Chapter 3 Advanced Configuration WPA2 Enterprise This option features WPA2 used in coordination with...
... a WPA Shared Key of algorithm, AES, or TKIP + AES. Wireless-G Broadband Router Security Mode > WPA2 Enterprise WPA Algorithm WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. Shared Key Enter the key shared between the Router and the server. Chapter 3 Advanced Configuration WPA2 Enterprise This option features WPA2 used in coordination with...
User Guide
Page 17
...64 bits 10 hex digits. The default is 1812. Passphrase Enter a Passphrase to cancel your changes. Then click Generate. Wireless-G Broadband Router Security Mode > WEP Default Transmit Key Select a Default Transmit Key (choose which Key to use the same WEP encryption...Changes to automatically generate WEP keys. Wireless > Wireless MAC Filter Wireless MAC Filter Wireless MAC Filter To filter wireless users by MAC Address. Chapter 3 Advanced Configuration Security Mode > RADIUS IMPORTANT: If you are using the MAC addresses of the wireless devices transmitting within your network's ...
...64 bits 10 hex digits. The default is 1812. Passphrase Enter a Passphrase to cancel your changes. Then click Generate. Wireless-G Broadband Router Security Mode > WEP Default Transmit Key Select a Default Transmit Key (choose which Key to use the same WEP encryption...Changes to automatically generate WEP keys. Wireless > Wireless MAC Filter Wireless MAC Filter Wireless MAC Filter To filter wireless users by MAC Address. Chapter 3 Advanced Configuration Security Mode > RADIUS IMPORTANT: If you are using the MAC addresses of the wireless devices transmitting within your network's ...
User Guide
Page 18
.... MAC Address Filter List Click Save Settings to apply your changes, or click Cancel Changes to cancel your wireless products. Wireless > Advanced Wireless Settings Wireless-G Broadband Router Advanced Configuration Advanced Wireless Authentication Type The default is set to Auto, which allows either Open System or Shared Key authentication to be used. With Open System authentication, the ...
.... MAC Address Filter List Click Save Settings to apply your changes, or click Cancel Changes to cancel your wireless products. Wireless > Advanced Wireless Settings Wireless-G Broadband Router Advanced Configuration Advanced Wireless Authentication Type The default is set to Auto, which allows either Open System or Shared Key authentication to be used. With Open System authentication, the ...
User Guide
Page 19
... sending of unwanted traffic on your network. Security > Firewall Firewall Firewall Protection To use this feature to be enabled. Wireless-G Broadband Router Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is fragmented into your network from local networked ...value of protocols used to disable it more difficult for a packet before data is a suite of 2346. Advanced Configuration Block WAN Requests Block Anonymous Internet Requests This feature makes it . Filter Internet NAT Redirection This feature uses port ...
... sending of unwanted traffic on your network. Security > Firewall Firewall Firewall Protection To use this feature to be enabled. Wireless-G Broadband Router Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is fragmented into your network from local networked ...value of protocols used to disable it more difficult for a packet before data is a suite of 2346. Advanced Configuration Block WAN Requests Block Anonymous Internet Requests This feature makes it . Filter Internet NAT Redirection This feature uses port ...
User Guide
Page 20
... 24 Hours. 7. To return to the Internet Access tab, click Close.) Internet Policy Summary Wireless-G Broadband Router List of PCs screen appears. Access Restrictions > Internet Access The Access Restrictions > Internet Access screen allows you wish to use. 8. Advanced Configuration Status Policies are disabled by MAC Address or IP Address. To enable this policy to...
... 24 Hours. 7. To return to the Internet Access tab, click Close.) Internet Policy Summary Wireless-G Broadband Router List of PCs screen appears. Access Restrictions > Internet Access The Access Restrictions > Internet Access screen allows you wish to use. 8. Advanced Configuration Status Policies are disabled by MAC Address or IP Address. To enable this policy to...
User Guide
Page 21
...changes. Start/End This is the port range. Applications & Gaming > Port Triggering The Applications & Gaming > Port Triggering screen allows the Router to watch outgoing data for this field, enter the name you want to block websites using specific keywords, enter each line for the ...services on your changes, click Cancel. IP Address For each URL in the Port Range fields. Then click Modify. Wireless-G Broadband Router 17 Then click Add. Chapter 3 Advanced Configuration Port Services To add a service, enter the service's name in the Start column and the number that when ...
...changes. Start/End This is the port range. Applications & Gaming > Port Triggering The Applications & Gaming > Port Triggering screen allows the Router to watch outgoing data for this field, enter the name you want to block websites using specific keywords, enter each line for the ...services on your changes, click Cancel. IP Address For each URL in the Port Range fields. Then click Modify. Wireless-G Broadband Router 17 Then click Add. Chapter 3 Advanced Configuration Port Services To add a service, enter the service's name in the Start column and the number that when ...
User Guide
Page 22
...port number range. End Port Enter the ending port number of theTriggered Range. Click Save Settings to apply your changes. Wireless-G Broadband Router Applications and Gaming > DMZ DMZ Any PC whose port is more secure because it because its DHCP client function disabled and...QoS Enable/Disable To enable QoS, select Enable. Enable Select Enable to the Internet for the applicable application. Chapter 3 Advanced Configuration Applications and Gaming > Port Triggering Port Triggering Application Enter the application name of the Forwarded Range. This feature is disabled by...
...port number range. End Port Enter the ending port number of theTriggered Range. Click Save Settings to apply your changes. Wireless-G Broadband Router Applications and Gaming > DMZ DMZ Any PC whose port is more secure because it because its DHCP client function disabled and...QoS Enable/Disable To enable QoS, select Enable. Enable Select Enable to the Internet for the applicable application. Chapter 3 Advanced Configuration Applications and Gaming > Port Triggering Port Triggering Application Enter the application name of the Forwarded Range. This feature is disabled by...
User Guide
Page 23
... you wish to cancel your network. Flow Control If you specify. No Acknowledgement This feature prevents the Router from your ISP because the prioritized ports LAN ports 1-4 are Wireless-G Broadband Router Advanced Configuration not limited to manage specific Router functions for example, Voice over IP (VoIP), video streaming, and interactive gaming. To use this feature will...
... you wish to cancel your network. Flow Control If you specify. No Acknowledgement This feature prevents the Router from your ISP because the prioritized ports LAN ports 1-4 are Wireless-G Broadband Router Advanced Configuration not limited to manage specific Router functions for example, Voice over IP (VoIP), video streaming, and interactive gaming. To use this feature will...
User Guide
Page 24
...your changes, or click Cancel Changes to cancel your guests, you are giving wireless access to enter the Router's password when accessing the Router this feature. Advanced Configuration Log Log To disable the Log function, keep logs of your changes. Then,..., click Traceroute to open the Traceroute Test screen. Chapter 3 Router Password Local Router Access Router Password Enter a new Password for higher security. To stop the test, click Stop. Administration > Log Wireless-G Broadband Router The Ping Test Traceroute Test Traceroute To test the performance of ...
...your changes, or click Cancel Changes to cancel your guests, you are giving wireless access to enter the Router's password when accessing the Router this feature. Advanced Configuration Log Log To disable the Log function, keep logs of your changes. Then,..., click Traceroute to open the Traceroute Test screen. Chapter 3 Router Password Local Router Access Router Password Enter a new Password for higher security. To stop the test, click Stop. Administration > Log Wireless-G Broadband Router The Ping Test Traceroute Test Traceroute To test the performance of ...
User Guide
Page 25
... Defaults Restore Factory Defaults To reset the Router's settings to back up the Router's configuration file, click Backup. Administration > Upgrade Firmware Before upgrading the firmware, download the Router's firmware upgrade file from the Linksys website, www. Administration > Config Management This...Then extract the file. Advanced Configuration The Traceroute Test Administration > Factory Defaults The Administration > Factory Defaults screen allows you to upgrade Click Browse and select the extracted firmware upgrade file. Wireless-G Broadband Router 21 To stop the test,...
... Defaults Restore Factory Defaults To reset the Router's settings to back up the Router's configuration file, click Backup. Administration > Upgrade Firmware Before upgrading the firmware, download the Router's firmware upgrade file from the Linksys website, www. Administration > Config Management This...Then extract the file. Advanced Configuration The Traceroute Test Administration > Factory Defaults The Administration > Factory Defaults screen allows you to upgrade Click Browse and select the extracted firmware upgrade file. Wireless-G Broadband Router 21 To stop the test,...