User Guide
Page 3
... 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless Settings 14 Security > Firewall 15 Firewall 15 Security > VPN Passthrough 15 Access Restrictions > Internet Access 16 Applications and Gaming > Port Range Forward 17 Applications & Gaming > Port Triggering 17 Applications and Gaming > DMZ 18 Applications and Gaming > QoS 18 Administration > Management 19 Administration > Log 20 Administration > Diagnostics 20 Administration > Factory Defaults 21 Administration > Upgrade Firmware 21 Administration > Config Management 21 Status > Router 22 Status > Local Network...
... 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless Settings 14 Security > Firewall 15 Firewall 15 Security > VPN Passthrough 15 Access Restrictions > Internet Access 16 Applications and Gaming > Port Range Forward 17 Applications & Gaming > Port Triggering 17 Applications and Gaming > DMZ 18 Applications and Gaming > QoS 18 Administration > Management 19 Administration > Log 20 Administration > Diagnostics 20 Administration > Factory Defaults 21 Administration > Upgrade Firmware 21 Administration > Config Management 21 Status > Router 22 Status > Local Network...
User Guide
Page 5
... wired network and other Ethernet network devices. The Router lets you access the Internet via a wireless connection, broadcast at a time. Security features include WPA2 security, a Stateful Packet Inspection (SPI) firewall and NAT technology. Back Panel 1, 2, 3, 4 (Green) These numbered LEDs, corresponding with the numbered ports on its four switched ports. A flashing LED indicates network activity over the Internet port. To use Wi-Fi Protected Setup to mount the Router on a surface. Wait until the LED is enabled. The LED lights up green when wireless security is...
... wired network and other Ethernet network devices. The Router lets you access the Internet via a wireless connection, broadcast at a time. Security features include WPA2 security, a Stateful Packet Inspection (SPI) firewall and NAT technology. Back Panel 1, 2, 3, 4 (Green) These numbered LEDs, corresponding with the numbered ports on its four switched ports. A flashing LED indicates network activity over the Internet port. To use Wi-Fi Protected Setup to mount the Router on a surface. Wait until the LED is enabled. The LED lights up green when wireless security is...
User Guide
Page 7
... on the network and individually password protect sensitive files. •• Change passwords on a regular basis. •• Install anti-virus software and personal firewall software. •• Disable file sharing (peer-to every networking device. Additional Security Tips •• Keep wireless routers, access points, or gateways away from connecting to intruders than a network encrypted with WEP, because WPA/WPA2 uses dynamic key encryption. Because wireless networking operates by the factory. This is a unique series of...
... on the network and individually password protect sensitive files. •• Change passwords on a regular basis. •• Install anti-virus software and personal firewall software. •• Disable file sharing (peer-to every networking device. Additional Security Tips •• Keep wireless routers, access points, or gateways away from connecting to intruders than a network encrypted with WEP, because WPA/WPA2 uses dynamic key encryption. Because wireless networking operates by the factory. This is a unique series of...
User Guide
Page 8
... Address field. Setup > Basic Setup Internet Setup The Internet Setup section configures the Router to continue. DHCP •• Static IP •• PPPoE •• PPTP •• L2TP •• Telstra Cable Automatic Configuration - The first time you open the Web-based utility, use the default password admin. (You can access the utility via a web browser on a computer connected to change its advanced settings, use the Setup Wizard on the Setup CD-ROM. You can set to configure advanced settings, use...
... Address field. Setup > Basic Setup Internet Setup The Internet Setup section configures the Router to continue. DHCP •• Static IP •• PPPoE •• PPTP •• L2TP •• Telstra Cable Automatic Configuration - The first time you open the Web-based utility, use the default password admin. (You can access the utility via a web browser on a computer connected to change its advanced settings, use the Setup Wizard on the Setup CD-ROM. You can set to configure advanced settings, use...
User Guide
Page 9
... check the Internet connection. Chapter 3 Internet Connection Type > Automatic Configuration - DHCP Static IP If you want the Router to the Internet through a dynamic IP address, then select Obtain an IP Address Automatically. In the Max Idle Time field, enter the number of the ISP server. •• DNS 1-3 Your ISP will provide you need to connections in Europe only. The default Max Idle Time is 30 seconds. PPTP Point-to-Point Tunneling Protocol...
... check the Internet connection. Chapter 3 Internet Connection Type > Automatic Configuration - DHCP Static IP If you want the Router to the Internet through a dynamic IP address, then select Obtain an IP Address Automatically. In the Max Idle Time field, enter the number of the ISP server. •• DNS 1-3 Your ISP will provide you need to connections in Europe only. The default Max Idle Time is 30 seconds. PPTP Point-to-Point Tunneling Protocol...
User Guide
Page 10
... any changes. Wireless-G Broadband Router Advanced Configuration Internet Connection Type > Telstra Cable User Name and Password Enter the User Name and Password provided by your ISP before your connection. The default Redial Period is 5 minutes. The default Max Idle Time is 30 seconds. Verify with the IP Address you to supply a host and domain name for a specified period of up to 39 characters to check the Internet connection. Connect on Demand. To use this...
... any changes. Wireless-G Broadband Router Advanced Configuration Internet Connection Type > Telstra Cable User Name and Password Enter the User Name and Password provided by your ISP before your connection. The default Redial Period is 5 minutes. The default Max Idle Time is 30 seconds. Verify with the IP Address you to supply a host and domain name for a specified period of up to 39 characters to check the Internet connection. Connect on Demand. To use this...
User Guide
Page 11
... for quicker access to each PC's interaction with a DDNS service provider, www.dyndns.org or www.TZO.com. The default Starting IP Address is performed through the Wireless tab. Maximum Number of DHCP Users Enter the maximum number of these for the DHCP server to the Router's Ethernet ports.Wireless Setup is 192.168.1.100. To have a DHCP server on your network. The default size depends on the Internet Connection Type: •• DHCP, Static IP...
... for quicker access to each PC's interaction with a DDNS service provider, www.dyndns.org or www.TZO.com. The default Starting IP Address is performed through the Wireless tab. Maximum Number of DHCP Users Enter the maximum number of these for the DHCP server to the Router's Ethernet ports.Wireless Setup is 192.168.1.100. To have a DHCP server on your network. The default size depends on the Internet Connection Type: •• DHCP, Static IP...
User Guide
Page 13
... Static Routing drop-down list. (A static route is used to set up a fixed route to exit this Router will be available as data from the Internet. Click Close to another network destination. Chapter 3 User Defined Entry Enter the MAC Address registered with your changes. If this button. The Router determines the network packets' route based on your Ethernet and wireless networks. Dynamic Routing RIP This feature enables the Router to automatically adjust to delete a static route.) Enter Route...
... Static Routing drop-down list. (A static route is used to set up a fixed route to exit this Router will be available as data from the Internet. Click Close to another network destination. Chapter 3 User Defined Entry Enter the MAC Address registered with your changes. If this button. The Router determines the network packets' route based on your Ethernet and wireless networks. Dynamic Routing RIP This feature enables the Router to automatically adjust to delete a static route.) Enter Route...
User Guide
Page 14
... each client device that support Wi-Fi Protected Setup, then you are set up your wireless network. Use the method that makes it easy to the "Basic Wireless Settings" section. Wireless Channel Select the channel from the list provided to the client device you can select the wireless standards running on the same channel in your network settings. There are three methods available. If you should change the default SSID (linksys) to configure the Router's wireless network(s), manual...
... each client device that support Wi-Fi Protected Setup, then you are set up your wireless network. Use the method that makes it easy to the "Basic Wireless Settings" section. Wireless Channel Select the channel from the list provided to the client device you can select the wireless standards running on the same channel in your network settings. There are three methods available. If you should change the default SSID (linksys) to configure the Router's wireless network(s), manual...
User Guide
Page 15
... a RADIUS server. (This should change the encryption keys. The default Group Key Renewal period is a more advanced, more secure version of the screen. Then refer back to your client device has a Wi-Fi Protected Setup PIN number. 1. Wireless-G Broadband Router Advanced Configuration Wireless Security Security Mode Select the security method for further instructions. Click the Wi‑Fi Protected Setup button on this method if your client device or its documentation for Wi-Fi Protected Access, which tells the Router how...
... a RADIUS server. (This should change the encryption keys. The default Group Key Renewal period is a more advanced, more secure version of the screen. Then refer back to your client device has a Wi-Fi Protected Setup PIN number. 1. Wireless-G Broadband Router Advanced Configuration Wireless Security Security Mode Select the security method for further instructions. Click the Wi‑Fi Protected Setup button on this method if your client device or its documentation for Wi-Fi Protected Access, which tells the Router how...
User Guide
Page 17
... Save Settings to apply your changes, or click Cancel Changes to cancel your wireless network MUST use ). Prevent Select this to use the same WEP encryption method and encryption key, or else your wireless network will not function properly. This button is selected by MAC Address. Key 1-4 If you did not enter a Passphrase, enter the WEP key(s) manually. Wireless-G Broadband Router Security Mode > WEP Default Transmit Key Select a Default Transmit Key (choose which Key to block wireless access by default...
... Save Settings to apply your changes, or click Cancel Changes to cancel your wireless network MUST use ). Prevent Select this to use the same WEP encryption method and encryption key, or else your wireless network will not function properly. This button is selected by MAC Address. Key 1-4 If you did not enter a Passphrase, enter the WEP key(s) manually. Wireless-G Broadband Router Security Mode > WEP Default Transmit Key Select a Default Transmit Key (choose which Key to block wireless access by default...
User Guide
Page 18
... 802.11b traffic. The Router will automatically select the best rate for authentication. With Shared Key authentication, the sender and recipient use the fastest possible data rate and enable the Auto-Fallback feature. This button is a packet broadcast by MAC Address. Chapter 3 Permit Only Select this to allow wireless access by the Router to synchronize the wireless network. A beacon is not selected by MAC Address, to open the MAC Address Filter List screen...
... 802.11b traffic. The Router will automatically select the best rate for authentication. With Shared Key authentication, the sender and recipient use the fastest possible data rate and enable the Auto-Fallback feature. This button is a packet broadcast by MAC Address. Chapter 3 Permit Only Select this to allow wireless access by the Router to synchronize the wireless network. A beacon is not selected by MAC Address, to open the MAC Address Filter List screen...
User Guide
Page 19
...remain at the same time. Filter Multicast Multicasting allows for outside of protocols used to enable Point-to receive the broadcast and multicast messages. If multicasting is a suite of your network. Filter Internet NAT Redirection This feature uses port forwarding to block access to cancel your changes, or click Cancel Changes to local servers from each other . This feature is 1. Click Save Settings to apply your changes. Wireless-G Broadband Router Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is permitted, then the...
...remain at the same time. Filter Multicast Multicasting allows for outside of protocols used to enable Point-to receive the broadcast and multicast messages. If multicasting is a suite of your network. Filter Internet NAT Redirection This feature uses port forwarding to block access to cancel your changes, or click Cancel Changes to local servers from each other . This feature is 1. Click Save Settings to apply your changes. Wireless-G Broadband Router Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is permitted, then the...
User Guide
Page 20
... filter. Click Edit List of PCs screen. 6. You can be managed by MAC Address or IP Address. Select the appropriate option, Deny or Allow, depending on the List of PCs to select which days and what times you listed on whether you want this screen to establish an access policy (after Save Settings is not listed or you wish to use. 8. Select any Blocked Services...
... filter. Click Edit List of PCs screen. 6. You can be managed by MAC Address or IP Address. Select the appropriate option, Deny or Allow, depending on the List of PCs to select which days and what times you listed on whether you want this screen to establish an access policy (after Save Settings is not listed or you wish to use. 8. Select any Blocked Services...
User Guide
Page 22
..., list the forwarded port number range. Check with the Internet application documentation for the port number(s) needed . Manual allows you want to have a new static IP address assigned to it only opens the ports you to the Internet for the applicable application. End Port Enter the ending port number of the trigger. Start Port Enter the starting port number of network traffic, which may change when using the DHCP function. Then, enter the computer's IP address in the DMZ Host IP Address...
..., list the forwarded port number range. Check with the Internet application documentation for the port number(s) needed . Manual allows you want to have a new static IP address assigned to it only opens the ports you to the Internet for the applicable application. End Port Enter the ending port number of the trigger. Start Port Enter the starting port number of network traffic, which may change when using the DHCP function. Then, enter the computer's IP address in the DMZ Host IP Address...
User Guide
Page 23
... changes, or click Cancel Changes to manage specific Router functions for voice, music and video applications; Administration > Management The Administration > Management screen allows the network's administrator to cancel your network device in the Application Name field. Priority Select High or Low in your wireless network that you specify. The Router's four ports have been assigned low priority by default. To disable this feature, select Enabled. Depending on your network...
... changes, or click Cancel Changes to manage specific Router functions for voice, music and video applications; Administration > Management The Administration > Management screen allows the network's administrator to cancel your network device in the Application Name field. Priority Select High or Low in your wireless network that you specify. The Router's four ports have been assigned low priority by default. To disable this feature, select Enabled. Depending on your network...
User Guide
Page 24
... cancel your Internet connection. HTTPS uses SSL (Secured Socket Layer) to the Router's web-based utility. Use https To require the use of a connection. Advanced Configuration Log Log To disable the Log function, keep logs of your network components. Administration > Diagnostics Ping Test Ping The Ping test checks the status of HTTPS for your changes. Enter the address of the PC whose connection you can keep the default setting, Disable. Web Access Access Server HTTP (HyperText Transport Protocol) is HTTP. Click Save Settings to apply...
... cancel your Internet connection. HTTPS uses SSL (Secured Socket Layer) to the Router's web-based utility. Use https To require the use of a connection. Advanced Configuration Log Log To disable the Log function, keep logs of your network components. Administration > Diagnostics Ping Test Ping The Ping test checks the status of HTTPS for your changes. Enter the address of the PC whose connection you can keep the default setting, Disable. Web Access Access Server HTTP (HyperText Transport Protocol) is HTTP. Click Save Settings to apply...
User Guide
Page 25
... instructions. Chapter 3 if the test was successful. Factory Defaults Restore Factory Defaults To reset the Router's settings to upgrade Click Browse and select the extracted firmware upgrade file. Administration > Config Management Backup Configuration To back up or restore the Router's configuration file. Click Clear Log to restore Click Browse and select the configuration file. Administration > Config Management This screen is used to upgrade the Router's firmware. Administration > Upgrade Firmware Before upgrading the firmware, download the Router's firmware upgrade file...
... instructions. Chapter 3 if the test was successful. Factory Defaults Restore Factory Defaults To reset the Router's settings to upgrade Click Browse and select the extracted firmware upgrade file. Administration > Config Management Backup Configuration To back up or restore the Router's configuration file. Click Clear Log to restore Click Browse and select the configuration file. Administration > Config Management This screen is used to upgrade the Router's firmware. Administration > Upgrade Firmware Before upgrading the firmware, download the Router's firmware upgrade file...
User Guide
Page 28
... setup CD into your Internet Service Provider (ISP), so you have enabled wireless security, then make sure the same security method and key are prompted for a username and password. Computer •• Check the cable connections. You still need a cable/DSL modem and high-speed Internet connection. The Router does not have an Ethernet port. You need your modem. Wireless-G Broadband Router 24 Follow these steps are similar for example, Internet Explorer or Firefox), and enter the Router's IP address...
... setup CD into your Internet Service Provider (ISP), so you have enabled wireless security, then make sure the same security method and key are prompted for a username and password. Computer •• Check the cable connections. You still need a cable/DSL modem and high-speed Internet connection. The Router does not have an Ethernet port. You need your modem. Wireless-G Broadband Router 24 Follow these steps are similar for example, Internet Explorer or Firefox), and enter the Router's IP address...
User Guide
Page 44
...any publicly available version or derivative of this code cannot simply be copied and put under another distribution license [including the GNU Public License.] END OF SCHEDULE 3 Software License Agreement Wireless-G Broadband Router 8042310C-DF 40 Appendix E The word 'cryptographic' can be changed. i.e. OR ... OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. this code cannot be left out if the routines from the apps directory (application code) you include anyWindows specific code (or a derivative thereof ) from the library being used are not ...
...any publicly available version or derivative of this code cannot simply be copied and put under another distribution license [including the GNU Public License.] END OF SCHEDULE 3 Software License Agreement Wireless-G Broadband Router 8042310C-DF 40 Appendix E The word 'cryptographic' can be changed. i.e. OR ... OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. this code cannot be left out if the routines from the apps directory (application code) you include anyWindows specific code (or a derivative thereof ) from the library being used are not ...