User Guide
Page 2
... website address or e-mail address. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is something that you should pay special attention to while using the product. All rights reserved. Wireless-G Broadband Router About This Guide i This User Guide will refer...
... website address or e-mail address. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is something that you should pay special attention to while using the product. All rights reserved. Wireless-G Broadband Router About This Guide i This User Guide will refer...
User Guide
Page 3
... Gaming > QoS 18 Administration > Management 19 Administration > Log 20 Administration > Diagnostics 20 Administration > Factory Defaults 21 Administration > Upgrade Firmware 21 Administration > Config Management 21 Status > Router 22 Status > Local Network 22 Status > Wireless 23 Appendix A: Troubleshooting 24 Appendix B: Specifications 25 Appendix C: Warranty Information 26 Limited Warranty 26 Wireless...
... Gaming > QoS 18 Administration > Management 19 Administration > Log 20 Administration > Diagnostics 20 Administration > Factory Defaults 21 Administration > Upgrade Firmware 21 Administration > Config Management 21 Status > Router 22 Status > Local Network 22 Status > Wireless 23 Appendix A: Troubleshooting 24 Appendix B: Specifications 25 Appendix C: Warranty Information 26 Limited Warranty 26 Wireless...
User Guide
Page 4
Table of Contents Appendix D: Regulatory Information 28 FCC Statement 28 FCC Radiation Exposure Statement 28 Safety Notices 28 Industry Canada Statement 28 Avis d'Industrie Canada 29 Wireless Disclaimer 29 Avis de non-responsabilité concernant les appareils sans fil 29 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 30 Appendix E: Software License Agreement 34 Software in Linksys Products 34 Software Licenses 34 Wireless-G Broadband Router iii
Table of Contents Appendix D: Regulatory Information 28 FCC Statement 28 FCC Radiation Exposure Statement 28 Safety Notices 28 Industry Canada Statement 28 Avis d'Industrie Canada 29 Wireless Disclaimer 29 Avis de non-responsabilité concernant les appareils sans fil 29 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 30 Appendix E: Software License Agreement 34 Software in Linksys Products 34 Software Licenses 34 Wireless-G Broadband Router iii
User Guide
Page 5
...SPI) firewall and NAT technology. When the Router goes through the Internet port. You can use Wi-Fi Protected Setup to automatically configure wireless security for choosing the Linksys Wireless-G Broadband Router. If the LED is flashing, the Router is complete, the LED will be solidly lit.... To use the Router to share resources such as wireless adapters, that port. The Router supports one of security features ...
...SPI) firewall and NAT technology. When the Router goes through the Internet port. You can use Wi-Fi Protected Setup to automatically configure wireless security for choosing the Linksys Wireless-G Broadband Router. If the LED is flashing, the Router is complete, the LED will be solidly lit.... To use the Router to share resources such as wireless adapters, that port. The Router supports one of security features ...
User Guide
Page 6
... head exposed. 4. Chapter 1 Wall-Mounting Placement The Router has two wall-mount slots on the wall to drill precise spacing. Wall Mounting Template Wireless-G Broadband Router 2 Place the wall-mount slots over the screws and slide the Router down until the screws fit snugly into the wall. ...Make sure that the wall you want to mount the Router. Maneuver the Router so the wall-mount slots line up with the two screws. 5. NOTE: Linksys ...
... head exposed. 4. Chapter 1 Wall-Mounting Placement The Router has two wall-mount slots on the wall to drill precise spacing. Wall Mounting Template Wireless-G Broadband Router 2 Place the wall-mount slots over the screws and slide the Router down until the screws fit snugly into the wall. ...Make sure that the wall you want to mount the Router. Maneuver the Router so the wall-mount slots line up with the two screws. 5. NOTE: Linksys ...
User Guide
Page 7
Wireless-G Broadband Router Wireless Security Checklist 4. Currently, devices that are Wi-Fi ..., because WPA/WPA2 uses dynamic key encryption. Hackers know these defaults and may try to use linksys as access points and routers, you will be more secure than a traditional wired network. Wi-Fi Protected Access (WPA/WPA2...firewall software. •• Disable file sharing (peer-to access your wireless device and change their settings. Linksys wireless products use them at a rapid pace. Enable encryption Encryption protects data transmitted over radio waves, it will...
Wireless-G Broadband Router Wireless Security Checklist 4. Currently, devices that are Wi-Fi ..., because WPA/WPA2 uses dynamic key encryption. Hackers know these defaults and may try to use linksys as access points and routers, you will be more secure than a traditional wired network. Wi-Fi Protected Access (WPA/WPA2...firewall software. •• Disable file sharing (peer-to access your wireless device and change their settings. Linksys wireless products use them at a rapid pace. Enable encryption Encryption protects data transmitted over radio waves, it will...
User Guide
Page 8
...use the default password admin. (You can access the utility via a web browser on a computer connected to the Router. Internet Connection Type Select the type of the main tabs. The available types are connecting through your Internet connection. DHCP By ...after you open the Web-based utility, use the Router's web-based utility. The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. Password Screen Wireless-G Broadband Router Advanced Configuration Setup > Basic Setup The first screen...
...use the default password admin. (You can access the utility via a web browser on a computer connected to the Router. Internet Connection Type Select the type of the main tabs. The available types are connecting through your Internet connection. DHCP By ...after you open the Web-based utility, use the Router's web-based utility. The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. Password Screen Wireless-G Broadband Router Advanced Configuration Setup > Basic Setup The first screen...
User Guide
Page 9
... period of time (Max Idle Time). PPPoE Some DSL-based ISPs use this option, select Connect on Demand enables the Router to automatically re-establish your ISP). Connect on the Internet (including your connection as soon as seen by users on Demand enables the...you specify how often you are connected to the Internet, then select Specify an IP Address. Gateway Your ISP will have elapsed Wireless-G Broadband Router Advanced Configuration before your Internet connection has been terminated due to use this option, select Keep Alive. To use a permanent IP address ...
... period of time (Max Idle Time). PPPoE Some DSL-based ISPs use this option, select Connect on Demand enables the Router to automatically re-establish your ISP). Connect on the Internet (including your connection as soon as seen by users on Demand enables the...you specify how often you are connected to the Internet, then select Specify an IP Address. Gateway Your ISP will have elapsed Wireless-G Broadband Router Advanced Configuration before your Internet connection has been terminated due to use this option, select Keep Alive. To use a permanent IP address ...
User Guide
Page 10
...Internet Connection Type > L2TP User Name and Password Enter the User Name and Password provided by your Internet connection terminates. If your broadband Internet service has been configured with a host and domain name. The default Max Idle Time is 5 minutes Keep Alive: Redial ...you attempt to access the Internet again. To use this option, select Keep Alive. L2TP Server This is 5 minutes. Wireless-G Broadband Router Advanced Configuration Internet Connection Type > Telstra Cable User Name and Password Enter the User Name and Password provided by your connection as ...
...Internet Connection Type > L2TP User Name and Password Enter the User Name and Password provided by your Internet connection terminates. If your broadband Internet service has been configured with a host and domain name. The default Max Idle Time is 5 minutes Keep Alive: Redial ...you attempt to access the Internet again. To use this option, select Keep Alive. L2TP Server This is 5 minutes. Wireless-G Broadband Router Advanced Configuration Internet Connection Type > Telstra Cable User Name and Password Enter the User Name and Password provided by your connection as ...
User Guide
Page 11
...is how the Internet translates domain or website names into Internet addresses or URLs. If you don't want to configure the Router's Dynamic Host Configuration Protocol (DHCP) server function. You can be allowed connection to 1500 range. Static DNS (1-3) The Domain...IP Address must be greater than 192.168.1.253. Because the Router's Wireless-G Broadband Router Advanced Configuration default IP address is transmitted. It specifies the largest packet size permitted for your network. Router IP Address Network Address Server Settings (DHCP) The settings allow you...
...is how the Internet translates domain or website names into Internet addresses or URLs. If you don't want to configure the Router's Dynamic Host Configuration Protocol (DHCP) server function. You can be allowed connection to 1500 range. Static DNS (1-3) The Domain...IP Address must be greater than 192.168.1.253. Because the Router's Wireless-G Broadband Router Advanced Configuration default IP address is transmitted. It specifies the largest packet size permitted for your network. Router IP Address Network Address Server Settings (DHCP) The settings allow you...
User Guide
Page 12
.... DDNS Service If your ISP to sign up with the MAC Address Clone feature. Internet IP Address The Router's Internet IP address is displayed here. Wireless-G Broadband Router Setup > MAC Address Clone MAC Address Clone Enable/Disable To have currently registered with your DDNS service is the...you can use . Chapter 3 name to cancel your changes. The features available on the DDNS screen will change . Internet IP Address The Router's Internet IP address is dynamic, it will vary, depending on which DDNS service provider you to register a MAC address in order to ...
.... DDNS Service If your ISP to sign up with the MAC Address Clone feature. Internet IP Address The Router's Internet IP address is displayed here. Wireless-G Broadband Router Setup > MAC Address Clone MAC Address Clone Enable/Disable To have currently registered with your DDNS service is the...you can use . Chapter 3 name to cancel your changes. The features available on the DDNS screen will change . Internet IP Address The Router's Internet IP address is dynamic, it will vary, depending on which DDNS service provider you to register a MAC address in order to ...
User Guide
Page 13
...network information must travel on the LAN & Wireless (Ethernet and wireless networks) or the WAN (Internet). When Wireless-G Broadband Router Advanced Configuration Router is Disabled by default. Subnet Mask The Subnet Mask determines which portion of the remote network or host to another... to which you can also select WAN (Internet), which performs dynamic routing over your Ethernet and wireless networks. NAT routes the host Router's network connection to update the information. This feature is chosen, Dynamic Routing will function. You can also select LAN & Wireless, ...
...network information must travel on the LAN & Wireless (Ethernet and wireless networks) or the WAN (Internet). When Wireless-G Broadband Router Advanced Configuration Router is Disabled by default. Subnet Mask The Subnet Mask determines which portion of the remote network or host to another... to which you can also select WAN (Internet), which performs dynamic routing over your Ethernet and wireless networks. NAT routes the host Router's network connection to update the information. This feature is chosen, Dynamic Routing will function. You can also select LAN & Wireless, ...
User Guide
Page 14
...wireless network must be identical for wireless networks to broadcast the Router's SSID, then select Disabled. To broadcast the Router's SSID, keep the default setting, Mixed. If you should change the default SSID (linksys) to a unique name. Click Save Settings to apply your...-B devices in your network, select Disabled. For added security, you do not have only Wireless-B devices, select Wireless-B Only. Wireless-G Broadband Router Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) Wi-Fi Protected Setup > Congratulations NOTE: Wi-Fi Protected Setup configures one client ...
...wireless network must be identical for wireless networks to broadcast the Router's SSID, then select Disabled. To broadcast the Router's SSID, keep the default setting, Mixed. If you should change the default SSID (linksys) to a unique name. Click Save Settings to apply your...-B devices in your network, select Disabled. For added security, you do not have only Wireless-B devices, select Wireless-B Only. Wireless-G Broadband Router Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) Wi-Fi Protected Setup > Congratulations NOTE: Wi-Fi Protected Setup configures one client ...
User Guide
Page 15
.... 2. After the client device has been configured, click OK. Wireless-G Broadband Router Advanced Configuration Wireless Security Security Mode Select the security method for Wi-Fi Protected Access, which tells the Router how often it should only be used in your client device or its... security for further instructions. Wireless > Wireless Security The Wireless Security settings configure the security of WPA. Select the type of the Router.) 2. Chapter 3 Method #1 Use this method if your other network devices. Click the Wi‑Fi Protected Setup button on the...
.... 2. After the client device has been configured, click OK. Wireless-G Broadband Router Advanced Configuration Wireless Security Security Mode Select the security method for Wi-Fi Protected Access, which tells the Router how often it should only be used in your client device or its... security for further instructions. Wireless > Wireless Security The Wireless Security settings configure the security of WPA. Select the type of the Router.) 2. Chapter 3 Method #1 Use this method if your other network devices. Click the Wi‑Fi Protected Setup button on the...
User Guide
Page 16
Select the type of algorithm, TKIP or AES. (AES is connected to the Router. Wireless-G Broadband Router Security Mode > WPA2 Enterprise WPA Algorithm WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. The default value is 3600 seconds. Security ...
Select the type of algorithm, TKIP or AES. (AES is connected to the Router. Wireless-G Broadband Router Security Mode > WPA2 Enterprise WPA Algorithm WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. The default value is 3600 seconds. Security ...
User Guide
Page 17
... number of WEP encryption, 64 bits 10 hex digits or 128 bits 26 hex digits. Shared Key Enter the key shared between the Router and the server. Default Transmit Key Select a Default Transmit Key (choose which is not as secure as WPA. WEP Encryption Select a...WEP WEP is a basic encryption method, which Key to block wireless access by MAC Address, either permitting or blocking access, click Enable. Wireless-G Broadband Router Security Mode > WEP Default Transmit Key Select a Default Transmit Key (choose which Key to automatically generate WEP keys. Passphrase Enter a Passphrase to ...
... number of WEP encryption, 64 bits 10 hex digits or 128 bits 26 hex digits. Shared Key Enter the key shared between the Router and the server. Default Transmit Key Select a Default Transmit Key (choose which is not as secure as WPA. WEP Encryption Select a...WEP WEP is a basic encryption method, which Key to block wireless access by MAC Address, either permitting or blocking access, click Enable. Wireless-G Broadband Router Security Mode > WEP Default Transmit Key Select a Default Transmit Key (choose which Key to automatically generate WEP keys. Passphrase Enter a Passphrase to ...
User Guide
Page 18
...CTS (Clear-To-Send) Protection Mode should remain disabled unless you are 1-2Mbps, for transmission. This function boosts the Router's ability to the Router in your network, so they know which allows either Open System or Shared Key authentication to synchronize the wireless network....data rate and enable the Auto-Fallback feature. These settings should only be used . Wireless > Advanced Wireless Settings Wireless-G Broadband Router Advanced Configuration Advanced Wireless Authentication Type The default is not the actual rate of the next window for associated clients, it ...
...CTS (Clear-To-Send) Protection Mode should remain disabled unless you are 1-2Mbps, for transmission. This function boosts the Router's ability to the Router in your network, so they know which allows either Open System or Shared Key authentication to synchronize the wireless network....data rate and enable the Auto-Fallback feature. These settings should only be used . Wireless > Advanced Wireless Settings Wireless-G Broadband Router Advanced Configuration Advanced Wireless Authentication Type The default is not the actual rate of the next window for associated clients, it ...
User Guide
Page 19
...RTS threshold size, the RTS/CTS mechanism will allow anonymous Internet requests. If a network packet is turned Off by default. The Router sends Request to Send (RTS) frames to receive the broadcast and multicast messages. Deselect the feature to allow IP multicast packets ... to apply your changes, or click Cancel Changes to implement secure exchange of packets at its default value of 2346. Wireless-G Broadband Router Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is fragmented into your local network. To allow PPTP ...
...RTS threshold size, the RTS/CTS mechanism will allow anonymous Internet requests. If a network packet is turned Off by default. The Router sends Request to Send (RTS) frames to receive the broadcast and multicast messages. Deselect the feature to allow IP multicast packets ... to apply your changes, or click Cancel Changes to implement secure exchange of packets at its default value of 2346. Wireless-G Broadband Router Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is fragmented into your local network. To allow PPTP ...
User Guide
Page 20
...Click Save Settings to save the policy's settings, or click Cancel Changes to the Internet Access tab, click Close.) Internet Policy Summary Wireless-G Broadband Router List of ports you want to block or allow L2TP tunnels to cancel your changes. Click Save Settings to apply your changes, or click... Cancel Changes to pass through the Router, keep the default, Enable. Enter a Policy Name in effect, or select 24 Hours. 7. To delete a policy, select that policy's settings. ...
...Click Save Settings to save the policy's settings, or click Cancel Changes to the Internet Access tab, click Close.) Internet Policy Summary Wireless-G Broadband Router List of ports you want to block or allow L2TP tunnels to cancel your changes. Click Save Settings to apply your changes, or click... Cancel Changes to pass through the Router, keep the default, Enable. Enter a Policy Name in effect, or select 24 Hours. 7. To delete a policy, select that policy's settings. ...
User Guide
Page 21
...forwarding for the criteria required. Then click Delete. Enable Select Enable to cancel your network, such as videoconferencing or online gaming. Wireless-G Broadband Router 17 To delete a service, select it from the Protocol dropdown menu, and enter its range in a separate field next to save the... or click Cancel Changes to the Access Restrictions screen, click Close. Start/End This is pulled back to the proper computer by the Router, so that use Internet access to perform functions such as web servers, ftp servers, e-mail servers, or other specialized Internet applications....
...forwarding for the criteria required. Then click Delete. Enable Select Enable to cancel your network, such as videoconferencing or online gaming. Wireless-G Broadband Router 17 To delete a service, select it from the Protocol dropdown menu, and enter its range in a separate field next to save the... or click Cancel Changes to the Access Restrictions screen, click Close. Start/End This is pulled back to the proper computer by the Router, so that use Internet access to perform functions such as web servers, ftp servers, e-mail servers, or other specialized Internet applications....