User Guide
Page 2
... to enter the web address without including http:// in front of the address. Wireless-G Broadband Router About This Guide i Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of their respective holders. WEB: This globe icon...
... to enter the web address without including http:// in front of the address. Wireless-G Broadband Router About This Guide i Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of their respective holders. WEB: This globe icon...
User Guide
Page 3
... > Basic Setup 4 Setup > DDNS 7 Setup > MAC Address Clone 8 Setup > Advanced Routing 9 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless Settings 14 Security > Firewall 15 Firewall 15 Security > VPN Passthrough 15 Access Restrictions > Internet Access 16 ...> Config Management 21 Status > Router 22 Status > Local Network 22 Status > Wireless 23 Appendix A: Troubleshooting 24 Appendix B: Specifications 25 Appendix C: Warranty Information 26 Limited Warranty 26 Wireless-G Broadband Router ii
... > Basic Setup 4 Setup > DDNS 7 Setup > MAC Address Clone 8 Setup > Advanced Routing 9 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless Settings 14 Security > Firewall 15 Firewall 15 Security > VPN Passthrough 15 Access Restrictions > Internet Access 16 ...> Config Management 21 Status > Router 22 Status > Local Network 22 Status > Wireless 23 Appendix A: Troubleshooting 24 Appendix B: Specifications 25 Appendix C: Warranty Information 26 Limited Warranty 26 Wireless-G Broadband Router ii
User Guide
Page 4
Table of Contents Appendix D: Regulatory Information 28 FCC Statement 28 FCC Radiation Exposure Statement 28 Safety Notices 28 Industry Canada Statement 28 Avis d'Industrie Canada 29 Wireless Disclaimer 29 Avis de non-responsabilité concernant les appareils sans fil 29 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 30 Appendix E: Software License Agreement 34 Software in Linksys Products 34 Software Licenses 34 Wireless-G Broadband Router iii
Table of Contents Appendix D: Regulatory Information 28 FCC Statement 28 FCC Radiation Exposure Statement 28 Safety Notices 28 Industry Canada Statement 28 Avis d'Industrie Canada 29 Wireless Disclaimer 29 Avis de non-responsabilité concernant les appareils sans fil 29 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 30 Appendix E: Software License Agreement 34 Software in Linksys Products 34 Software Licenses 34 Wireless-G Broadband Router iii
User Guide
Page 5
...Chapter 1 Chapter 1: Product Overview Thank you can also use the Router to share resources such as wireless adapters, that support Wi-Fi Protected Setup, then you for choosing the Linksys Wireless-G Broadband Router. If the LED is flashing, the Router is where you will stay on a surface. Wi...-Fi Protected Setup LED (Green/ Amber) It lights up green when wireless security is a connection made through its selfdiagnostic mode...
...Chapter 1 Chapter 1: Product Overview Thank you can also use the Router to share resources such as wireless adapters, that support Wi-Fi Protected Setup, then you for choosing the Linksys Wireless-G Broadband Router. If the LED is flashing, the Router is where you will stay on a surface. Wi...-Fi Protected Setup LED (Green/ Amber) It lights up green when wireless security is a connection made through its selfdiagnostic mode...
User Guide
Page 6
...the wall. The distance between the slots is not responsible for damages incurred by insecure wall-mounting hardware. Wall Mounting Template Wireless-G Broadband Router 2 Determine where you use is within reach of its bottom panel. Make sure the holes are needed to mount ... inches) apart. 3. Suggested Mounting Hardware 2.5-3.0 mm 4-5 mm 1-1.5 mm ††Note: Mounting hardware illustrations are not true to scale. NOTE: Linksys is 152 mm (6 inches). Product Overview Follow these instructions: 1. Cut along the dotted line, and place on its head exposed. 4. Insert a screw...
...the wall. The distance between the slots is not responsible for damages incurred by insecure wall-mounting hardware. Wall Mounting Template Wireless-G Broadband Router 2 Determine where you use is within reach of its bottom panel. Make sure the holes are needed to mount ... inches) apart. 3. Suggested Mounting Hardware 2.5-3.0 mm 4-5 mm 1-1.5 mm ††Note: Mounting hardware illustrations are not true to scale. NOTE: Linksys is 152 mm (6 inches). Product Overview Follow these instructions: 1. Cut along the dotted line, and place on its head exposed. 4. Insert a screw...
User Guide
Page 7
...;• Keep wireless routers, access points, or gateways away from your network secure. 1. Linksys wireless products use linksys as access points and routers, you should change your consent and/or knowledge. Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient... Change the default wireless network name or SSID Wireless devices have a default password set by the factory. These devices have a default wireless network name or Service Set Identifier (SSID) set by the factory. Wireless-G Broadband Router Wireless Security Checklist 4. ...
...;• Keep wireless routers, access points, or gateways away from your network secure. 1. Linksys wireless products use linksys as access points and routers, you should change your consent and/or knowledge. Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient... Change the default wireless network name or SSID Wireless devices have a default password set by the factory. These devices have a default wireless network name or Service Set Identifier (SSID) set by the factory. Wireless-G Broadband Router Wireless Security Checklist 4. ...
User Guide
Page 8
... name field blank. DHCP, which should use the Router's web-based utility. The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. Internet Connection Type Select the type of Internet connection your ISP supports DHCP... obtained through a dynamic IP address. (This option usually applies to change the Router's general settings. Password Screen Wireless-G Broadband Router Advanced Configuration Setup > Basic Setup The first screen that appears is set a new password from the drop-down menu.
... name field blank. DHCP, which should use the Router's web-based utility. The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. Internet Connection Type Select the type of Internet connection your ISP supports DHCP... obtained through a dynamic IP address. (This option usually applies to change the Router's general settings. Password Screen Wireless-G Broadband Router Advanced Configuration Setup > Basic Setup The first screen that appears is set a new password from the drop-down menu.
User Guide
Page 9
... by users on Demand. DHCP Static IP If you with at least one DNS (Domain Name System) Server IP Address. Your ISP will have elapsed Wireless-G Broadband Router Advanced Configuration before your ISP). Internet Connection Type > PPPoE User Name and Password Enter the User Name and Password provided by your ISP to...
... by users on Demand. DHCP Static IP If you with at least one DNS (Domain Name System) Server IP Address. Your ISP will have elapsed Wireless-G Broadband Router Advanced Configuration before your ISP). Internet Connection Type > PPPoE User Name and Password Enter the User Name and Password provided by your ISP to...
User Guide
Page 10
... this option, select Keep Alive. In the Redial Period field, you specify how often you want the Router to see if your broadband Internet service has been configured with your ISP to check the Internet connection. If your Internet connection. To use this option, select... to automatically re-establish your connection as soon as you attempt to access the Internet again. The default value is 30 seconds. Wireless-G Broadband Router Advanced Configuration Internet Connection Type > Telstra Cable User Name and Password Enter the User Name and Password provided by your ISP....
... this option, select Keep Alive. In the Redial Period field, you specify how often you want the Router to see if your broadband Internet service has been configured with your ISP to check the Internet connection. If your Internet connection. To use this option, select... to automatically re-establish your connection as soon as you attempt to access the Internet again. The default value is 30 seconds. Wireless-G Broadband Router Advanced Configuration Internet Connection Type > Telstra Cable User Name and Password Enter the User Name and Password provided by your ISP....
User Guide
Page 11
...that you want a DHCP server, then select Disable (no other DHCP features will be allowed connection to the Router's Ethernet ports.Wireless Setup is transmitted. The Router can use this dynamic IP address. If you don't want the DHCP server to assign IP addresses... Setup The Network Setup section changes the settings on your changes. If you with when issuing IP addresses. Because the Router's Wireless-G Broadband Router Advanced Configuration default IP address is 0 minutes, which your Internet connection, keep the default setting, Disable. The default is...
...that you want a DHCP server, then select Disable (no other DHCP features will be allowed connection to the Router's Ethernet ports.Wireless Setup is transmitted. The Router can use this dynamic IP address. If you don't want the DHCP server to assign IP addresses... Setup The Network Setup section changes the settings on your changes. If you with when issuing IP addresses. Because the Router's Wireless-G Broadband Router Advanced Configuration default IP address is 0 minutes, which your Internet connection, keep the default setting, Disable. The default is...
User Guide
Page 12
... account. If you can use . Password Enter the Password for your changes, or click Cancel Changes to the Router with the MAC Address Clone feature. Wireless-G Broadband Router Setup > MAC Address Clone MAC Address Clone Enable/Disable To have currently registered with TZO. Before you do not want to a dynamic Internet IP...
... account. If you can use . Password Enter the Password for your changes, or click Cancel Changes to the Router with the MAC Address Clone feature. Wireless-G Broadband Router Setup > MAC Address Clone MAC Address Clone Enable/Disable To have currently registered with TZO. Before you do not want to a dynamic Internet IP...
User Guide
Page 13
... clone the MAC address of the remote network or host to another Router exists on the LAN & Wireless (Ethernet and wireless networks) or the WAN (Internet). When Wireless-G Broadband Router Advanced Configuration Router is used to set up a new static route. (Click the Delete This ...information. Interface This interface tells you want to exit this button. If another network destination. This feature is on your Ethernet and wireless networks. Subnet Mask The Subnet Mask determines which portion of 25 alphanumeric characters. Routing Table 9 Click Close to assign a static ...
... clone the MAC address of the remote network or host to another Router exists on the LAN & Wireless (Ethernet and wireless networks) or the WAN (Internet). When Wireless-G Broadband Router Advanced Configuration Router is used to set up a new static route. (Click the Delete This ...information. Interface This interface tells you want to exit this button. If another network destination. This feature is on your Ethernet and wireless networks. Subnet Mask The Subnet Mask determines which portion of 25 alphanumeric characters. Routing Table 9 Click Close to assign a static ...
User Guide
Page 14
.... Use the method that support Wi-Fi Protected Setup, then you should change the default SSID (linksys) to associate with your changes. Wireless Channel Select the channel from the list provided to function correctly. Wireless-G Broadband Router Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) Wi-Fi Protected Setup > Congratulations NOTE: Wi-Fi Protected Setup configures...
.... Use the method that support Wi-Fi Protected Setup, then you should change the default SSID (linksys) to associate with your changes. Wireless Channel Select the channel from the list provided to function correctly. Wireless-G Broadband Router Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) Wi-Fi Protected Setup > Congratulations NOTE: Wi-Fi Protected Setup configures...
User Guide
Page 15
...;Fi Protected Setup button on the client device. 2. After the client device has been configured, click OK. Method #2 Use this method if your wireless network. Wireless-G Broadband Router Advanced Configuration Wireless Security Security Mode Select the security method for the Router, refer to the Router.) 11 WPA Enterprise This option features WPA used when...
...;Fi Protected Setup button on the client device. 2. After the client device has been configured, click OK. Method #2 Use this method if your wireless network. Wireless-G Broadband Router Advanced Configuration Wireless Security Security Mode Select the security method for the Router, refer to the Router.) 11 WPA Enterprise This option features WPA used when...
User Guide
Page 16
... AES, with dynamic encryption keys. WPA2 Personal Security Mode > WPA2 Personal WPA Algorithm WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. Wireless-G Broadband Router Security Mode > WPA2 Enterprise WPA Algorithm WPA2 supports two encryption methods, TKIP and AES, with a RADIUS server. (This should only be used in coordination...
... AES, with dynamic encryption keys. WPA2 Personal Security Mode > WPA2 Personal WPA Algorithm WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. Wireless-G Broadband Router Security Mode > WPA2 Enterprise WPA Algorithm WPA2 supports two encryption methods, TKIP and AES, with a RADIUS server. (This should only be used in coordination...
User Guide
Page 17
... do not wish to filter users by using WEP encryption, always remember that each device in your wireless network MUST use ). Chapter 3 Advanced Configuration Security Mode > RADIUS IMPORTANT: If you are using the MAC addresses of the...click Generate. Wireless-G Broadband Router Security Mode > WEP Default Transmit Key Select a Default Transmit Key (choose which is 1812. Wireless > Wireless MAC Filter Wireless access can be filtered by MAC Address, keep the default setting, Disable. Wireless > Wireless MAC Filter Wireless MAC Filter Wireless MAC Filter To filter wireless users by MAC...
... do not wish to filter users by using WEP encryption, always remember that each device in your wireless network MUST use ). Chapter 3 Advanced Configuration Security Mode > RADIUS IMPORTANT: If you are using the MAC addresses of the...click Generate. Wireless-G Broadband Router Security Mode > WEP Default Transmit Key Select a Default Transmit Key (choose which is 1812. Wireless > Wireless MAC Filter Wireless access can be filtered by MAC Address, keep the default setting, Disable. Wireless > Wireless MAC Filter Wireless MAC Filter Wireless MAC Filter To filter wireless users by MAC...
User Guide
Page 18
... are 1-2Mbps, for authentication. These settings should be used. Chapter 3 Permit Only Select this to allow wireless access by an expert administrator as incorrect settings can reduce wireless performance. Wireless > Advanced Wireless Settings Wireless-G Broadband Router Advanced Configuration Advanced Wireless Authentication Type The default is Disable. You can select from a range of your changes. The default is...
... are 1-2Mbps, for authentication. These settings should be used. Chapter 3 Permit Only Select this to allow wireless access by an expert administrator as incorrect settings can reduce wireless performance. Wireless > Advanced Wireless Settings Wireless-G Broadband Router Advanced Configuration Advanced Wireless Authentication Type The default is Disable. You can select from a range of your changes. The default is...
User Guide
Page 19
... protection, select Disable. Fragmentation Threshold This value specifies the maximum size for outside of packets at the same time. Wireless-G Broadband Router Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is not selected by default. If ... Multicasting allows for multiple transmissions to work their way into multiple packets. AP Isolation This isolates all wireless clients and wireless devices on the Router's local network. Advanced Configuration Block WAN Requests Block Anonymous Internet Requests This feature...
... protection, select Disable. Fragmentation Threshold This value specifies the maximum size for outside of packets at the same time. Wireless-G Broadband Router Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is not selected by default. If ... Multicasting allows for multiple transmissions to work their way into multiple packets. AP Isolation This isolates all wireless clients and wireless devices on the Router's local network. Advanced Configuration Block WAN Requests Block Anonymous Internet Requests This feature...
User Guide
Page 20
... the List of PCs. Select any Blocked Services or Website Blocking you want this policy to the Internet Access tab, click Close.) Internet Policy Summary Wireless-G Broadband Router List of PCs screen appears. To enable a policy, select the policy number from the drop-down menu will display that policy's number and click...
... the List of PCs. Select any Blocked Services or Website Blocking you want this policy to the Internet Access tab, click Close.) Internet Policy Summary Wireless-G Broadband Router List of PCs screen appears. To enable a policy, select the policy number from the drop-down menu will display that policy's number and click...
User Guide
Page 21
... port range in the Port Range fields. Click Save Settings to apply your changes, or click Cancel Changes to the proper computer by URL Address. Wireless-G Broadband Router 17 If you to set up to cancel your network, such as web servers, ftp servers, e-mail servers, or other specialized Internet applications. (Specialized...
... port range in the Port Range fields. Click Save Settings to apply your changes, or click Cancel Changes to the proper computer by URL Address. Wireless-G Broadband Router 17 If you to set up to cancel your network, such as web servers, ftp servers, e-mail servers, or other specialized Internet applications. (Specialized...