User Guide
Page 2
All rights reserved. WEB: This globe icon indicates a noteworthy website address or e-mail address. Wireless-G Broadband Router About This Guide i and certain other countries. Copyright © 2008 Cisco Systems, Inc. This User ... enter the web address without including http:// in front of the address. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of their respective holders.
All rights reserved. WEB: This globe icon indicates a noteworthy website address or e-mail address. Wireless-G Broadband Router About This Guide i and certain other countries. Copyright © 2008 Cisco Systems, Inc. This User ... enter the web address without including http:// in front of the address. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of their respective holders.
User Guide
Page 3
...Setup 4 Setup > DDNS 7 Setup > MAC Address Clone 8 Setup > Advanced Routing 9 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless Settings 14 Security > Firewall 15 Firewall 15 Security > VPN Passthrough 15 Access Restrictions > ... Firmware 21 Administration > Config Management 21 Status > Router 22 Status > Local Network 22 Status > Wireless 23 Appendix A: Troubleshooting 24 Appendix B: Specifications 25 Appendix C: Warranty Information 26 Limited Warranty 26 Wireless-G Broadband Router ii
...Setup 4 Setup > DDNS 7 Setup > MAC Address Clone 8 Setup > Advanced Routing 9 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless Settings 14 Security > Firewall 15 Firewall 15 Security > VPN Passthrough 15 Access Restrictions > ... Firmware 21 Administration > Config Management 21 Status > Router 22 Status > Local Network 22 Status > Wireless 23 Appendix A: Troubleshooting 24 Appendix B: Specifications 25 Appendix C: Warranty Information 26 Limited Warranty 26 Wireless-G Broadband Router ii
User Guide
Page 4
Table of Contents Appendix D: Regulatory Information 28 FCC Statement 28 FCC Radiation Exposure Statement 28 Safety Notices 28 Industry Canada Statement 28 Avis d'Industrie Canada 29 Wireless Disclaimer 29 Avis de non-responsabilité concernant les appareils sans fil 29 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 30 Appendix E: Software License Agreement 34 Software in Linksys Products 34 Software Licenses 34 Wireless-G Broadband Router iii
Table of Contents Appendix D: Regulatory Information 28 FCC Statement 28 FCC Radiation Exposure Statement 28 Safety Notices 28 Industry Canada Statement 28 Avis d'Industrie Canada 29 Wireless Disclaimer 29 Avis de non-responsabilité concernant les appareils sans fil 29 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 30 Appendix E: Software License Agreement 34 Software in Linksys Products 34 Software Licenses 34 Wireless-G Broadband Router iii
User Guide
Page 5
... made through that port. Internet (Green) The Internet LED lights up when there is to place the Router horizontally on its selfdiagnostic mode during every boot-up to automatically configure wireless security for choosing the Linksys Wireless-G Broadband Router. A flashing LED indicates network activity over the Internet port. Make sure the client device supports Wi‑...
... made through that port. Internet (Green) The Internet LED lights up when there is to place the Router horizontally on its selfdiagnostic mode during every boot-up to automatically configure wireless security for choosing the Linksys Wireless-G Broadband Router. A flashing LED indicates network activity over the Internet port. Make sure the client device supports Wi‑...
User Guide
Page 6
... Mounting Hardware 2.5-3.0 mm 4-5 mm 1-1.5 mm ††Note: Mounting hardware illustrations are 152 mm (6 inches) apart. 3. NOTE: Linksys is 152 mm (6 inches). Product Overview Follow these instructions: 1. Determine where you use is within reach of its bottom panel. Drill...wall-mount slots over the screws and slide the Router down until the screws fit snugly into the wall. Cut along the dotted line, and place on its head exposed. 4. Wall Mounting Template Wireless-G Broadband Router 2 Chapter 1 Wall-Mounting Placement The Router has two wall-mount slots on the wall to...
... Mounting Hardware 2.5-3.0 mm 4-5 mm 1-1.5 mm ††Note: Mounting hardware illustrations are 152 mm (6 inches) apart. 3. NOTE: Linksys is 152 mm (6 inches). Product Overview Follow these instructions: 1. Determine where you use is within reach of its bottom panel. Drill...wall-mount slots over the screws and slide the Router down until the screws fit snugly into the wall. Cut along the dotted line, and place on its head exposed. 4. Wall Mounting Template Wireless-G Broadband Router 2 Chapter 1 Wall-Mounting Placement The Router has two wall-mount slots on the wall to...
User Guide
Page 7
...admin. Additional Security Tips •• Keep wireless routers, access points, or gateways away from other wireless networks that do not use linksys as access points and routers, you will be asked for wireless communication. The Linksys default password is not secure. ••... highest level of security for a password when you can be intercepted. The MAC address is provided solely for wireless networks. 2. Wireless-G Broadband Router Wireless Security Checklist 4. A network encrypted with WPA/WPA2 is an older encryption standard and may exist around you need...
...admin. Additional Security Tips •• Keep wireless routers, access points, or gateways away from other wireless networks that do not use linksys as access points and routers, you will be asked for wireless communication. The Linksys default password is not secure. ••... highest level of security for a password when you can be intercepted. The MAC address is provided solely for wireless networks. 2. Wireless-G Broadband Router Wireless Security Checklist 4. A network encrypted with WPA/WPA2 is an older encryption standard and may exist around you need...
User Guide
Page 8
...your ISP supports DHCP or you to continue. Setup > Basic Setup Internet Setup The Internet Setup section configures the Router to your ISP provides from the Administration tab's Management screen.) Click OK to change its advanced settings, use the ...you 'd like to Automatic Configuration - The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. Password Screen Wireless-G Broadband Router Advanced Configuration Setup > Basic Setup The first screen that appears is set a new password from...
...your ISP supports DHCP or you to continue. Setup > Basic Setup Internet Setup The Internet Setup section configures the Router to your ISP provides from the Administration tab's Management screen.) Click OK to change its advanced settings, use the ...you 'd like to Automatic Configuration - The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. Password Screen Wireless-G Broadband Router Advanced Configuration Setup > Basic Setup The first screen that appears is set a new password from...
User Guide
Page 9
...check with at least one DNS (Domain Name System) server IP address. If you select this option, select Connect on Demand enables the Router to have to specify here. Gateway Your ISP will provide you with the IP address of time (Max Idle Time). If you are ...specify how often you will periodically check your connection. Your ISP will provide you are required to use this option, the Router will have elapsed Wireless-G Broadband Router Advanced Configuration before your connection as soon as seen from the Internet. In the Max Idle Time field, enter the number ...
...check with at least one DNS (Domain Name System) server IP address. If you select this option, select Connect on Demand enables the Router to have to specify here. Gateway Your ISP will provide you with the IP address of time (Max Idle Time). If you are ...specify how often you will periodically check your connection. Your ISP will provide you are required to use this option, the Router will have elapsed Wireless-G Broadband Router Advanced Configuration before your connection as soon as seen from the Internet. In the Max Idle Time field, enter the number ...
User Guide
Page 10
... the Internet again. To use this option, select Keep Alive. If you are disconnected, then the Router will automatically re-establish your ISP. L2TP L2TP is the IP address of time (Max Idle Time). Wireless-G Broadband Router Advanced Configuration Internet Connection Type > Telstra Cable User Name and Password Enter the User Name and Password...
... the Internet again. To use this option, select Keep Alive. If you are disconnected, then the Router will automatically re-establish your ISP. L2TP L2TP is the IP address of time (Max Idle Time). Wireless-G Broadband Router Advanced Configuration Internet Connection Type > Telstra Cable User Name and Password Enter the User Name and Password...
User Guide
Page 11
...as seen by factory default. If you are hosting your own website, FTP server, or other DHCP server on your network. Because the Router's Wireless-G Broadband Router Advanced Configuration default IP address is no other DHCP features will be "leased" this feature, you assign a fixed host and domain 7 ... saving time.) Time Setting Click Save Settings to apply your changes, or click Cancel Changes to the Router's Ethernet ports.Wireless Setup is useful when you already have the Router select the best MTU for your network functions from this drop-down menu. (You can use this ...
...as seen by factory default. If you are hosting your own website, FTP server, or other DHCP server on your network. Because the Router's Wireless-G Broadband Router Advanced Configuration default IP address is no other DHCP features will be "leased" this feature, you assign a fixed host and domain 7 ... saving time.) Time Setting Click Save Settings to apply your changes, or click Cancel Changes to the Router's Ethernet ports.Wireless Setup is useful when you already have the Router select the best MTU for your network functions from this drop-down menu. (You can use this ...
User Guide
Page 12
...cloned, select Enable. 8 Chapter 3 name to cancel your changes. Host Name The is dynamic, it will change . Internet IP Address The Router's Internet IP address is provided by TZO, then select TZO.com. Advanced Configuration TZO.com Setup > DDNS > TZO E-mail Address, TZO Key... ISPs will vary, depending on the DDNS screen will require you need to use this feature, keep the default setting, Disable. Wireless-G Broadband Router Setup > MAC Address Clone MAC Address Clone Enable/Disable To have currently registered with the MAC Address Clone feature. Before you are...
...cloned, select Enable. 8 Chapter 3 name to cancel your changes. Host Name The is dynamic, it will change . Internet IP Address The Router's Internet IP address is provided by TZO, then select TZO.com. Advanced Configuration TZO.com Setup > DDNS > TZO E-mail Address, TZO Key... ISPs will vary, depending on the DDNS screen will require you need to use this feature, keep the default setting, Disable. Wireless-G Broadband Router Setup > MAC Address Clone MAC Address Clone Enable/Disable To have currently registered with the MAC Address Clone feature. Before you are...
User Guide
Page 13
...which you whether the Destination IP Address is the host portion. Dynamic Routing RIP This feature enables the Router to automatically adjust to cancel your Ethernet and wireless networks. Subnet Mask The Subnet Mask determines which portion of the computer you can also select WAN (...address of 25 alphanumeric characters. Delete This Entry To delete a route, select its number from the Internet. When Wireless-G Broadband Router Advanced Configuration Router is Disabled by default. Click Save Settings to apply your changes, or click Cancel Changes to physical changes in ...
...which you whether the Destination IP Address is the host portion. Dynamic Routing RIP This feature enables the Router to automatically adjust to cancel your Ethernet and wireless networks. Subnet Mask The Subnet Mask determines which portion of the computer you can also select WAN (...address of 25 alphanumeric characters. Delete This Entry To delete a route, select its number from the Internet. When Wireless-G Broadband Router Advanced Configuration Router is Disabled by default. Click Save Settings to apply your changes, or click Cancel Changes to physical changes in ...
User Guide
Page 14
...10 If you are set up your changes. It is the network name shared among all points in your wireless network. Wireless-G Broadband Router Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) Wi-Fi Protected Setup > Congratulations NOTE: Wi-Fi Protected Setup configures one client device... Save Settings to apply your changes, or click Cancel Changes to cancel your wireless network, select Manual. Wireless Configuration To manually configure your changes. If you should change the default SSID (linksys) to a unique name. Repeat the instructions for each client device that applies...
...10 If you are set up your changes. It is the network name shared among all points in your wireless network. Wireless-G Broadband Router Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) Wi-Fi Protected Setup > Congratulations NOTE: Wi-Fi Protected Setup configures one client device... Save Settings to apply your changes, or click Cancel Changes to cancel your wireless network, select Manual. Wireless Configuration To manually configure your changes. If you should change the default SSID (linksys) to a unique name. Repeat the instructions for each client device that applies...
User Guide
Page 15
... often it should only be used in your client device or its documentation for the Router's PIN number. 1. For detailed instructions on configuring wireless security for further instructions. Wireless-G Broadband Router Advanced Configuration Wireless Security Security Mode Select the security method for your client device asks for further instructions. Chapter 3 Method #1 Use this method if your...
... often it should only be used in your client device or its documentation for the Router's PIN number. 1. For detailed instructions on configuring wireless security for further instructions. Wireless-G Broadband Router Advanced Configuration Wireless Security Security Mode Select the security method for your client device asks for further instructions. Chapter 3 Method #1 Use this method if your...
User Guide
Page 16
Select the type of the RADIUS server. Wireless-G Broadband Router Security Mode > WPA2 Enterprise WPA Algorithm WPA2 supports two ...of algorithm, TKIP or AES. (AES is 3600 seconds. Shared Key Enter the key shared between the Router and the server. Select the type of the RADIUS server. The default Group Key Renewal period is ... algorithm, AES, or TKIP + AES. Key Renewal Timeout Enter a Key Renewal Timeout period, which instructs the Router how often it should change the encryption keys. WPA2 Personal Security Mode > WPA2 Personal WPA Algorithm WPA2 supports two...
Select the type of the RADIUS server. Wireless-G Broadband Router Security Mode > WPA2 Enterprise WPA Algorithm WPA2 supports two ...of algorithm, TKIP or AES. (AES is 3600 seconds. Shared Key Enter the key shared between the Router and the server. Select the type of the RADIUS server. The default Group Key Renewal period is ... algorithm, AES, or TKIP + AES. Key Renewal Timeout Enter a Key Renewal Timeout period, which instructs the Router how often it should change the encryption keys. WPA2 Personal Security Mode > WPA2 Personal WPA Algorithm WPA2 supports two...
User Guide
Page 17
...use the same WEP encryption method and encryption key, or else your wireless network will not function properly. Key 1-4 If you did not enter a Passphrase, enter the WEP key(s) manually. Wireless-G Broadband Router Security Mode > WEP Default Transmit Key Select a Default Transmit Key... (choose which Key to block wireless access by using WEP encryption, always remember that each device in your wireless network MUST use ). Shared Key Enter the...
...use the same WEP encryption method and encryption key, or else your wireless network will not function properly. Key 1-4 If you did not enter a Passphrase, enter the WEP key(s) manually. Wireless-G Broadband Router Security Mode > WEP Default Transmit Key Select a Default Transmit Key... (choose which Key to block wireless access by using WEP encryption, always remember that each device in your wireless network MUST use ). Shared Key Enter the...
User Guide
Page 18
... of transmission speeds, or you are 1-2Mbps, for use a WEP key for transmission. Wireless > Advanced Wireless Settings Wireless-G Broadband Router Advanced Configuration Advanced Wireless Authentication Type The default is a packet broadcast by an expert administrator as incorrect settings can select Auto to have the Router automatically use a WEP key for listening to broadcast and multicast messages. The...
... of transmission speeds, or you are 1-2Mbps, for use a WEP key for transmission. Wireless > Advanced Wireless Settings Wireless-G Broadband Router Advanced Configuration Advanced Wireless Authentication Type The default is a packet broadcast by an expert administrator as incorrect settings can select Auto to have the Router automatically use a WEP key for listening to broadcast and multicast messages. The...
User Guide
Page 19
...the RTS/CTS mechanism will not be forwarded to the appropriate computers. AP Isolation This isolates all wireless clients and wireless devices on the Router's local network. This feature is selected by default. If a network packet is 1. This ...IPSec, PPTP, or L2TP protocols to begin transmission. Wireless-G Broadband Router Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is permitted, then the Router will be tunneled through the Router's firewall. PPTP Passthrough Point-to-Point Tunneling Protocol...
...the RTS/CTS mechanism will not be forwarded to the appropriate computers. AP Isolation This isolates all wireless clients and wireless devices on the Router's local network. This feature is selected by default. If a network packet is 1. This ...IPSec, PPTP, or L2TP protocols to begin transmission. Wireless-G Broadband Router Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is permitted, then the Router will be tunneled through the Router's firewall. PPTP Passthrough Point-to-Point Tunneling Protocol...
User Guide
Page 20
...Access Policy dropdown menu. 2. Advanced Configuration Status Policies are disabled by MAC Address or IP Address. You can filter access to pass through the Router, keep the default, Enable. Selecting a policy from the drop-down menu, and select Enable. Click Edit List of ports you want to...Access can block up to 20 services.) Then enter the range of PCs to the Internet Access tab, click Close.) Internet Policy Summary Wireless-G Broadband Router List of PCs screen appears. To return to select which the policy will be managed by the policy. Decide which the policy will...
...Access Policy dropdown menu. 2. Advanced Configuration Status Policies are disabled by MAC Address or IP Address. You can filter access to pass through the Router, keep the default, Enable. Selecting a policy from the drop-down menu, and select Enable. Click Edit List of ports you want to...Access can block up to 20 services.) Then enter the range of PCs to the Internet Access tab, click Close.) Internet Policy Summary Wireless-G Broadband Router List of PCs screen appears. To return to select which the policy will be managed by the policy. Decide which the policy will...
User Guide
Page 21
...watch outgoing data for the relevant application. Some Internet applications may not require any applications that when the requested data returns through the Router, the data is pulled back to cancel your changes, or click Cancel Changes to save the changes. Start/End This is remembered...In this application, either TCP or UDP, or Both. Applications & Gaming > Port Triggering The Applications & Gaming > Port Triggering screen allows the Router to give the application. The IP address of the PC running the specific application. Wireless-G Broadband Router 17
...watch outgoing data for the relevant application. Some Internet applications may not require any applications that when the requested data returns through the Router, the data is pulled back to cancel your changes, or click Cancel Changes to save the changes. Start/End This is remembered...In this application, either TCP or UDP, or Both. Applications & Gaming > Port Triggering The Applications & Gaming > Port Triggering screen allows the Router to give the application. The IP address of the PC running the specific application. Wireless-G Broadband Router 17