User Guide
Page 2
and/ or its affiliates in front of the address. Wireless-G Broadband Router About This Guide i WARNING: This exclamation point indicates that there is a caution or warning and it . Online Resources ... something that you to websites without adding the http:// in the U.S. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of their respective holders. and certain other countries...
and/ or its affiliates in front of the address. Wireless-G Broadband Router About This Guide i WARNING: This exclamation point indicates that there is a caution or warning and it . Online Resources ... something that you to websites without adding the http:// in the U.S. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of their respective holders. and certain other countries...
User Guide
Page 3
...Setup 4 Setup > DDNS 7 Setup > MAC Address Clone 8 Setup > Advanced Routing 9 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless Settings 14 Security > Firewall 15 Firewall 15 Security > VPN Passthrough 15 Access Restrictions > ... Firmware 21 Administration > Config Management 21 Status > Router 22 Status > Local Network 22 Status > Wireless 23 Appendix A: Troubleshooting 24 Appendix B: Specifications 25 Appendix C: Warranty Information 26 Limited Warranty 26 Wireless-G Broadband Router ii
...Setup 4 Setup > DDNS 7 Setup > MAC Address Clone 8 Setup > Advanced Routing 9 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless Settings 14 Security > Firewall 15 Firewall 15 Security > VPN Passthrough 15 Access Restrictions > ... Firmware 21 Administration > Config Management 21 Status > Router 22 Status > Local Network 22 Status > Wireless 23 Appendix A: Troubleshooting 24 Appendix B: Specifications 25 Appendix C: Warranty Information 26 Limited Warranty 26 Wireless-G Broadband Router ii
User Guide
Page 4
Table of Contents Appendix D: Regulatory Information 28 FCC Statement 28 FCC Radiation Exposure Statement 28 Safety Notices 28 Industry Canada Statement 28 Avis d'Industrie Canada 29 Wireless Disclaimer 29 Avis de non-responsabilité concernant les appareils sans fil 29 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 30 Appendix E: Software License Agreement 34 Software in Linksys Products 34 Software Licenses 34 Wireless-G Broadband Router iii
Table of Contents Appendix D: Regulatory Information 28 FCC Statement 28 FCC Radiation Exposure Statement 28 Safety Notices 28 Industry Canada Statement 28 Avis d'Industrie Canada 29 Wireless Disclaimer 29 Avis de non-responsabilité concernant les appareils sans fil 29 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 30 Appendix E: Software License Agreement 34 Software in Linksys Products 34 Software Licenses 34 Wireless-G Broadband Router iii
User Guide
Page 5
You can use Wi-Fi Protected Setup to automatically configure wireless security for choosing the Linksys Wireless-G Broadband Router. Security features include WPA2 security, a Stateful Packet Inspection (SPI) firewall and NAT technology. A flashing LED indicates network activity over the network. When the Router goes through that port. Wi-Fi Protected Setup LED (Green/ Amber) It lights up...
You can use Wi-Fi Protected Setup to automatically configure wireless security for choosing the Linksys Wireless-G Broadband Router. Security features include WPA2 security, a Stateful Packet Inspection (SPI) firewall and NAT technology. A flashing LED indicates network activity over the network. When the Router goes through that port. Wi-Fi Protected Setup LED (Green/ Amber) It lights up...
User Guide
Page 6
...wall-mounting hardware. Determine where you use is within reach of its bottom panel. Make sure the holes are needed to scale. NOTE: Linksys is 152 mm (6 inches). Make sure that the wall you want to drill precise spacing. Place the wall-mount slots over the ... dry, and sturdy. Cut along the dotted line, and place on its head exposed. 4. Maneuver the Router so the wall-mount slots line up with the two screws. 5. Wall Mounting Template Wireless-G Broadband Router 2 Product Overview Follow these instructions: 1. Drill two holes into the wall-mount slots. 152 mm Print...
...wall-mounting hardware. Determine where you use is within reach of its bottom panel. Make sure the holes are needed to scale. NOTE: Linksys is 152 mm (6 inches). Make sure that the wall you want to drill precise spacing. Place the wall-mount slots over the ... dry, and sturdy. Cut along the dotted line, and place on its head exposed. 4. Maneuver the Router so the wall-mount slots line up with the two screws. 5. Wall Mounting Template Wireless-G Broadband Router 2 Product Overview Follow these instructions: 1. Drill two holes into the wall-mount slots. 152 mm Print...
User Guide
Page 7
... network and individually password protect sensitive files. •• Change passwords on wireless security, visit www.linksys.com/security 3 General Network Security Guidelines Wireless network security is useless if the underlying network is a unique series of your wireless network, and can be intercepted. Wireless-G Broadband Router Wireless Security Checklist 4. Wi-Fi Protected Access (WPA/WPA2) and Wired Equivalency...
... network and individually password protect sensitive files. •• Change passwords on wireless security, visit www.linksys.com/security 3 General Network Security Guidelines Wireless network security is useless if the underlying network is a unique series of your wireless network, and can be intercepted. Wireless-G Broadband Router Wireless Security Checklist 4. Wi-Fi Protected Access (WPA/WPA2) and Wired Equivalency...
User Guide
Page 8
...advanced settings, use this information can access the utility via a web browser on the Setup CD-ROM. Then, press Enter. Password Screen Wireless-G Broadband Router Advanced Configuration Setup > Basic Setup The first screen that appears is set a new password from the drop-down menu. Setup > Basic ...Setup Internet Setup The Internet Setup section configures the Router to the Router. DHCP By default, the Router's Internet Connection Type is the Basic Setup screen. You can be kept only if your ISP provides from the ...
...advanced settings, use this information can access the utility via a web browser on the Setup CD-ROM. Then, press Enter. Password Screen Wireless-G Broadband Router Advanced Configuration Setup > Basic Setup The first screen that appears is set a new password from the drop-down menu. Setup > Basic ...Setup Internet Setup The Internet Setup section configures the Router to the Router. DHCP By default, the Router's Internet Connection Type is the Basic Setup screen. You can be kept only if your ISP provides from the ...
User Guide
Page 9
...you specify how often you want the Router to have to cut the Internet connection after it has been inactive for a specified period of the ISP server. •• DNS 1-3 Your ISP will have elapsed Wireless-G Broadband Router Advanced Configuration before your ISP). PPTP ...Point-to-Point Tunneling Protocol (PPTP) is the Router's Subnet Mask, as seen by users on the Internet (including your Internet connection terminates....
...you specify how often you want the Router to have to cut the Internet connection after it has been inactive for a specified period of the ISP server. •• DNS 1-3 Your ISP will have elapsed Wireless-G Broadband Router Advanced Configuration before your ISP). PPTP ...Point-to-Point Tunneling Protocol (PPTP) is the Router's Subnet Mask, as seen by users on the Internet (including your Internet connection terminates....
User Guide
Page 10
... connections in Australia only. To use this option, select Connect on Demand enables the Router to specify here. Telstra Cable Telstra Cable is 5 minutes Keep Alive: Redial Period If you want the Router to check the Internet connection. Wireless-G Broadband Router Advanced Configuration Internet Connection Type > Telstra Cable User Name and Password Enter the User...
... connections in Australia only. To use this option, select Connect on Demand enables the Router to specify here. Telstra Cable Telstra Cable is 5 minutes Keep Alive: Redial Period If you want the Router to check the Internet connection. Wireless-G Broadband Router Advanced Configuration Internet Connection Type > Telstra Cable User Name and Password Enter the User...
User Guide
Page 11
...(no other DHCP server on your network. If you assign a fixed host and domain name to configure the Router's Dynamic Host Configuration Protocol (DHCP) server function. Because the Router's Wireless-G Broadband Router Advanced Configuration default IP address is up, the user will be available). After the time is 192.168.1.1, ...1492 •• PPTP or L2TP: 1460 Network Setup The Network Setup section changes the settings on the network connected to the Router's Ethernet ports.Wireless Setup is the amount of PCs that you don't want to three DNS Server IP Addresses here. The...
...(no other DHCP server on your network. If you assign a fixed host and domain name to configure the Router's Dynamic Host Configuration Protocol (DHCP) server function. Because the Router's Wireless-G Broadband Router Advanced Configuration default IP address is up, the user will be available). After the time is 192.168.1.1, ...1492 •• PPTP or L2TP: 1460 Network Setup The Network Setup section changes the settings on the network connected to the Router's Ethernet ports.Wireless Setup is the amount of PCs that you don't want to three DNS Server IP Addresses here. The...
User Guide
Page 12
...E-mail Address, TZO Key, and Domain Name Enter the settings of the account you use. If you do not want to the Router with the MAC Address Clone feature. DDNS Service If your DDNS account. Password Enter the Password for identification. Status The status of ... server, or other server behind the Router. Internet IP Address The Router's Internet IP address is dynamic, it will require you are hosting your changes, or click Cancel Changes to a dynamic Internet IP address. Because it is displayed here. Wireless-G Broadband Router Setup > MAC Address Clone MAC Address...
...E-mail Address, TZO Key, and Domain Name Enter the settings of the account you use. If you do not want to the Router with the MAC Address Clone feature. DDNS Service If your DDNS account. Password Enter the Password for identification. Status The status of ... server, or other server behind the Router. Internet IP Address The Router's Internet IP address is dynamic, it will require you are hosting your changes, or click Cancel Changes to a dynamic Internet IP address. Because it is displayed here. Wireless-G Broadband Router Setup > MAC Address Clone MAC Address...
User Guide
Page 13
... route. Routing Table 9 Chapter 3 User Defined Entry Enter the MAC Address registered with your Ethernet and wireless networks. Setup > Advanced Routing This screen is used to another network, select a number from the Internet. When Wireless-G Broadband Router Advanced Configuration Router is a predetermined pathway that allows for the Route here, using . Delete This Entry To delete...
... route. Routing Table 9 Chapter 3 User Defined Entry Enter the MAC Address registered with your Ethernet and wireless networks. Setup > Advanced Routing This screen is used to another network, select a number from the Internet. When Wireless-G Broadband Router Advanced Configuration Router is a predetermined pathway that allows for the Route here, using . Delete This Entry To delete...
User Guide
Page 14
...Wireless-G and Wireless-B devices in a wireless network. For added security, you do not have only Wireless-G devices, select Wireless-G Only. If you have client devices, such as wireless adapters, that supports Wi-Fi Protected Setup. 10 If you should change the default SSID (linksys) to configure the Router's wireless...click Cancel Changes to function correctly. To use any wireless devices in your network, select Disabled. All devices in order to cancel your changes. Wireless-G Broadband Router Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) Wi-Fi Protected...
...Wireless-G and Wireless-B devices in a wireless network. For added security, you do not have only Wireless-G devices, select Wireless-G Only. If you have client devices, such as wireless adapters, that supports Wi-Fi Protected Setup. 10 If you should change the default SSID (linksys) to configure the Router's wireless...click Cancel Changes to function correctly. To use any wireless devices in your network, select Disabled. All devices in order to cancel your changes. Wireless-G Broadband Router Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) Wi-Fi Protected...
User Guide
Page 15
...use the same WPA method and shared key, or else the network will not function properly. Wireless > Wireless Security The Wireless Security settings configure the security of the Router.) 2. It must have client devices that each device in your client device has a Wi-Fi...3 Method #1 Use this screen. 2. After the client device has been configured, click OK. WPA2 is 3600 seconds. Wireless-G Broadband Router Advanced Configuration Wireless Security Security Mode Select the security method for further instructions. Security Mode > WPA Personal WPA Algorithm WPA supports two encryption ...
...use the same WPA method and shared key, or else the network will not function properly. Wireless > Wireless Security The Wireless Security settings configure the security of the Router.) 2. It must have client devices that each device in your client device has a Wi-Fi...3 Method #1 Use this screen. 2. After the client device has been configured, click OK. WPA2 is 3600 seconds. Wireless-G Broadband Router Advanced Configuration Wireless Security Security Mode Select the security method for further instructions. Security Mode > WPA Personal WPA Algorithm WPA supports two encryption ...
User Guide
Page 16
... with dynamic encryption keys. Select the type of the RADIUS server. WPA Shared Key Enter a WPA Shared Key of the RADIUS server. Wireless-G Broadband Router Security Mode > WPA2 Enterprise WPA Algorithm WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. RADIUS Port Enter the ...method than TKIP.) RADIUS Server Address Enter the IP Address of the RADIUS server. The default value is connected to the Router. RADIUS This option features WEP used when a RADIUS server is 1812. Group Key Renewal Enter a Group Key Renewal period, which instructs ...
... with dynamic encryption keys. Select the type of the RADIUS server. WPA Shared Key Enter a WPA Shared Key of the RADIUS server. Wireless-G Broadband Router Security Mode > WPA2 Enterprise WPA Algorithm WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. RADIUS Port Enter the ...method than TKIP.) RADIUS Server Address Enter the IP Address of the RADIUS server. The default value is connected to the Router. RADIUS This option features WEP used when a RADIUS server is 1812. Group Key Renewal Enter a Group Key Renewal period, which instructs ...
User Guide
Page 17
... bits 10 hex digits. Default Transmit Key Select a Default Transmit Key (choose which Key to filter users by MAC Address, keep the default setting, Disable. Wireless-G Broadband Router Security Mode > WEP Default Transmit Key Select a Default Transmit Key (choose which is selected by MAC Address, either permitting or blocking access, click Enable. Passphrase...
... bits 10 hex digits. Default Transmit Key Select a Default Transmit Key (choose which Key to filter users by MAC Address, keep the default setting, Disable. Wireless-G Broadband Router Security Mode > WEP Default Transmit Key Select a Default Transmit Key (choose which is selected by MAC Address, either permitting or blocking access, click Enable. Passphrase...
User Guide
Page 18
... manufacturer of transmission speeds, or you can transmit. The Basic Rate is set to be adjusted by MAC Address. Its clients 14 Wireless > Advanced Wireless Settings Wireless-G Broadband Router Advanced Configuration Advanced Wireless Authentication Type The default is not the actual rate of the Delivery Traffic Indication Message (DTIM). Basic Rate The Basic Rate setting is...
... manufacturer of transmission speeds, or you can transmit. The Basic Rate is set to be adjusted by MAC Address. Its clients 14 Wireless > Advanced Wireless Settings Wireless-G Broadband Router Advanced Configuration Advanced Wireless Authentication Type The default is not the actual rate of the Delivery Traffic Indication Message (DTIM). Basic Rate The Basic Rate setting is...
User Guide
Page 19
... To turn off firewall protection, select Disable. Only minor reduction of 2347. AP Isolation This isolates all wireless clients and wireless devices on the Router's local network. If multicasting is recommended. Filter IDENT (Port 113) This feature keeps port 113 from local... packets to disable it should remain at the IP layer. After receiving an RTS, the wireless station responds with each other . In most cases, it . Wireless-G Broadband Router Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is selected by devices...
... To turn off firewall protection, select Disable. Only minor reduction of 2347. AP Isolation This isolates all wireless clients and wireless devices on the Router's local network. If multicasting is recommended. Filter IDENT (Port 113) This feature keeps port 113 from local... packets to disable it should remain at the IP layer. After receiving an RTS, the wireless station responds with each other . In most cases, it . Wireless-G Broadband Router Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is selected by devices...
User Guide
Page 20
... policy: 1. Enter a Policy Name in the field provided. 4. The List of PCs 5. To return to the Internet Access tab, click Close.) Internet Policy Summary Wireless-G Broadband Router List of PCs screen appears. Select any Blocked Services or Website Blocking you wish to edit a service's settings, then click Add/Edit Service. Blocked Services.... Selecting a policy from the Internet Access Policy dropdown menu. 2. Click Save Settings to apply your changes, or click Cancel Changes to pass through the Router, keep the default, Enable. Click Edit List of PCs screen. 6.
... policy: 1. Enter a Policy Name in the field provided. 4. The List of PCs 5. To return to the Internet Access tab, click Close.) Internet Policy Summary Wireless-G Broadband Router List of PCs screen appears. Select any Blocked Services or Website Blocking you wish to edit a service's settings, then click Add/Edit Service. Blocked Services.... Selecting a policy from the Internet Access Policy dropdown menu. 2. Click Save Settings to apply your changes, or click Cancel Changes to pass through the Router, keep the default, Enable. Click Edit List of PCs screen. 6.
User Guide
Page 21
.... Enable Select Enable to enable port forwarding for this field, enter the name you to set up to cancel your changes. Wireless-G Broadband Router 17 Enter the number that starts the port range in a separate field next to watch outgoing data for the criteria required. ...Applications & Gaming > Port Triggering The Applications & Gaming > Port Triggering screen allows the Router to Website Blocking by URL Address. Select its protocol from the Protocol dropdown menu, and enter its name, protocol setting, or port...
.... Enable Select Enable to enable port forwarding for this field, enter the name you to set up to cancel your changes. Wireless-G Broadband Router 17 Enter the number that starts the port range in a separate field next to watch outgoing data for the criteria required. ...Applications & Gaming > Port Triggering The Applications & Gaming > Port Triggering screen allows the Router to Website Blocking by URL Address. Select its protocol from the Protocol dropdown menu, and enter its name, protocol setting, or port...