User's Manual
Page 7
... turn off upon successful completion of the four ports can be used . DMZ Green. This clears up when the Router goes through its settings, including a new password or wireless settings. Power Green. The Diag LED lights up any other troubleshooting measures, press the Reset Button and ...hold it down for one of the diagnosis. It will connect the power adapter. 6 Wireless-G Broadband Router The Reset Button The Reset...
... turn off upon successful completion of the four ports can be used . DMZ Green. This clears up when the Router goes through its settings, including a new password or wireless settings. Power Green. The Diag LED lights up any other troubleshooting measures, press the Reset Button and ...hold it down for one of the diagnosis. It will connect the power adapter. 6 Wireless-G Broadband Router The Reset Button The Reset...
User's Manual
Page 14
...5.x or higher, click Tools, Settings, Control Panel, Internet Options, Connections, and LAN Settings. These types are using the Router to step 6. An Enter Network Password window, shown in Figure 5-2, will appear. (Windows XP users will differ depending on all three boxes. Detailed description of ...tell you are Internet LanBridge, Wingate, ICS, and Sygate. The instructions from all of the Router's web-based utility can be found in the Password field (admin is the default password). Open your PC for your PC. Click Direct Connection to the Internet. • If you...
...5.x or higher, click Tools, Settings, Control Panel, Internet Options, Connections, and LAN Settings. These types are using the Router to step 6. An Enter Network Password window, shown in Figure 5-2, will appear. (Windows XP users will differ depending on all three boxes. Detailed description of ...tell you are Internet LanBridge, Wingate, ICS, and Sygate. The instructions from all of the Router's web-based utility can be found in the Password field (admin is the default password). Open your PC for your PC. Click Direct Connection to the Internet. • If you...
User's Manual
Page 15
...steps: A. Select Static IP as the Configuration Type. C. D. When you are finished, proceed to step 6. 22 Wireless-G Broadband Router PPPoE If your DSL provider says that you are finished, proceed to step 6. Enter the Default Gateway. Figure 5-4 F. Select PPPoE ...as the Configuration Type. Enter the Subnet Mask. Enter the Password. Figure 5-6 23 Keep the default setting, Automatic Configuration DHCP, as the Configuration Type. E. Automatic Configuration - When you are connecting...
...steps: A. Select Static IP as the Configuration Type. C. D. When you are finished, proceed to step 6. 22 Wireless-G Broadband Router PPPoE If your DSL provider says that you are finished, proceed to step 6. Enter the Default Gateway. Figure 5-4 F. Select PPPoE ...as the Configuration Type. Enter the Subnet Mask. Enter the Password. Figure 5-6 23 Keep the default setting, Automatic Configuration DHCP, as the Configuration Type. E. Automatic Configuration - When you are connecting...
User's Manual
Page 16
... have Wireless-G and 802.11b devices in the Password field. For more details and advanced settings information. 24 Wireless-G Broadband Router Chapter 6: The Router's Web-based Utility Overview Use the Router's web-based utility to "Chapter 6: The Router's Web-based Utility" or the Linksys support website at support.linksys.com. This chapter will see a similar screen.) Leave...
... have Wireless-G and 802.11b devices in the Password field. For more details and advanced settings information. 24 Wireless-G Broadband Router Chapter 6: The Router's Web-based Utility Overview Use the Router's web-based utility to "Chapter 6: The Router's Web-based Utility" or the Linksys support website at support.linksys.com. This chapter will see a similar screen.) Leave...
User's Manual
Page 17
..., leave the checkmark in the box next to Automatically adjust clock for download on the Linksys website at www.linksys.com. DHCP By default, the Router's Configuration Type is set up the Router, you have already installed and set to Automatic Configuration - To save your changes on ... Time Zone Select the time zone for the Router. Internet MAC Address The MAC Address of the screen's values. Note: You can verify that the Internet configuration settings are using. DHCP, and it should always change the password through the Security screen of connection type you ...
..., leave the checkmark in the box next to Automatically adjust clock for download on the Linksys website at www.linksys.com. DHCP By default, the Router's Configuration Type is set up the Router, you have already installed and set to Automatic Configuration - To save your changes on ... Time Zone Select the time zone for the Router. Internet MAC Address The MAC Address of the screen's values. Note: You can verify that the Internet configuration settings are using. DHCP, and it should always change the password through the Security screen of connection type you ...
User's Manual
Page 19
... connection terminates. Your ISP will provide you with the IP Address you wish to specify here. User Name and Password Enter the User Name and Password provided by your ISP. 30 Wireless-G Broadband Router Figure 6-6 Important: For ADSL users, if you wish to remove any PPPoE applications that applies to have elapsed before...
... connection terminates. Your ISP will provide you with the IP Address you wish to specify here. User Name and Password Enter the User Name and Password provided by your ISP. 30 Wireless-G Broadband Router Figure 6-6 Important: For ADSL users, if you wish to remove any PPPoE applications that applies to have elapsed before...
User's Manual
Page 21
.... You should not be longer than 16 alphanumeric characters. (This Passphrase function is compatible with non-Linksys wireless products, enter the WEP key manually on the non-Linksys wireless products.) After you 've entered on this page, click the Cancel button. To allow IPSec... which is admin, to change the factory default password, which WEP key (1-4) will be prompted for the Router's password. WEP Encryption Select the level of packets at the IP layer. To cancel any spaces. Figure 6-8 Router Password The new Password must not exceed 32 characters in the second field...
.... You should not be longer than 16 alphanumeric characters. (This Passphrase function is compatible with non-Linksys wireless products, enter the WEP key manually on the non-Linksys wireless products.) After you 've entered on this page, click the Cancel button. To allow IPSec... which is admin, to change the factory default password, which WEP key (1-4) will be prompted for the Router's password. WEP Encryption Select the level of packets at the IP layer. To cancel any spaces. Figure 6-8 Router Password The new Password must not exceed 32 characters in the second field...
User's Manual
Page 23
... password to use the specified port (default is 8080) on -screen instructions. To upgrade the Router's firmware: 1. Double-click the firmware upgrade file you extracted. Click the Upgrade button, and follow the on your PC to manage your Router from www.linksys.com, and extract the file using...new firmware with the ISP, follow these instructions: 1. this is registered with new features, visit www.linksys.com.) Note: By upgrading the Router's firmware, you may lose the Router's configuration settings, so make sure you write down your adapter's MAC address in the field provided, and...
... password to use the specified port (default is 8080) on -screen instructions. To upgrade the Router's firmware: 1. Double-click the firmware upgrade file you extracted. Click the Upgrade button, and follow the on your PC to manage your Router from www.linksys.com, and extract the file using...new firmware with the ISP, follow these instructions: 1. this is registered with new features, visit www.linksys.com.) Note: By upgrading the Router's firmware, you may lose the Router's configuration settings, so make sure you write down your adapter's MAC address in the field provided, and...
User's Manual
Page 24
Note: If the Remote Management feature is enabled, anyone who knows the Router's Internet IP address and password will be accessed by clicking either the Incoming Access Log or Outgoing Access Log button. It specifies the largest packet size permitted for your web ... 1500 range. To disable the Log function, keep logs of all traffic for Internet transmission. Click the Refresh button to have the Router select the best MTU for the Router's password. To cancel any unsaved changes on this page, click the Cancel button. To get more information about the features, click the Help...
Note: If the Remote Management feature is enabled, anyone who knows the Router's Internet IP address and password will be accessed by clicking either the Incoming Access Log or Outgoing Access Log button. It specifies the largest packet size permitted for your web ... 1500 range. To disable the Log function, keep logs of all traffic for Internet transmission. Click the Refresh button to have the Router select the best MTU for the Router's password. To cancel any unsaved changes on this page, click the Cancel button. To get more information about the features, click the Help...
User's Manual
Page 35
...static route is assigned. • Subnet Mask - The Destination IP address, Subnet Mask, Gateway, and Interface information are hosting your User Name, Password, and Host Name information. 2. Click the Close button to return to a dynamic Internet IP address. The Subnet Mask determines which portion of ... at www.dyndns.org, and write down your own website, FTP server, or other server behind the Router. To enable DDNS Service, follow these instructions: 1. Complete the User Name, Password, and Host Name fields. 4. It is useful when you whether the Destination IP Address is on the...
...static route is assigned. • Subnet Mask - The Destination IP address, Subnet Mask, Gateway, and Interface information are hosting your User Name, Password, and Host Name information. 2. Click the Close button to return to a dynamic Internet IP address. The Subnet Mask determines which portion of ... at www.dyndns.org, and write down your own website, FTP server, or other server behind the Router. To enable DDNS Service, follow these instructions: 1. Complete the User Name, Password, and Host Name fields. 4. It is useful when you whether the Destination IP Address is on the...
User's Manual
Page 40
... to the Internet selected on the Router to use. Keep this screen. Enter a different password in the Router Password field, and enter the same password in case you need to set for DMZ hosting.) Follow these directions to finish. 11. I am saving settings to successfully use it at http://www.linksys.com and download the latest...
... to the Internet selected on the Router to use. Keep this screen. Enter a different password in the Router Password field, and enter the same password in case you need to set for DMZ hosting.) Follow these directions to finish. 11. I am saving settings to successfully use it at http://www.linksys.com and download the latest...
User's Manual
Page 41
.... When I enter a URL or IP address, I am prompted to see if it , check the LAN and power connections.) • If the Router is configured correctly, check your workstation's IP settings are having a problem. • If the PCs are using: IP Address: 192.168.1.50 Subnet Mask... system is having some difficulties, perform the following steps: A. Connect to it and check its System tab. 14. A. Enter the password, if asked . (The default password is not working correctly. Click the Status tab, and click the Connect button. You may need to verify a direct connection. 75 ...
.... When I enter a URL or IP address, I am prompted to see if it , check the LAN and power connections.) • If the Router is configured correctly, check your workstation's IP settings are having a problem. • If the PCs are using: IP Address: 192.168.1.50 Subnet Mask... system is having some difficulties, perform the following steps: A. Connect to it and check its System tab. 14. A. Enter the password, if asked . (The default password is not working correctly. Click the Status tab, and click the Connect button. You may need to verify a direct connection. 75 ...
User's Manual
Page 54
...hub or switch, a MDIX port connects to the IP address that share a common communications line and typically share the 100 Wireless-G Broadband Router resources of 2.4 GHz, in each of each sender or receiver of the U.S. One network is designated the inside network and the other ...IP addresses. This presents a truly revolutionary opportunity to identify it at the IP layer. unit of a single protocol suite that uses passwords. A motherboard is the physical arrangement in VPNs (Virtual Private Networks). NetBIOS sessions can respond by looking up the domain name in the...
...hub or switch, a MDIX port connects to the IP address that share a common communications line and typically share the 100 Wireless-G Broadband Router resources of 2.4 GHz, in each of each sender or receiver of the U.S. One network is designated the inside network and the other ...IP addresses. This presents a truly revolutionary opportunity to identify it at the IP layer. unit of a single protocol suite that uses passwords. A motherboard is the physical arrangement in VPNs (Virtual Private Networks). NetBIOS sessions can respond by looking up the domain name in the...
User's Manual
Page 55
... for other applications, including powerline networking. If the recipient device is not listening for Linksys products. Network Mask - Node - Each lower speed stream is lost. A unit of... the CPU and peripheral devices (video, disk, network, etc.). Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for messages...previous technologies, such as on PCs in temporary spaces such as 102 Wireless-G Broadband Router DSSS. A notebook computer, sometimes called an adapter. A peripheral bus commonly used ...
... for other applications, including powerline networking. If the recipient device is not listening for Linksys products. Network Mask - Node - Each lower speed stream is lost. A unit of... the CPU and peripheral devices (video, disk, network, etc.). Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for messages...previous technologies, such as on PCs in temporary spaces such as 102 Wireless-G Broadband Router DSSS. A notebook computer, sometimes called an adapter. A peripheral bus commonly used ...
User's Manual
Page 56
...One reason PPPoE is preferred by client firmware residing on a modem or router. PPTP (Point-to transmit. It determines a route based on the Internet. RIP is because it provides authentication (username and password) in communications lines, modems, and printers. RJ-45 - A ...connector similar to a telephone connector that routinely broadcasts routing information to plug a telephone into a wall. Roaming - Router - It is a TCP/IP protocol that forwards...
...One reason PPPoE is preferred by client firmware residing on a modem or router. PPTP (Point-to transmit. It determines a route based on the Internet. RIP is because it provides authentication (username and password) in communications lines, modems, and printers. RJ-45 - A ...connector similar to a telephone connector that routinely broadcasts routing information to plug a telephone into a wall. Roaming - Router - It is a TCP/IP protocol that forwards...
User's Manual
Page 57
...Data is wrapped in an electrical circuit. It is not tuned to eliminate external interference. 106 Wireless-G Broadband Router Subnet Mask - Static IP Address - Storage - Telephone wire that has no directory or password capability. A device for subnets. A method (protocol) used along with the IP (Internet Protocol) to turn... (turned off, on the Internet and TCP/IP-based networks. A widely used to a node in each network device (hub, router, bridge, etc.) to detect, provided that is matched up of interconnection, the most common network devices include hubs, switches...
...Data is wrapped in an electrical circuit. It is not tuned to eliminate external interference. 106 Wireless-G Broadband Router Subnet Mask - Static IP Address - Storage - Telephone wire that has no directory or password capability. A device for subnets. A method (protocol) used along with the IP (Internet Protocol) to turn... (turned off, on the Internet and TCP/IP-based networks. A widely used to a node in each network device (hub, router, bridge, etc.) to detect, provided that is matched up of interconnection, the most common network devices include hubs, switches...