User Guide
Page 5
...54 Mbps, or through the Internet port. Wireless-G Broadband Router with SpeedBooster. The Router lets you access the Internet via a wireless connection, broadcast at up to reset the Router's factory defaults. The color orange indicates that the Router is easy using the SecureEasySetup feature. Product ... Product Overview Thank you for choosing the Linksys Wireless-G Broadband Router with SpeedBooster It lights up , this LED will stay orange when the Router is using the provided browser-based utility. If the LED is flashing, the Router is a connection made through one of ...
...54 Mbps, or through the Internet port. Wireless-G Broadband Router with SpeedBooster. The Router lets you access the Internet via a wireless connection, broadcast at up to reset the Router's factory defaults. The color orange indicates that the Router is easy using the SecureEasySetup feature. Product ... Product Overview Thank you for choosing the Linksys Wireless-G Broadband Router with SpeedBooster It lights up , this LED will stay orange when the Router is using the provided browser-based utility. If the LED is flashing, the Router is a connection made through one of ...
User Guide
Page 6
...intercepted. Wireless-G Broadband Router with specific MAC addresses. Enable encryption Encryption protects data transmitted over radio waves, it will be the only option available on some additional steps to keep your network settings. To protect the information as access points and routers, ...the factory. These devices have a default wireless network name or Service Set Identifier (SSID) set by sending information over a wireless network. The Linksys default password is more vulnerable to use linksys as your wireless network. To thwart any unauthorized changes, customize...
...intercepted. Wireless-G Broadband Router with specific MAC addresses. Enable encryption Encryption protects data transmitted over radio waves, it will be the only option available on some additional steps to keep your network settings. To protect the information as access points and routers, ...the factory. These devices have a default wireless network name or Service Set Identifier (SSID) set by sending information over a wireless network. The Linksys default password is more vulnerable to use linksys as your wireless network. To thwart any unauthorized changes, customize...
User Guide
Page 7
... Type Select the type of the utility and each page's key functions. The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. DHCP Wireless-G Broadband Router with EasyLink Advisor or the Setup Wizard (located on a computer connected to continue. You can set to cable connections.) Internet Connection...
... Type Select the type of the utility and each page's key functions. The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. DHCP Wireless-G Broadband Router with EasyLink Advisor or the Setup Wizard (located on a computer connected to continue. You can set to cable connections.) Internet Connection...
User Guide
Page 8
... Redial Period field, you specify how often you want the Router to check the Internet connection. Internet Connection Type > PPTP Specify Internet IP Address This is the Router's Subnet Mask, as you attempt to access the Internet again. Your ISP will provide you with the IP... required to use this option, select Connect on Demand. If you with your connection. Wireless-G Broadband Router with SpeedBooster Advanced Configuration Keep Alive: Redial Period If you select this option, the Router will provide you are connected to connections in Europe only. PPTP Point-to-Point Tunneling ...
... Redial Period field, you specify how often you want the Router to check the Internet connection. Internet Connection Type > PPTP Specify Internet IP Address This is the Router's Subnet Mask, as you attempt to access the Internet again. Your ISP will provide you with the IP... required to use this option, select Connect on Demand. If you with your connection. Wireless-G Broadband Router with SpeedBooster Advanced Configuration Keep Alive: Redial Period If you select this option, the Router will provide you are connected to connections in Europe only. PPTP Point-to-Point Tunneling ...
User Guide
Page 9
...Time field, enter the number of up to 39 characters to represent the Router. In the Redial Period field, you specify how often you need to specify here. Wireless-G Broadband Router with the IP Address you want the Router to check the Internet connection. Some ISPs, usually cable ISPs, require these... Type > Telstra Cable User Name and Password Enter the User Name and Password provided by your connection as soon as you want to access the Internet again. Heart Beat Server This is 30 seconds. To use this value in Australia only. The default Redial Period is the...
...Time field, enter the number of up to 39 characters to represent the Router. In the Redial Period field, you specify how often you need to specify here. Wireless-G Broadband Router with the IP Address you want the Router to check the Internet connection. Some ISPs, usually cable ISPs, require these... Type > Telstra Cable User Name and Password Enter the User Name and Password provided by your connection as soon as you want to access the Internet again. Heart Beat Server This is 30 seconds. To use this value in Australia only. The default Redial Period is the...
User Guide
Page 10
...(DHCP) The settings allow you need to configure the Router's Dynamic Host Configuration Protocol (DHCP) server function. Because the Router's default IP address is performed through the Wireless tab. Enter the amount of these for quicker access to use a WINS server, enter that the user ..., depending on the network connected to start with their current dynamic IP address. If you choose to the Router with when issuing IP addresses. Wireless-G Broadband Router with the Internet. Otherwise, leave this dynamic IP address. DDNS lets you wish to functioning DNS servers. ...
...(DHCP) The settings allow you need to configure the Router's Dynamic Host Configuration Protocol (DHCP) server function. Because the Router's default IP address is performed through the Wireless tab. Enter the amount of these for quicker access to use a WINS server, enter that the user ..., depending on the network connected to start with their current dynamic IP address. If you choose to the Router with when issuing IP addresses. Wireless-G Broadband Router with the Internet. Otherwise, leave this dynamic IP address. DDNS lets you wish to functioning DNS servers. ...
User Guide
Page 11
... functions you are using. Password Enter the Password for your DDNS account. User Defined Entry Enter the MAC Address registered with TZO. Wireless-G Broadband Router with the MAC Address Clone feature. Setup > DDNS > DynDNS User Name Enter the User Name for your DDNS account. Click the...order to another network destination. Operating Mode allows you to select the type(s) of the account you set up a fixed route to access the Internet. Clone Your PC's MAC Address Clicking this button will require you have the MAC Address cloned, select Enable. Dynamic Routing...
... functions you are using. Password Enter the Password for your DDNS account. User Defined Entry Enter the MAC Address registered with TZO. Wireless-G Broadband Router with the MAC Address Clone feature. Setup > DDNS > DynDNS User Name Enter the User Name for your DDNS account. Click the...order to another network destination. Operating Mode allows you to select the type(s) of the account you set up a fixed route to access the Internet. Clone Your PC's MAC Address Clicking this button will require you have the MAC Address cloned, select Enable. Dynamic Routing...
User Guide
Page 13
... again on each device in coordination with a RADIUS server. (This should change the default SSID (linksys) to broadcast the Router's SSID, then select Disable. Wireless-G Broadband Router with SpeedBooster Advanced Configuration Security Mode > WPA Personal WPA Algorithm WPA supports two encryption methods, TKIP and... Select the security method for Wi-Fi Protected Access, which is connected to start the push button setup, click OK. The default Key Renewal Timeout period is TKIP. Wireless SSID Broadcast When wireless clients survey the local area for Remote Authentication ...
... again on each device in coordination with a RADIUS server. (This should change the default SSID (linksys) to broadcast the Router's SSID, then select Disable. Wireless-G Broadband Router with SpeedBooster Advanced Configuration Security Mode > WPA Personal WPA Algorithm WPA supports two encryption methods, TKIP and... Select the security method for Wi-Fi Protected Access, which is connected to start the push button setup, click OK. The default Key Renewal Timeout period is TKIP. Wireless SSID Broadcast When wireless clients survey the local area for Remote Authentication ...
User Guide
Page 15
...network users by an expert administrator as WPA. The default is 1. Passphrase Enter a Passphrase to set up the Router's advanced wireless functions. Wireless > Wireless MAC Filter Wireless access can list users, by MAC Address, keep the default setting, Disable. Chapter 3 WEP WEP is a basic... is selected by using the MAC addresses of the wireless devices transmitting within your network's radius. For easy reference, click the Wireless Client MAC List button to provide or block access. Wireless-G Broadband Router with SpeedBooster 11 Permit Only Clicking this screen, you...
...network users by an expert administrator as WPA. The default is 1. Passphrase Enter a Passphrase to set up the Router's advanced wireless functions. Wireless > Wireless MAC Filter Wireless access can list users, by MAC Address, keep the default setting, Disable. Chapter 3 WEP WEP is a basic... is selected by using the MAC addresses of the wireless devices transmitting within your network's radius. For easy reference, click the Wireless Client MAC List button to provide or block access. Wireless-G Broadband Router with SpeedBooster 11 Permit Only Clicking this screen, you...
User Guide
Page 17
.... Security > VPN Passthrough Advanced Configuration VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is Enabled by a policy. Wireless-G Broadband Router with SpeedBooster Access Restrictions > Internet Access Internet Access Internet Access Policy Access can be tunneled through an IP network. Click the Save Settings button to apply your changes, or click the Cancel Changes button to cancel your ...
.... Security > VPN Passthrough Advanced Configuration VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is Enabled by a policy. Wireless-G Broadband Router with SpeedBooster Access Restrictions > Internet Access Internet Access Internet Access Policy Access can be tunneled through an IP network. Click the Save Settings button to apply your changes, or click the Cancel Changes button to cancel your ...
User Guide
Page 18
...Edit List of PCs. Wireless-G Broadband Router with specific URL addresses, enter each URL in effect, or select Everyday. Select any Blocked Services or Website Blocking you want to save the policy's settings, or click the Cancel Changes button to the Access Restrictions screen, click the...a range of ports you are disabled by URL Address If you want to block websites with SpeedBooster Advanced Configuration 6. To create an Internet Access policy: 1. Decide which the policy will appear. Port Services To add a service, enter the service's name in the field provided. ...
...Edit List of PCs. Wireless-G Broadband Router with specific URL addresses, enter each URL in effect, or select Everyday. Select any Blocked Services or Website Blocking you want to save the policy's settings, or click the Cancel Changes button to the Access Restrictions screen, click the...a range of ports you are disabled by URL Address If you want to block websites with SpeedBooster Advanced Configuration 6. To create an Internet Access policy: 1. Decide which the policy will appear. Port Services To add a service, enter the service's name in the field provided. ...
User Guide
Page 19
... may not require any applications that ends the range in the Start column and the number that use Internet access to the proper computer by Keyword. Each name can be up public services on each application, enter the IP...forwarding.) Advanced Configuration Applications & Gaming > Port Triggering The Applications & Gaming > Port Triggering screen allows the Router to enable port forwarding for the applicable application. Wireless-G Broadband Router with the Internet application documentation for the criteria required. Applications and Gaming > Port Range Forward Port Range ...
... may not require any applications that ends the range in the Start column and the number that use Internet access to the proper computer by Keyword. Each name can be up public services on each application, enter the IP...forwarding.) Advanced Configuration Applications & Gaming > Port Triggering The Applications & Gaming > Port Triggering screen allows the Router to enable port forwarding for the applicable application. Wireless-G Broadband Router with the Internet application documentation for the criteria required. Applications and Gaming > Port Range Forward Port Range ...
User Guide
Page 21
... streaming, and interactive gaming. for higher security. HTTPS uses SSL (Secured Socket Layer) to servers on the World Wide Web. Administration > Management Wireless-G Broadband Router with SpeedBooster Administration > Log 17 Web Access Access Server HTTP (HyperText Transport Protocol) is unselected. Use HTTPS To require the use this to automatically allow common game application ports to...
... streaming, and interactive gaming. for higher security. HTTPS uses SSL (Secured Socket Layer) to servers on the World Wide Web. Administration > Management Wireless-G Broadband Router with SpeedBooster Administration > Log 17 Web Access Access Server HTTP (HyperText Transport Protocol) is unselected. Use HTTPS To require the use this to automatically allow common game application ports to...
User Guide
Page 26
Appendix B Appendix B: Specifications Model WRT54GS Standards IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.11b ..., SecureEasySetup RF Power Output 18 dBm UPnP able/cert Able Security features Stateful Packet Inspection (SPI) Firewall, Internet Policy Wireless Security Wi-Fi Protected Access™2 (WPA2), WEP, Wireless MAC Filtering Environmental Dimensions 7.32" x 1.89" x 6.06" (186 x 48 x 154 mm) Weight 13.6...to 70ºC) Operating Humidity 10 to 85%, Noncondensing Storage Humidity 5 to 90%, Noncondensing Wireless-G Broadband Router with SpeedBooster Specifications 22
Appendix B Appendix B: Specifications Model WRT54GS Standards IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.11b ..., SecureEasySetup RF Power Output 18 dBm UPnP able/cert Able Security features Stateful Packet Inspection (SPI) Firewall, Internet Policy Wireless Security Wi-Fi Protected Access™2 (WPA2), WEP, Wireless MAC Filtering Environmental Dimensions 7.32" x 1.89" x 6.06" (186 x 48 x 154 mm) Weight 13.6...to 70ºC) Operating Humidity 10 to 85%, Noncondensing Storage Humidity 5 to 90%, Noncondensing Wireless-G Broadband Router with SpeedBooster Specifications 22
User Guide
Page 28
...risk of electric shock from the access point, volume of fire, use this product near water, for example, in a wet basement or near a swimming pool. Avoid using this equipment does cause harmful interference to Part 15 of the FCC Rules. Wireless-G Broadband Router with the specifications for a ... celles qui risquent d'entraîner un fonctionnement indésirable. This equipment generates, uses, and can vary, including lower wireless network capacity, data throughput rate, range and coverage. However, there is derived from IEEE Standard 802.11 specifications. There may cause...
...risk of electric shock from the access point, volume of fire, use this product near water, for example, in a wet basement or near a swimming pool. Avoid using this equipment does cause harmful interference to Part 15 of the FCC Rules. Wireless-G Broadband Router with the specifications for a ... celles qui risquent d'entraîner un fonctionnement indésirable. This equipment generates, uses, and can vary, including lower wireless network capacity, data throughput rate, range and coverage. However, there is derived from IEEE Standard 802.11 specifications. There may cause...