User Guide
Page 4
Wireless-G Broadband Router with SRX The Administration Tab - Firmware Upgrade 30 The Administration Tab - Config Management 31 The Status Tab - Router 31 The Status Tab - Local Network 32 The Status Tab - System Performance 34 Appendix A: Troubleshooting 36 Common Problems and Solutions 36 Frequently Asked Questions 45 Appendix B: Wireless Security 51 Security Precautions 51 Security Threats Facing Wireless Networks...
Wireless-G Broadband Router with SRX The Administration Tab - Firmware Upgrade 30 The Administration Tab - Config Management 31 The Status Tab - Router 31 The Status Tab - Local Network 32 The Status Tab - System Performance 34 Appendix A: Troubleshooting 36 Common Problems and Solutions 36 Frequently Asked Questions 45 Appendix B: Wireless Security 51 Security Precautions 51 Security Threats Facing Wireless Networks...
User Guide
Page 6
Wireless-G Broadband Router with SRX Figure 5-27: Port Services 25 Figure 5-28: Applications and Gaming Tab - Log 29 Figure 5-34: Administration Tab - Config Management 31 Figure 5-38: Status Tab - Local Network 32 Figure 5-40: Status Tab - Wireless 33 Figure 5-41: Status Tab - Port Triggering 26 Figure 5-30: Applications ... E-5: MAC Address Clone 57 Management 28 Figure 5-33: Administration Tab - DMZ 27 Figure 5-31: Applications and Gaming Tab - Firmware Upgrade 30 Figure 5-37: Administration Tab - Factory Defaults 30 Figure 5-36: Administration Tab...
Wireless-G Broadband Router with SRX Figure 5-27: Port Services 25 Figure 5-28: Applications and Gaming Tab - Log 29 Figure 5-34: Administration Tab - Config Management 31 Figure 5-38: Status Tab - Local Network 32 Figure 5-40: Status Tab - Wireless 33 Figure 5-41: Status Tab - Port Triggering 26 Figure 5-30: Applications ... E-5: MAC Address Clone 57 Management 28 Figure 5-33: Administration Tab - DMZ 27 Figure 5-31: Applications and Gaming Tab - Firmware Upgrade 30 Figure 5-37: Administration Tab - Factory Defaults 30 Figure 5-36: Administration Tab...
User Guide
Page 8
... asked questions, regarding installation and use of the Wireless-G Broadband Router. • Appendix B: Wireless Security This appendix explains the risks of wireless networking and some solutions to reduce the risks. • Appendix C: Upgrading Firmware This appendix instructs you on how to upgrade the Router's firmware should you can use the Router's MAC filtering and/or MAC address cloning feature...
... asked questions, regarding installation and use of the Wireless-G Broadband Router. • Appendix B: Wireless Security This appendix explains the risks of wireless networking and some solutions to reduce the risks. • Appendix C: Upgrading Firmware This appendix instructs you on how to upgrade the Router's firmware should you can use the Router's MAC filtering and/or MAC address cloning feature...
User Guide
Page 36
...to "Appendix C: Upgrading Firmware". Wireless-G Broadband Router with the Router. This feature is disabled by clicking the Upgrade button after browsing for the firmware, which you wish to receive a file transmitted over a network Chapter 5: Configuring the Wireless-G Broadband Router 30 The Administration Tab -... configuration settings to clear the screen. Firmware Upgrade firmware: the programming code that runs a networking device download: to test and click the Start Test button. Firmware Upgrade Firmware can download from the Linksys website. The Administration Tab - To ...
...to "Appendix C: Upgrading Firmware". Wireless-G Broadband Router with the Router. This feature is disabled by clicking the Upgrade button after browsing for the firmware, which you wish to receive a file transmitted over a network Chapter 5: Configuring the Wireless-G Broadband Router 30 The Administration Tab -... configuration settings to clear the screen. Firmware Upgrade firmware: the programming code that runs a networking device download: to test and click the Start Test button. Firmware Upgrade Firmware can download from the Linksys website. The Administration Tab - To ...
User Guide
Page 37
... restore them later. Router The Router screen on the Status Tab displays the Router's current status. Connection Type. Boot Version. This is the amount of time since the Router was first booted up. System Up Time. Router isp: your hard drive. Wireless-G Broadband Router with SRX The Administration Tab - Firmware Version. Hardware Version. Chapter 5: Configuring the Wireless-G Broadband Router 31 The Administration...
... restore them later. Router The Router screen on the Status Tab displays the Router's current status. Connection Type. Boot Version. This is the amount of time since the Router was first booted up. System Up Time. Router isp: your hard drive. Wireless-G Broadband Router with SRX The Administration Tab - Firmware Version. Hardware Version. Chapter 5: Configuring the Wireless-G Broadband Router 31 The Administration...
User Guide
Page 48
...-based utility. 16. On the Setup screen, select the option Keep Alive, and set the Redial Period option at www.linksys.com. Wireless-G Broadband Router with the firmware and TFTP program, and follow the pdf's instructions. • Set a static IP address on the PC; The upgrade could have failed for the computer you ...
...-based utility. 16. On the Setup screen, select the option Keep Alive, and set the Redial Period option at www.linksys.com. Wireless-G Broadband Router with the firmware and TFTP program, and follow the pdf's instructions. • Set a static IP address on the PC; The upgrade could have failed for the computer you ...
User Guide
Page 52
... 46 Frequently Asked Questions The default client port for free. The computers on the screen. As far as a temporary measure. (Please look at www.linksys.com for remote admin. What do I block corrupted FTP downloads? How will I need to do ? How do I be 6, 7, 8, and ...flash the latest firmware release that your cable or DSL modem by holding down the reset button until the Power LED fully turns on the same LAN (not a problem with the Router? Reset your proxy setting is used for more information. The web page hangs; Wireless-G Broadband Router with one ...
... 46 Frequently Asked Questions The default client port for free. The computers on the screen. As far as a temporary measure. (Please look at www.linksys.com for remote admin. What do I block corrupted FTP downloads? How will I need to do ? How do I be 6, 7, 8, and ...flash the latest firmware release that your cable or DSL modem by holding down the reset button until the Power LED fully turns on the same LAN (not a problem with the Router? Reset your proxy setting is used for more information. The web page hangs; Wireless-G Broadband Router with one ...
User Guide
Page 53
... a connection. The Router allows PPTP packets to use DMZ Hosting. Theoretically, the Router can establish 520 sessions at the same time, but the Router's setup pages are the advanced features of the Router? Appendix A: Troubleshooting 47 Frequently Asked Questions Downloading a more current version of Router firmware will not enhance the.... Any platform that Internet Explorer is disabled. Or remove the dial-up is set to Direct connection to be open. Wireless-G Broadband Router with SRX that version contains new features that you can only forward 10 ranges of ports.
... a connection. The Router allows PPTP packets to use DMZ Hosting. Theoretically, the Router can establish 520 sessions at the same time, but the Router's setup pages are the advanced features of the Router? Appendix A: Troubleshooting 47 Frequently Asked Questions Downloading a more current version of Router firmware will not enhance the.... Any platform that Internet Explorer is disabled. Or remove the dial-up is set to Direct connection to be open. Wireless-G Broadband Router with SRX that version contains new features that you can only forward 10 ranges of ports.
User Guide
Page 57
... Identifier). So, make wireless networking as safe and easy for implementation. Appendix B: Wireless Security Security Precautions Note: Some of these security features, refer to "Chapter 5: Configuring the Wireless-G Broadband Router." Wireless-G Broadband Router with SRX Appendix B: Wireless Security Linksys wants to make it...be followed): 1. With every wireless networking device you are stored in its firmware. These messages can change network settings. Use the highest encryption algorithm possible. If a hacker gets a hold of Linksys products provide several network security...
... Identifier). So, make wireless networking as safe and easy for implementation. Appendix B: Wireless Security Security Precautions Note: Some of these security features, refer to "Chapter 5: Configuring the Wireless-G Broadband Router." Wireless-G Broadband Router with SRX Appendix B: Wireless Security Linksys wants to make it...be followed): 1. With every wireless networking device you are stored in its firmware. These messages can change network settings. Use the highest encryption algorithm possible. If a hacker gets a hold of Linksys products provide several network security...
User Guide
Page 60
... the firmware. Wireless-G Broadband Router with SRX Appendix C: Upgrading Firmware The Broadband Router's firmware is upgraded through the Web-based Utility's Administration tab. Then, click the Upgrade button to find the file. 4. Download the firmware from the Web-Utility's Administration tab, and the Upgrade Firmware screen, will appear. 3. Figure C-1: Upgrade Firmware Appendix C: Upgrading Firmware 54 Follow these instructions: 1. Click Firmware Upgrade from Linksys's website...
... the firmware. Wireless-G Broadband Router with SRX Appendix C: Upgrading Firmware The Broadband Router's firmware is upgraded through the Web-based Utility's Administration tab. Then, click the Upgrade button to find the file. 4. Download the firmware from the Web-Utility's Administration tab, and the Upgrade Firmware screen, will appear. 3. Figure C-1: Upgrade Firmware Appendix C: Upgrading Firmware 54 Follow these instructions: 1. Click Firmware Upgrade from Linksys's website...
User Guide
Page 66
... (The Institute of related programs located at a network gateway server that can occur in wireless transmissions. IP Address - IPCONFIG - The programming code that provides access to servers on ...Wireless-G Broadband Router with different, incompatible communications protocols. Data transmission that protects the resources of the packet. A wireless network that develops networking standards. ISM band - An independent institute that is bridged to implement secure exchange of computers, telecommunications, and other networks. Appendix F: Glossary 60 Firmware...
... (The Institute of related programs located at a network gateway server that can occur in wireless transmissions. IP Address - IPCONFIG - The programming code that provides access to servers on ...Wireless-G Broadband Router with different, incompatible communications protocols. Data transmission that protects the resources of the packet. A wireless network that develops networking standards. ISM band - An independent institute that is bridged to implement secure exchange of computers, telecommunications, and other networks. Appendix F: Glossary 60 Firmware...
User Guide
Page 68
Wireless-G Broadband Router with a newer version. Static Routing - A data .../IP FTP protocol that inspects every incoming packet of instructions PCs use to enter the network. Switch - 1. a wireless encryption protocol that is called a "program". SSID (Service Set IDentifier) - A version of instructions that does not... require acknowledgement from the recipient of a network. SPI (Stateful Packet Inspection) Firewall - Subnet Mask - Your wireless network's name. A device for the computer. A network protocol for transmitting data that requires acknowledgement from the recipient...
Wireless-G Broadband Router with a newer version. Static Routing - A data .../IP FTP protocol that inspects every incoming packet of instructions PCs use to enter the network. Switch - 1. a wireless encryption protocol that is called a "program". SSID (Service Set IDentifier) - A version of instructions that does not... require acknowledgement from the recipient of a network. SPI (Stateful Packet Inspection) Firewall - Subnet Mask - Your wireless network's name. A device for the computer. A network protocol for transmitting data that requires acknowledgement from the recipient...