User Guide
Page 5
... 55 23 Frequently Asked Questions 69 24 Appendix B: Wireless Security 79 26 27 30 Security Precautions Security Threats Facing Wireless Networks 79 80 Filter 34 5 The Access Restrictions Tab - Wireless MAC Filter Wireless-G Broadband Router with 2 Phone Ports 1 The Wireless Tab - Advanced Wireless Settings 31 1 The Security Tab - Firewall 33 2 The Access Restrictions Tab - Wireless 52 13 The Status Tab - Chapter 2: Planning Your...
... 55 23 Frequently Asked Questions 69 24 Appendix B: Wireless Security 79 26 27 30 Security Precautions Security Threats Facing Wireless Networks 79 80 Filter 34 5 The Access Restrictions Tab - Wireless MAC Filter Wireless-G Broadband Router with 2 Phone Ports 1 The Wireless Tab - Advanced Wireless Settings 31 1 The Security Tab - Firewall 33 2 The Access Restrictions Tab - Wireless 52 13 The Status Tab - Chapter 2: Planning Your...
User Guide
Page 7
...: Applications & Gaming Tab - Wireless Security (WPA-RADIUS) 28 Wireless-G Broadband Router with 2 Phone Ports Figure 5-14: Wireless Tab - Wireless Security (RADIUS) 28 Figure 5-15: Wireless Tab - Firewall 33 Figure 5-21: Access Restrictions Tab - QoS 43 Figure 5-29: QoS - Log 46 Figure 5-32: Administration Tab - Wireless Security (WEP) 29 Figure 5-16: Wireless Tab - Management 45 Figure 5-31: Administration Tab - Wireless Security (WPA-Preshared Key) 27...
...: Applications & Gaming Tab - Wireless Security (WPA-RADIUS) 28 Wireless-G Broadband Router with 2 Phone Ports Figure 5-14: Wireless Tab - Wireless Security (RADIUS) 28 Figure 5-15: Wireless Tab - Firewall 33 Figure 5-21: Access Restrictions Tab - QoS 43 Figure 5-29: QoS - Log 46 Figure 5-32: Administration Tab - Wireless Security (WEP) 29 Figure 5-16: Wireless Tab - Management 45 Figure 5-31: Administration Tab - Wireless Security (WPA-Preshared Key) 27...
User Guide
Page 9
... also can share Internet access, so you don't need more than ever, sharing Internet access, files and fun, easily and securely. PCs on another computer's hard drive. All of a local area network to a different IP address for data transmission. So... device that provides a way to look at either up to network wirelessly better than one high-speed Internet connection. Chapter 1: Introduction Wireless-G Broadband Router with 2 Phone Ports Welcome Thank you for choosing the Linksys Wireless-G Broadband Router with all the information on the World Wide Web. All the while...
... also can share Internet access, so you don't need more than ever, sharing Internet access, files and fun, easily and securely. PCs on another computer's hard drive. All of a local area network to a different IP address for data transmission. So... device that provides a way to look at either up to network wirelessly better than one high-speed Internet connection. Chapter 1: Introduction Wireless-G Broadband Router with 2 Phone Ports Welcome Thank you for choosing the Linksys Wireless-G Broadband Router with all the information on the World Wide Web. All the while...
User Guide
Page 11
...and solutions, as well as frequently asked questions, regarding installation and use of the Router. • Appendix B: Wireless Security This appendix explains the risks of wireless networking and some solutions to reduce the risks. • Appendix C: Finding the ... networking. • Appendix F: Specifications This appendix provides the technical specifications for the Router. • Appendix G: Warranty Information This appendix supplies the warranty information for reference: Wireless-G Broadband Router with 2 Phone Ports • Chapter 1: Introduction This chapter describes the...
...and solutions, as well as frequently asked questions, regarding installation and use of the Router. • Appendix B: Wireless Security This appendix explains the risks of wireless networking and some solutions to reduce the risks. • Appendix C: Finding the ... networking. • Appendix F: Specifications This appendix provides the technical specifications for the Router. • Appendix G: Warranty Information This appendix supplies the warranty information for reference: Wireless-G Broadband Router with 2 Phone Ports • Chapter 1: Introduction This chapter describes the...
User Guide
Page 21
...request the settings. To secure the Router, change the User Name and Password from their defaults. • Wireless. The Utility can use of the Utility: • Basic Setup. Chapter 5: Configuring the Router Wireless-G Broadband Router with 2 Phone Ports Overview Linksys recommends using the Setup CD...-ROM for first-time installation of the main tabs. For advanced users, you click one of the Router. Click the Administration tab and then the...
...request the settings. To secure the Router, change the User Name and Password from their defaults. • Wireless. The Utility can use of the Utility: • Basic Setup. Chapter 5: Configuring the Router Wireless-G Broadband Router with 2 Phone Ports Overview Linksys recommends using the Setup CD...-ROM for first-time installation of the main tabs. For advanced users, you click one of the Router. Click the Administration tab and then the...
User Guide
Page 22
.... To permit or deny wireless network access for your wireless network. • Wireless MAC Filter. Security • Firewall. If you need to clone a MAC address onto the Router, use this screen. • Wireless Security. Enable and configure the security settings for your wireless network on this screen....Enter the basic settings for specific devices, set up MAC address filtering. • Advanced Wireless Settings. Wireless-G Broadband Router with 2 Phone Ports Setup • Basic Setup. Enable the Router's Dynamic Domain Name System (DDNS) feature on this screen. • DDNS.
.... To permit or deny wireless network access for your wireless network. • Wireless MAC Filter. Security • Firewall. If you need to clone a MAC address onto the Router, use this screen. • Wireless Security. Enable and configure the security settings for your wireless network on this screen....Enter the basic settings for specific devices, set up MAC address filtering. • Advanced Wireless Settings. Wireless-G Broadband Router with 2 Phone Ports Setup • Basic Setup. Enable the Router's Dynamic Domain Name System (DDNS) feature on this screen. • DDNS.
User Guide
Page 31
...Enable. MAC Address. Then click the Save Settings button. The Router will require you have to call your ISP to change the registered MAC address to undo your ISP. MAC Address Clone Wireless-G Broadband Router with the MAC Address Clone feature. MAC Clone MAC Clone ...Service. When you to register a MAC address in order to access the Internet. Chapter 5: Configuring the Router 23 The Setup Tab - If you want to clone the MAC address of hardware for identification, like a social security...
...Enable. MAC Address. Then click the Save Settings button. The Router will require you have to call your ISP to change the registered MAC address to undo your ISP. MAC Address Clone Wireless-G Broadband Router with the MAC Address Clone feature. MAC Clone MAC Clone ...Service. When you to register a MAC address in order to access the Internet. Chapter 5: Configuring the Router 23 The Setup Tab - If you want to clone the MAC address of hardware for identification, like a social security...
User Guide
Page 32
...are enabled by default. NAT is a pre-determined pathway that enables the Router to translate IP addresses of the host for transmission of hops between the Router and another network. (A static route is a security feature that network information must travel to create a static route. 24 Figure.... To disable this feature to 20 static route entries. The Destination LAN IP Address is also disabled.) Dynamic Routing. Wireless-G Broadband Router with the other router(s). Advanced Routing The Advanced Routing screen allows you want , RIP1 v1, RIP1 v1 Compatible, or RIP v2. Use ...
...are enabled by default. NAT is a pre-determined pathway that enables the Router to translate IP addresses of the host for transmission of hops between the Router and another network. (A static route is a security feature that network information must travel to create a static route. 24 Figure.... To disable this feature to 20 static route entries. The Destination LAN IP Address is also disabled.) Dynamic Routing. Wireless-G Broadband Router with the other router(s). Advanced Routing The Advanced Routing screen allows you want , RIP1 v1, RIP1 v1 Compatible, or RIP v2. Use ...
User Guide
Page 34
... (linksys) to broadcast the Router's SSID, then select Disable. Figure 5-11: Wireless Tab - Wireless Settings Wireless Network Mode. Basic Wireless Settings 26 Chapter 5: Configuring the Router The Wireless Tab - Basic Wireless Settings The basic settings for wireless networks to undo your network, keep the default setting, Enable. If you can select the wireless standards running on your wireless network. For added security, you...
... (linksys) to broadcast the Router's SSID, then select Disable. Figure 5-11: Wireless Tab - Wireless Settings Wireless Network Mode. Basic Wireless Settings 26 Chapter 5: Configuring the Router The Wireless Tab - Basic Wireless Settings The basic settings for wireless networks to undo your network, keep the default setting, Enable. If you can select the wireless standards running on your wireless network. For added security, you...
User Guide
Page 35
... used in conjunction with 2 Phone Ports The Wireless Security settings configure the security of your changes. Wireless Security Figure 5-12: Wireless Tab - Then enter the Group Key Renewal period, which is a security standard stronger than WEP encryption. Chapter 5: Configuring the Router The Wireless Tab - wep (wired equivalent privacy): a method of 8-32 characters. Wireless Security Wireless-G Broadband Router with a RADIUS server. There are briefly discussed...
... used in conjunction with 2 Phone Ports The Wireless Security settings configure the security of your changes. Wireless Security Figure 5-12: Wireless Tab - Then enter the Group Key Renewal period, which is a security standard stronger than WEP encryption. Chapter 5: Configuring the Router The Wireless Tab - wep (wired equivalent privacy): a method of 8-32 characters. Wireless Security Wireless-G Broadband Router with a RADIUS server. There are briefly discussed...
User Guide
Page 36
... enter the WEP key(s) manually, then enter it should only be used in the Key 1-4 field(s). Wireless Security (RADIUS) Chapter 5: Configuring the Router The Wireless Tab - When you want to the Router.) Enter the RADIUS server's IP address and port number, along with 2 Phone Ports WPA-RADIUS. RADIUS...Select a level of WEP encryption, 64 bits 10 hex digits or 128 bits 26 hex digits. Wireless-G Broadband Router with the Shared Key, which is the key shared between the Router and the server. If you have finished making changes on this screen, click the Save Settings button...
... enter the WEP key(s) manually, then enter it should only be used in the Key 1-4 field(s). Wireless Security (RADIUS) Chapter 5: Configuring the Router The Wireless Tab - When you want to the Router.) Enter the RADIUS server's IP address and port number, along with 2 Phone Ports WPA-RADIUS. RADIUS...Select a level of WEP encryption, 64 bits 10 hex digits or 128 bits 26 hex digits. Wireless-G Broadband Router with the Shared Key, which is the key shared between the Router and the server. If you have finished making changes on this screen, click the Save Settings button...
User Guide
Page 37
... you want to use a Passphrase, then enter it in the Passphrase field and click the Generate button. Figure 5-15: Wireless Tab - Wireless-G Broadband Router with 2 Phone Ports WEP. Wireless Security (WEP) Chapter 5: Configuring the Router 29 The Wireless Tab - WEP is a basic encryption method, which WEP key to use , select the appropriate Default Transmit Key number. If you..., or click the Cancel Changes button to enter the WEP key(s) manually, then enter it in the Key 1-4 field(s). To indicate which is not as secure as WPA.
... you want to use a Passphrase, then enter it in the Passphrase field and click the Generate button. Figure 5-15: Wireless Tab - Wireless-G Broadband Router with 2 Phone Ports WEP. Wireless Security (WEP) Chapter 5: Configuring the Router 29 The Wireless Tab - WEP is a basic encryption method, which WEP key to use , select the appropriate Default Transmit Key number. If you..., or click the Cancel Changes button to enter the WEP key(s) manually, then enter it in the Key 1-4 field(s). To indicate which is not as secure as WPA.
User Guide
Page 41
... Filter Java Applets. Filter ActiveX. Web Filters Filter Proxy. Filter Cookies. Chapter 5: Configuring the Router 33 The Security Tab - When you will see the Firewall screen. Firewall Wireless-G Broadband Router with them. Use of not having access to any WAN proxy servers. Filter Pop-Ups. A...If you deny ActiveX, you have finished making changes on your screen. To enable ActiveX filtering, click the checkbox. The Security Tab - You can use the Internet, sometimes unwanted pop-up filtering, click the checkbox. Denying Filter Proxy will enhance the...
... Filter Java Applets. Filter ActiveX. Web Filters Filter Proxy. Filter Cookies. Chapter 5: Configuring the Router 33 The Security Tab - When you will see the Firewall screen. Firewall Wireless-G Broadband Router with them. Use of not having access to any WAN proxy servers. Filter Pop-Ups. A...If you deny ActiveX, you have finished making changes on your screen. To enable ActiveX filtering, click the checkbox. The Security Tab - You can use the Internet, sometimes unwanted pop-up filtering, click the checkbox. Denying Filter Proxy will enhance the...
User Guide
Page 43
Select Enabled to block anonymous Internet requests, or Disabled to undo your network's security and filter multicasting. Chapter 5: Configuring the Router 35 The Access Restrictions Tab - Filter Multicast. When you have finished making changes to this feature. ...to allow IP multicast packets to be forwarded to enhance your changes. Block WAN Requests Wireless-G Broadband Router with 2 Phone Ports Use these features to the appropriate computers. This keeps your network from being "pinged" or detected and reinforces your network security by hiding your network.
Select Enabled to block anonymous Internet requests, or Disabled to undo your network's security and filter multicasting. Chapter 5: Configuring the Router 35 The Access Restrictions Tab - Filter Multicast. When you have finished making changes to this feature. ...to allow IP multicast packets to be forwarded to enhance your changes. Block WAN Requests Wireless-G Broadband Router with 2 Phone Ports Use these features to the appropriate computers. This keeps your network from being "pinged" or detected and reinforces your network security by hiding your network.
User Guide
Page 44
... to block local access for five services: Telnet, Web, FTP, TFTP, and Secure Shell (SSH). Specify the IP addresses that are allowed to undo your changes. 36 Chapter 5: Configuring the Router The Access Restrictions Tab - If you want to block local or remote access.... screen, click the Save Settings button to save the changes, or click the Cancel Changes button to remotely access the Router. Access Control Enable Access Control. Wireless-G Broadband Router with 2 Phone Ports The Access Restrictions Tab - Make sure the appropriate checkbox is denied. When a checkbox is unchecked...
... to block local access for five services: Telnet, Web, FTP, TFTP, and Secure Shell (SSH). Specify the IP addresses that are allowed to undo your changes. 36 Chapter 5: Configuring the Router The Access Restrictions Tab - If you want to block local or remote access.... screen, click the Save Settings button to save the changes, or click the Cancel Changes button to remotely access the Router. Access Control Enable Access Control. Wireless-G Broadband Router with 2 Phone Ports The Access Restrictions Tab - Make sure the appropriate checkbox is denied. When a checkbox is unchecked...
User Guide
Page 50
.... DMZ hosting forwards all the ports of a special-purpose service such as Internet gaming and videoconferencing. Any PC whose port is more secure because it because its DHCP client function disabled and should have its IP address may change when using the DHCP function. To use this... PC. To expose one local user to be exposed to the Internet. DMZ Figure 5-27: Applications & Gaming Tab DMZ DMZ Host IP Address. Wireless-G Broadband Router with 2 Phone Ports The Applications & Gaming Tab - The Port Range Forwarding is being forwarded must have a new static IP address assigned to one...
.... DMZ hosting forwards all the ports of a special-purpose service such as Internet gaming and videoconferencing. Any PC whose port is more secure because it because its DHCP client function disabled and should have its IP address may change when using the DHCP function. To use this... PC. To expose one local user to be exposed to the Internet. DMZ Figure 5-27: Applications & Gaming Tab DMZ DMZ Host IP Address. Wireless-G Broadband Router with 2 Phone Ports The Applications & Gaming Tab - The Port Range Forwarding is being forwarded must have a new static IP address assigned to one...
User Guide
Page 53
...well as gaming and videoconferencing. To enable UPnP, click the Enabled radio button. Management Wireless-G Broadband Router with 2 Phone Ports When you click the Administration tab, you use the Router's Web-based Utility, your changes. This screen allows you change the default user name... to one of time you access the Router's Web-based Utility. Management The Administration Tab - Re-enter the Router's new Password to confirm. Enter the length of your choice. Router Password Local Router Access To ensure the Router's security, you will see the Management screen. User...
...well as gaming and videoconferencing. To enable UPnP, click the Enabled radio button. Management Wireless-G Broadband Router with 2 Phone Ports When you click the Administration tab, you use the Router's Web-based Utility, your changes. This screen allows you change the default user name... to one of time you access the Router's Web-based Utility. Management The Administration Tab - Re-enter the Router's new Password to confirm. Enter the length of your choice. Router Password Local Router Access To ensure the Router's security, you will see the Management screen. User...
User Guide
Page 60
... the status of the Router's wireless network interface is enabled on the Wireless Security tab, this will display whether or not wireless security is displayed here. SSID. MAC Address. Status. Figure 5-39: Status Tab - Channel. Encryption Function. Wireless As entered on -screen information. As selected on the Router. The MAC Address of your wireless network. Wireless-G Broadband Router with 2 Phone Ports The...
... the status of the Router's wireless network interface is enabled on the Wireless Security tab, this will display whether or not wireless security is displayed here. SSID. MAC Address. Status. Figure 5-39: Status Tab - Channel. Encryption Function. Wireless As entered on -screen information. As selected on the Router. The MAC Address of your wireless network. Wireless-G Broadband Router with 2 Phone Ports The...
User Guide
Page 64
... TCP/IP line with 2 Phone Ports C. D. F. Restart the computer when asked. 56 Appendix A: Troubleshooting Common Problems and Solutions Make sure the security level is selected. Each PC or network device that is not unique to a network, Windows will only see one Ethernet adapter installed, you only ... and Domain names (e.g., John for Host and home for the information. If the IP address is not used by your Ethernet adapter. Wireless-G Broadband Router with no association to 192.168.15.150 using the DHCP server on the network connected to identify itself in the ranges 192.168....
... TCP/IP line with 2 Phone Ports C. D. F. Restart the computer when asked. 56 Appendix A: Troubleshooting Common Problems and Solutions Make sure the security level is selected. Each PC or network device that is not unique to a network, Windows will only see one Ethernet adapter installed, you only ... and Domain names (e.g., John for Host and home for the information. If the IP address is not used by your Ethernet adapter. Wireless-G Broadband Router with no association to 192.168.15.150 using the DHCP server on the network connected to identify itself in the ranges 192.168....
User Guide
Page 69
Wireless-G Broadband Router with the NAT standard. Make sure the cable connecting from your system; Wait 30 seconds, and then turn on your ISP. A. I can't get an IP address. 6. At least one IPSec session will work fine. however, simultaneous IPSec sessions may be possible, depending on a PC." AH has limitations due to the Router...verify that use IPSec with the ESP (Encapsulation Security Payload known as protocol 51) are incompatible with the Router. F. Check the Status tab of the Router, and go to access the Router's Web-based Utility Setup page. refer to ...
Wireless-G Broadband Router with the NAT standard. Make sure the cable connecting from your system; Wait 30 seconds, and then turn on your ISP. A. I can't get an IP address. 6. At least one IPSec session will work fine. however, simultaneous IPSec sessions may be possible, depending on a PC." AH has limitations due to the Router...verify that use IPSec with the ESP (Encapsulation Security Payload known as protocol 51) are incompatible with the Router. F. Check the Status tab of the Router, and go to access the Router's Web-based Utility Setup page. refer to ...