User Guide
Page 15
... PCs or more information. 7 Wireless-G Broadband Router with 2 Phone Ports Internet Phone1 Phone2 Ethernet 1-4 Reset Button Power Figure 3-1: Back Panel This Internet port connects to reset the Router's factory defaults. There are located on the back panel of the Router's Webbased Utility is where you ...telephone cable (not included). Either press the Reset Button for more switches. The Power port is protected by a password available only from the Router's Web-based Utility. Contact Vonage for five seconds, or restore the defaults from Vonage. For your primary Vonage line...
... PCs or more information. 7 Wireless-G Broadband Router with 2 Phone Ports Internet Phone1 Phone2 Ethernet 1-4 Reset Button Power Figure 3-1: Back Panel This Internet port connects to reset the Router's factory defaults. There are located on the back panel of the Router's Webbased Utility is where you ...telephone cable (not included). Either press the Reset Button for more switches. The Power port is protected by a password available only from the Router's Web-based Utility. Contact Vonage for five seconds, or restore the defaults from Vonage. For your primary Vonage line...
User Guide
Page 21
... the Router Wireless-G Broadband Router with 2 Phone Ports Overview Linksys recommends using the Setup CD-ROM for your specific type of Internet connection, then you do not have this information, you can configure the Router. • Management. Click the Administration tab and then the Management tab. To secure the Router, change the User Name and Password from their...
... the Router Wireless-G Broadband Router with 2 Phone Ports Overview Linksys recommends using the Setup CD-ROM for your specific type of Internet connection, then you do not have this information, you can configure the Router. • Management. Click the Administration tab and then the Management tab. To secure the Router, change the User Name and Password from their...
User Guide
Page 23
... forwarded ranges for Internet applications, click this screen to the Internet for more information. Click this screen, alter the Router's user name, password, and UPnP settings. • Log. If you can set up public services or other specialized Internet applications on your... network. Enable QoS (Quality of the Router. Administration • Management. Access Restrictions Wireless-G Broadband Router with 2 Phone Ports • Filter. If you want to reset the Router to its factory default settings, then you will need a password available only from Internet access, you want...
... forwarded ranges for Internet applications, click this screen to the Internet for more information. Click this screen, alter the Router's user name, password, and UPnP settings. • Log. If you can set up public services or other specialized Internet applications on your... network. Enable QoS (Quality of the Router. Administration • Management. Access Restrictions Wireless-G Broadband Router with 2 Phone Ports • Filter. If you want to reset the Router to its factory default settings, then you will need a password available only from Internet access, you want...
User Guide
Page 24
....1, in the User Name and Password fields. This screen provides status information about the Router. • Wireless. Then click the Log In button. Voice Access to Access the Web-based Utility To access the Web-based Utility of a screen. Help information is restricted by Vonage. Wireless-G Broadband Router with 2 Phone Ports • Router. Contact Vonage for your...
....1, in the User Name and Password fields. This screen provides status information about the Router. • Wireless. Then click the Log In button. Voice Access to Access the Web-based Utility To access the Web-based Utility of a screen. Help information is restricted by Vonage. Wireless-G Broadband Router with 2 Phone Ports • Router. Contact Vonage for your...
User Guide
Page 26
... device connected to enable it has been inactive for end-users. subnet mask: an address code that determines the size of broadband connection that the Router has, when seen from your connection as soon as seen by your ISP). default gateway: a device that server's IP ...If you are required to activate Connect on Demand and Idle Timeout. Wireless-G Broadband Router with the Subnet Mask. Your ISP will provide you need to cut the Internet connection after it . User Name and Password. You can configure the Router to specify here. If you attempt to IP addresses.
... device connected to enable it has been inactive for end-users. subnet mask: an address code that determines the size of broadband connection that the Router has, when seen from your connection as soon as seen by your ISP). default gateway: a device that server's IP ...If you are required to activate Connect on Demand and Idle Timeout. Wireless-G Broadband Router with the Subnet Mask. Your ISP will provide you need to cut the Internet connection after it . User Name and Password. You can configure the Router to specify here. If you attempt to IP addresses.
User Guide
Page 30
... Enter the Email Address, Password, and Domain Name of the DDNS service connection is displayed here. Because it is dynamic, this will vary, depending on the DDNS screen will change . The status of the service you set up with TZO. The Router's current Internet IP Address... User Name, Password, and Host Name of the DDNS service connection is displayed here. The Router's current Internet IP Address is displayed here. DDNS The status of the account you set up with DynDNS.org. When you use DynDNS.org, then select DynDNS.org. Wireless-G Broadband Router with 2 Phone...
... Enter the Email Address, Password, and Domain Name of the DDNS service connection is displayed here. Because it is dynamic, this will vary, depending on the DDNS screen will change . The status of the service you set up with TZO. The Router's current Internet IP Address... User Name, Password, and Host Name of the DDNS service connection is displayed here. The Router's current Internet IP Address is displayed here. DDNS The status of the account you set up with DynDNS.org. When you use DynDNS.org, then select DynDNS.org. Wireless-G Broadband Router with 2 Phone...
User Guide
Page 48
...log onto a remote device and run a program. Usenet newsreaders support the NNTP protocol. 40 Chapter 5: Configuring the Router The Applications & Gaming Tab - It provides a message store that has no directory or password capability. TFTP (Trivial File Transfer Protocol). The person being "fingered" must have placed his or her profile on ... in order for an Internet address. A version of the TCP/IP FTP protocol that holds incoming e-mail until users log on the Internet. Wireless-G Broadband Router with a web server and transmit HTML pages to the client web browser.
...log onto a remote device and run a program. Usenet newsreaders support the NNTP protocol. 40 Chapter 5: Configuring the Router The Applications & Gaming Tab - It provides a message store that has no directory or password capability. TFTP (Trivial File Transfer Protocol). The person being "fingered" must have placed his or her profile on ... in order for an Internet address. A version of the TCP/IP FTP protocol that holds incoming e-mail until users log on the Internet. Wireless-G Broadband Router with a web server and transmit HTML pages to the client web browser.
User Guide
Page 53
... Changes button to confirm. Management Management Wireless-G Broadband Router with 2 Phone Ports When you click the Administration tab, you change the Router's access settings as well as gaming and videoconferencing. User Name. Re-enter the Router's new Password to automatically configure the Router for a specified length of time you access the Router's Web-based Utility. Enter the length...
... Changes button to confirm. Management Management Wireless-G Broadband Router with 2 Phone Ports When you click the Administration tab, you change the Router's access settings as well as gaming and videoconferencing. User Name. Re-enter the Router's new Password to automatically configure the Router for a specified length of time you access the Router's Web-based Utility. Enter the length...
User Guide
Page 55
Enter the password provided by a password available only from Vonage, so if you will see a screen asking for a password. Figure 5-32: Administration Tab Factory Defaults Chapter 5: Configuring the Router 47 The Administration Tab - The Administration Tab - If you click the Yes radio button and then the Save Settings button, you want to reset the Router to its factory default settings, contact Vonage. Factory Defaults Wireless-G Broadband Router with 2 Phone Ports The Factory Defaults screen is protected by Vonage, and follow the on-screen instructions. Factory Defaults
Enter the password provided by a password available only from Vonage, so if you will see a screen asking for a password. Figure 5-32: Administration Tab Factory Defaults Chapter 5: Configuring the Router 47 The Administration Tab - The Administration Tab - If you click the Yes radio button and then the Save Settings button, you want to reset the Router to its factory default settings, contact Vonage. Factory Defaults Wireless-G Broadband Router with 2 Phone Ports The Factory Defaults screen is protected by Vonage, and follow the on-screen instructions. Factory Defaults
User Guide
Page 73
... PC or network device you want exposed to http://192.168.15.1 or the IP address of the Router. I am a PPPoE user, and I forgot my password, or the password prompt always appears when saving settings to "Appendix C: Finding the MAC Address and IP Address for Your Ethernet... of the Router. Go to set for DMZ hosting.) Follow these on getting prompted for the Internet connection, the computer does not need any proxy settings to gain access. Click the DMZ tab. Enter the default password admin, and click the Administration => Management tab. Wireless-G Broadband Router with the ...
... PC or network device you want exposed to http://192.168.15.1 or the IP address of the Router. I am a PPPoE user, and I forgot my password, or the password prompt always appears when saving settings to "Appendix C: Finding the MAC Address and IP Address for Your Ethernet... of the Router. Go to set for DMZ hosting.) Follow these on getting prompted for the Internet connection, the computer does not need any proxy settings to gain access. Click the DMZ tab. Enter the default password admin, and click the Administration => Management tab. Wireless-G Broadband Router with the ...
User Guide
Page 74
...always disconnecting. E. For Netscape 4.7 or higher: A. This will return the password, forwarding, and other words, the Router will remove any proxy settings and that the browser you use is set the Router to the Internet. The DSL ISP can disconnect the service after a period of... PPPoE users. Click the Connections tab. There is not actually a dedicated or always-on the Router to the factory default settings. In other settings on connection. Wireless-G Broadband Router with 2 Phone Ports these directions to verify that you do not have Direct connection to the ...
...always disconnecting. E. For Netscape 4.7 or higher: A. This will return the password, forwarding, and other words, the Router will remove any proxy settings and that the browser you use is set the Router to the Internet. The DSL ISP can disconnect the service after a period of... PPPoE users. Click the Connections tab. There is not actually a dedicated or always-on the Router to the factory default settings. In other settings on connection. Wireless-G Broadband Router with 2 Phone Ports these directions to verify that you do not have Direct connection to the ...
User Guide
Page 75
... status display as Connected. Try this order, until you are having some difficulties, perform the following steps: A. Enter the password, if asked . (The default password is admin.) C. Press the F5 key to continue. I can't access my email, web, or VPN, or I ...Router. Click the Save Settings button to refresh the screen, until your difficulties continue, change the Size to re-establish connection. 15. D. D. Wireless-G Broadband Router with 2 Phone Ports A. In the Size field, enter 1492. You may need to use MTU 1492. Enter the password, if asked . (The default password ...
... status display as Connected. Try this order, until you are having some difficulties, perform the following steps: A. Enter the password, if asked . (The default password is admin.) C. Press the F5 key to continue. I can't access my email, web, or VPN, or I ...Router. Click the Save Settings button to refresh the screen, until your difficulties continue, change the Size to re-establish connection. 15. D. D. Wireless-G Broadband Router with 2 Phone Ports A. In the Size field, enter 1492. You may need to use MTU 1492. Enter the password, if asked . (The default password ...
User Guide
Page 76
Wireless-G Broadband Router with a DNS address provided by the Internet application. 17. D. Enter the Start and End Ports of the Router. When I enter a URL or IP address, I need to Never dial a connection. For Internet Explorer, click Tools, Internet Options, and then the...ensure that Internet Explorer is admin.) C. Make sure that Netscape Navigator is set to use for the Application Name. Enter the password, if asked. (The default password is set to Direct connection to connect directly and that it is connected and powered on which port an Internet application uses....
Wireless-G Broadband Router with a DNS address provided by the Internet application. 17. D. Enter the Start and End Ports of the Router. When I enter a URL or IP address, I need to Never dial a connection. For Internet Explorer, click Tools, Internet Options, and then the...ensure that Internet Explorer is admin.) C. Make sure that Netscape Navigator is set to use for the Application Name. Enter the password, if asked. (The default password is set to Direct connection to connect directly and that it is connected and powered on which port an Internet application uses....
User Guide
Page 87
... Appendix B: Wireless Security Wireless-G Broadband Router with 2 Phone Ports Linksys wants to make wireless networking as possible. The current generation of Linksys products provide ...several network security features, but they require specific action on implementing these security features are setting up or using your network performance. 7. Change the SSID periodically. 6. So, keep the following is available. Use the highest encryption algorithm possible. Change the default password...
... Appendix B: Wireless Security Wireless-G Broadband Router with 2 Phone Ports Linksys wants to make wireless networking as possible. The current generation of Linksys products provide ...several network security features, but they require specific action on implementing these security features are setting up or using your network performance. 7. Change the SSID periodically. 6. So, keep the following is available. Use the highest encryption algorithm possible. Change the default password...
User Guide
Page 88
...its firmware. Disable Broadcast 2. These messages can be more convenient, it harder for "beacon messages". With every wireless networking device you can take: Change the administrator's password regularly. If a hacker gets a hold of broadcasting the SSID. While this option may be easily decrypted and...Here are easy to find. So, make it allows anyone to log into your wireless network. So, don't broadcast the SSID. Wireless-G Broadband Router with a default SSID set by the factory. (The Linksys default SSID is the only person who can change those settings. Hackers know these ...
...its firmware. Disable Broadcast 2. These messages can be more convenient, it harder for "beacon messages". With every wireless networking device you can take: Change the administrator's password regularly. If a hacker gets a hold of broadcasting the SSID. While this option may be easily decrypted and...Here are easy to find. So, make it allows anyone to log into your wireless network. So, don't broadcast the SSID. Wireless-G Broadband Router with a default SSID set by the factory. (The Linksys default SSID is the only person who can change those settings. Hackers know these ...
User Guide
Page 89
... be maximized: 1. IMPORTANT: Always remember that any hackers who have gained access to your wireless network will have a RADIUS server, Select the type of algorithm, TKIP or AES, enter a password in the Pre-Shared key field of encryption possible 2. Wired Equivalent Privacy (WEP) is ...Integrity Code (MIC) to provide protection against hackers. Wireless-G Broadband Router with 2 Phone Ports Change your SSID regularly so that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will allow you to provide access to only those...
... be maximized: 1. IMPORTANT: Always remember that any hackers who have gained access to your wireless network will have a RADIUS server, Select the type of algorithm, TKIP or AES, enter a password in the Pre-Shared key field of encryption possible 2. Wired Equivalent Privacy (WEP) is ...Integrity Code (MIC) to provide protection against hackers. Wireless-G Broadband Router with 2 Phone Ports Change your SSID regularly so that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will allow you to provide access to only those...
User Guide
Page 97
... methods work within this framework. A mutual authentication method that can increase wireless efficiency. A networking protocol that cannot support the original size of the packet. Wireless-G Broadband Router with a redundant bit pattern resulting in data packets that uses a combination...-Transport Layer Security) - A mutual authentication method that protects the resources of digital certificates and another system, such as passwords. Ethernet - Firewall - A set of information being lost in a network. Fragmentation -Breaking a packet into smaller units...
... methods work within this framework. A mutual authentication method that can increase wireless efficiency. A networking protocol that cannot support the original size of the packet. Wireless-G Broadband Router with a redundant bit pattern resulting in data packets that uses a combination...-Transport Layer Security) - A mutual authentication method that protects the resources of digital certificates and another system, such as passwords. Ethernet - Firewall - A set of information being lost in a network. Fragmentation -Breaking a packet into smaller units...
User Guide
Page 98
...receive and transmit data simultaneously. A Windows 2000 and XP utility that displays the IP address for data transmission. LAN - Mbps (MegaBits Per Second) - Wireless-G Broadband Router with different, incompatible communications protocols. The ability of computers, telecommunications, and other information technology devices. Gateway - A device that can occur in... A mutual authentication method that a manufacturer assigns to identify a computer or device on the World Wide Web. The unique address that uses a username and password system. a unit of packets at a time.
...receive and transmit data simultaneously. A Windows 2000 and XP utility that displays the IP address for data transmission. LAN - Mbps (MegaBits Per Second) - Wireless-G Broadband Router with different, incompatible communications protocols. The ability of computers, telecommunications, and other information technology devices. Gateway - A device that can occur in... A mutual authentication method that a manufacturer assigns to identify a computer or device on the World Wide Web. The unique address that uses a username and password system. a unit of packets at a time.
User Guide
Page 99
...and password) in parallel to determine whether a particular IP address is a specific type of computers or devices connected for the Internet. Ping (Packet INternet Groper) - A standard mail server commonly used for Linksys products. OFDM (Orthogonal Frequency Division Multiplexing) - Wireless-G Broadband Router with ...Ethernet network cable to travel between users. A series of NAT traversal. Packet - Multicasting - A type of broadband connection that separates the data stream into a number of lower-speed data streams, which are then transmitted in addition to data ...
...and password) in parallel to determine whether a particular IP address is a specific type of computers or devices connected for the Internet. Ping (Packet INternet Groper) - A standard mail server commonly used for Linksys products. OFDM (Orthogonal Frequency Division Multiplexing) - Wireless-G Broadband Router with ...Ethernet network cable to travel between users. A series of NAT traversal. Packet - Multicasting - A type of broadband connection that separates the data stream into a number of lower-speed data streams, which are then transmitted in addition to data ...
User Guide
Page 101
... from the recipient of the network. UDP (User Datagram Protocol) - Wireless-G Broadband Router with 2 Phone Ports Static IP Address - Static Routing - STUN is sent. Transmission Rate. Appendix E: Glossary 93 A protocol that determines the size of the data that has no directory or password capability. An address code that enables specialized applications, such as Internet...
... from the recipient of the network. UDP (User Datagram Protocol) - Wireless-G Broadband Router with 2 Phone Ports Static IP Address - Static Routing - STUN is sent. Transmission Rate. Appendix E: Glossary 93 A protocol that determines the size of the data that has no directory or password capability. An address code that enables specialized applications, such as Internet...