User Manual
Page 3
... Panel 7 Chapter 4: Connecting the Wireless-G Broadband Router 8 Overview 8 Hardware Installation for Connection to Your Broadband Modem 8 Hardware Installation for Connection to Another Router 10 Chapter 5: Configuring the Wireless-G Broadband Router 12 Overview 12 The Setup Tab - Port Triggering 31 The Applications and Gaming Tab - DMZ 32 The Applications and Gaming Tab...
... Panel 7 Chapter 4: Connecting the Wireless-G Broadband Router 8 Overview 8 Hardware Installation for Connection to Your Broadband Modem 8 Hardware Installation for Connection to Another Router 10 Chapter 5: Configuring the Wireless-G Broadband Router 12 Overview 12 The Setup Tab - Port Triggering 31 The Applications and Gaming Tab - DMZ 32 The Applications and Gaming Tab...
User Manual
Page 6
... 5-38: Administration Tab - Router 37 Figure 5-47: Status Tab - Wireless Security (WEP) 23 Figure 5-24: Wireless Tab - Wireless 39 Figure C-1: Upgrade Firmware 58 Figure E-1: IP Configuration Screen 60 Figure E-2: MAC Address/Adapter Address 60 Figure E-3: MAC Address/Physical Address 60 Figure E-4: MAC Address Filter List 61 Figure E-5: MAC Address Clone 61...
... 5-38: Administration Tab - Router 37 Figure 5-47: Status Tab - Wireless Security (WEP) 23 Figure 5-24: Wireless Tab - Wireless 39 Figure C-1: Upgrade Firmware 58 Figure E-1: IP Configuration Screen 60 Figure E-2: MAC Address/Adapter Address 60 Figure E-3: MAC Address/Physical Address 60 Figure E-4: MAC Address Filter List 61 Figure E-5: MAC Address Clone 61...
User Manual
Page 7
... connection over a network. wpa (wi-fi protected access): a wireless security protocol using the Setup CD-ROM for Wireless-G. firewall: Security measures that make up , and configure it will allow you can also be used for choosing the Linksys Wireless-G Broadband Router. You can communicate without cumbersome cables. notebooks, printers, other SecureEasySetup...
... connection over a network. wpa (wi-fi protected access): a wireless security protocol using the Setup CD-ROM for Wireless-G. firewall: Security measures that make up , and configure it will allow you can also be used for choosing the Linksys Wireless-G Broadband Router. You can communicate without cumbersome cables. notebooks, printers, other SecureEasySetup...
User Manual
Page 8
... TCP/IP protocol. • Appendix E: Finding the MAC Address and IP Address for your network. • Chapter 5: Configuring the Wireless-G Broadband Router This chapter explains how to use the Web-based Utility to configure the settings on the Router should you need to find the MAC address for setting up and using...
... TCP/IP protocol. • Appendix E: Finding the MAC Address and IP Address for your network. • Chapter 5: Configuring the Wireless-G Broadband Router This chapter explains how to use the Web-based Utility to configure the settings on the Router should you need to find the MAC address for setting up and using...
User Manual
Page 10
...or peripherals with wireless network adapters, which they may be used. ssid (service set up : infrastructure and ad-hoc. An infrastructure configuration is limited by the wireless devices belonging to the network. Choosing between them. The drawback of the Router. ad-hoc: a group... the wireless network should be accessible by a wired network or need for use of communications in Infrastructure mode. An ad-hoc configuration is an identification name shared by the distance and interference directly between these standards can set up in a wireless network. Ad-...
...or peripherals with wireless network adapters, which they may be used. ssid (service set up : infrastructure and ad-hoc. An infrastructure configuration is limited by the wireless devices belonging to the network. Choosing between them. The drawback of the Router. ad-hoc: a group... the wireless network should be accessible by a wired network or need for use of communications in Infrastructure mode. An ad-hoc configuration is an identification name shared by the distance and interference directly between these standards can set up in a wireless network. Ad-...
User Manual
Page 15
... into an electrical outlet. Use of a different adapter may result in product damage. Chapter 4: Connecting the Wireless-G Broadband Router 9 Hardware Installation for Connection to "Chapter 5: Configuring the Wireless-G Broadband Router." Wireless-G Broadband Router 5.
... into an electrical outlet. Use of a different adapter may result in product damage. Chapter 4: Connecting the Wireless-G Broadband Router 9 Hardware Installation for Connection to "Chapter 5: Configuring the Wireless-G Broadband Router." Wireless-G Broadband Router 5.
User Manual
Page 17
... network cabling. Wireless-G Broadband Router 9. Connect the AC power adapter to the Router's Power port and the other router, and then connect them to "Chapter 5: Configuring the Wireless-G Broadband Router." IMPORTANT: Make sure you want to connect to Another Router Use of a different adapter may result in product damage. Disconnect the...
... network cabling. Wireless-G Broadband Router 9. Connect the AC power adapter to the Router's Power port and the other router, and then connect them to "Chapter 5: Configuring the Wireless-G Broadband Router." IMPORTANT: Make sure you want to connect to Another Router Use of a different adapter may result in product damage. Disconnect the...
User Manual
Page 18
... D: Windows Help" for first-time installation of the main tabs. Then press Enter. For advanced users, you want to configure advanced settings, use the Web-based Utility to learn about the Web-based Utility. For a basic network setup, most users... Access Restrictions, Applications & Gaming, Administration, and Status. PCs communicate over the network with this chapter to configure the Router. Wireless-G Broadband Router Chapter 5: Configuring the Wireless-G Broadband Router Overview Linksys recommends using the Setup Wizard on TCP/IP. The Router's default password...
... D: Windows Help" for first-time installation of the main tabs. Then press Enter. For advanced users, you want to configure advanced settings, use the Web-based Utility to learn about the Web-based Utility. For a basic network setup, most users... Access Restrictions, Applications & Gaming, Administration, and Status. PCs communicate over the network with this chapter to configure the Router. Wireless-G Broadband Router Chapter 5: Configuring the Wireless-G Broadband Router Overview Linksys recommends using the Setup Wizard on TCP/IP. The Router's default password...
User Manual
Page 19
This is set to Automatic Configuration - Subnet Mask. Gateway. Your ISP will provide you with the Subnet Mask. Change these settings as seen by users on the Internet (including your changes. ...'s IP address, when seen from the drop-down menu. • DHCP. Basic Setup Figure 5-3: DHCP Connection Type Chapter 5: Configuring the Wireless-G Broadband Router The Setup Tab - Internet Setup The Internet Setup section configures the Router to the Internet, select Static IP. Your ISP will provide you are connecting through your Internet connection...
This is set to Automatic Configuration - Subnet Mask. Gateway. Your ISP will provide you with the Subnet Mask. Change these settings as seen by users on the Internet (including your changes. ...'s IP address, when seen from the drop-down menu. • DHCP. Basic Setup Figure 5-3: DHCP Connection Type Chapter 5: Configuring the Wireless-G Broadband Router The Setup Tab - Internet Setup The Internet Setup section configures the Router to the Internet, select Static IP. Your ISP will provide you are connecting through your Internet connection...
User Manual
Page 20
... you want to have to Keep Alive. The default Redial Period is 30 seconds. Chapter 5: Configuring the Wireless-G Broadband Router The Setup Tab - User Name and Password. You can configure the Router to specify here. Your ISP will provide you with your Internet connection. Your ISP ...will have elapsed before your connection. You can configure the Router to cut the Internet connection after it has been inactive for a specified period of minutes you are disconnected, then the...
... you want to have to Keep Alive. The default Redial Period is 30 seconds. Chapter 5: Configuring the Wireless-G Broadband Router The Setup Tab - User Name and Password. You can configure the Router to specify here. Your ISP will provide you with your Internet connection. Your ISP ...will have elapsed before your connection. You can configure the Router to cut the Internet connection after it has been inactive for a specified period of minutes you are disconnected, then the...
User Manual
Page 21
...Idle Time). Enter the IP address of time (Max Idle Time). If you need to remain on Demand, click the radio button. Chapter 5: Configuring the Wireless-G Broadband Router The Setup Tab - Your ISP will provide you with the IP Address you wish to activate Connect on Demand enables the... the Internet. If you want the Router to Keep Alive. If your Internet access connected indefinitely, even when it sits idle. You can configure the Router to connections in European countries. Connect on Demand and Max Idle Time. To use this option, click the radio button next to...
...Idle Time). Enter the IP address of time (Max Idle Time). If you need to remain on Demand, click the radio button. Chapter 5: Configuring the Wireless-G Broadband Router The Setup Tab - Your ISP will provide you with the IP Address you wish to activate Connect on Demand enables the... the Internet. If you want the Router to Keep Alive. If your Internet access connected indefinitely, even when it sits idle. You can configure the Router to connections in European countries. Connect on Demand and Max Idle Time. To use this option, click the radio button next to...
User Manual
Page 22
... a DHCP server for Internet transmission. You should leave this field, you to each computer on the network connected to configure the Router's Dynamic Host Configuration Protocol (DHCP) server function. If you choose to enable the Router's DHCP server option, you to a DHCP server... is the Maximum Transmission Unit. Figure 5-9: Optional Settings Figure 5-10: Router IP Figure 5-11: Network Address Server Settings Chapter 5: Configuring the Wireless-G Broadband Router 16 The Setup Tab - Wireless-G Broadband Router When you already have the Router select the best MTU for...
... a DHCP server for Internet transmission. You should leave this field, you to each computer on the network connected to configure the Router's Dynamic Host Configuration Protocol (DHCP) server function. If you choose to enable the Router's DHCP server option, you to a DHCP server... is the Maximum Transmission Unit. Figure 5-9: Optional Settings Figure 5-10: Router IP Figure 5-11: Network Address Server Settings Chapter 5: Configuring the Wireless-G Broadband Router 16 The Setup Tab - Wireless-G Broadband Router When you already have the Router select the best MTU for...
User Manual
Page 23
... with the Internet. Time Setting Change the time zone in one of DHCP Users. Enter a value for daylight savings time.) Figure 5-12: Time Setting Chapter 5: Configuring the Wireless-G Broadband Router 17 The Setup Tab - The default Starting IP Address is how the Internet translates domain or website names into Internet addresses...
... with the Internet. Time Setting Change the time zone in one of DHCP Users. Enter a value for daylight savings time.) Figure 5-12: Time Setting Chapter 5: Configuring the Wireless-G Broadband Router 17 The Setup Tab - The default Starting IP Address is how the Internet translates domain or website names into Internet addresses...
User Manual
Page 24
... order to cancel your DDNS account Password. DDNS lets you have the MAC Address cloned, click the radio button beside Enable. MAC Address Clone Chapter 5: Configuring the Wireless-G Broadband Router 18 The Setup Tab - It is a 12-digit code assigned to a dynamic Internet IP address. Figure 5-13: Setup Tab...
... order to cancel your DDNS account Password. DDNS lets you have the MAC Address cloned, click the radio button beside Enable. MAC Address Clone Chapter 5: Configuring the Wireless-G Broadband Router 18 The Setup Tab - It is a 12-digit code assigned to a dynamic Internet IP address. Figure 5-13: Setup Tab...
User Manual
Page 25
... pathway that allows for both networks, as well as described here and click the Save Settings button to apply your network. Advanced Routing (Router) Chapter 5: Configuring the Wireless-G Broadband Router 19 The Setup Tab - To set up a fixed route to the Internet, select Gateway. Default Gateway. Change these settings as data...
... pathway that allows for both networks, as well as described here and click the Save Settings button to apply your network. Advanced Routing (Router) Chapter 5: Configuring the Wireless-G Broadband Router 19 The Setup Tab - To set up a fixed route to the Internet, select Gateway. Default Gateway. Change these settings as data...
User Manual
Page 26
... network. When wireless clients survey the local area for wireless networking are set on the same channel in the wireless network. Basic Wireless Settings Chapter 5: Configuring the Wireless-G Broadband Router 20 The Wireless Tab - Basic Wireless Settings It is the network name shared among all devices in order to cancel your...
... network. When wireless clients survey the local area for wireless networking are set on the same channel in the wireless network. Basic Wireless Settings Chapter 5: Configuring the Wireless-G Broadband Router 20 The Wireless Tab - Basic Wireless Settings It is the network name shared among all devices in order to cancel your...
User Manual
Page 27
...should only be used in your wireless network. Wireless Security (WPA Enterprise) Chapter 5: Configuring the Wireless-G Broadband Router 21 The Wireless Tab - For detailed instructions on configuring wireless security for Remote Authentication Dial-In User Service.) These are using WPA, always ... Personal) WPA Enterprise. WPA Enterprise is stronger than WEP encryption. WPA Personal. Wireless Security Wireless Security The Wireless Security settings configure the security of WPA algorithm you want to "Appendix B: Wireless Security." Select the type of 8-63 characters. Enter a ...
...should only be used in your wireless network. Wireless Security (WPA Enterprise) Chapter 5: Configuring the Wireless-G Broadband Router 21 The Wireless Tab - For detailed instructions on configuring wireless security for Remote Authentication Dial-In User Service.) These are using WPA, always ... Personal) WPA Enterprise. WPA Enterprise is stronger than WEP encryption. WPA Personal. Wireless Security Wireless Security The Wireless Security settings configure the security of WPA algorithm you want to "Appendix B: Wireless Security." Select the type of 8-63 characters. Enter a ...
User Manual
Page 28
... the RADIUS server's IP Address and port number, along with a key shared between the Router and the server. Wireless Security Figure 5-21: Wireless Tab - Chapter 5: Configuring the Wireless-G Broadband Router The Wireless Tab - Wireless-G Broadband Router WPA2 Personal. Then enter a Group Key Renewal period, which instructs the Router how often it...
... the RADIUS server's IP Address and port number, along with a key shared between the Router and the server. Wireless Security Figure 5-21: Wireless Tab - Chapter 5: Configuring the Wireless-G Broadband Router The Wireless Tab - Wireless-G Broadband Router WPA2 Personal. Then enter a Group Key Renewal period, which instructs the Router how often it...
User Manual
Page 29
... the RADIUS server's IP Address and port number, along with a key shared between the Router and the server. For detailed instructions on configuring wireless security for the Router, turn to use ), and a level of WEP encryption, 64 bits 10 hex digits or 128 bits 26...a Default Transmit Key (choose which is connected to cancel your wireless network will not function properly. Wireless-G Broadband Router RADIUS. Chapter 5: Configuring the Wireless-G Broadband Router The Wireless Tab - This option features WEP used in your wireless network MUST use the same WEP encryption method ...
... the RADIUS server's IP Address and port number, along with a key shared between the Router and the server. For detailed instructions on configuring wireless security for the Router, turn to use ), and a level of WEP encryption, 64 bits 10 hex digits or 128 bits 26...a Default Transmit Key (choose which is connected to cancel your wireless network will not function properly. Wireless-G Broadband Router RADIUS. Chapter 5: Configuring the Wireless-G Broadband Router The Wireless Tab - This option features WEP used in your wireless network MUST use the same WEP encryption method ...
User Manual
Page 30
... filtered by MAC Address, to whom you do not wish to cancel your network's radius. Wireless-G Broadband Router The Wireless Tab - Wireless MAC Filter Chapter 5: Configuring the Wireless-G Broadband Router The Wireless Tab - Edit MAC Address Filter List.
... filtered by MAC Address, to whom you do not wish to cancel your network's radius. Wireless-G Broadband Router The Wireless Tab - Wireless MAC Filter Chapter 5: Configuring the Wireless-G Broadband Router The Wireless Tab - Edit MAC Address Filter List.