Brochure
Page 1
... and secure wireless and Internet connections Linksys EasyLink Advisor (LELA) Get up . There's also a built-in minutes Wireless-G Broadband Router Model: WRT54G2 All your PCs against intruders and most known Internet attacks, supports VPN pass-through, and can communicate with the web browser-based interface. The..., work, or play without running in 4-port full-duplex 10/100 Switch to your wired-Ethernet devices together. First, there's the Wireless Access Point, which lets you need. Just push the button on the Router and on one computer, and listen to the Router and the Internet, ...
... and secure wireless and Internet connections Linksys EasyLink Advisor (LELA) Get up . There's also a built-in minutes Wireless-G Broadband Router Model: WRT54G2 All your PCs against intruders and most known Internet attacks, supports VPN pass-through, and can communicate with the web browser-based interface. The..., work, or play without running in 4-port full-duplex 10/100 Switch to your wired-Ethernet devices together. First, there's the Wireless Access Point, which lets you need. Just push the button on the Router and on one computer, and listen to the Router and the Internet, ...
Brochure
Page 2
... or trademark of their respective holders. 8062310A-JL Model: WRT54G2 All rights reserved. Actual performance can vary, including lower wireless network capacity, data throughput rate, range and coverage. and certain other adverse conditions. Copyright © 2008 Cisco Systems, Inc. Linksys is derived from the access point, volume of network traffic, building materials and construction...
... or trademark of their respective holders. 8062310A-JL Model: WRT54G2 All rights reserved. Actual performance can vary, including lower wireless network capacity, data throughput rate, range and coverage. and certain other adverse conditions. Copyright © 2008 Cisco Systems, Inc. Linksys is derived from the access point, volume of network traffic, building materials and construction...
User Manual
Page 7
...WPA/WPA2 uses dynamic key encryption. Since you cannot physically prevent someone from exterior walls and windows. •• Turn wireless routers, access points, or gateways off when they are not being used (at night, during vacations). •• Use strong passphrases that are at...radio waves, it can be intercepted. To protect the information as your wireless network can access your network equipment. Additional Security Tips •• Keep wireless routers, access points, or gateways away from connecting to your wireless network, you want to distinguish your ...
...WPA/WPA2 uses dynamic key encryption. Since you cannot physically prevent someone from exterior walls and windows. •• Turn wireless routers, access points, or gateways off when they are not being used (at night, during vacations). •• Use strong passphrases that are at...radio waves, it can be intercepted. To protect the information as your wireless network can access your network equipment. Additional Security Tips •• Keep wireless routers, access points, or gateways away from connecting to your wireless network, you want to distinguish your ...
User Manual
Page 9
...; Subnet Mask This is the ISP server's IP address. In the Redial Period field, you specify how often you are required to use PPPoE (Point-to-Point Protocol over Ethernet) to connections in Europe only. If you are connected to the Internet, select Static IP. Subnet Mask This is 30 seconds.... re-establish your connection as soon as seen by your ISP. If your ISP to see if they do, you will provide you need to access the Internet again. Then configure the following: •• Specify an IP Address This is the Router's IP address, when seen from the Internet....
...; Subnet Mask This is the ISP server's IP address. In the Redial Period field, you specify how often you are required to use PPPoE (Point-to-Point Protocol over Ethernet) to connections in Europe only. If you are connected to the Internet, select Static IP. Subnet Mask This is 30 seconds.... re-establish your connection as soon as seen by your ISP. If your ISP to see if they do, you will provide you need to access the Internet again. Then configure the following: •• Specify an IP Address This is the Router's IP address, when seen from the Internet....
User Manual
Page 19
...with each other . AP Isolation is the method used to enable Point-to a particular receiving station and negotiates the sending of a data frame. Filter Internet NAT Redirection This feature uses port forwarding to block access to local servers from each other . Filter IDENT (Port 113)...feature to allow IP multicast packets to be enabled. To turn off firewall protection, select Disable. PPTP Passthrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to disable it should remain at its default value of 2346. Deselect this feature to be...
...with each other . AP Isolation is the method used to enable Point-to a particular receiving station and negotiates the sending of a data frame. Filter Internet NAT Redirection This feature uses port forwarding to block access to local servers from each other . Filter IDENT (Port 113)...feature to allow IP multicast packets to be enabled. To turn off firewall protection, select Disable. PPTP Passthrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to disable it should remain at its default value of 2346. Deselect this feature to be...