User Manual
Page 11
... the MAC filtering and/or MAC address cloning feature of the Router. • Appendix F: Glossary This appendix gives a brief glossary of Linksys resources, including Technical Support. Chapter 1: Introduction 3 What's in networking. • Appendix G: Specifications This appendix provides the technical specifications for the Router. • Appendix H: Warranty Information This appendix supplies the...
... the MAC filtering and/or MAC address cloning feature of the Router. • Appendix F: Glossary This appendix gives a brief glossary of Linksys resources, including Technical Support. Chapter 1: Introduction 3 What's in networking. • Appendix G: Specifications This appendix provides the technical specifications for the Router. • Appendix H: Warranty Information This appendix supplies the...
User Manual
Page 20
... devices. You will automatically detect the language setting of this chapter, "Using SecureEasySetup to proceed with the Setup Wizard using the encryption supported by your CD-ROM drive). 2. Click the Norton Internet Security button to exit the Setup Wizard. Using the Setup Wizard 1. These... PC. Start Wizard Screen 12 The Setup Wizard will need to open the PDF file of your current wireless devices do not support WPA-Personal security, then you through the instructions for configuring the Router's network and wireless settings. Click the User Guide button ...
... devices. You will automatically detect the language setting of this chapter, "Using SecureEasySetup to proceed with the Setup Wizard using the encryption supported by your CD-ROM drive). 2. Click the Norton Internet Security button to exit the Setup Wizard. Using the Setup Wizard 1. These... PC. Start Wizard Screen 12 The Setup Wizard will need to open the PDF file of your current wireless devices do not support WPA-Personal security, then you through the instructions for configuring the Router's network and wireless settings. Click the User Guide button ...
User Manual
Page 30
...Wizard Figure 5-22: Additional Information - Wireless-G Broadband Router Using the Router's SecureEasySetup Feature Read these instructions before using the encryption supported by your existing devices. 1. Click the Next button to continue or the Close button to return to the Configure Wireless Settings ...You will see a screen showing the SecureEasySetup logo. Figure 5-21: Additional Information - If your current wireless devices do not support WPA-Personal security, then you press any button, locate the SecureEasySetup button for instructions to locate the software button, or click ...
...Wizard Figure 5-22: Additional Information - Wireless-G Broadband Router Using the Router's SecureEasySetup Feature Read these instructions before using the encryption supported by your existing devices. 1. Click the Next button to continue or the Close button to return to the Configure Wireless Settings ...You will see a screen showing the SecureEasySetup logo. Figure 5-21: Additional Information - If your current wireless devices do not support WPA-Personal security, then you press any button, locate the SecureEasySetup button for instructions to locate the software button, or click ...
User Manual
Page 37
... that appears will describe the two steps you cannot use SecureEasySetup if you need to configure your network. If your current wireless devices do not support WPA-Personal security, then you will need more information, click the Help button. Click the Next button to Configure Your Notebook Figure 5-35: ...Screen Chapter 5: Setting up the Wireless-G Broadband Router Using SecureEasySetup to continue. You will take to manually configure your network security using the encryption supported by your existing devices. 1. NOTE: SecureEasySetup uses WPA-Personal encryption.
... that appears will describe the two steps you cannot use SecureEasySetup if you need to configure your network. If your current wireless devices do not support WPA-Personal security, then you will need more information, click the Help button. Click the Next button to Configure Your Notebook Figure 5-35: ...Screen Chapter 5: Setting up the Wireless-G Broadband Router Using SecureEasySetup to continue. You will take to manually configure your network security using the encryption supported by your existing devices. 1. NOTE: SecureEasySetup uses WPA-Personal encryption.
User Manual
Page 41
... will provide you with the IP Address you with the Subnet Mask. Change these settings as seen by users on the Internet (including your ISP supports DHCP or you with at least one DNS (Domain Name System) Server IP Address. This is the Router's IP address, when seen from the drop...
... will provide you with the IP Address you with the Subnet Mask. Change these settings as seen by users on the Internet (including your ISP supports DHCP or you with at least one DNS (Domain Name System) Server IP Address. This is the Router's IP address, when seen from the drop...
User Manual
Page 49
..., with a key shared between the Router and the server. RADIUS stands for Remote Authentication Dial-In User Service.) These are four wireless security mode options supported by the Router: WPA Personal, WPA Enterprise, WPA2 Personal, WPA2 Enterprise, RADIUS, and WEP. (WEP stands for Wired Equivalent Privacy, WPA stands for the Router...
..., with a key shared between the Router and the server. RADIUS stands for Remote Authentication Dial-In User Service.) These are four wireless security mode options supported by the Router: WPA Personal, WPA Enterprise, WPA2 Personal, WPA2 Enterprise, RADIUS, and WEP. (WEP stands for Wired Equivalent Privacy, WPA stands for the Router...
User Manual
Page 61
... Protocol). POP3 (Post Office Protocol 3). To use this feature will assign information a high or low priority for Priority. Ethernet Port Priority QoS does not require support from your ISP because the prioritized ports are downloaded at a terminal or computer to your changes. For each application, select High or Low for the...
... Protocol). POP3 (Post Office Protocol 3). To use this feature will assign information a high or low priority for Priority. Ethernet Port Priority QoS does not require support from your ISP because the prioritized ports are downloaded at a terminal or computer to your changes. For each application, select High or Low for the...
User Manual
Page 76
... the Router installed on the front panel. Repeat the SecureEasySetup process for each wireless device's documentation for instructions on that support WPA-Personal security, but those protocols cannot connect from one node to enter these settings. For other SecureEasySetup devices, refer... my existing wireless devices can be lighted either orange or white. Yes. Re-run the Setup Wizard. Is IPSec Pass-Through supported by your current wireless devices do I still use SecureEasySetup on -screen instructions. In a typical environment, the Router is my SecureEasySetup...
... the Router installed on the front panel. Repeat the SecureEasySetup process for each wireless device's documentation for instructions on that support WPA-Personal security, but those protocols cannot connect from one node to enter these settings. For other SecureEasySetup devices, refer... my existing wireless devices can be lighted either orange or white. Yes. Re-run the Setup Wizard. Is IPSec Pass-Through supported by your current wireless devices do I still use SecureEasySetup on -screen instructions. In a typical environment, the Router is my SecureEasySetup...
User Manual
Page 77
... on one game server and play simultaneously with one public address that is never transmitted on the LAN cannot join. For example, Unreal Tournament supports multi-login with just one TCP/IP address is used for remote admin. The computers on the LAN get Half-Life: Team Fortress to...a static IP for ? It depends on its Internet port; You can then send a file to the Internet. I am behind this time, provide technical support for Half-Life is it used with the following fix: click ICQ menu -> preference -> connections tab->, and check I set the firewall time-out to use...
... on one game server and play simultaneously with one public address that is never transmitted on the LAN cannot join. For example, Unreal Tournament supports multi-login with just one TCP/IP address is used for remote admin. The computers on the LAN get Half-Life: Team Fortress to...a static IP for ? It depends on its Internet port; You can then send a file to the Internet. I am behind this time, provide technical support for Half-Life is it used with the following fix: click ICQ menu -> preference -> connections tab->, and check I set the firewall time-out to use...
User Manual
Page 79
... Hosting. The Router allows PPTP packets to be used , does the exposed user share the public IP with the Router. Any platform that supports Ethernet and TCP/IP is used over a network. The Router has DHCP server software built-in. Demilitarized Zone (DMZ) allows one of ...remote computer over the wireless network? It is recommended that the hardware complies with a static IP if you can be exposed to determine if it supports operation over a network. It is one IP address (computer) to be simultaneously forwarded? Wireless-G Broadband Router What is the IEEE 802.11g ...
... Hosting. The Router allows PPTP packets to be used , does the exposed user share the public IP with the Router. Any platform that supports Ethernet and TCP/IP is used over a network. The Router has DHCP server software built-in. Demilitarized Zone (DMZ) allows one of ...remote computer over the wireless network? It is recommended that the hardware complies with a static IP if you can be exposed to determine if it supports operation over a network. It is one IP address (computer) to be simultaneously forwarded? Wireless-G Broadband Router What is the IEEE 802.11g ...
User Manual
Page 80
... of a portable computer user to communicate with a wired network through a wireless access point. What IEEE 802.11g features are supported? The product supports the following IEEE 802.11b functions: • CSMA/CA plus Acknowledge protocol • OFDM protocol • Multi-Channel Roaming ...• Automatic Rate Selection • RTS/CTS feature • Fragmentation • Power Management What IEEE 802.11b features are supported? What is the IEEE 802.11b standard? Each node must always acknowledge receipt of the IEEE standards for example, must Appendix A:...
... of a portable computer user to communicate with a wired network through a wireless access point. What IEEE 802.11g features are supported? The product supports the following IEEE 802.11b functions: • CSMA/CA plus Acknowledge protocol • OFDM protocol • Multi-Channel Roaming ...• Automatic Rate Selection • RTS/CTS feature • Fragmentation • Power Management What IEEE 802.11b features are supported? What is the IEEE 802.11b standard? Each node must always acknowledge receipt of the IEEE standards for example, must Appendix A:...
User Manual
Page 90
... computers and other devices to communicate with all the information on the World Wide Web. Bandwidth - Broadband - An application program that adds network functionality to support and coordinate different computing and networking activities so one isn't held up by the other (peer-to look at and interact with a wired network. A security...
... computers and other devices to communicate with all the information on the World Wide Web. Bandwidth - Broadband - An application program that adds network functionality to support and coordinate different computing and networking activities so one isn't held up by the other (peer-to look at and interact with a wired network. A security...
User Manual
Page 92
... transmitting over a network. FTP (File Transfer Protocol) - The ability of a network from users from a common transmission medium. HTTP (HyperText Transport Protocol) - A wireless network that cannot support the original size of digital certificates and another system, such as passwords. A protocol used to receive and transmit data simultaneously. IP Address - Appendix F: Glossary 84
... transmitting over a network. FTP (File Transfer Protocol) - The ability of a network from users from a common transmission medium. HTTP (HyperText Transport Protocol) - A wireless network that cannot support the original size of digital certificates and another system, such as passwords. A protocol used to receive and transmit data simultaneously. IP Address - Appendix F: Glossary 84
User Manual
Page 99
... EVENT WILL LINKSYS' LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT. If the Product proves defective during the Warranty Period call Linksys Technical Support in the country of defects in materials and workmanship under normal use. You are requested to return the Product, mark the Return Authorization Number clearly...
... EVENT WILL LINKSYS' LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT. If the Product proves defective during the Warranty Period call Linksys Technical Support in the country of defects in materials and workmanship under normal use. You are requested to return the Product, mark the Return Authorization Number clearly...
User Manual
Page 105
... Sweden Switzerland United Kingdom & Ireland E-mail Address support[email protected] support[email protected] support[email protected] support[email protected] support[email protected] support[email protected] support[email protected] support[email protected] support[email protected] support[email protected] support[email protected] support[email protected] support[email protected] Outside of Europe E-mail...
... Sweden Switzerland United Kingdom & Ireland E-mail Address support[email protected] support[email protected] support[email protected] support[email protected] support[email protected] support[email protected] support[email protected] support[email protected] support[email protected] support[email protected] support[email protected] support[email protected] support[email protected] Outside of Europe E-mail...