User Guide
Page 3
... Installation for Connection to Your Broadband Modem 8 Hardware Installation for Connection to Another Router 10 Chapter 5: Configuring the Wireless-G Broadband Router 12 Overview 12 The Setup Tab - DDNS 18 The Setup Tab - Wireless Security 21 The Wireless Tab - Firewall 27 The Security Tab - Advanced Wireless Settings 25 The Security Tab - Internet Access 28 The Applications and Gaming Tab - Basic...
... Installation for Connection to Your Broadband Modem 8 Hardware Installation for Connection to Another Router 10 Chapter 5: Configuring the Wireless-G Broadband Router 12 Overview 12 The Setup Tab - DDNS 18 The Setup Tab - Wireless Security 21 The Wireless Tab - Firewall 27 The Security Tab - Advanced Wireless Settings 25 The Security Tab - Internet Access 28 The Applications and Gaming Tab - Basic...
User Guide
Page 4
... Frequently Asked Questions 47 Appendix B: Wireless Security 54 Security Precautions 54 Security Threats Facing Wireless Networks 54 Appendix C: Upgrading Firmware 57 Appendix D: Windows Help 58 Appendix E: Finding the MAC Address and IP Address for Your Ethernet Adapter59 Windows 2000 or XP Instructions 59 Windows Vista Instructions 59 For the Router's Web-based Utility 60 Appendix F: Glossary...
... Frequently Asked Questions 47 Appendix B: Wireless Security 54 Security Precautions 54 Security Threats Facing Wireless Networks 54 Appendix C: Upgrading Firmware 57 Appendix D: Windows Help 58 Appendix E: Finding the MAC Address and IP Address for Your Ethernet Adapter59 Windows 2000 or XP Instructions 59 Windows Vista Instructions 59 For the Router's Web-based Utility 60 Appendix F: Glossary...
User Guide
Page 5
... Clone 18 Figure 5-15: Setup Tab - Advanced Routing (Router) 19 Figure 5-16: Setup Tab - Wireless Security (WPA Personal) 21 Figure 5-19: Wireless Tab - Wireless Security (WPA2 Personal) 22 Figure 5-21: Wireless Tab - Wireless Security (RADIUS) 23 Wireless Security (WPA2 Enterprise) 22 Figure 5-22: Wireless Tab - Wireless-G Broadband Router List of Figures Figure 3-1: The Router's Back Panel 6 Figure 3-2: The Router's Front Panel 7 Figure 4-1: Connecting Your Internet Connection...
... Clone 18 Figure 5-15: Setup Tab - Advanced Routing (Router) 19 Figure 5-16: Setup Tab - Wireless Security (WPA Personal) 21 Figure 5-19: Wireless Tab - Wireless Security (WPA2 Personal) 22 Figure 5-21: Wireless Tab - Wireless Security (RADIUS) 23 Wireless Security (WPA2 Enterprise) 22 Figure 5-22: Wireless Tab - Wireless-G Broadband Router List of Figures Figure 3-1: The Router's Back Panel 6 Figure 3-2: The Router's Front Panel 7 Figure 4-1: Connecting Your Internet Connection...
User Guide
Page 6
... 5-26: Wireless Tab - Wireless-G Broadband Router Figure 5-23: Wireless Tab - DMZ 32 Figure 5-37: Applications and Gaming Tab - Log 34 Figure 5-40: Administration Tab - Factory Defaults 36 Figure 5-44: Administration Tab - Management 34 Figure 5-39: Administration Tab - Router 37 Figure 5-47: Status Tab - Port Range Forward 30 Figure 5-35: Applications and Gaming Tab - Wireless Security (WEP) 23...
... 5-26: Wireless Tab - Wireless-G Broadband Router Figure 5-23: Wireless Tab - DMZ 32 Figure 5-37: Applications and Gaming Tab - Log 34 Figure 5-40: Administration Tab - Factory Defaults 36 Figure 5-44: Administration Tab - Management 34 Figure 5-39: Administration Tab - Router 37 Figure 5-47: Status Tab - Port Range Forward 30 Figure 5-35: Applications and Gaming Tab - Wireless Security (WEP) 23...
User Guide
Page 8
...Wireless-G Broadband Router protects your network. firewall: Security measures that make up your networks from intruders. Wireless-G Broadband Router Chapter 1: Introduction Welcome Thank you for first-time installation of the Router. Networks are even used in homes and offices, they form a wireless network. With your home... access): a wireless security protocol using the Setup CD-ROM for choosing the Linksys Wireless-G Broadband Router. How does the Wireless-G Broadband Router do not wish to run the Setup Wizard and it to bridge your wireless network while the...
...Wireless-G Broadband Router protects your network. firewall: Security measures that make up your networks from intruders. Wireless-G Broadband Router Chapter 1: Introduction Welcome Thank you for first-time installation of the Router. Networks are even used in homes and offices, they form a wireless network. With your home... access): a wireless security protocol using the Setup CD-ROM for choosing the Linksys Wireless-G Broadband Router. How does the Wireless-G Broadband Router do not wish to run the Setup Wizard and it to bridge your wireless network while the...
User Guide
Page 9
...need to find the MAC address for your computer's Ethernet adapter so you can use the Web-based Utility to configure the settings on the Wireless-G Broadband Router. • Appendix A: Troubleshooting This appendix describes some problems and solutions, as well as installing the TCP/IP protocol. • Appendix ... you can use Windows Help for instructions about networking, such as frequently asked questions, regarding installation and use of the Wireless-G Broadband Router. • Appendix B: Wireless Security This appendix explains the risks of terms frequently used in networking...
...need to find the MAC address for your computer's Ethernet adapter so you can use the Web-based Utility to configure the settings on the Wireless-G Broadband Router. • Appendix A: Troubleshooting This appendix describes some problems and solutions, as well as installing the TCP/IP protocol. • Appendix ... you can use Windows Help for instructions about networking, such as frequently asked questions, regarding installation and use of the Wireless-G Broadband Router. • Appendix B: Wireless Security This appendix explains the risks of terms frequently used in networking...
User Guide
Page 13
... where you want to retain these settings. The Internet port is where you will erase all of your settings (Internet connection, wireless security, and other Ethernet network devices. These ports (1, 2, 3, 4) connect the Router to Know the Wireless-G Broadband Router The Back Panel The Router's ports, where the cables are connected, are two ways to Know the...
... where you want to retain these settings. The Internet port is where you will erase all of your settings (Internet connection, wireless security, and other Ethernet network devices. These ports (1, 2, 3, 4) connect the Router to Know the Wireless-G Broadband Router The Back Panel The Router's ports, where the cables are connected, are two ways to Know the...
User Guide
Page 14
...pairing has been successfully complete. The button lights up orange when no mobile phone is a connection made through that port. Wireless-G Broadband Router The Front Panel The Router's LEDs are located on the Router's back panel, serve two purposes. The Power LED lights up ...on. Internet Green. The Internet LED lights up and will stay on while the Router is successfully connected to Know the Wireless-G Broadband Router 7 The Front Panel Figure 3-2: The Router's Front Panel Get Security Key White/Orange. Chapter 3: Getting to a device through the Internet port. ...
...pairing has been successfully complete. The button lights up orange when no mobile phone is a connection made through that port. Wireless-G Broadband Router The Front Panel The Router's LEDs are located on the Router's back panel, serve two purposes. The Power LED lights up ...on. Internet Green. The Internet LED lights up and will stay on while the Router is successfully connected to Know the Wireless-G Broadband Router 7 The Front Panel Figure 3-2: The Router's Front Panel Get Security Key White/Orange. Chapter 3: Getting to a device through the Internet port. ...
User Guide
Page 19
... Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. Additional tabs will see a similar screen.) Leave the User Name field blank. Refer to learn about the Web-based Utility. If you do not wish to the Router. NOTE: For first-time installation, Linksys recommends...Setup CD-ROM for more information on TCP/IP. HAVE YOU: Enabled TCP/IP on your PCs? Wireless-G Broadband Router Chapter 5: Configuring the Wireless-G Broadband Router Overview Linksys recommends using the Setup Wizard on the Setup CD-ROM. To access the Web-based Utility, launch...
... Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. Additional tabs will see a similar screen.) Leave the User Name field blank. Refer to learn about the Web-based Utility. If you do not wish to the Router. NOTE: For first-time installation, Linksys recommends...Setup CD-ROM for more information on TCP/IP. HAVE YOU: Enabled TCP/IP on your PCs? Wireless-G Broadband Router Chapter 5: Configuring the Wireless-G Broadband Router Overview Linksys recommends using the Setup Wizard on the Setup CD-ROM. To access the Web-based Utility, launch...
User Guide
Page 27
...provided to broadcast the Router's SSID, then select Disable. To broadcast the Router's SSID, keep the default setting, Mixed. Basic Wireless Settings Chapter 6: Configuring the Wireless-G Broadband Router 20 The Wireless Tab - Basic Wireless Settings The basic settings for wireless networks to cancel ...among all devices in a wireless network. Wireless SSID Broadcast. Wireless Network Mode. If you have only 802.11b devices, select B-Only. If you should change the default SSID (linksys) to function correctly. Basic Wireless Settings For added security, you do not have only...
...provided to broadcast the Router's SSID, then select Disable. To broadcast the Router's SSID, keep the default setting, Mixed. Basic Wireless Settings Chapter 6: Configuring the Wireless-G Broadband Router 20 The Wireless Tab - Basic Wireless Settings The basic settings for wireless networks to cancel ...among all devices in a wireless network. Wireless SSID Broadcast. Wireless Network Mode. If you have only 802.11b devices, select B-Only. If you should change the default SSID (linksys) to function correctly. Basic Wireless Settings For added security, you do not have only...
User Guide
Page 28
... and shared key, or else the network will not function properly. Wireless Security (WPA Personal) WPA Enterprise. Wireless Security Wireless-G Broadband Router The Wireless Tab - Wireless Security The Wireless Security settings configure the security of 8-63 characters. For detailed instructions on configuring wireless security for Wi-Fi Protected Access, which instructs the Router how often it should change the encryption keys. Select the type of...
... and shared key, or else the network will not function properly. Wireless Security (WPA Personal) WPA Enterprise. Wireless Security Wireless-G Broadband Router The Wireless Tab - Wireless Security The Wireless Security settings configure the security of 8-63 characters. For detailed instructions on configuring wireless security for Wi-Fi Protected Access, which instructs the Router how often it should change the encryption keys. Select the type of...
User Guide
Page 29
... TKIP + AES. Enter the RADIUS server's IP Address and port number, along with a RADIUS server. (This should change the encryption keys. Wireless Security Figure 5-21: Wireless Tab - Wireless-G Broadband Router WPA2 Personal. Figure 5-20: Wireless Tab - WPA2 gives you want to use, AES, or TKIP + AES. Select the type of 8-63 characters. Then enter a Group Key...
... TKIP + AES. Enter the RADIUS server's IP Address and port number, along with a RADIUS server. (This should change the encryption keys. Wireless Security Figure 5-21: Wireless Tab - Wireless-G Broadband Router WPA2 Personal. Figure 5-20: Wireless Tab - WPA2 gives you want to use, AES, or TKIP + AES. Select the type of 8-63 characters. Then enter a Group Key...
User Guide
Page 30
... click the Save Settings button to apply your changes. Figure 5-22: Wireless Tab - Wireless Security (WEP) 23 Change these settings as WPA. For detailed instructions on configuring wireless security for the Router, turn to use the same WEP encryption method and encryption key, or else your wireless network will not function properly. Then either generate a WEP key...
... click the Save Settings button to apply your changes. Figure 5-22: Wireless Tab - Wireless Security (WEP) 23 Change these settings as WPA. For detailed instructions on configuring wireless security for the Router, turn to use the same WEP encryption method and encryption key, or else your wireless network will not function properly. Then either generate a WEP key...
User Guide
Page 34
... to pass through . To allow PPTP tunnels to specific recipients at the IP layer. Chapter 6: Configuring the Wireless-G Broadband Router The Security Tab - This feature employs Stateful Packet Inspection (SPI) for a more difficult for multiple transmissions to pass through..., or L2TP protocols to pass through the Router's firewall. Firewall Firewall Protection. PPTP PassThrough is enabled by other Internet users. Firewall Figure 5-27: Security Tab - This feature is enabled by default. Wireless-G Broadband Router The Security Tab - VPN Passthrough Use the settings on...
... to pass through . To allow PPTP tunnels to specific recipients at the IP layer. Chapter 6: Configuring the Wireless-G Broadband Router The Security Tab - This feature employs Stateful Packet Inspection (SPI) for a more difficult for multiple transmissions to pass through..., or L2TP protocols to pass through the Router's firewall. Firewall Firewall Protection. PPTP PassThrough is enabled by other Internet users. Firewall Figure 5-27: Security Tab - This feature is enabled by default. Wireless-G Broadband Router The Security Tab - VPN Passthrough Use the settings on...
User Guide
Page 39
... Upstream Bandwidth. Any PC whose port is more secure because it because its priority from the drop-down menu. The Applications and Gaming Tab - DMZ Chapter 6: Configuring the Wireless-G Broadband Router The Applications and Gaming Tab - Wireless-G Broadband Router The Applications and Gaming Tab - Wired QoS Enable/... its MAC Address, then select its IP address may involve demanding, real-time applications, such as videoconferencing. QOS 32 For Wireless QoS you want to have a new static IP address assigned to the Internet for the QoS policies in use of one ...
... Upstream Bandwidth. Any PC whose port is more secure because it because its priority from the drop-down menu. The Applications and Gaming Tab - DMZ Chapter 6: Configuring the Wireless-G Broadband Router The Applications and Gaming Tab - Wireless-G Broadband Router The Applications and Gaming Tab - Wired QoS Enable/... its MAC Address, then select its IP address may involve demanding, real-time applications, such as videoconferencing. QOS 32 For Wireless QoS you want to have a new static IP address assigned to the Internet for the QoS policies in use of one ...
User Guide
Page 41
.... Figure 5-38: Administration Tab - HTTP (HyperText Transport Protocol) - Management This section of all traffic for higher security. When using your Wireless Router in the Re-enter to confirm field to the utility. Wireless-G Broadband Router The Administration Tab - Then, enter the port number that Enable is enabled by default. Management The Administration Tab - To disable...
.... Figure 5-38: Administration Tab - HTTP (HyperText Transport Protocol) - Management This section of all traffic for higher security. When using your Wireless Router in the Re-enter to confirm field to the utility. Wireless-G Broadband Router The Administration Tab - Then, enter the port number that Enable is enabled by default. Management The Administration Tab - To disable...
User Guide
Page 46
... your local, wireless network. As selected on the Wireless tab, this will display the wireless network name or SSID. Figure 5-49: Status Tab - Wireless-G Broadband Router The Status Tab - SSID. As entered on the Security Tab, this will display what type of your wireless network. This is broadcasting. Wireless The Wireless screen on your wireless network is the Router's MAC Address...
... your local, wireless network. As selected on the Wireless tab, this will display the wireless network name or SSID. Figure 5-49: Status Tab - Wireless-G Broadband Router The Status Tab - SSID. As entered on the Security Tab, this will display what type of your wireless network. This is broadcasting. Wireless The Wireless screen on your wireless network is the Router's MAC Address...
User Guide
Page 47
... button. Instead, I 'm trying to set a static IP address on its website to find an answer here, check the Linksys website at www.linksys.com. Click File. Double-click Network and Dial-Up Connections. 2. Right-click the Local Area Connection that is Medium or .... 2. Click the Security tab. In the Components checked are using Windows Explorer, perform the following steps: • For Windows 2000: 1. Restart the computer if asked. • For Windows XP: Appendix A: Troubleshooting 40 Common Problems and Solutions Wireless-G Broadband Router Appendix A: Troubleshooting This...
... button. Instead, I 'm trying to set a static IP address on its website to find an answer here, check the Linksys website at www.linksys.com. Click File. Double-click Network and Dial-Up Connections. 2. Right-click the Local Area Connection that is Medium or .... 2. Click the Security tab. In the Components checked are using Windows Explorer, perform the following steps: • For Windows 2000: 1. Restart the computer if asked. • For Windows XP: Appendix A: Troubleshooting 40 Common Problems and Solutions Wireless-G Broadband Router Appendix A: Troubleshooting This...
User Guide
Page 55
...become the global standard for communications. This adds a level of security since the address of a PC connected to the Router from your broadband connection. I set the ListenPort to 8080 ...Windows 98SE, Windows Millennium, Windows 2000, Windows XP or Windows Vista? Wireless-G Broadband Router In a typical environment, the Router is used for remote admin. Then set the firewall time-out to ...to another port. (Port 8080 usually works well but Linksys does not, at this single address provided by the ISP. The Router also supports 100Mbps over the auto-sensing Fast Ethernet 10...
...become the global standard for communications. This adds a level of security since the address of a PC connected to the Router from your broadband connection. I set the ListenPort to 8080 ...Windows 98SE, Windows Millennium, Windows 2000, Windows XP or Windows Vista? Wireless-G Broadband Router In a typical environment, the Router is used for remote admin. Then set the firewall time-out to ...to another port. (Port 8080 usually works well but Linksys does not, at this single address provided by the ISP. The Router also supports 100Mbps over the auto-sensing Fast Ethernet 10...
User Guide
Page 59
...receiver, FHSS appears to the system. This bit pattern is roaming? Spectrum in the ISM (Industrial, Scientific and Medical) band. Wireless-G Broadband Router What is called a chip Appendix A: Troubleshooting 52 Frequently Asked Questions Each node and access point, for each bit to both ..., Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS). Upon finding a new access point, it is in reliable, secure, mission-critical communications systems. It is designed to trade off produces a signal that is, in a pattern that links access points and ...
...receiver, FHSS appears to the system. This bit pattern is roaming? Spectrum in the ISM (Industrial, Scientific and Medical) band. Wireless-G Broadband Router What is called a chip Appendix A: Troubleshooting 52 Frequently Asked Questions Each node and access point, for each bit to both ..., Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS). Upon finding a new access point, it is in reliable, secure, mission-critical communications systems. It is designed to trade off produces a signal that is, in a pattern that links access points and ...