User Guide
Page 2
...User Guide you may have to while using the product. Resource Website Linksys Linksys International Glossary www.linksysbycisco.com www.linksysbycisco.com/international www.linksysbycisco.com/glossary Network Security www....Linksys, Cisco and the Cisco Logo are trademarks or registered trademarks of Cisco Systems, Inc. Other brands and product names are registered trademarks or trademarks of their respective holders. Online Resources Website addresses in this document are listed without http:// in the U.S. Copyright © 2009 Cisco Systems, Inc. Wireless-G Broadband Router...
...User Guide you may have to while using the product. Resource Website Linksys Linksys International Glossary www.linksysbycisco.com www.linksysbycisco.com/international www.linksysbycisco.com/glossary Network Security www....Linksys, Cisco and the Cisco Logo are trademarks or registered trademarks of Cisco Systems, Inc. Other brands and product names are registered trademarks or trademarks of their respective holders. Online Resources Website addresses in this document are listed without http:// in the U.S. Copyright © 2009 Cisco Systems, Inc. Wireless-G Broadband Router...
User Guide
Page 3
... 4 Setup > DDNS 7 Setup > MAC Address Clone 8 Setup > Advanced Routing 9 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless Settings 14 Security > Firewall 15 Security > VPN Passthrough 15 Access Restrictions > Internet Access ... Firmware 21 Administration > Config Management 21 Status > Router 22 Status > Local Network 22 Status > Wireless 23 Appendix A: Troubleshooting 24 Appendix B: Specifications 25 Appendix C: Warranty Information 26 Limited Warranty 26 Wireless-G Broadband Router ii
... 4 Setup > DDNS 7 Setup > MAC Address Clone 8 Setup > Advanced Routing 9 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless Settings 14 Security > Firewall 15 Security > VPN Passthrough 15 Access Restrictions > Internet Access ... Firmware 21 Administration > Config Management 21 Status > Router 22 Status > Local Network 22 Status > Wireless 23 Appendix A: Troubleshooting 24 Appendix B: Specifications 25 Appendix C: Warranty Information 26 Limited Warranty 26 Wireless-G Broadband Router ii
User Guide
Page 4
Table of Contents Appendix D: Regulatory Information 28 FCC Statement 28 FCC Radiation Exposure Statement 28 Safety Notices 28 Industry Canada Statement 28 Avis d'Industrie Canada 29 Wireless Disclaimer 29 Avis de non-responsabilité concernant les appareils sans fil 29 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 30 Appendix E: Software End User License Agreement 34 Cisco Products 34 Software Licenses 34 Wireless-G Broadband Router iii
Table of Contents Appendix D: Regulatory Information 28 FCC Statement 28 FCC Radiation Exposure Statement 28 Safety Notices 28 Industry Canada Statement 28 Avis d'Industrie Canada 29 Wireless Disclaimer 29 Avis de non-responsabilité concernant les appareils sans fil 29 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 30 Appendix E: Software End User License Agreement 34 Cisco Products 34 Software Licenses 34 Wireless-G Broadband Router iii
User Guide
Page 5
... security, a Stateful Packet Inspection (SPI) firewall and NAT technology. Wireless-G Broadband Router Internet The Internet port is to share resources such as wireless adapters, that port. You can use Wi-Fi Protected Setup to automatically configure wireless security for choosing the Linksys by Cisco Wireless-G Broadband Router. Configuring the Router is active, and a second session begins. Wi-Fi Protected Setup...
... security, a Stateful Packet Inspection (SPI) firewall and NAT technology. Wireless-G Broadband Router Internet The Internet port is to share resources such as wireless adapters, that port. You can use Wi-Fi Protected Setup to automatically configure wireless security for choosing the Linksys by Cisco Wireless-G Broadband Router. Configuring the Router is active, and a second session begins. Wi-Fi Protected Setup...
User Guide
Page 6
... is within reach of its bottom panel. Make sure that the wall you want to mount the Router. Position the Router so the wall-mount slots line up with the two screws. 5. Wall Mounting Template Wireless-G Broadband Router 2 Suggested Mounting Hardware 2.5-3.0 mm 4-5 mm 1-1.5 mm ††Note: Mounting hardware illustrations are 152 mm (6 inches) apart... electrical outlet. 2. The distance between the slots is not responsible for damages incurred by insecure wall-mounting hardware. Two screws are needed to scale. NOTE: Linksys is 152 mm (6 inches).
... is within reach of its bottom panel. Make sure that the wall you want to mount the Router. Position the Router so the wall-mount slots line up with the two screws. 5. Wall Mounting Template Wireless-G Broadband Router 2 Suggested Mounting Hardware 2.5-3.0 mm 4-5 mm 1-1.5 mm ††Note: Mounting hardware illustrations are 152 mm (6 inches) apart... electrical outlet. 2. The distance between the slots is not responsible for damages incurred by insecure wall-mounting hardware. Two screws are needed to scale. NOTE: Linksys is 152 mm (6 inches).
User Guide
Page 7
...software. •• Disable file sharing (peer-to access your wireless device and change your consent and/or knowledge. Hackers know these defaults and may be intercepted. Wireless-G Broadband Router Wireless Security Checklist 4. Combine letters and numbers to avoid using standard words... settings. To protect the information as the default wireless network name. Additional Security Tips •• Keep wireless routers, access points, or gateways away from connecting to your network equipment. Linksys wireless products use linksys as it will be hard to guess. 3....
...software. •• Disable file sharing (peer-to access your wireless device and change your consent and/or knowledge. Hackers know these defaults and may be intercepted. Wireless-G Broadband Router Wireless Security Checklist 4. Combine letters and numbers to avoid using standard words... settings. To protect the information as the default wireless network name. Additional Security Tips •• Keep wireless routers, access points, or gateways away from connecting to your network equipment. Linksys wireless products use linksys as it will be hard to guess. 3....
User Guide
Page 8
... Internet Service Provider (ISP). Then enter the password you set a new password from the drop-down menu. Password Screen Wireless-G Broadband Router Advanced Configuration Setup > Basic Setup The first screen that appears is Automatic Configuration - Setup > Basic Setup Internet Setup The Internet ... should use the Setup Wizard on the CD-ROM), the Router will see a similar screen.) Leave the User name field blank. The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. DHCP The default ...
... Internet Service Provider (ISP). Then enter the password you set a new password from the drop-down menu. Password Screen Wireless-G Broadband Router Advanced Configuration Setup > Basic Setup The first screen that appears is Automatic Configuration - Setup > Basic Setup Internet Setup The Internet ... should use the Setup Wizard on the CD-ROM), the Router will see a similar screen.) Leave the User name field blank. The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. DHCP The default ...
User Guide
Page 9
... been inactive for a specified period of time (Max Idle Time). Connect on the Internet (including your Internet connection. If Wireless-G Broadband Router Advanced Configuration you are connected to the Internet through a dynamic IP address, then select Obtain an IP Address Automatically. Username ...Internet IP Address This is 5 minutes. If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your ISP). The default is 5 minutes. 5 The default is 30 seconds. Your ISP will automatically re...
... been inactive for a specified period of time (Max Idle Time). Connect on the Internet (including your Internet connection. If Wireless-G Broadband Router Advanced Configuration you are connected to the Internet through a dynamic IP address, then select Obtain an IP Address Automatically. Username ...Internet IP Address This is 5 minutes. If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your ISP). The default is 5 minutes. 5 The default is 30 seconds. Your ISP will automatically re...
User Guide
Page 10
...can enter a name of time (Max Idle Time). In the Redial Period field, specify how often the Router should check the Internet connection. Wireless-G Broadband Router Advanced Configuration Internet Connection Type > Telstra Cable User Name and Password Enter the User Name and Password provided... by your broadband Internet service has been configured with your ISP to specify. The default is 5 minutes....
...can enter a name of time (Max Idle Time). In the Redial Period field, specify how often the Router should check the Internet connection. Wireless-G Broadband Router Advanced Configuration Internet Connection Type > Telstra Cable User Name and Password Enter the User Name and Password provided... by your broadband Internet service has been configured with your ISP to specify. The default is 5 minutes....
User Guide
Page 11
... to start with the Internet. Starting IP Address Enter a value for the DHCP server to a dynamic Internet IP address. Because the Wireless-G Broadband Router Advanced Configuration Router's default IP address is no other DHCP features will be used as seen by factory default. If you use a WINS server, enter...on your own website, FTP server, or other DHCP server on the network connected to the Router's Ethernet ports.Wireless Setup is useful when you need to sign up to enable the Router's DHCP server option, make sure there is 192.168.1.1, the Starting IP Address must be ...
... to start with the Internet. Starting IP Address Enter a value for the DHCP server to a dynamic Internet IP address. Because the Wireless-G Broadband Router Advanced Configuration Router's default IP address is no other DHCP features will be used as seen by factory default. If you use a WINS server, enter...on your own website, FTP server, or other DHCP server on the network connected to the Router's Ethernet ports.Wireless Setup is useful when you need to sign up to enable the Router's DHCP server option, make sure there is 192.168.1.1, the Starting IP Address must be ...
User Guide
Page 12
... service providers, DynDNS.org or TZO.com. Setup > MAC Address Clone Some ISPs will change . Internet IP Address The Router's Internet IP address is displayed. Wireless-G Broadband Router Advanced Configuration TZO.com Setup > DDNS > TZO E-mail Address, TZO Key, and Domain Name Enter the settings of hardware....org from the drop-down menu. A MAC address is dynamic, it will require you assign a fixed host and domain name to the Router. Setup > MAC Address Clone MAC Address Clone Enable/Disable To have the MAC Address cloned, select Enable. 8 If your changes. Because it...
... service providers, DynDNS.org or TZO.com. Setup > MAC Address Clone Some ISPs will change . Internet IP Address The Router's Internet IP address is displayed. Wireless-G Broadband Router Advanced Configuration TZO.com Setup > DDNS > TZO E-mail Address, TZO Key, and Domain Name Enter the settings of hardware....org from the drop-down menu. A MAC address is dynamic, it will require you assign a fixed host and domain name to the Router. Setup > MAC Address Clone MAC Address Clone Enable/Disable To have the MAC Address cloned, select Enable. 8 If your changes. Because it...
User Guide
Page 13
Static Routing sets up a new static route. (Click the Delete This Entry button to the Internet. When Wireless-G Broadband Router Advanced Configuration Router is Disabled by default. Dynamic Routing RIP This feature enables the Router to automatically adjust to another network destination. This feature is chosen, Dynamic Routing will be available as data from the Internet...
Static Routing sets up a new static route. (Click the Delete This Entry button to the Internet. When Wireless-G Broadband Router Advanced Configuration Router is Disabled by default. Dynamic Routing RIP This feature enables the Router to automatically adjust to another network destination. This feature is chosen, Dynamic Routing will be available as data from the Internet...
User Guide
Page 14
... you should change the default SSID (linksys) to disable wireless networking, select Disabled. For added security, you have client devices, such as wireless adapters, that applies to configure the Router's wireless network(s), manual and Wi-Fi Protected Setup. It is a feature that supports Wi-Fi Protected Setup. 10 Wireless-G Broadband Router Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) Wi...
... you should change the default SSID (linksys) to disable wireless networking, select Disabled. For added security, you have client devices, such as wireless adapters, that applies to configure the Router's wireless network(s), manual and Wi-Fi Protected Setup. It is a feature that supports Wi-Fi Protected Setup. 10 Wireless-G Broadband Router Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) Wi...
User Guide
Page 15
...Protected Setup button. 1. There are displayed at the bottom of your client device asks for the Router's PIN number. 1. If you do not support Wi-Fi Protected Setup, note the wireless settings, and then manually configure those client devices. Then refer back to your client device has a..., refer to use the same WPA method and shared key, or else the network will not function properly. Wireless-G Broadband Router Advanced Configuration Wireless Security Wireless security is strongly recommended, and WPA2 is AES. Use WPA2 if it should change the encryption keys. WPA2 Personal ...
...Protected Setup button. 1. There are displayed at the bottom of your client device asks for the Router's PIN number. 1. If you do not support Wi-Fi Protected Setup, note the wireless settings, and then manually configure those client devices. Then refer back to your client device has a..., refer to use the same WPA method and shared key, or else the network will not function properly. Wireless-G Broadband Router Advanced Configuration Wireless Security Wireless security is strongly recommended, and WPA2 is AES. Use WPA2 if it should change the encryption keys. WPA2 Personal ...
User Guide
Page 16
... AES, with a RADIUS server. (This should change the encryption keys. Shared Key Enter the key shared between the Router and the server. The default is AES Wireless-G Broadband Router 12 The default is 3600 seconds. Security Mode > WPA2 Enterprise WPA Algorithm WPA2 supports two encryption methods, TKIP and...algorithm, TKIP or AES. (AES is a stronger encryption method than TKIP.) WPA Shared Key Enter the key shared by the Router and your wireless network MUST use the same WPA method and shared key, or else the network will not function properly. Advanced Configuration RADIUS ...
... AES, with a RADIUS server. (This should change the encryption keys. Shared Key Enter the key shared between the Router and the server. The default is AES Wireless-G Broadband Router 12 The default is 3600 seconds. Security Mode > WPA2 Enterprise WPA Algorithm WPA2 supports two encryption methods, TKIP and...algorithm, TKIP or AES. (AES is a stronger encryption method than TKIP.) WPA Shared Key Enter the key shared by the Router and your wireless network MUST use the same WPA method and shared key, or else the network will not function properly. Advanced Configuration RADIUS ...
User Guide
Page 17
... level of the devices in your wireless network. Key 1-4 If you are using WEP encryption, each device in your wireless network MUST use ). Shared Key Enter the key shared between the Router and the server. WEP WEP is connected to the Router.) Advanced Configuration IMPORTANT: If you ... key, or else your wireless network will not function properly. Then click Generate. WEP Encryption Select a level of WEP encryption, 64 bits 10 hex digits or 128 bits 26 hex digits. The default is not as secure as WPA. Wireless > Wireless MAC Filter Wireless-G Broadband Router 13
... level of the devices in your wireless network. Key 1-4 If you are using WEP encryption, each device in your wireless network MUST use ). Shared Key Enter the key shared between the Router and the server. WEP WEP is connected to the Router.) Advanced Configuration IMPORTANT: If you ... key, or else your wireless network will not function properly. Then click Generate. WEP Encryption Select a level of WEP encryption, 64 bits 10 hex digits or 128 bits 26 hex digits. The default is not as secure as WPA. Wireless > Wireless MAC Filter Wireless-G Broadband Router 13
User Guide
Page 18
.... These settings should remain disabled unless you can reduce wireless performance. Wireless-G Broadband Router Advanced Configuration Wireless > Advanced Wireless Settings Advanced Wireless Authentication Type The default is Default, for transmission at all wireless rates. The default setting is set to provide or block access. If you want to specify the Router's rate of network users by MAC Address, to...
.... These settings should remain disabled unless you can reduce wireless performance. Wireless-G Broadband Router Advanced Configuration Wireless > Advanced Wireless Settings Advanced Wireless Authentication Type The default is Default, for transmission at all wireless rates. The default setting is set to provide or block access. If you want to specify the Router's rate of network users by MAC Address, to...
User Guide
Page 19
... on your changes. This feature is selected by default. This feature is selected by the Router to the appropriate computers. Wireless-G Broadband Router 15 Beacon Interval A beacon is permitted, then the Router will be forwarded to synchronize the wireless network. A DTIM field is recommended. RTS Threshold Should you encounter inconsistent data flow, only minor reduction of...
... on your changes. This feature is selected by default. This feature is selected by the Router to the appropriate computers. Wireless-G Broadband Router 15 Beacon Interval A beacon is permitted, then the Router will be forwarded to synchronize the wireless network. A DTIM field is recommended. RTS Threshold Should you encounter inconsistent data flow, only minor reduction of...
User Guide
Page 20
...the default, Enable. You can be managed by default. To return to the Internet Access screen, click Close.) Wireless-G Broadband Router Internet Policy Summary Status Policies are disabled by a policy. To enable this screen to establish an access policy (... Advanced Configuration Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is clicked). To allow L2TP tunnels to pass through the Router, keep the default, Enable. To delete a policy, select that policy's settings. To view all the policies, click Summary. (To delete ...
...the default, Enable. You can be managed by default. To return to the Internet Access screen, click Close.) Wireless-G Broadband Router Internet Policy Summary Status Policies are disabled by a policy. To enable this screen to establish an access policy (... Advanced Configuration Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is clicked). To allow L2TP tunnels to pass through the Router, keep the default, Enable. To delete a policy, select that policy's settings. To view all the policies, click Summary. (To delete ...
User Guide
Page 21
... from the list on the right. Change its name, protocol setting, or port range. To delete a service, select it from the list on the right. Wireless-G Broadband Router Applications and Gaming > Port Range Forward 17 Select the appropriate option, Deny or Allow, depending on the List of hours and minutes during which the...
... from the list on the right. Change its name, protocol setting, or port range. To delete a service, select it from the list on the right. Wireless-G Broadband Router Applications and Gaming > Port Range Forward 17 Select the appropriate option, Deny or Allow, depending on the List of hours and minutes during which the...