User Guide
Page 2
... noteworthy website address or e-mail address. Copyright © 2008 Cisco Systems, Inc. All rights reserved. Wireless-G Router for Mobile Broadband About This Guide WARNING: This exclamation point indicates that there is a caution or warning and it ....product names are listed without http:// in the U.S. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of the address because most...
... noteworthy website address or e-mail address. Copyright © 2008 Cisco Systems, Inc. All rights reserved. Wireless-G Router for Mobile Broadband About This Guide WARNING: This exclamation point indicates that there is a caution or warning and it ....product names are listed without http:// in the U.S. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of the address because most...
User Guide
Page 5
... Thank you for choosing the Linksys Wireless-G Router for Mobile Broadband If you have a mobile broadband data card, use the Basic Setup screen of the Router's four switched ports. Mobile PC Card Slot If the Router will connect your cable or ...broadband service. Wireless (Green) The Wireless LED lights up and stays on . Mobile USB Ports If the Router will pop up and stays on , then the connection is enabled. If the LED flashes quickly, the Router is a connection made through one of security features help to a mobile broadband service, insert the mobile broadband...
... Thank you for choosing the Linksys Wireless-G Router for Mobile Broadband If you have a mobile broadband data card, use the Basic Setup screen of the Router's four switched ports. Mobile PC Card Slot If the Router will connect your cable or ...broadband service. Wireless (Green) The Wireless LED lights up and stays on . Mobile USB Ports If the Router will pop up and stays on , then the connection is enabled. If the LED flashes quickly, the Router is a connection made through one of security features help to a mobile broadband service, insert the mobile broadband...
User Guide
Page 6
... Mobile Broadband Place the Router on a level surface near an electrical outlet. Vertical Placement The Router has a stand on a wall. Front Panel Product Overview Placement Positions There are two ways to physically install the Router. Wireless-G Router ...for approximately five seconds, or restore the defaults from theft, you will connect the power adapter. The third way is where you can remove the security bracket to mount the Router on the panel opposite to the Router using the security slot. Chapter 1 Security Bracket The security...
... Mobile Broadband Place the Router on a level surface near an electrical outlet. Vertical Placement The Router has a stand on a wall. Front Panel Product Overview Placement Positions There are two ways to physically install the Router. Wireless-G Router ...for approximately five seconds, or restore the defaults from theft, you will connect the power adapter. The third way is where you can remove the security bracket to mount the Router on the panel opposite to the Router using the security slot. Chapter 1 Security Bracket The security...
User Guide
Page 8
...network settings. General Network Security Guidelines Wireless network security is useless if the underlying network is an older encryption standard and may be the only option available on wireless security, visit www.linksys.com/security The Linksys default password is more...changes, customize the device's password so it can be asked for Mobile Broadband Wireless Security Checklist 4. Wireless-G Router for a password when you cannot physically prevent someone from your wireless network. Enable encryption Encryption protects data transmitted over radio waves, it ...
...network settings. General Network Security Guidelines Wireless network security is useless if the underlying network is an older encryption standard and may be the only option available on wireless security, visit www.linksys.com/security The Linksys default password is more...changes, customize the device's password so it can be asked for Mobile Broadband Wireless Security Checklist 4. Wireless-G Router for a password when you cannot physically prevent someone from your wireless network. Enable encryption Encryption protects data transmitted over radio waves, it ...
User Guide
Page 9
... screen. However, if you to change the Router's general settings. This chapter describes each web page of Internet connection your ISP provides from the drop-down menu. The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and... after you click one of the main tabs. If you should be ready for Mobile Broadband Advanced Configuration Setup > Basic Setup Internet Setup The Internet Setup section configures the Router to learn about the web-based utility. These are connecting through your ISP. Chapter...
... screen. However, if you to change the Router's general settings. This chapter describes each web page of Internet connection your ISP provides from the drop-down menu. The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and... after you click one of the main tabs. If you should be ready for Mobile Broadband Advanced Configuration Setup > Basic Setup Internet Setup The Internet Setup section configures the Router to learn about the web-based utility. These are connecting through your ISP. Chapter...
User Guide
Page 16
... select Disabled. Wireless > Basic Wireless Settings The basic settings for wireless networking are briefly discussed here. Wireless-G Router for Mobile Broadband Advanced Configuration SSID Broadcast When wireless clients survey the local area for all points in your wireless network. Wireless > Basic Wireless Settings Basic Wireless Settings Network Mode From this screen. The SSID must not exceed 32 characters (use wireless security, keep the default...
... select Disabled. Wireless > Basic Wireless Settings The basic settings for wireless networking are briefly discussed here. Wireless-G Router for Mobile Broadband Advanced Configuration SSID Broadcast When wireless clients survey the local area for all points in your wireless network. Wireless > Basic Wireless Settings Basic Wireless Settings Network Mode From this screen. The SSID must not exceed 32 characters (use wireless security, keep the default...
User Guide
Page 17
...encryption methods, TKIP and AES, with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) Security Mode > WPA2 Personal Encryption WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. RADIUS Server Enter the IP...keys. The default is 1812. RADIUS Port Enter the port number of the RADIUS server. The default is 3600 seconds. Wireless-G Router for Mobile Broadband Security Mode > WPA2 Enterprise Encryption WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. The default is 3600...
...encryption methods, TKIP and AES, with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) Security Mode > WPA2 Personal Encryption WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. RADIUS Server Enter the IP...keys. The default is 1812. RADIUS Port Enter the port number of the RADIUS server. The default is 3600 seconds. Wireless-G Router for Mobile Broadband Security Mode > WPA2 Enterprise Encryption WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. The default is 3600...
User Guide
Page 18
... hex digits) or 104/128 bits (26 hex digits). The default is 1. The default is 1. Wireless-G Router for Mobile Broadband 17 Then click Generate. Chapter 3 Advanced Configuration Security Mode > RADIUS IMPORTANT: If you are using the MAC addresses of the wireless devices transmitting within your network's radius. Encryption Select a level of WEP encryption, 40/64 bits...
... hex digits) or 104/128 bits (26 hex digits). The default is 1. The default is 1. Wireless-G Router for Mobile Broadband 17 Then click Generate. Chapter 3 Advanced Configuration Security Mode > RADIUS IMPORTANT: If you are using the MAC addresses of the wireless devices transmitting within your network's radius. Encryption Select a level of WEP encryption, 40/64 bits...
User Guide
Page 20
...experience a high packet error rate, you want to specify the Router's rate of the default value, 2347, is used . Wireless-G Router for transmission. Security > Firewall The Firewall screen is recommended. To turn off firewall...Mobile Broadband Advanced Configuration RTS Threshold Should you can select Auto to have the Router automatically use the fastest possible data rate and enable the Auto-Fallback feature. Beacon Interval Enter a value between the Router and a wireless client. The default is Auto. In most cases, it sends the next DTIM with heavy 802.11b traffic. Security...
...experience a high packet error rate, you want to specify the Router's rate of the default value, 2347, is used . Wireless-G Router for transmission. Security > Firewall The Firewall screen is recommended. To turn off firewall...Mobile Broadband Advanced Configuration RTS Threshold Should you can select Auto to have the Router automatically use the fastest possible data rate and enable the Auto-Fallback feature. Beacon Interval Enter a value between the Router and a wireless client. The default is Auto. In most cases, it sends the next DTIM with heavy 802.11b traffic. Security...
User Guide
Page 21
...the feature to allow L2TP tunnels to establish an access policy (after Save Settings is clicked). To allow proxy access. Wireless-G Router for websites. To view all the policies, click Summary. Use the settings on the Layer 2 level. Web Filter ...Access Policy screen, click Close. 20 Select this feature to enable ActiveX filtering. Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is a programming language for Mobile Broadband Access Restrictions > Internet Access Internet Access Policy Access Policy Access can be tunneled...
...the feature to allow L2TP tunnels to establish an access policy (after Save Settings is clicked). To allow proxy access. Wireless-G Router for websites. To view all the policies, click Summary. Use the settings on the Layer 2 level. Web Filter ...Access Policy screen, click Close. 20 Select this feature to enable ActiveX filtering. Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is a programming language for Mobile Broadband Access Restrictions > Internet Access Internet Access Policy Access Policy Access can be tunneled...
User Guide
Page 24
.... Wireless-G Router for the applications you want to have defined. If you have opened, while DMZ hosting opens all the ports at the same time to -date information, click Refresh. Enabled Select Enabled to enable port triggering for Mobile Broadband Advanced Configuration Applications and Gaming > DMZ DMZ Any PC whose port is more secure because...
.... Wireless-G Router for the applications you want to have defined. If you have opened, while DMZ hosting opens all the ports at the same time to -date information, click Refresh. Enabled Select Enabled to enable port triggering for Mobile Broadband Advanced Configuration Applications and Gaming > DMZ DMZ Any PC whose port is more secure because...
User Guide
Page 26
... an entry. Your new entry will appear in the Summary list. Summary This lists the QoS entries you access the Router's web-based utility. Wireless-G Router for Mobile Broadband Administration > Management Management Router Access To ensure the Router's security, you will be no valid entry shown in the Summary list. Web Access Web Utility Access HTTP (HyperText Transport...
... an entry. Your new entry will appear in the Summary list. Summary This lists the QoS entries you access the Router's web-based utility. Wireless-G Router for Mobile Broadband Administration > Management Management Router Access To ensure the Router's security, you will be no valid entry shown in the Summary list. Web Access Web Utility Access HTTP (HyperText Transport...
User Guide
Page 27
...the default, Enabled, to allow wireless access to the utility, or select Disabled to block wireless access to view temporary logs. Remote Upgrade If you want to access the Router from any and all traffic for higher security. Wireless-G Router for various Internet applications, such as...in a remote location and wish to automatically configure the Router for Mobile Broadband Advanced Configuration Allow Users to Disable Internet Access Select Enabled, if you can keep the default, Disabled. HTTPS uses SSL (Secured Socket Layer) to specify an external IP address or range...
...the default, Enabled, to allow wireless access to the utility, or select Disabled to block wireless access to view temporary logs. Remote Upgrade If you want to access the Router from any and all traffic for higher security. Wireless-G Router for various Internet applications, such as...in a remote location and wish to automatically configure the Router for Mobile Broadband Advanced Configuration Allow Users to Disable Internet Access Select Enabled, if you can keep the default, Disabled. HTTPS uses SSL (Secured Socket Layer) to specify an external IP address or range...
User Guide
Page 28
.../port numbers for Mobile Broadband Diagnostics > Traceroute Administration > Factory Defaults The Administration > Factory Defaults screen allows you will have exhausted all the information that is 32 bytes. The default is displayed. Chapter 3 Log • Type Select Incoming Log, Outgoing Log, Security Log, or DHCP... Start to Traceroute To run the test, click this information to its factory default settings. Wireless-G Router for the outgoing Internet traffic. Once the Router is reset, you to restore the Router's configuration to a file on your PC's hard drive.
.../port numbers for Mobile Broadband Diagnostics > Traceroute Administration > Factory Defaults The Administration > Factory Defaults screen allows you will have exhausted all the information that is 32 bytes. The default is displayed. Chapter 3 Log • Type Select Incoming Log, Outgoing Log, Security Log, or DHCP... Start to Traceroute To run the test, click this information to its factory default settings. Wireless-G Router for the outgoing Internet traffic. Once the Router is reset, you to restore the Router's configuration to a file on your PC's hard drive.
User Guide
Page 31
... is also called the SSID, is displayed. The list can be sorted by the Router is displayed. Security The wireless security method used by the Router is displayed. Chapter 3 the Router. To retrieve the most up-todate information, click Refresh. Wireless-G Router for Mobile Broadband 30 To exit this screen and return to the Local Network screen, click Close. Network...
... is also called the SSID, is displayed. The list can be sorted by the Router is displayed. Security The wireless security method used by the Router is displayed. Chapter 3 the Router. To retrieve the most up-todate information, click Refresh. Wireless-G Router for Mobile Broadband 30 To exit this screen and return to the Local Network screen, click Close. Network...
User Guide
Page 32
Computer • Check the LEDs on both the computer and the Router. The computer should be connected to the mobile network via the mobile broadband data card or USB adapter. Select Tools > Internet Options. 2. If you have enabled wireless security, then make sure the same security method and key are lit. Open the web browser. 2. When prompted, complete...
Computer • Check the LEDs on both the computer and the Router. The computer should be connected to the mobile network via the mobile broadband data card or USB adapter. Select Tools > Internet Options. 2. If you have enabled wireless security, then make sure the same security method and key are lit. Open the web browser. 2. When prompted, complete...
User Guide
Page 34
Appendix B Appendix B: Specifications Model Number WRT54G3GV2-ST Standards IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.11b Ports Internet, Ethernet (4), PC Card, USB 2.0 (3), Power, and Antenna (SMA) Button Mobile Connect/Disconnect, Reset LEDs Power, Ethernet (1-4), Wireless, Modem Internet, Mobile Internet Cabling Type UTP CAT 5 # of Antennas 1 Detachable (Y/N) ... Humidity 10 to 85%, Relative Humidity, Noncondensing Storage Humidity 5 to 90% Noncondensing Specifications are subject to change without notice. Wireless-G Router for Mobile Broadband Specifications 33
Appendix B Appendix B: Specifications Model Number WRT54G3GV2-ST Standards IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.11b Ports Internet, Ethernet (4), PC Card, USB 2.0 (3), Power, and Antenna (SMA) Button Mobile Connect/Disconnect, Reset LEDs Power, Ethernet (1-4), Wireless, Modem Internet, Mobile Internet Cabling Type UTP CAT 5 # of Antennas 1 Detachable (Y/N) ... Humidity 10 to 85%, Relative Humidity, Noncondensing Storage Humidity 5 to 90% Noncondensing Specifications are subject to change without notice. Wireless-G Router for Mobile Broadband Specifications 33
User Guide
Page 44
...to comply with changes in legislation, legal or regulatory requirements or as defined at any Upgrades, you may expose your Linksys product and/or the Software to serious security threats and/or some features within your freedom to share and change it does not identify you personally. The United ..., INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF CAUSE (INCLUDING NEGLIGENCE), ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE Wireless-G Router for Mobile Broadband Software License Agreement SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. U.S.
...to comply with changes in legislation, legal or regulatory requirements or as defined at any Upgrades, you may expose your Linksys product and/or the Software to serious security threats and/or some features within your freedom to share and change it does not identify you personally. The United ..., INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF CAUSE (INCLUDING NEGLIGENCE), ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE Wireless-G Router for Mobile Broadband Software License Agreement SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. U.S.