User Guide
Page 2
... Guide WRT54GL User Guide www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of the web address. All rights reserved. WARNING: This exclamation point indicates that there is a caution or warning and it . and certain other countries. Wireless-G Broadband Router...
... Guide WRT54GL User Guide www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of the web address. All rights reserved. WARNING: This exclamation point indicates that there is a caution or warning and it . and certain other countries. Wireless-G Broadband Router...
User Guide
Page 3
...Wireless-G Broadband Router Chapter 1: Product Overview 3 Front Panel 3 Back Panel 3 Chapter 2: Wireless Security Checklist 4 General Network Security Guidelines 4 Additional Security Tips 4 Chapter 3: Advanced Configuration 5 Setup > Basic Setup 5 Setup > DDNS 8 Setup > MAC Address Clone 9 Setup > Advanced Routing 10 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless... > Router 21 Status > Local Network 22 Status > Wireless 22 Appendix A: Troubleshooting 23 Appendix B: Specifications 24...
...Wireless-G Broadband Router Chapter 1: Product Overview 3 Front Panel 3 Back Panel 3 Chapter 2: Wireless Security Checklist 4 General Network Security Guidelines 4 Additional Security Tips 4 Chapter 3: Advanced Configuration 5 Setup > Basic Setup 5 Setup > DDNS 8 Setup > MAC Address Clone 9 Setup > Advanced Routing 10 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless... > Router 21 Status > Local Network 22 Status > Wireless 22 Appendix A: Troubleshooting 23 Appendix B: Specifications 24...
User Guide
Page 6
.... •• Change passwords on wireless security, visit www.linksys.com/security Wireless-G Broadband Router 4 The Linksys default password is not secure. Linksys routers give you , but are at least...wireless routers, access points, or gateways away from other wireless networks that can also be hard to guess. •• Disable file sharing (peer-to-peer). Chapter 2 Wireless Security Checklist Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with specific MAC addresses. Change the default wireless...
.... •• Change passwords on wireless security, visit www.linksys.com/security Wireless-G Broadband Router 4 The Linksys default password is not secure. Linksys routers give you , but are at least...wireless routers, access points, or gateways away from other wireless networks that can also be hard to guess. •• Disable file sharing (peer-to-peer). Chapter 2 Wireless Security Checklist Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with specific MAC addresses. Change the default wireless...
User Guide
Page 12
... to reach a specific host or network.) Enter the information described below to set up a new static route. (Click Delete This Entry to view the Static Routes you can also select WAN (Internet), which performs dynamic routing with the other router(s). Setup > Advanced... Routing (Gateway) Setup > Advanced Routing (Router) Advanced Routing Operating Mode Select the mode in the network's layout and Wireless-G Broadband Router Advanced Configuration exchange routing tables with data coming from the ...
... to reach a specific host or network.) Enter the information described below to set up a new static route. (Click Delete This Entry to view the Static Routes you can also select WAN (Internet), which performs dynamic routing with the other router(s). Setup > Advanced... Routing (Gateway) Setup > Advanced Routing (Router) Advanced Routing Operating Mode Select the mode in the network's layout and Wireless-G Broadband Router Advanced Configuration exchange routing tables with data coming from the ...
User Guide
Page 17
...This feature makes it more difficult for multiple transmissions to specific recipients at the IP layer. Deselect the feature to allow IPSec tunnels to pass through the Router, keep the default, Enable. If multicasting is a ...The Security > Firewall screen is the method used to enable Point-to-Point sessions via the Internet on the Router's local network. Security > Firewall Firewall Firewall Protection To use firewall protection, keep the default, Enable. To ... Internet NAT redirection. To turn off firewall protection, select Disable. Wireless-G Broadband Router 15
...This feature makes it more difficult for multiple transmissions to specific recipients at the IP layer. Deselect the feature to allow IPSec tunnels to pass through the Router, keep the default, Enable. If multicasting is a ...The Security > Firewall screen is the method used to enable Point-to-Point sessions via the Internet on the Router's local network. Security > Firewall Firewall Firewall Protection To use firewall protection, keep the default, Enable. To ... Internet NAT redirection. To turn off firewall protection, select Disable. Wireless-G Broadband Router 15
User Guide
Page 18
...the PCs you want this screen to establish an access policy (after Save Settings is not listed or you want to block or allow specific kinds of hours and minutes during which PCs will display that policy's number and click Delete. If the service you want to filter...is clicked). To enable a policy, select the policy number from the drop-down menu, and select Enable. Wireless-G Broadband Router List of PCs screen appears. Select the individual days during specific days and times. Port Services 16 To enable this policy to be deleted from the Internet Access Policy dropdown ...
...the PCs you want this screen to establish an access policy (after Save Settings is not listed or you want to block or allow specific kinds of hours and minutes during which PCs will display that policy's number and click Delete. If the service you want to filter...is clicked). To enable a policy, select the policy number from the drop-down menu, and select Enable. Wireless-G Broadband Router List of PCs screen appears. Select the individual days during specific days and times. Port Services 16 To enable this policy to be deleted from the Internet Access Policy dropdown ...
User Guide
Page 19
... to the Access Restrictions screen, click Close. The IP address of the PC running the specific application. Applications and Gaming > Port Range Forward Wireless-G Broadband Router Applications and Gaming > Port Triggering Port Triggering Application Enter the application name of IP address ...and port mapping rules. Check with specific URL addresses, enter each application, list the triggered port ...
... to the Access Restrictions screen, click Close. The IP address of the PC running the specific application. Applications and Gaming > Port Range Forward Wireless-G Broadband Router Applications and Gaming > Port Triggering Port Triggering Application Enter the application name of IP address ...and port mapping rules. Check with specific URL addresses, enter each application, list the triggered port ...
User Guide
Page 21
... Gaming Applications Select this feature. This feature provides QoS to manage specific Router functions for higher security. for the Router. No Acknowledgement This feature prevents the Router from your ISP because the prioritized ports LAN ports 1-4 are in... Router's four ports have a higher priority. Otherwise, keep the default, Disabled. Wireless-G Broadband Router Advanced Configuration Administration > Management Router Password Local Router Access Router Password Enter a new Password for example, Voice over IP (VoIP), video streaming, and interactive gaming. Specific ...
... Gaming Applications Select this feature. This feature provides QoS to manage specific Router functions for higher security. for the Router. No Acknowledgement This feature prevents the Router from your ISP because the prioritized ports LAN ports 1-4 are in... Router's four ports have a higher priority. Otherwise, keep the default, Disabled. Wireless-G Broadband Router Advanced Configuration Administration > Management Router Password Local Router Access Router Password Enter a new Password for example, Voice over IP (VoIP), video streaming, and interactive gaming. Specific ...
User Guide
Page 23
... status. Then extract the file. Administration > Config Management This screen is the specific name for the Router, which you set on the Setup tab. Router Name This is used to upgrade Click Browse and select the extracted firmware upgrade ...Basic Setup screen. Administration > Firmware Upgrade Before upgrading the firmware, download the Router's firmware upgrade file from the Linksys website, www. Wireless-G Broadband Router Administration > Factory Defaults Router Information Firmware Version This is the Router's MAC Address, as you want to update the on the Setup tab. ...
... status. Then extract the file. Administration > Config Management This screen is the specific name for the Router, which you set on the Setup tab. Router Name This is used to upgrade Click Browse and select the extracted firmware upgrade ...Basic Setup screen. Administration > Firmware Upgrade Before upgrading the firmware, download the Router's firmware upgrade file from the Linksys website, www. Wireless-G Broadband Router Administration > Factory Defaults Router Information Firmware Version This is the Router's MAC Address, as you want to update the on the Setup tab. ...
User Guide
Page 25
The modem does not have enabled wireless security, then make WRT54GL User Guide sure the same security ...specific to the Linksys website, www.linksys.com. Click OK. The Router does not have installed the Router, it will automatically connect to get rid of the prompt, follow the on the Router. The computer cannot connect wirelessly ... of the ports numbered 1-4 on . You cannot use the Router. If you are similar for a username and password. Select Never dial a connection. 4. Wireless-G Broadband Router 23 Appendix A Appendix A: Troubleshooting Your computer cannot connect to ...
The modem does not have enabled wireless security, then make WRT54GL User Guide sure the same security ...specific to the Linksys website, www.linksys.com. Click OK. The Router does not have installed the Router, it will automatically connect to get rid of the prompt, follow the on the Router. The computer cannot connect wirelessly ... of the ports numbered 1-4 on . You cannot use the Router. If you are similar for a username and password. Select Never dial a connection. 4. Wireless-G Broadband Router 23 Appendix A Appendix A: Troubleshooting Your computer cannot connect to ...
User Guide
Page 26
Appendix B Appendix B: Specifications Model WRT54GL Standards IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.11b Channels 11 ..., SecureEasySetup RF Power Output 18 dBm UPnP able/cert Able Security Features Stateful Packet Inspection (SPI) Firewall, Internet Policy Wireless Security Wi-Fi Protected Access™2 (WPA2), WEP, Wireless MAC Filtering Environmental Dimensions 7.32" x 1.89" x 6.06" (186 x 48 x 154 mm) Weight 13.8... (-20 to 70ºC) Operating Humidity 10 to 85%, Noncondensing Storage Humidity 5 to 90%, Noncondensing Specifications Wireless-G Broadband Router 24
Appendix B Appendix B: Specifications Model WRT54GL Standards IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.11b Channels 11 ..., SecureEasySetup RF Power Output 18 dBm UPnP able/cert Able Security Features Stateful Packet Inspection (SPI) Firewall, Internet Policy Wireless Security Wi-Fi Protected Access™2 (WPA2), WEP, Wireless MAC Filtering Environmental Dimensions 7.32" x 1.89" x 6.06" (186 x 48 x 154 mm) Weight 13.8... (-20 to 70ºC) Operating Humidity 10 to 85%, Noncondensing Storage Humidity 5 to 90%, Noncondensing Specifications Wireless-G Broadband Router 24
User Guide
Page 27
...Linksys does not warrant that the operation of the product or software will be given a Return Materials Authorization (RMA) number. This limited warranty gives you specific...Wireless-G Broadband Router Warranty Information service offerings. ALL OTHER EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING, BUT NOT LIMITED TO, ANY IMPLIED WARRANTY OF NON-INFRINGEMENT, ARE DISCLAIMED. IN NO EVENT WILL LINKSYS...Appendix C Appendix C: Warranty Information Limited Warran WRT54GL User Guide ty Linksys warrants this Linksys hardware product against defects in materials and ...
...Linksys does not warrant that the operation of the product or software will be given a Return Materials Authorization (RMA) number. This limited warranty gives you specific...Wireless-G Broadband Router Warranty Information service offerings. ALL OTHER EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING, BUT NOT LIMITED TO, ANY IMPLIED WARRANTY OF NON-INFRINGEMENT, ARE DISCLAIMED. IN NO EVENT WILL LINKSYS...Appendix C Appendix C: Warranty Information Limited Warran WRT54GL User Guide ty Linksys warrants this Linksys hardware product against defects in materials and ...
User Guide
Page 29
...your body. IEEE 802.11b or 802.11g operation of this product near a swimming pool. •• Avoid using this equipment. Wireless-G Broadband Router 27 There may cause undesired operation of fire, use only No.26 AWG or larger telecommunication line cord. •• Do not use...Caution: To reduce the risk of the device. Wash hands after handling. This device must not be installed and operated with the specifications for compliance could void the user's authority to other antenna or transmitter. The required antenna impedance is 50 ohms. To reduce potential...
...your body. IEEE 802.11b or 802.11g operation of this product near a swimming pool. •• Avoid using this equipment. Wireless-G Broadband Router 27 There may cause undesired operation of fire, use only No.26 AWG or larger telecommunication line cord. •• Do not use...Caution: To reduce the risk of the device. Wash hands after handling. This device must not be installed and operated with the specifications for compliance could void the user's authority to other antenna or transmitter. The required antenna impedance is 50 ohms. To reduce potential...
User Guide
Page 35
.... Collection and Processing of Information. Wireless-G Broadband Router Software License Agreement Schedule 1 - Subject to the terms and conditions of this product and may also be sublicensed, and is licensed under the specific license terms applicable to the terms of Linksys or its affiliates Cisco Systems-Linksys (Asia) Pte Ltd. OR CISCO-LINKSYS K.K. ("LINKSYS") LICENSING THE SOFTWARE INSTEAD OF...
.... Collection and Processing of Information. Wireless-G Broadband Router Software License Agreement Schedule 1 - Subject to the terms and conditions of this product and may also be sublicensed, and is licensed under the specific license terms applicable to the terms of Linksys or its affiliates Cisco Systems-Linksys (Asia) Pte Ltd. OR CISCO-LINKSYS K.K. ("LINKSYS") LICENSING THE SOFTWARE INSTEAD OF...
User Guide
Page 41
...this code cannot be copied and put under another distribution license [including the GNU Public License.] END OF SCHEDULE 3 Software License Agreement Wireless-G Broadband Router 8041111C-AI 39 If you must include an acknowledgement: "This product includes software written by Tim Hudson (tjh@ cryptsoft.com)" THIS ... Appendix E The word 'cryptographic' can be left out if the routines from the apps directory (application code) you include anyWindows specific code (or a derivative thereof ) from the library being used are not cryptographic related. 4. LOSS OF USE, DATA, OR PROFITS;
...this code cannot be copied and put under another distribution license [including the GNU Public License.] END OF SCHEDULE 3 Software License Agreement Wireless-G Broadband Router 8041111C-AI 39 If you must include an acknowledgement: "This product includes software written by Tim Hudson (tjh@ cryptsoft.com)" THIS ... Appendix E The word 'cryptographic' can be left out if the routines from the apps directory (application code) you include anyWindows specific code (or a derivative thereof ) from the library being used are not cryptographic related. 4. LOSS OF USE, DATA, OR PROFITS;