User Guide
Page 2
... not require it is something that could damage your property or product. Wireless-G Broadband Router About This Guide i Resource Website Linksys WRT54GL User Guide WRT54GL User Guide www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of their respective holders. Copyright ©...
... not require it is something that could damage your property or product. Wireless-G Broadband Router About This Guide i Resource Website Linksys WRT54GL User Guide WRT54GL User Guide www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of their respective holders. Copyright ©...
User Guide
Page 3
...Wireless-G Broadband Router Chapter 1: Product Overview 3 Front Panel 3 Back Panel 3 Chapter 2: Wireless Security Checklist 4 General Network Security Guidelines 4 Additional Security Tips 4 Chapter 3: Advanced Configuration 5 Setup > Basic Setup 5 Setup > DDNS 8 Setup > MAC Address Clone 9 Setup > Advanced Routing 10 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless... Config Management 21 Status > Router 21 Status > Local Network 22 Status > Wireless 22 Appendix A: Troubleshooting 23 ...
...Wireless-G Broadband Router Chapter 1: Product Overview 3 Front Panel 3 Back Panel 3 Chapter 2: Wireless Security Checklist 4 General Network Security Guidelines 4 Additional Security Tips 4 Chapter 3: Advanced Configuration 5 Setup > Basic Setup 5 Setup > DDNS 8 Setup > MAC Address Clone 9 Setup > Advanced Routing 10 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless... Config Management 21 Status > Router 21 Status > Local Network 22 Status > Wireless 22 Appendix A: Troubleshooting 23 ...
User Guide
Page 4
Table of Contents Avis d'Industrie Canada 28 Wireless Disclaimer 28 Avis de non-responsabilité concernant les appareils sans fil 28 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 29 Appendix E: Software License Agreement 33 Software in Linksys Products 33 Software Licenses 33 Wireless-G Broadband Router ii
Table of Contents Avis d'Industrie Canada 28 Wireless Disclaimer 28 Avis de non-responsabilité concernant les appareils sans fil 28 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 29 Appendix E: Software License Agreement 33 Software in Linksys Products 33 Software Licenses 33 Wireless-G Broadband Router ii
User Guide
Page 5
... two ways to 54 Mbps, or through that makes it easy to indicate a successful reset. If the LED is continuously lit, the Router is where you for choosing the Linksys Wireless-G Broadband Router. Either press and hold down the Cisco logo for approximately five seconds, or restore the defaults from Administration > Factory Defaults in the...
... two ways to 54 Mbps, or through that makes it easy to indicate a successful reset. If the LED is continuously lit, the Router is where you for choosing the Linksys Wireless-G Broadband Router. Either press and hold down the Cisco logo for approximately five seconds, or restore the defaults from Administration > Factory Defaults in the...
User Guide
Page 6
...linksys.com/security Wireless-G Broadband Router 4 To thwart any unauthorized changes, customize the device's password so it will be hard to guess. •• Disable file sharing (peer-to 32 characters in your home so that are Wi-Fi certified are required to support WPA2, but do not •• WRT54GL...by sending information over a wireless network. Linksys routers give you , but are not required to support WEP. You Wireless network security is useless if the underlying network is provided solely for wireless networks. •• ...
...linksys.com/security Wireless-G Broadband Router 4 To thwart any unauthorized changes, customize the device's password so it will be hard to guess. •• Disable file sharing (peer-to 32 characters in your home so that are Wi-Fi certified are required to support WPA2, but do not •• WRT54GL...by sending information over a wireless network. Linksys routers give you , but are not required to support WEP. You Wireless network security is useless if the underlying network is provided solely for wireless networks. •• ...
User Guide
Page 7
...-ROM. Internet Connection Type Select the type of the main tabs. The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. Additional tabs will be available after you to change its advanced...chapter to continue. DHCP, which should use this information can set to cable connections.) Internet Connection Type > Automatic Configuration - DHCP Wireless-G Broadband Router 5 Password Screen Setup > Basic Setup The first screen that appears is set a new password from the drop-down menu. Chapter...
...-ROM. Internet Connection Type Select the type of the main tabs. The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. Additional tabs will be available after you to change its advanced...chapter to continue. DHCP, which should use this information can set to cable connections.) Internet Connection Type > Automatic Configuration - DHCP Wireless-G Broadband Router 5 Password Screen Setup > Basic Setup The first screen that appears is set a new password from the drop-down menu. Chapter...
User Guide
Page 8
... connection terminates. If your Internet connection has been terminated due to inactivity, Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time). Subnet Mask This is...ISP). In the Max Idle Time field, enter the number of minutes you want to have elapsed Wireless-G Broadband Router Advanced Configuration before your ISP. If you are disconnected, then the Router will automatically re-establish your connection. To use PPPoE. In the Max Idle Time field, enter...
... connection terminates. If your Internet connection has been terminated due to inactivity, Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time). Subnet Mask This is...ISP). In the Max Idle Time field, enter the number of minutes you want to have elapsed Wireless-G Broadband Router Advanced Configuration before your ISP. If you are disconnected, then the Router will automatically re-establish your connection. To use PPPoE. In the Max Idle Time field, enter...
User Guide
Page 9
... User Name and Password provided by your Internet connection. Wireless-G Broadband Router Advanced Configuration Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for the Router. To use this option, select Keep Alive. The ...automatically re-establish your Internet connection terminates. In the Redial Period field, you specify how often you want the Router to inactivity, Connect on the Internet Connection Type: WRT54GL User Guide •• DHCP, Static IP, or Telstra: 1500 •• PPPoE: 1492 7 ...
... User Name and Password provided by your Internet connection. Wireless-G Broadband Router Advanced Configuration Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for the Router. To use this option, select Keep Alive. The ...automatically re-establish your Internet connection terminates. In the Redial Period field, you specify how often you want the Router to inactivity, Connect on the Internet Connection Type: WRT54GL User Guide •• DHCP, Static IP, or Telstra: 1500 •• PPPoE: 1492 7 ...
User Guide
Page 10
Network Address Server Settings (DHCP) DHCP Server DHCP is up, the user will Wireless-G Broadband Router Advanced Configuration be automatically assigned a new dynamic IP address. After the time is enabled by DynDNS.org, then select DynDNS.org from this feature,...50. Chapter 3 •• PPTP or L2TP: 1460 Network Setup The Network Setup section changes the settings on the network connected to the Router's Ethernet ports.Wireless Setup is how the Internet translates domain or website names into Internet addresses or URLs. Static DNS (1-3) The Domain Name System (DNS) is ...
Network Address Server Settings (DHCP) DHCP Server DHCP is up, the user will Wireless-G Broadband Router Advanced Configuration be automatically assigned a new dynamic IP address. After the time is enabled by DynDNS.org, then select DynDNS.org from this feature,...50. Chapter 3 •• PPTP or L2TP: 1460 Network Setup The Network Setup section changes the settings on the network connected to the Router's Ethernet ports.Wireless Setup is how the Internet translates domain or website names into Internet addresses or URLs. Static DNS (1-3) The Domain Name System (DNS) is ...
User Guide
Page 11
... will change . For example, if your mail server. To enable wildcards, select On. Because it is Dynamic. Internet IP Address The Router's Internet IP address is the DDNS URL assigned by the DDNS service. User Defined Entry Enter the MAC Address registered with TZO. Mail ...Clone A MAC address is displayed here. If you set up with your changes. Status The status of the DDNS service connection is displayed here. Wireless-G Broadband Router Setup > DDNS > TZO E-mail Address, Password, and Domain Name Enter the settings of the computer you use: Dynamic, Static, or Custom...
... will change . For example, if your mail server. To enable wildcards, select On. Because it is Dynamic. Internet IP Address The Router's Internet IP address is the DDNS URL assigned by the DDNS service. User Defined Entry Enter the MAC Address registered with TZO. Mail ...Clone A MAC address is displayed here. If you set up with your changes. Status The status of the DDNS service connection is displayed here. Wireless-G Broadband Router Setup > DDNS > TZO E-mail Address, Password, and Domain Name Enter the settings of the computer you use: Dynamic, Static, or Custom...
User Guide
Page 12
... basic settings for contact between the source and the destination. Static Routing sets up the Router's advanced functions. Setup > Advanced Routing (Gateway) Setup > Advanced Routing (Router) Advanced Routing Operating Mode Select the mode in the network's layout and Wireless-G Broadband Router Advanced Configuration exchange routing tables with data coming from the Internet. Subnet Mask The...
... basic settings for contact between the source and the destination. Static Routing sets up the Router's advanced functions. Setup > Advanced Routing (Gateway) Setup > Advanced Routing (Router) Advanced Routing Operating Mode Select the mode in the network's layout and Wireless-G Broadband Router Advanced Configuration exchange routing tables with data coming from the Internet. Subnet Mask The...
User Guide
Page 13
... change the default SSID (linksys) to a unique name. To broadcast the Router's SSID, keep the default setting, Mixed. If you do not want to communicate. When you are six wireless security mode options supported by the Router. WEP stands for Wired ...Security Use this button to re-associate it with dynamic encryption keys. Wireless-G Broadband Router Advanced Configuration Wireless > Wireless Security The Wireless Security settings configure the security of algorithm, TKIP or AES. Wireless Security Security Mode Select the security method for Remote Authentication Dial-In...
... change the default SSID (linksys) to a unique name. To broadcast the Router's SSID, keep the default setting, Mixed. If you do not want to communicate. When you are six wireless security mode options supported by the Router. WEP stands for Wired ...Security Use this button to re-associate it with dynamic encryption keys. Wireless-G Broadband Router Advanced Configuration Wireless > Wireless Security The Wireless Security settings configure the security of algorithm, TKIP or AES. Wireless Security Security Mode Select the security method for Remote Authentication Dial-In...
User Guide
Page 14
...default Key Renewal Timeout period is 3600 seconds. Select the type of the RADIUS server. Shared Key Enter the key shared between the Router and the server. WPA2 Personal Security Mode > WPA2 Personal WPA Algorithm WPA2 supports two encryption methods, TKIP and AES, with dynamic..., TKIP or AES. The default value is TKIP + AES. Select the type of the RADIUS server. The default selection is 1812. Wireless-G Broadband Router Security Mode > WPA2 Enterprise WPA Algorithm WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. The default value is...
...default Key Renewal Timeout period is 3600 seconds. Select the type of the RADIUS server. Shared Key Enter the key shared between the Router and the server. WPA2 Personal Security Mode > WPA2 Personal WPA Algorithm WPA2 supports two encryption methods, TKIP and AES, with dynamic..., TKIP or AES. The default value is TKIP + AES. Select the type of the RADIUS server. The default selection is 1812. Wireless-G Broadband Router Security Mode > WPA2 Enterprise WPA Algorithm WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. The default value is...
User Guide
Page 15
...Shared Key Enter the key shared between the Router and the server. The default is 64 bits 10 hex digits. If you do not wish to allow wireless access by MAC Address, keep the default ..., to whom you wish to use the same WEP encryption method and encryption key, or else your wireless network will not function properly. On this to display a list of network users by MAC Address. ... apply your changes, or click Cancel Changes to cancel your changes. Wireless-G Broadband Router MAC Address Filter List Click Save Settings to apply your changes, or click Cancel Changes to cancel your...
...Shared Key Enter the key shared between the Router and the server. The default is 64 bits 10 hex digits. If you do not wish to allow wireless access by MAC Address, keep the default ..., to whom you wish to use the same WEP encryption method and encryption key, or else your wireless network will not function properly. On this to display a list of network users by MAC Address. ... apply your changes, or click Cancel Changes to cancel your changes. Wireless-G Broadband Router MAC Address Filter List Click Save Settings to apply your changes, or click Cancel Changes to cancel your...
User Guide
Page 16
... problems with greater performance, depending on the speed of your Wireless-G products not being able Wireless-G Broadband Router Advanced Configuration to transmit to catch all standard wireless rates (1-2Mbps, 5.5Mbps, 11Mbps, 18Mbps, and 24Mbps). The default value is turned Off by the Router to have the Router automatically use a WEP key for a packet before data is not...
... problems with greater performance, depending on the speed of your Wireless-G products not being able Wireless-G Broadband Router Advanced Configuration to transmit to catch all standard wireless rates (1-2Mbps, 5.5Mbps, 11Mbps, 18Mbps, and 24Mbps). The default value is turned Off by the Router to have the Router automatically use a WEP key for a packet before data is not...
User Guide
Page 17
... of your changes. To turn off firewall protection, select Disable. Deselect the feature to allow L2TP tunnels to pass through the Router, keep the default, Enable. Select Filter Internet NAT Redirection to local servers from being scanned by default. Security > VPN Passthrough...is selected by default. Click Save Settings to apply your changes, or click Cancel Changes to specific recipients at the IP layer. Wireless-G Broadband Router 15 Advanced Configuration Security > VPN Passthrough The Security > VPN Passthrough screen allows you to enable VPN tunnels using IPSec, PPTP, ...
... of your changes. To turn off firewall protection, select Disable. Deselect the feature to allow L2TP tunnels to pass through the Router, keep the default, Enable. Select Filter Internet NAT Redirection to local servers from being scanned by default. Security > VPN Passthrough...is selected by default. Click Save Settings to apply your changes, or click Cancel Changes to specific recipients at the IP layer. Wireless-G Broadband Router 15 Advanced Configuration Security > VPN Passthrough The Security > VPN Passthrough screen allows you to enable VPN tunnels using IPSec, PPTP, ...
User Guide
Page 18
... Policy Access can select a PC by selecting the policy or policies and clicking Delete. Use the settings on this policy to affect a group of PCs. Wireless-G Broadband Router List of PCs screen appears. Blocked Services You can filter access to various services accessed over the Internet, such as Internet access, designated services, and...
... Policy Access can select a PC by selecting the policy or policies and clicking Delete. Use the settings on this policy to affect a group of PCs. Wireless-G Broadband Router List of PCs screen appears. Blocked Services You can filter access to various services accessed over the Internet, such as Internet access, designated services, and...
User Guide
Page 19
... for specific port numbers. Some Internet applications may not require any applications that when the requested data returns through the Router, the data is the port range. Enable Select Enable to block websites with the Internet application documentation for the port...by Keyword. To close the Port Services screen and return to cancel your changes. Applications and Gaming > Port Range Forward Wireless-G Broadband Router Applications and Gaming > Port Triggering Port Triggering Application Enter the application name of the PC running the specific application. Select...
... for specific port numbers. Some Internet applications may not require any applications that when the requested data returns through the Router, the data is the port range. Enable Select Enable to block websites with the Internet application documentation for the port...by Keyword. To close the Port Services screen and return to cancel your changes. Applications and Gaming > Port Range Forward Wireless-G Broadband Router Applications and Gaming > Port Triggering Port Triggering Application Enter the application name of the PC running the specific application. Select...
User Guide
Page 20
...ports of one PC, select Enable. There are three types of QoS available: Device Priority, Ethernet Port Priority, and Application Priority. Wireless-G Broadband Router Applications and Gaming > QoS Device Priority Enter the name of your network device in the DMZ Host IP Address field. The Port ... number range. Chapter 3 Start Port Enter the starting port number of the Forwarded Range. Check with the Internet application documentation for the Router's four ports, LAN Ports 1-4. Enable Select Enable to cancel your changes. This feature is disabled by default. Click Save Settings to ...
...ports of one PC, select Enable. There are three types of QoS available: Device Priority, Ethernet Port Priority, and Application Priority. Wireless-G Broadband Router Applications and Gaming > QoS Device Priority Enter the name of your network device in the DMZ Host IP Address field. The Port ... number range. Chapter 3 Start Port Enter the starting port number of the Forwarded Range. Check with the Internet application documentation for the Router's four ports, LAN Ports 1-4. Enable Select Enable to cancel your changes. This feature is disabled by default. Click Save Settings to ...
User Guide
Page 21
.... Otherwise, keep the default, Disabled. Administration > Management The Administration > Management screen allows the network's administrator to encrypt data transmitted for the Router. Wireless-G Broadband Router Advanced Configuration Administration > Management Router Password Local Router Access Router Password Enter a new Password for higher security. Re-enter to confirm Enter the Password again to the utility. Keep the default, Enable...
.... Otherwise, keep the default, Disabled. Administration > Management The Administration > Management screen allows the network's administrator to encrypt data transmitted for the Router. Wireless-G Broadband Router Advanced Configuration Administration > Management Router Password Local Router Access Router Password Enter a new Password for higher security. Re-enter to confirm Enter the Password again to the utility. Keep the default, Enable...