User Guide
Page 2
...address. and/ or its affiliates in front of Cisco Systems, Inc. Wireless-G Broadband Router About This Guide i Online Resources Website addresses in front of the web... Resource Website Linksys WRT54GL User Guide WRT54GL User Guide www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a ...reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark ...
...address. and/ or its affiliates in front of Cisco Systems, Inc. Wireless-G Broadband Router About This Guide i Online Resources Website addresses in front of the web... Resource Website Linksys WRT54GL User Guide WRT54GL User Guide www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a ...reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark ...
User Guide
Page 3
...Wireless-G Broadband Router Chapter 1: Product Overview 3 Front Panel 3 Back Panel 3 Chapter 2: Wireless Security Checklist 4 General Network Security Guidelines 4 Additional Security Tips 4 Chapter 3: Advanced Configuration 5 Setup > Basic Setup 5 Setup > DDNS 8 Setup > MAC Address Clone 9 Setup > Advanced Routing 10 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless... > Router 21 Status > Local Network 22 Status > Wireless 22 Appendix A: Troubleshooting 23 Appendix B: Specifications 24...
...Wireless-G Broadband Router Chapter 1: Product Overview 3 Front Panel 3 Back Panel 3 Chapter 2: Wireless Security Checklist 4 General Network Security Guidelines 4 Additional Security Tips 4 Chapter 3: Advanced Configuration 5 Setup > Basic Setup 5 Setup > DDNS 8 Setup > MAC Address Clone 9 Setup > Advanced Routing 10 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless... > Router 21 Status > Local Network 22 Status > Wireless 22 Appendix A: Troubleshooting 23 Appendix B: Specifications 24...
User Guide
Page 6
...Internet access are adopting them to intruders than a network encrypted with specific MAC addresses. Wireless devices have a default password set by the factory. These devices have a default wireless network name or Service Set Identifier (SSID) set by the ...WRT54GL User Guidsuepport WPA. Currently, devices that do not use linksys as your wireless network. Enable encryption Encryption protects data transmitted over radio waves, it will be the network name or SSID only option available on wireless security, visit www.linksys.com/security Wireless-G Broadband Router...
...Internet access are adopting them to intruders than a network encrypted with specific MAC addresses. Wireless devices have a default password set by the factory. These devices have a default wireless network name or Service Set Identifier (SSID) set by the ...WRT54GL User Guidsuepport WPA. Currently, devices that do not use linksys as your wireless network. Enable encryption Encryption protects data transmitted over radio waves, it will be the network name or SSID only option available on wireless security, visit www.linksys.com/security Wireless-G Broadband Router...
User Guide
Page 12
... or host. Setup > Advanced Routing (Gateway) Setup > Advanced Routing (Router) Advanced Routing Operating Mode Select the mode in the network's layout and Wireless-G Broadband Router Advanced Configuration exchange routing tables with data coming from the Internet. Dynamic Routing automatically adjusts how packets travel to reach a specific host or network.) Enter the information described below to...
... or host. Setup > Advanced Routing (Gateway) Setup > Advanced Routing (Router) Advanced Routing Operating Mode Select the mode in the network's layout and Wireless-G Broadband Router Advanced Configuration exchange routing tables with data coming from the Internet. Dynamic Routing automatically adjusts how packets travel to reach a specific host or network.) Enter the information described below to...
User Guide
Page 17
...you to enable VPN tunnels using IPSec, PPTP, or L2TP protocols to specific recipients at the IP layer. Filter Multicast Multicasting allows for outside of protocols used to pass through the Router, keep the default, Enable. Filter IDENT (Port 113) This feature... Internet Requests This feature makes it more difficult for multiple transmissions to pass through the Router, keep the default selection, Enable. This feature is selected by default. Wireless-G Broadband Router 15 Deselect this feature to the appropriate computers. To turn off firewall protection, select...
...you to enable VPN tunnels using IPSec, PPTP, or L2TP protocols to specific recipients at the IP layer. Filter Multicast Multicasting allows for outside of protocols used to pass through the Router, keep the default, Enable. Filter IDENT (Port 113) This feature... Internet Requests This feature makes it more difficult for multiple transmissions to pass through the Router, keep the default selection, Enable. This feature is selected by default. Wireless-G Broadband Router 15 Deselect this feature to the appropriate computers. To turn off firewall protection, select...
User Guide
Page 18
...want to edit a service's settings, then click Add/Edit Service. After making your changes, click Save Settings to apply your changes. Then click Close. Wireless-G Broadband Router List of PCs screen appears. Then enter a range of Internet usage and traffic, such as FTP or telnet, by default. Port Services 16 To ... if you want this screen to establish an access policy (after Save Settings is not listed or you want to block or allow specific kinds of hours and minutes during which the policy will be in effect, or select 24 Hours. 7. Select the individual days during...
...want to edit a service's settings, then click Add/Edit Service. After making your changes, click Save Settings to apply your changes. Then click Close. Wireless-G Broadband Router List of PCs screen appears. Then enter a range of Internet usage and traffic, such as FTP or telnet, by default. Port Services 16 To ... if you want this screen to establish an access policy (after Save Settings is not listed or you want to block or allow specific kinds of hours and minutes during which the policy will be in effect, or select 24 Hours. 7. Select the individual days during...
User Guide
Page 19
... is remembered by way of IP address and port mapping rules. Applications and Gaming > Port Range Forward Wireless-G Broadband Router Applications and Gaming > Port Triggering Port Triggering Application Enter the application name of the PC running the specific application. Chapter 3 To add a service, enter the service's name in the Port Range fields. Then click...
... is remembered by way of IP address and port mapping rules. Applications and Gaming > Port Range Forward Wireless-G Broadband Router Applications and Gaming > Port Triggering Port Triggering Application Enter the application name of the PC running the specific application. Chapter 3 To add a service, enter the service's name in the Port Range fields. Then click...
User Guide
Page 21
... to encrypt data transmitted for the applications that support WMM, select Enabled. HTTPS uses SSL (Secured Socket Layer) to manage specific Router functions for the application. Depending on the IEEE 802.11e standard. UPnP UPnP Keep the default, Enable to access the web... based on the settings of HTTPS for example, Voice over IP (VoIP), video streaming, and interactive gaming. Wireless-G Broadband Router Advanced Configuration Administration > Management Router Password Local Router Access Router Password Enter a new Password for voice, music and video applications;
... to encrypt data transmitted for the applications that support WMM, select Enabled. HTTPS uses SSL (Secured Socket Layer) to manage specific Router functions for the application. Depending on the IEEE 802.11e standard. UPnP UPnP Keep the default, Enable to access the web... based on the settings of HTTPS for example, Voice over IP (VoIP), video streaming, and interactive gaming. Wireless-G Broadband Router Advanced Configuration Administration > Management Router Password Local Router Access Router Password Enter a new Password for voice, music and video applications;
User Guide
Page 23
...To back up or restore the Router's configuration file. Wireless-G Broadband Router Administration > Factory Defaults Router Information Firmware Version This is used to back up the Router's configuration file, click Backup. MAC Address This is the specific name for the Router, which you set on -...on the Setup tab. Advanced Configuration Status > Router The Status > Router screen displays the Router's current status. Upgrade Firmware Please select a file to restore Click Browse and select the configuration file. linksys.com. The information varies depending on the Internet...
...To back up or restore the Router's configuration file. Wireless-G Broadband Router Administration > Factory Defaults Router Information Firmware Version This is used to back up the Router's configuration file, click Backup. MAC Address This is the specific name for the Router, which you set on -...on the Setup tab. Advanced Configuration Status > Router The Status > Router screen displays the Router's current status. Upgrade Firmware Please select a file to restore Click Browse and select the configuration file. linksys.com. The information varies depending on the Internet...
User Guide
Page 25
...setup CD into your DSL modem in the following steps (these steps are specific to the Linksys website, www.linksys.com. The modem does not have enabled wireless security, then make WRT54GL User Guide sure the same security method and key are not addressed here... follow these instructions until your cable connection to use the Router. Select Never dial a connection. 4. The computer cannot connect wirelessly to the Router (the default is admin). Wireless-G Broadband Router 23 Follow these instructions. The Router does not replace your modem. If you have an Ethernet...
...setup CD into your DSL modem in the following steps (these steps are specific to the Linksys website, www.linksys.com. The modem does not have enabled wireless security, then make WRT54GL User Guide sure the same security method and key are not addressed here... follow these instructions until your cable connection to use the Router. Select Never dial a connection. 4. The computer cannot connect wirelessly to the Router (the default is admin). Wireless-G Broadband Router 23 Follow these instructions. The Router does not replace your modem. If you have an Ethernet...
User Guide
Page 26
Appendix B Appendix B: Specifications Model WRT54GL Standards IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.11b Channels 11 ..., SecureEasySetup RF Power Output 18 dBm UPnP able/cert Able Security Features Stateful Packet Inspection (SPI) Firewall, Internet Policy Wireless Security Wi-Fi Protected Access™2 (WPA2), WEP, Wireless MAC Filtering Environmental Dimensions 7.32" x 1.89" x 6.06" (186 x 48 x 154 mm) Weight 13.8... (-20 to 70ºC) Operating Humidity 10 to 85%, Noncondensing Storage Humidity 5 to 90%, Noncondensing Specifications Wireless-G Broadband Router 24
Appendix B Appendix B: Specifications Model WRT54GL Standards IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.11b Channels 11 ..., SecureEasySetup RF Power Output 18 dBm UPnP able/cert Able Security Features Stateful Packet Inspection (SPI) Firewall, Internet Policy Wireless Security Wi-Fi Protected Access™2 (WPA2), WEP, Wireless MAC Filtering Environmental Dimensions 7.32" x 1.89" x 6.06" (186 x 48 x 154 mm) Weight 13.8... (-20 to 70ºC) Operating Humidity 10 to 85%, Noncondensing Storage Humidity 5 to 90%, Noncondensing Specifications Wireless-G Broadband Router 24
User Guide
Page 27
...WITHOUT WARRANTY OF ANY KIND. This limited warranty gives you specific legal rights, and you may also have a question about your product or experience a problem with it, please go to www.linksys.com/support where you will apply even if any rebates. ... Limited Warran WRT54GL User Guide ty Linksys warrants this Linksys hardware product against defects in materials and workmanship under this limited warranty fails of its option, to (a) repair the product with new or refurbished parts, (b) replace the product with third party software or Wireless-G Broadband Router Warranty Information ...
...WITHOUT WARRANTY OF ANY KIND. This limited warranty gives you specific legal rights, and you may also have a question about your product or experience a problem with it, please go to www.linksys.com/support where you will apply even if any rebates. ... Limited Warran WRT54GL User Guide ty Linksys warrants this Linksys hardware product against defects in materials and workmanship under this limited warranty fails of its option, to (a) repair the product with new or refurbished parts, (b) replace the product with third party software or Wireless-G Broadband Router Warranty Information ...
User Guide
Page 29
... specifications for an uncontrolled environment. The required antenna impedance is firmware-limited to Part 15 of this equipment. Industry Canada Radiation Exposure Statement: This equipment complies with IC radiation exposure limits set forth for a Class B digital device, pursuant to channels 1 through 11. This transmitter must accept any other antenna or transmitter. Wireless-G Broadband Router...
... specifications for an uncontrolled environment. The required antenna impedance is firmware-limited to Part 15 of this equipment. Industry Canada Radiation Exposure Statement: This equipment complies with IC radiation exposure limits set forth for a Class B digital device, pursuant to channels 1 through 11. This transmitter must accept any other antenna or transmitter. Wireless-G Broadband Router...
User Guide
Page 35
...Wireless-G Broadband Router Software License Agreement Schedule 1 - IF YOU DO NOT AGREE TO ALL OF THESE TERMS, THEN YOU MAY NOT DOWNLOAD, INSTALL OR USE THE SOFTWARE. Subject to the terms and conditions of this product and may not be prompted to review and accept that software made available at the Linksys... and 3 below . Where such specific license terms entitle you to the source code of such software, that Linksys and/or its suppliers and may , from the open source software in Linksys products please look at the Linksys public web site at: www.linksys.com/gpl/ or Schedule 2 below...
...Wireless-G Broadband Router Software License Agreement Schedule 1 - IF YOU DO NOT AGREE TO ALL OF THESE TERMS, THEN YOU MAY NOT DOWNLOAD, INSTALL OR USE THE SOFTWARE. Subject to the terms and conditions of this product and may not be prompted to review and accept that software made available at the Linksys... and 3 below . Where such specific license terms entitle you to the source code of such software, that Linksys and/or its suppliers and may , from the open source software in Linksys products please look at the Linksys public web site at: www.linksys.com/gpl/ or Schedule 2 below...
User Guide
Page 41
...cryptographic' can be copied and put under another distribution license [including the GNU Public License.] END OF SCHEDULE 3 Software License Agreement Wireless-G Broadband Router 8041111C-AI 39 IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, ...derivative of this code cannot simply be left out if the routines from the apps directory (application code) you include anyWindows specific code (or a derivative thereof ) from the library being used are not cryptographic related. 4. OR BUSINESS INTERRUPTION) HOWEVER ...
...cryptographic' can be copied and put under another distribution license [including the GNU Public License.] END OF SCHEDULE 3 Software License Agreement Wireless-G Broadband Router 8041111C-AI 39 IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, ...derivative of this code cannot simply be left out if the routines from the apps directory (application code) you include anyWindows specific code (or a derivative thereof ) from the library being used are not cryptographic related. 4. OR BUSINESS INTERRUPTION) HOWEVER ...