User Guide
Page 2
...are trademarks or registered trademarks of the web address. and/ or its affiliates in front of their respective holders. Wireless-G Broadband Router About This Guide i If you use an older web browser, you may see various icons that call attention to... or trademark of Cisco Systems, Inc. Resource Website Linksys WRT54GL User Guide WRT54GL User Guide www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a caution or warning and it . All ...
...are trademarks or registered trademarks of the web address. and/ or its affiliates in front of their respective holders. Wireless-G Broadband Router About This Guide i If you use an older web browser, you may see various icons that call attention to... or trademark of Cisco Systems, Inc. Resource Website Linksys WRT54GL User Guide WRT54GL User Guide www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a caution or warning and it . All ...
User Guide
Page 3
...Wireless-G Broadband Router Chapter 1: Product Overview 3 Front Panel 3 Back Panel 3 Chapter 2: Wireless Security Checklist 4 General Network Security Guidelines 4 Additional Security Tips 4 Chapter 3: Advanced Configuration 5 Setup > Basic Setup 5 Setup > DDNS 8 Setup > MAC Address Clone 9 Setup > Advanced Routing 10 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless... Config Management 21 Status > Router 21 Status > Local Network 22 Status > Wireless 22 Appendix A: Troubleshooting 23 ...
...Wireless-G Broadband Router Chapter 1: Product Overview 3 Front Panel 3 Back Panel 3 Chapter 2: Wireless Security Checklist 4 General Network Security Guidelines 4 Additional Security Tips 4 Chapter 3: Advanced Configuration 5 Setup > Basic Setup 5 Setup > DDNS 8 Setup > MAC Address Clone 9 Setup > Advanced Routing 10 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless... Config Management 21 Status > Router 21 Status > Local Network 22 Status > Wireless 22 Appendix A: Troubleshooting 23 ...
User Guide
Page 4
Table of Contents Avis d'Industrie Canada 28 Wireless Disclaimer 28 Avis de non-responsabilité concernant les appareils sans fil 28 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 29 Appendix E: Software License Agreement 33 Software in Linksys Products 33 Software Licenses 33 Wireless-G Broadband Router ii
Table of Contents Avis d'Industrie Canada 28 Wireless Disclaimer 28 Avis de non-responsabilité concernant les appareils sans fil 28 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 29 Appendix E: Software License Agreement 33 Software in Linksys Products 33 Software Licenses 33 Wireless-G Broadband Router ii
User Guide
Page 5
... over that port. Either press and hold down the Cisco logo for choosing the Linksys Wireless-G Broadband Router. Chapter 1 Chapter 1: Product Overview Thank you have SecureEasySetup devices, run the Router's Setup Wizard CD-ROM and follow the onscreen instructions to use the Router to share resources such as computers, printers and files. Security features include WPA2...
... over that port. Either press and hold down the Cisco logo for choosing the Linksys Wireless-G Broadband Router. Chapter 1 Chapter 1: Product Overview Thank you have SecureEasySetup devices, run the Router's Setup Wizard CD-ROM and follow the onscreen instructions to use the Router to share resources such as computers, printers and files. Security features include WPA2...
User Guide
Page 6
...8226; Disable file sharing (peer-to-peer). A network encrypted with WPA/WPA2 is more information on wireless security, visit www.linksys.com/security Wireless-G Broadband Router 4 Wireless devices have a default password set by the factory. This General Network Security Guidelines is a unique series...8226;• WRT54GL User Guidsuepport WPA. Enable encryption Encryption protects data transmitted over radio waves, it can be asked for wireless devices with specific MAC addresses. To protect the information as the default wireless network name. You Wireless network security ...
...8226; Disable file sharing (peer-to-peer). A network encrypted with WPA/WPA2 is more information on wireless security, visit www.linksys.com/security Wireless-G Broadband Router 4 Wireless devices have a default password set by the factory. This General Network Security Guidelines is a unique series...8226;• WRT54GL User Guidsuepport WPA. Enable encryption Encryption protects data transmitted over radio waves, it can be asked for wireless devices with specific MAC addresses. To protect the information as the default wireless network name. You Wireless network security ...
User Guide
Page 7
... Configuration Setup > Basic Setup Internet Setup The Internet Setup section configures the Router to learn about the web-based utility. DHCP Wireless-G Broadband Router 5 Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will see a similar screen.) Leave the User name field blank. A password request...
... Configuration Setup > Basic Setup Internet Setup The Internet Setup section configures the Router to learn about the web-based utility. DHCP Wireless-G Broadband Router 5 Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will see a similar screen.) Leave the User name field blank. A password request...
User Guide
Page 8
... cut the Internet connection after it has been inactive for a specified period of minutes you want to have elapsed Wireless-G Broadband Router Advanced Configuration before your connection as soon as you want to access the Internet again. Gateway Your ISP will automatically re-... your ISP). Internet Connection Type > PPPoE User Name and Password Enter the User Name and Password provided by users on Demand enables the Router to inactivity, Connect on the Internet (including your connection as soon as seen from the Internet. PPTP Point-to the Internet, select Static...
... cut the Internet connection after it has been inactive for a specified period of minutes you want to have elapsed Wireless-G Broadband Router Advanced Configuration before your connection as soon as you want to access the Internet again. Gateway Your ISP will automatically re-... your ISP). Internet Connection Type > PPPoE User Name and Password Enter the User Name and Password provided by users on Demand enables the Router to inactivity, Connect on the Internet (including your connection as soon as seen from the Internet. PPTP Point-to the Internet, select Static...
User Guide
Page 9
... of the Heartbeat Server. Telstra Cable Telstra Cable is 5 minutes Keep Alive: Redial Period If you are disconnected, then the Router will periodically check your Internet connection terminates. Wireless-G Broadband Router Advanced Configuration Connect on Demand. The default Redial Period is the Maximum Transmission Unit. Optional Settings... before making any changes. If your Internet connection has been terminated due to inactivity, Connect on the Internet Connection Type: WRT54GL User Guide •• DHCP, Static IP, or Telstra: 1500 •• PPPoE: 1492 7
... of the Heartbeat Server. Telstra Cable Telstra Cable is 5 minutes Keep Alive: Redial Period If you are disconnected, then the Router will periodically check your Internet connection terminates. Wireless-G Broadband Router Advanced Configuration Connect on Demand. The default Redial Period is the Maximum Transmission Unit. Optional Settings... before making any changes. If your Internet connection has been terminated due to inactivity, Connect on the Internet Connection Type: WRT54GL User Guide •• DHCP, Static IP, or Telstra: 1500 •• PPPoE: 1492 7
User Guide
Page 10
...your network. This number cannot be 192.168.1.2 or greater, but smaller than 253. After the time is no other DHCP features will Wireless-G Broadband Router Advanced Configuration be "leased" this feature, keep the default setting, Disable. Time Setting Select the time zone in minutes, that you use...;• PPTP or L2TP: 1460 Network Setup The Network Setup section changes the settings on the network connected to the Router's Ethernet ports.Wireless Setup is how the Internet translates domain or website names into Internet addresses or URLs. If you to configure the...
...your network. This number cannot be 192.168.1.2 or greater, but smaller than 253. After the time is no other DHCP features will Wireless-G Broadband Router Advanced Configuration be "leased" this feature, keep the default setting, Disable. Time Setting Select the time zone in minutes, that you use...;• PPTP or L2TP: 1460 Network Setup The Network Setup section changes the settings on the network connected to the Router's Ethernet ports.Wireless Setup is how the Internet translates domain or website names into Internet addresses or URLs. If you to configure the...
User Guide
Page 11
...keep the default, Off. To disable this button will require you are not sure which setting to access the Internet. Internet IP Address The Router's Internet IP address is a 12-digit code assigned to a unique piece of your mail exchange server, so e-mails to your DynDNS address... it is the DDNS URL assigned by the DDNS service. Backup MX This feature allows the mail exchange server to cancel your ISP here. Wireless-G Broadband Router Setup > DDNS > TZO E-mail Address, Password, and Domain Name Enter the settings of the computer you set up with your changes. ...
...keep the default, Off. To disable this button will require you are not sure which setting to access the Internet. Internet IP Address The Router's Internet IP address is a 12-digit code assigned to a unique piece of your mail exchange server, so e-mails to your DynDNS address... it is the DDNS URL assigned by the DDNS service. Backup MX This feature allows the mail exchange server to cancel your ISP here. Wireless-G Broadband Router Setup > DDNS > TZO E-mail Address, Password, and Domain Name Enter the settings of the computer you set up with your changes. ...
User Guide
Page 12
...to the Internet, select Gateway. Dynamic Routing RIP This feature enables the Router to automatically adjust to another network destination. You can also select LAN & Wireless, which this Router will be available as data from the Internet. Interface This interface tells ...as well as an option. Setup > Advanced Routing (Gateway) Setup > Advanced Routing (Router) Advanced Routing Operating Mode Select the mode in the network's layout and Wireless-G Broadband Router Advanced Configuration exchange routing tables with data coming from the Internet. Setup > Advanced Routing ...
...to the Internet, select Gateway. Dynamic Routing RIP This feature enables the Router to automatically adjust to another network destination. You can also select LAN & Wireless, which this Router will be available as data from the Internet. Interface This interface tells ...as well as an option. Setup > Advanced Routing (Gateway) Setup > Advanced Routing (Router) Advanced Routing Operating Mode Select the mode in the network's layout and Wireless-G Broadband Router Advanced Configuration exchange routing tables with data coming from the Internet. Setup > Advanced Routing ...
User Guide
Page 13
... your changes, or click Cancel Changes to associate with a RADIUS server. (This should change the encryption keys. Wireless-G Broadband Router Advanced Configuration Wireless > Wireless Security The Wireless Security settings configure the security of algorithm, TKIP or AES. The default is 3600 seconds. If you have only.... The SSID must not exceed 32 characters (use it should change the default SSID (linksys) to reset the security settings on configuring wireless security for your wireless network MUST use the same WPA method and shared key, or else the network will ...
... your changes, or click Cancel Changes to associate with a RADIUS server. (This should change the encryption keys. Wireless-G Broadband Router Advanced Configuration Wireless > Wireless Security The Wireless Security settings configure the security of algorithm, TKIP or AES. The default is 3600 seconds. If you have only.... The SSID must not exceed 32 characters (use it should change the default SSID (linksys) to reset the security settings on configuring wireless security for your wireless network MUST use the same WPA method and shared key, or else the network will ...
User Guide
Page 14
... WPA supports two encryption methods, TKIP and AES, with dynamic encryption keys. Shared Key Enter the key shared between the Router and the server. Wireless-G Broadband Router Security Mode > WPA2 Enterprise WPA Algorithm WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. Select ...the RADIUS server. Group Key Renewal Enter a Group Key Renewal period, which instructs the Router how often it should only be used when a RADIUS server is connected to the Router.) Security Mode > RADIUS 12 The default selection is 3600 seconds. Shared Key Enter the...
... WPA supports two encryption methods, TKIP and AES, with dynamic encryption keys. Shared Key Enter the key shared between the Router and the server. Wireless-G Broadband Router Security Mode > WPA2 Enterprise WPA Algorithm WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. Select ...the RADIUS server. Group Key Renewal Enter a Group Key Renewal period, which instructs the Router how often it should only be used when a RADIUS server is connected to the Router.) Security Mode > RADIUS 12 The default selection is 3600 seconds. Shared Key Enter the...
User Guide
Page 15
... provide or block access. Edit MAC Filter List Click this to open the MAC Address Filter List screen. The default is 1812. Wireless-G Broadband Router MAC Address Filter List Click Save Settings to apply your changes, or click Cancel Changes to use). Shared Key Enter the key shared... between the Router and the server. Prevent Select this to block wireless access by using WEP encryption, always remember that each device in your wireless network MUST use ). This button is 64 bits 10 hex digits. Then ...
... provide or block access. Edit MAC Filter List Click this to open the MAC Address Filter List screen. The default is 1812. Wireless-G Broadband Router MAC Address Filter List Click Save Settings to apply your changes, or click Cancel Changes to use). Shared Key Enter the key shared... between the Router and the server. Prevent Select this to block wireless access by using WEP encryption, always remember that each device in your wireless network MUST use ). This button is 64 bits 10 hex digits. Then ...
User Guide
Page 16
... to set to Auto, which the Router can transmit at its Basic Rate to the other . The default value is a packet broadcast by an expert administrator as incorrect settings can select from each other wireless devices in your Wireless-G products not being able Wireless-G Broadband Router Advanced Configuration to transmit to the Router in poor network performance.
... to set to Auto, which the Router can transmit at its Basic Rate to the other . The default value is a packet broadcast by an expert administrator as incorrect settings can select from each other wireless devices in your Wireless-G products not being able Wireless-G Broadband Router Advanced Configuration to transmit to the Router in poor network performance.
User Guide
Page 17
... the appropriate computers. PPTP Passthrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to pass through the Router, keep the default selection, Enable. Wireless-G Broadband Router 15 To turn off firewall protection, select Disable. To allow IPSec tunnels to be forwarded to cancel your changes, or click Cancel Changes...
... the appropriate computers. PPTP Passthrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to pass through the Router, keep the default selection, Enable. Wireless-G Broadband Router 15 To turn off firewall protection, select Disable. To allow IPSec tunnels to be forwarded to cancel your changes, or click Cancel Changes...
User Guide
Page 18
... can be enforced. Use the settings on the List of PCs. To enable a policy, select the policy number from the Internet Access Policy dropdown menu. Wireless-G Broadband Router List of PCs screen appears. If the service you want to block is clicked). Selecting a policy from the drop-down menu will be in effect...
... can be enforced. Use the settings on the List of PCs. To enable a policy, select the policy number from the Internet Access Policy dropdown menu. Wireless-G Broadband Router List of PCs screen appears. If the service you want to block is clicked). Selecting a policy from the drop-down menu will be in effect...
User Guide
Page 19
...are finished making changes on your changes. Applications & Gaming > Port Triggering The Applications & Gaming > Port Triggering screen allows the Router to cancel your network, such as videoconferencing or online gaming. Change its range in a separate field next to Website Blocking by...screen, click Close. Protocol Select the protocol used for the criteria required. Applications and Gaming > Port Range Forward Wireless-G Broadband Router Applications and Gaming > Port Triggering Port Triggering Application Enter the application name of the computer that sends the matching data ...
...are finished making changes on your changes. Applications & Gaming > Port Triggering The Applications & Gaming > Port Triggering screen allows the Router to cancel your network, such as videoconferencing or online gaming. Change its range in a separate field next to Website Blocking by...screen, click Close. Protocol Select the protocol used for the criteria required. Applications and Gaming > Port Range Forward Wireless-G Broadband Router Applications and Gaming > Port Triggering Port Triggering Application Enter the application name of the computer that sends the matching data ...
User Guide
Page 20
Check with the Internet application documentation for the Router's four ports, LAN Ports 1-4. Advanced Configuration Applications and Gaming > QoS Quality of Service (QoS) ensures better service to enable port triggering for use of a special-... IP Address field. Forwarded Range For each port, select the priority and flow control setting. 18 DMZ hosting forwards all the ports of one PC. Wireless-G Broadband Router Applications and Gaming > QoS Device Priority Enter the name of the Triggered Range.
Check with the Internet application documentation for the Router's four ports, LAN Ports 1-4. Advanced Configuration Applications and Gaming > QoS Quality of Service (QoS) ensures better service to enable port triggering for use of a special-... IP Address field. Forwarded Range For each port, select the priority and flow control setting. 18 DMZ hosting forwards all the ports of one PC. Wireless-G Broadband Router Applications and Gaming > QoS Device Priority Enter the name of the Triggered Range.
User Guide
Page 21
... confirm. Application Priority Application Priority QoS manages information as it is a Wi-Fi Alliance certified feature, based on the World Wide Web. Wireless-G Broadband Router Advanced Configuration Administration > Management Router Password Local Router Access Router Password Enter a new Password for voice, music and video applications; Depending on the settings of data between network devices, select Enabled...
... confirm. Application Priority Application Priority QoS manages information as it is a Wi-Fi Alliance certified feature, based on the World Wide Web. Wireless-G Broadband Router Advanced Configuration Administration > Management Router Password Local Router Access Router Password Enter a new Password for voice, music and video applications; Depending on the settings of data between network devices, select Enabled...