User Guide
Page 2
... because most current web browsers do not require it is something that could damage your property or product. Wireless-G Router for Mobile Broadband About This Guide WARNING: This exclamation point indicates that you should pay special attention to specific items... that call attention to while using the product. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of the web address. ...
... because most current web browsers do not require it is something that could damage your property or product. Wireless-G Router for Mobile Broadband About This Guide WARNING: This exclamation point indicates that you should pay special attention to specific items... that call attention to while using the product. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of the web address. ...
User Guide
Page 5
... to the mobile network. Wireless-G Router for Mobile Broadband. The Router lets you press the Mobile Connect/Disconnect button, make sure the mobile broadband data card or USB adapter is enabled. A variety of the Router's web-based utility.) Side Panel Product Overview USB Port Reserved for future use the Basic Setup screen of security features help to a mobile broadband service, insert the mobile broadband USB...
... to the mobile network. Wireless-G Router for Mobile Broadband. The Router lets you press the Mobile Connect/Disconnect button, make sure the mobile broadband data card or USB adapter is enabled. A variety of the Router's web-based utility.) Side Panel Product Overview USB Port Reserved for future use the Basic Setup screen of security features help to a mobile broadband service, insert the mobile broadband USB...
User Guide
Page 6
... button for Mobile Broadband Front Panel Product Overview Placement Positions There are two ways to the Router using the security slot. The second way is to stand the Router vertically on a wall. Bottom Panel To place the Router in a vertical position, rotate the stand 90 degrees. The third way is to mount the Router on a surface. Wireless-G Router for...
... button for Mobile Broadband Front Panel Product Overview Placement Positions There are two ways to the Router using the security slot. The second way is to stand the Router vertically on a wall. Bottom Panel To place the Router in a vertical position, rotate the stand 90 degrees. The third way is to mount the Router on a surface. Wireless-G Router for...
User Guide
Page 8
... your wireless device and change their settings. Wireless-G Router for wireless communication. WEP is an older encryption standard and may open file sharing without your network secure. 1. General Network Security Guidelines Wireless network security is ...security for Mobile Broadband Wireless Security Checklist 4. WEB: For more secure than a traditional wired network. Because wireless networking operates by your Social Security number) because this information may try to use linksys as it will be intercepted. Chapter 2 Chapter 2: Wireless Security Checklist Wireless...
... your wireless device and change their settings. Wireless-G Router for wireless communication. WEP is an older encryption standard and may open file sharing without your network secure. 1. General Network Security Guidelines Wireless network security is ...security for Mobile Broadband Wireless Security Checklist 4. WEB: For more secure than a traditional wired network. Because wireless networking operates by your Social Security number) because this information may try to use linksys as it will be intercepted. Chapter 2 Chapter 2: Wireless Security Checklist Wireless...
User Guide
Page 9
... to cable connections.) Wireless-G Router for use this information can access the utility via a web browser on a computer connected to your ISP supports DHCP or you should be ready for Mobile Broadband However, if you... to learn about the web-based utility. Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will see a similar screen.) Enter admin (the default) in the Address field. The web-based utility has these main tabs: Setup, Wireless, Security...
... to cable connections.) Wireless-G Router for use this information can access the utility via a web browser on a computer connected to your ISP supports DHCP or you should be ready for Mobile Broadband However, if you... to learn about the web-based utility. Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will see a similar screen.) Enter admin (the default) in the Address field. The web-based utility has these main tabs: Setup, Wireless, Security...
User Guide
Page 16
... all points in a wireless network. Wireless-G Router for Mobile Broadband Advanced Configuration SSID Broadcast When wireless clients survey the local area for Wi-Fi Protected Setup, which is the network name shared among all points in your network, keep the default, Mixed. To broadcast the Router's SSID, keep the default, Disabled. There are six wireless security mode options supported...
... all points in a wireless network. Wireless-G Router for Mobile Broadband Advanced Configuration SSID Broadcast When wireless clients survey the local area for Wi-Fi Protected Setup, which is the network name shared among all points in your network, keep the default, Mixed. To broadcast the Router's SSID, keep the default, Disabled. There are six wireless security mode options supported...
User Guide
Page 17
... is 1812. Shared Secret Enter the key shared between the Router and the server. Key Renewal Enter a Key Renewal period, which instructs the Router how often it should change the encryption keys. Select the type of algorithm, AES or AES or TKIP. Wireless-G Router for Mobile Broadband Security Mode > WPA2 Enterprise Encryption WPA2 supports two encryption methods...
... is 1812. Shared Secret Enter the key shared between the Router and the server. Key Renewal Enter a Key Renewal period, which instructs the Router how often it should change the encryption keys. Select the type of algorithm, AES or AES or TKIP. Wireless-G Router for Mobile Broadband Security Mode > WPA2 Enterprise Encryption WPA2 supports two encryption methods...
User Guide
Page 18
...default is 1812. Security Mode > WEP Encryption Select a level of WEP encryption, 40/64 bits (10 hex digits) or 104/128 bits (26 hex digits). Then click Generate. Then click Generate. Wireless-G Router for Mobile Broadband 17 Wireless > Wireless MAC Filter Wireless access can be... filtered by using WEP encryption, always remember that each device in your wireless network MUST use the same WEP encryption method and ...
...default is 1812. Security Mode > WEP Encryption Select a level of WEP encryption, 40/64 bits (10 hex digits) or 104/128 bits (26 hex digits). Then click Generate. Then click Generate. Wireless-G Router for Mobile Broadband 17 Wireless > Wireless MAC Filter Wireless access can be... filtered by using WEP encryption, always remember that each device in your wireless network MUST use the same WEP encryption method and ...
User Guide
Page 20
...will automatically select the best rate for Mobile Broadband Advanced Configuration RTS Threshold Should you can select Auto to configure a firewall that it should remain at all wireless rates. Wireless-G Router for transmission. After receiving an RTS, the wireless station responds with a DTIM Interval value... can transmit at the same time. If a network packet is recommended. Security > Firewall Firewall SPI Firewall Protection To use with heavy 802.11b traffic. When the Router has buffered broadcast or multicast messages for associated clients, it more difficult for...
...will automatically select the best rate for Mobile Broadband Advanced Configuration RTS Threshold Should you can select Auto to configure a firewall that it should remain at all wireless rates. Wireless-G Router for transmission. After receiving an RTS, the wireless station responds with a DTIM Interval value... can transmit at the same time. If a network packet is recommended. Security > Firewall Firewall SPI Firewall Protection To use with heavy 802.11b traffic. When the Router has buffered broadcast or multicast messages for associated clients, it more difficult for...
User Guide
Page 21
...to implement secure exchange of your local network. Deselect the feature to allow IPSec tunnels to cancel your changes. Click Save Settings to apply your changes, or click Cancel Changes to pass through the Router, keep the default, Enabled. Wireless-G Router for websites....The policies are listed with them. ActiveX ActiveX is a programming language for Mobile Broadband Access Restrictions > Internet Access Internet Access Policy Access Policy Access can be tunneled through the Router's firewall. Cookies A cookie is selected by devices outside of packets at...
...to implement secure exchange of your local network. Deselect the feature to allow IPSec tunnels to cancel your changes. Click Save Settings to apply your changes, or click Cancel Changes to pass through the Router, keep the default, Enabled. Wireless-G Router for websites....The policies are listed with them. ActiveX ActiveX is a programming language for Mobile Broadband Access Restrictions > Internet Access Internet Access Policy Access Policy Access can be tunneled through the Router's firewall. Cookies A cookie is selected by devices outside of packets at...
User Guide
Page 24
...Check with the Internet application documentation for Mobile Broadband Advanced Configuration Applications and Gaming > DMZ DMZ Any PC whose port is pulled back to the proper computer by MAC address, select MAC Address and enter the MAC address in the field provided. Wireless-G Router for the port number(s) needed .... Forwarding feature is more secure because it because its IP address may change when using the DHCP function. To retrieve the most up-to cancel your changes. The IP address of the computer that when the requested data returns through the Router, the data is being...
...Check with the Internet application documentation for Mobile Broadband Advanced Configuration Applications and Gaming > DMZ DMZ Any PC whose port is pulled back to the proper computer by MAC address, select MAC Address and enter the MAC address in the field provided. Wireless-G Router for the port number(s) needed .... Forwarding feature is more secure because it because its IP address may change when using the DHCP function. To retrieve the most up-to cancel your changes. The IP address of the computer that when the requested data returns through the Router, the data is being...
User Guide
Page 26
.... Your new entry will appear in the Summary list. The default is the default. 25 Router Password Enter a new password for access and security. Web Access Web Utility Access HTTP (HyperText Transport Protocol) is the communications protocol used to ...the Summary list. Priority This column displays the bandwidth priority of your device. Wireless-G Router for Mobile Broadband Administration > Management Management Router Access To ensure the Router's security, you have created for higher security. HTTPS uses SSL (Secured Socket Layer) to save your voice device.
.... Your new entry will appear in the Summary list. The default is the default. 25 Router Password Enter a new password for access and security. Web Access Web Utility Access HTTP (HyperText Transport Protocol) is the communications protocol used to ...the Summary list. Priority This column displays the bandwidth priority of your device. Wireless-G Router for Mobile Broadband Administration > Management Management Router Access To ensure the Router's security, you have created for higher security. HTTPS uses SSL (Secured Socket Layer) to save your voice device.
User Guide
Page 27
...SSL (Secured Socket Layer) to view temporary logs. Allowed Remote IP Address If you want to the utility. Enter the Router's specific Internet IP address in place of , and enter the Remote Management Port number in place of the Router, from any and all traffic for Mobile Broadband Advanced ... UPnP If you want to be able to make manual changes to the Router while using the Router in a remote location and wish to prohibit any external IP address, select Any IP Address. Wireless-G Router for your changes, or click Cancel Changes to specify an external IP address ...
...SSL (Secured Socket Layer) to view temporary logs. Allowed Remote IP Address If you want to the utility. Enter the Router's specific Internet IP address in place of , and enter the Remote Management Port number in place of the Router, from any and all traffic for Mobile Broadband Advanced ... UPnP If you want to be able to make manual changes to the Router while using the Router in a remote location and wish to prohibit any external IP address, select Any IP Address. Wireless-G Router for your changes, or click Cancel Changes to specify an external IP address ...
User Guide
Page 28
... default settings. Administration > Diagnostics Diagnostics Ping Test The Ping test checks the status of a connection. Wireless-G Router for the incoming Internet traffic. The DHCP Client Log will show if the test was successful. Advanced Configuration...Security Log, or DHCP Client Log. • Log The Incoming Log will display a temporary log of the source IP addresses and destination port numbers for Mobile Broadband Diagnostics > Traceroute Administration > Factory Defaults The Administration > Factory Defaults screen allows you are having difficulties with the Router...
... default settings. Administration > Diagnostics Diagnostics Ping Test The Ping test checks the status of a connection. Wireless-G Router for the incoming Internet traffic. The DHCP Client Log will show if the test was successful. Advanced Configuration...Security Log, or DHCP Client Log. • Log The Incoming Log will display a temporary log of the source IP addresses and destination port numbers for Mobile Broadband Diagnostics > Traceroute Administration > Factory Defaults The Administration > Factory Defaults screen allows you are having difficulties with the Router...
User Guide
Page 31
... be sorted by the network is displayed. Advanced Configuration Status > Wireless Network Wireless Network MAC Address The MAC address of the SSID Broadcast feature is displayed. Wireless-G Router for Mobile Broadband 30 Security The wireless security method used by the Router is displayed. Standard Channel The channel used by the Router is displayed. To retrieve the most up-todate information, click...
... be sorted by the network is displayed. Advanced Configuration Status > Wireless Network Wireless Network MAC Address The MAC address of the SSID Broadcast feature is displayed. Wireless-G Router for Mobile Broadband 30 Security The wireless security method used by the Router is displayed. Standard Channel The channel used by the Router is displayed. To retrieve the most up-todate information, click...
User Guide
Page 32
... button on the Setup CD-ROM. If this is admin). On the first screen you have enabled wireless security, then make sure the same security method and key are similar for Mobile Broadband 31 If this is the same on the Router. Open the web browser. 2. Enter the Router's IP address in the following steps (these instructions.
... button on the Setup CD-ROM. If this is admin). On the first screen you have enabled wireless security, then make sure the same security method and key are similar for Mobile Broadband 31 If this is the same on the Router. Open the web browser. 2. Enter the Router's IP address in the following steps (these instructions.
User Guide
Page 34
Appendix B Appendix B: Specifications Model Number WRT54G3GV2-ST Standards IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.11b Ports Internet, Ethernet (4), PC Card, USB 2.0 (3), Power, and Antenna (SMA) Button Mobile Connect/Disconnect, Reset LEDs Power, Ethernet (1-4), Wireless, Modem Internet, Mobile Internet Cabling Type UTP CAT 5 # of Antennas 1 Detachable (Y/N) ... Humidity 10 to 85%, Relative Humidity, Noncondensing Storage Humidity 5 to 90% Noncondensing Specifications are subject to change without notice. Wireless-G Router for Mobile Broadband Specifications 33
Appendix B Appendix B: Specifications Model Number WRT54G3GV2-ST Standards IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.11b Ports Internet, Ethernet (4), PC Card, USB 2.0 (3), Power, and Antenna (SMA) Button Mobile Connect/Disconnect, Reset LEDs Power, Ethernet (1-4), Wireless, Modem Internet, Mobile Internet Cabling Type UTP CAT 5 # of Antennas 1 Detachable (Y/N) ... Humidity 10 to 85%, Relative Humidity, Noncondensing Storage Humidity 5 to 90% Noncondensing Specifications are subject to change without notice. Wireless-G Router for Mobile Broadband Specifications 33
User Guide
Page 44
... Floor, Boston, MA 02110-1301, USA Everyone is intended to serious security threats and/or some features within your Linksys product and/or Software may not apply to non-governmental customers. Software ...OR RELATED TO THE USE OF OR INABILITY TO USE THE Wireless-G Router for most software are designed to take away your Linksys product and/or the Software. Software, including technical data, ... for such source code are from Linksys if You fail to U.S. Preamble The licenses for Mobile Broadband Software License Agreement SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF...
... Floor, Boston, MA 02110-1301, USA Everyone is intended to serious security threats and/or some features within your Linksys product and/or Software may not apply to non-governmental customers. Software ...OR RELATED TO THE USE OF OR INABILITY TO USE THE Wireless-G Router for most software are designed to take away your Linksys product and/or the Software. Software, including technical data, ... for such source code are from Linksys if You fail to U.S. Preamble The licenses for Mobile Broadband Software License Agreement SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF...