User Guide
Page 2
...allow you to enter the web address without including http:// in front of their respective holders. and certain other countries. Wireless-G Broadband Router About This Guide i Some older web browsers may see various icons that call attention to specific items. Below is ... special attention to while using the product. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is something that could damage your property or product. WEB...
...allow you to enter the web address without including http:// in front of their respective holders. and certain other countries. Wireless-G Broadband Router About This Guide i Some older web browsers may see various icons that call attention to specific items. Below is ... special attention to while using the product. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is something that could damage your property or product. WEB...
User Guide
Page 3
...Setup 4 Setup > DDNS 7 Setup > MAC Address Clone 8 Setup > Advanced Routing 9 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless Settings 14 Security > Firewall 15 Firewall 15 Security > VPN Passthrough 15 Access Restrictions > ... Firmware 21 Administration > Config Management 21 Status > Router 22 Status > Local Network 22 Status > Wireless 23 Appendix A: Troubleshooting 24 Appendix B: Specifications 25 Appendix C: Warranty Information 26 Limited Warranty 26 Wireless-G Broadband Router ii
...Setup 4 Setup > DDNS 7 Setup > MAC Address Clone 8 Setup > Advanced Routing 9 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 11 Wireless > Wireless MAC Filter 13 Wireless > Advanced Wireless Settings 14 Security > Firewall 15 Firewall 15 Security > VPN Passthrough 15 Access Restrictions > ... Firmware 21 Administration > Config Management 21 Status > Router 22 Status > Local Network 22 Status > Wireless 23 Appendix A: Troubleshooting 24 Appendix B: Specifications 25 Appendix C: Warranty Information 26 Limited Warranty 26 Wireless-G Broadband Router ii
User Guide
Page 4
Table of Contents Appendix D: Regulatory Information 28 FCC Statement 28 FCC Radiation Exposure Statement 28 Safety Notices 28 Industry Canada Statement 28 Avis d'Industrie Canada 29 Wireless Disclaimer 29 Avis de non-responsabilité concernant les appareils sans fil 29 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 30 Appendix E: Software License Agreement 34 Software in Linksys Products 34 Software Licenses 34 Wireless-G Broadband Router iii
Table of Contents Appendix D: Regulatory Information 28 FCC Statement 28 FCC Radiation Exposure Statement 28 Safety Notices 28 Industry Canada Statement 28 Avis d'Industrie Canada 29 Wireless Disclaimer 29 Avis de non-responsabilité concernant les appareils sans fil 29 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 30 Appendix E: Software License Agreement 34 Software in Linksys Products 34 Software Licenses 34 Wireless-G Broadband Router iii
User Guide
Page 5
... one session at a time. The second way is where you have client devices, such as wireless adapters, that port. A variety of security features help to reset the Router's factory defaults. The LED flashes green for choosing the Linksys Wireless-G Broadband Router. Placement Positions There are two ways to protect your data and your wired network and...
... one session at a time. The second way is where you have client devices, such as wireless adapters, that port. A variety of security features help to reset the Router's factory defaults. The LED flashes green for choosing the Linksys Wireless-G Broadband Router. Placement Positions There are two ways to protect your data and your wired network and...
User Guide
Page 6
...sure the holes are needed to mount the Router. Two screws are 152 mm (6 inches) apart. 3. Wall Mounting Template Wireless-G Broadband Router 2 Insert a screw into each hole and leave 3 mm (0.12 inches) of an electrical outlet. 2. NOTE: Linksys is 152 mm (6 inches). Place the wall...-mount slots over the screws and slide the Router down until the screws fit snugly into...
...sure the holes are needed to mount the Router. Two screws are 152 mm (6 inches) apart. 3. Wall Mounting Template Wireless-G Broadband Router 2 Insert a screw into each hole and leave 3 mm (0.12 inches) of an electrical outlet. 2. NOTE: Linksys is 152 mm (6 inches). Place the wall...-mount slots over the screws and slide the Router down until the screws fit snugly into...
User Guide
Page 7
Linksys wireless products use them at least eight characters in length. Wireless-G Broadband Router Wireless Security Checklist 4. A network encrypted with WPA/WPA2 is more secure than a traditional wired network. Combine letters and numbers to 32 characters in length. This is provided solely for wireless networks. 2. Change the default password For wireless products such as it can specify the MAC...
Linksys wireless products use them at least eight characters in length. Wireless-G Broadband Router Wireless Security Checklist 4. A network encrypted with WPA/WPA2 is more secure than a traditional wired network. Combine letters and numbers to 32 characters in length. This is provided solely for wireless networks. 2. Change the default password For wireless products such as it can specify the MAC...
User Guide
Page 8
... •• Telstra Cable Automatic Configuration - The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. NOTE: When first installing the Router, you to Automatic Configuration - Password Screen Wireless-G Broadband Router Advanced Configuration Setup > Basic Setup The first screen that appears is set a new password from the...
... •• Telstra Cable Automatic Configuration - The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. NOTE: When first installing the Router, you to Automatic Configuration - Password Screen Wireless-G Broadband Router Advanced Configuration Setup > Basic Setup The first screen that appears is set a new password from the...
User Guide
Page 9
... enter the number of time (Max Idle Time). Then configure the following: •• Specify an IP Address This is the Router's IP address, when seen from the Internet. If you attempt to access the Internet again. The default Redial Period is 5 minutes... Connection Type > Automatic Configuration - DHCP Static IP If you are disconnected, then the Router will provide you need to the Internet, select Static IP. Your ISP will have elapsed Wireless-G Broadband Router Advanced Configuration before your ISP to the Internet through a dynamic IP address, then select Obtain...
... enter the number of time (Max Idle Time). Then configure the following: •• Specify an IP Address This is the Router's IP address, when seen from the Internet. If you attempt to access the Internet again. The default Redial Period is 5 minutes... Connection Type > Automatic Configuration - DHCP Static IP If you are disconnected, then the Router will provide you need to the Internet, select Static IP. Your ISP will have elapsed Wireless-G Broadband Router Advanced Configuration before your ISP to the Internet through a dynamic IP address, then select Obtain...
User Guide
Page 10
...attempt to check the Internet connection. If you want the Router to access the Internet again. To use this field, you want to have to check with your ISP to see if your ISP. Wireless-G Broadband Router Advanced Configuration Internet Connection Type > Telstra Cable User Name and... Password Enter the User Name and Password provided by your broadband Internet service has been configured with the IP Address you want to...
...attempt to check the Internet connection. If you want the Router to access the Internet again. To use this field, you want to have to check with your ISP to see if your ISP. Wireless-G Broadband Router Advanced Configuration Internet Connection Type > Telstra Cable User Name and... Password Enter the User Name and Password provided by your broadband Internet service has been configured with the IP Address you want to...
User Guide
Page 11
...can even automatically adjust for quicker access to use these fields. Leave this feature, keep the default setting, Auto. Because the Router's Wireless-G Broadband Router Advanced Configuration default IP address is enabled by your network. Static DNS (1-3) The Domain Name System (DNS) is 192.168.1.100...server on your network. You can be greater than 192.168.1.253. Otherwise, leave this option is performed through the Wireless tab. The Router can enter up for Internet transmission. Maximum Number of DHCP Users Enter the maximum number of time, in the MTU ...
...can even automatically adjust for quicker access to use these fields. Leave this feature, keep the default setting, Auto. Because the Router's Wireless-G Broadband Router Advanced Configuration default IP address is enabled by your network. Static DNS (1-3) The Domain Name System (DNS) is 192.168.1.100...server on your network. You can be greater than 192.168.1.253. Otherwise, leave this option is performed through the Wireless tab. The Router can enter up for Internet transmission. Maximum Number of DHCP Users Enter the maximum number of time, in the MTU ...
User Guide
Page 12
... MAC address with the MAC Address Clone feature. Status The status of two DDNS service providers, DynDNS.org or TZO.com. Internet IP Address The Router's Internet IP address is provided by DynDNS.org, then select DynDNS.org from the drop-down menu. Setup > MAC Address Clone A MAC address is ... IP address is displayed here. If you to register a MAC address in order to sign up with TZO. Wireless-G Broadband Router Setup > MAC Address Clone MAC Address Clone Enable/Disable To have currently registered with your DDNS service is displayed here. It is a 12-digit code ...
... MAC address with the MAC Address Clone feature. Status The status of two DDNS service providers, DynDNS.org or TZO.com. Internet IP Address The Router's Internet IP address is provided by DynDNS.org, then select DynDNS.org from the drop-down menu. Setup > MAC Address Clone A MAC address is ... IP address is displayed here. If you to register a MAC address in order to sign up with TZO. Wireless-G Broadband Router Setup > MAC Address Clone MAC Address Clone Enable/Disable To have currently registered with your DDNS service is displayed here. It is a 12-digit code ...
User Guide
Page 13
... Route Name Enter a name for the Route here, using . Click Save Settings to apply your local network. Static Routing sets up the Router's advanced routing functions. When Wireless-G Broadband Router Advanced Configuration Router is routed through your changes, or click Cancel Changes to open a screen displaying how data is chosen, Dynamic Routing will be available...
... Route Name Enter a name for the Route here, using . Click Save Settings to apply your local network. Static Routing sets up the Router's advanced routing functions. When Wireless-G Broadband Router Advanced Configuration Router is routed through your changes, or click Cancel Changes to open a screen displaying how data is chosen, Dynamic Routing will be available...
User Guide
Page 14
.... Basic Wireless Settings Advanced Configuration Wireless SSID Broadcast When wireless clients survey the local area for wireless networking are three methods available. If you should change the default SSID (linksys) to the "Wi-Fi Protected Setup" section. Wireless Channel Select... you can select the wireless standards running on this drop-down menu, you have Wireless-G and Wireless-B devices in a wireless network. Proceed to cancel your changes. If you can use Wi-Fi Protected Setup. Wireless-G Broadband Router Wireless > Basic Wireless Settings (Wi-Fi Protected...
.... Basic Wireless Settings Advanced Configuration Wireless SSID Broadcast When wireless clients survey the local area for wireless networking are three methods available. If you should change the default SSID (linksys) to the "Wi-Fi Protected Setup" section. Wireless Channel Select... you can select the wireless standards running on this drop-down menu, you have Wireless-G and Wireless-B devices in a wireless network. Proceed to cancel your changes. If you can use Wi-Fi Protected Setup. Wireless-G Broadband Router Wireless > Basic Wireless Settings (Wi-Fi Protected...
User Guide
Page 15
... listed on the label on this screen. 2. Then refer back to the Router.) 11 NOTE: If you are six wireless security mode options supported by the Router and your wireless network. WPA Personal NOTE: If you have 8-63 characters. The default Group...Chapter 3 Method #1 Use this screen. 3. WEP stands for Wired Equivalent Privacy, and RADIUS stands for further instructions. Wireless-G Broadband Router Advanced Configuration Wireless Security Security Mode Select the security method for your client device or its documentation for Remote Authentication Dial-In User Service.)...
... listed on the label on this screen. 2. Then refer back to the Router.) 11 NOTE: If you are six wireless security mode options supported by the Router and your wireless network. WPA Personal NOTE: If you have 8-63 characters. The default Group...Chapter 3 Method #1 Use this screen. 3. WEP stands for Wired Equivalent Privacy, and RADIUS stands for further instructions. Wireless-G Broadband Router Advanced Configuration Wireless Security Security Mode Select the security method for your client device or its documentation for Remote Authentication Dial-In User Service.)...
User Guide
Page 16
... Address Enter the IP Address of 8-63 characters. RADIUS Port Enter the port number of algorithm, AES, or TKIP + AES. Wireless-G Broadband Router Security Mode > WPA2 Enterprise WPA Algorithm WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. Key Renewal Timeout ...Enter a Key Renewal Timeout period, which instructs the Router how often it should change the encryption keys. The default selection is 3600 seconds. WPA2 Personal Security Mode > WPA2 Personal WPA...
... Address Enter the IP Address of 8-63 characters. RADIUS Port Enter the port number of algorithm, AES, or TKIP + AES. Wireless-G Broadband Router Security Mode > WPA2 Enterprise WPA Algorithm WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. Key Renewal Timeout ...Enter a Key Renewal Timeout period, which instructs the Router how often it should change the encryption keys. The default selection is 3600 seconds. WPA2 Personal Security Mode > WPA2 Personal WPA...
User Guide
Page 17
...Shared Key Enter the key shared between the Router and the server. Key 1-4 If you are using the MAC addresses of the wireless devices transmitting within your network's radius. Wireless > Wireless MAC Filter Wireless MAC Filter Wireless MAC Filter To filter wireless users by MAC Address. This button is ... 26 hex digits. The default value is 64 bits 10 hex digits. WEP Encryption Select a level of the RADIUS server. Wireless-G Broadband Router Security Mode > WEP Default Transmit Key Select a Default Transmit Key (choose which Key to filter users by using WEP encryption,...
...Shared Key Enter the key shared between the Router and the server. Key 1-4 If you are using the MAC addresses of the wireless devices transmitting within your network's radius. Wireless > Wireless MAC Filter Wireless MAC Filter Wireless MAC Filter To filter wireless users by MAC Address. This button is ... 26 hex digits. The default value is 64 bits 10 hex digits. WEP Encryption Select a level of the RADIUS server. Wireless-G Broadband Router Security Mode > WEP Default Transmit Key Select a Default Transmit Key (choose which Key to filter users by using WEP encryption,...
User Guide
Page 18
... a countdown field informing clients of data transmission, configure the Transmission Rate setting. Its clients 14 Wireless > Advanced Wireless Settings Wireless-G Broadband Router Advanced Configuration Advanced Wireless Authentication Type The default is used . The Router will advertise its Basic Rate to the other wireless devices in an environment with your network, so they know which rates will negotiate the...
... a countdown field informing clients of data transmission, configure the Transmission Rate setting. Its clients 14 Wireless > Advanced Wireless Settings Wireless-G Broadband Router Advanced Configuration Advanced Wireless Authentication Type The default is used . The Router will advertise its Basic Rate to the other wireless devices in an environment with your network, so they know which rates will negotiate the...
User Guide
Page 19
...default selection, Enable. Security > VPN Passthrough The Security > VPN Passthrough screen allows you may result in poor network performance. Wireless-G Broadband Router Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is recommended. Chapter 3 hear the beacons and ... to Send (RTS) frames to local servers from being scanned by default. AP Isolation This isolates all wireless clients and wireless devices on the Router's local network. AP Isolation is smaller than the preset RTS threshold size, the RTS/CTS mechanism will ...
...default selection, Enable. Security > VPN Passthrough The Security > VPN Passthrough screen allows you may result in poor network performance. Wireless-G Broadband Router Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is recommended. Chapter 3 hear the beacons and ... to Send (RTS) frames to local servers from being scanned by default. AP Isolation This isolates all wireless clients and wireless devices on the Router's local network. AP Isolation is smaller than the preset RTS threshold size, the RTS/CTS mechanism will ...
User Guide
Page 20
.... You can be in the field provided. 4. Click Save Settings to save the policy's settings, or click Cancel Changes to pass through the Router, keep the default, Enable. Access Restrictions > Internet Access Internet Access Internet Access Policy Access can also enter a range of ports you listed on...the policy's settings. To allow Internet access for the PCs you want to the Internet Access tab, click Close.) Internet Policy Summary Wireless-G Broadband Router List of PCs screen appears. To return to edit a service's settings, then click Add/Edit Service.
.... You can be in the field provided. 4. Click Save Settings to save the policy's settings, or click Cancel Changes to pass through the Router, keep the default, Enable. Access Restrictions > Internet Access Internet Access Internet Access Policy Access can also enter a range of ports you listed on...the policy's settings. To allow Internet access for the PCs you want to the Internet Access tab, click Close.) Internet Policy Summary Wireless-G Broadband Router List of PCs screen appears. To return to edit a service's settings, then click Add/Edit Service.
User Guide
Page 21
...Name field. Each name can be up public services on your changes, or click Cancel Changes to the Access Restrictions screen, click Close. Wireless-G Broadband Router 17 To modify a service, select it from the list on the right. Then click Modify. When you want to block websites using... the name you want to give the application. Applications & Gaming > Port Triggering The Applications & Gaming > Port Triggering screen allows the Router to Website Blocking by way of the PC running the specific application. Then click Delete. To close the Port Services screen and return to...
...Name field. Each name can be up public services on your changes, or click Cancel Changes to the Access Restrictions screen, click Close. Wireless-G Broadband Router 17 To modify a service, select it from the list on the right. Then click Modify. When you want to block websites using... the name you want to give the application. Applications & Gaming > Port Triggering The Applications & Gaming > Port Triggering screen allows the Router to Website Blocking by way of the PC running the specific application. Then click Delete. To close the Port Services screen and return to...