Linksys WRT54G User Manual

Linksys WRT54G User Manual

Wireless-g broadband router
Hide thumbs Also See for WRT54G:
Table of Contents

Advertisement

Quick Links

®
A Division of Cisco Systems, Inc.
2.4
GHz
Wireless-G
802.11g
User Guide
Broadband Router
WIRELESS
WRT54G
Model No.

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WRT54G

  • Page 1 ® A Division of Cisco Systems, Inc. Wireless-G 802.11g User Guide Broadband Router WIRELESS WRT54G Model No.
  • Page 2 Wireless-G Broadband Router Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2005 Cisco Systems, Inc. All rights reserved.
  • Page 3: Table Of Contents

    Wireless-G Broadband Router Table of Contents Chapter 1: Introduction Welcome What’s in this User Guide? Chapter 2: Planning Your Wireless Network Network Topology Ad-Hoc versus Infrastructure Mode Network Layout Chapter 3: Getting to Know the Wireless-G Broadband Router The Back Panel The Front Panel Chapter 4: Connecting the Wireless-G Broadband Router Overview...
  • Page 4 Wireless-G Broadband Router The Applications & Gaming Tab - Port Triggering The Applications and Gaming Tab - DMZ The Applications and Gaming Tab - QoS The Administration Tab - Management The Administration Tab - Log The Administration Tab - Diagnostics The Administration Tab - Factory Defaults The Administration Tab - Firmware Upgrade The Administration Tab - Config Management...
  • Page 5 Wireless-G Broadband Router List of Figures Figure 3-1: The Router’s Back Panel Figure 3-2: The Router’s Front Panel Figure 4-1: Connecting Your Internet Connection Figure 4-2: Connecting Your Network Devices Figure 4-3: Connecting the Power Figure 4-4: Diagram for Connection to Another Router Figure 4-5: Connecting Another Router Figure 4-6: Connecting Your Network Devices Figure 4-7: Connecting the Power...
  • Page 6 Wireless-G Broadband Router Figure 5-23: Setup Wizard’s Configure Wireless Settings Screen Figure 5-24: Setup Wizard’s Confirm New Settings Screen Figure 5-25: Setup Wizard’s Safe Surfing Screen Figure 5-26: Setup Wizard’s Congratulations Screen Figure 5-27: Setup Wizard’s Configure Wireless Settings Screen Figure 5-28: Setup Wizard’s Wireless Settings Screen Figure 5-29: Setup Wizard’s Wireless Security - WPA-PSK Screen Figure 5-30: Setup Wizard’s Wireless Security - WEP (64-Bit) Screen...
  • Page 7 Wireless-G Broadband Router Figure 6-19: Wireless Tab - Wireless Security (WPA2 Personal) Figure 6-20: Wireless Tab - Wireless Security (WPA2 Enterprise) Figure 6-21: Wireless Tab - Wireless Security (RADIUS) Figure 6-22: Wireless Tab - Wireless Security (WEP) Figure 6-23: Wireless Tab - Wireless MAC Filter Figure 6-24: MAC Address Filter List Figure 6-25: Wireless Tab - Advanced Wireless Settings Figure 6-26: Security Tab - Firewall...
  • Page 8 Wireless-G Broadband Router Figure E-5: MAC Address Clone...
  • Page 9: Chapter 1: Introduction Welcome

    Linksys recommends using the Setup CD-ROM for first-time installation of the Router. If you do not wish to run the Setup Wizard on the Setup CD-ROM, then use the instructions in this Guide to help you connect the Wireless-G Broadband Router, set it up, and configure it to bridge your different networks.
  • Page 10: What's In This User Guide

    Wireless-G Broadband Router What’s in this User Guide? This user guide covers the steps for setting up and using the Wireless-G Broadband Router. • Chapter 1: Introduction This chapter describes the Router’s applications and this User Guide. • Chapter 2: Planning Your Wireless Network This chapter describes the basics of wireless networking.
  • Page 11 • Appendix I: Regulatory Information This appendix supplies the regulatory information regarding the Router. • Appendix J: Contact Information This appendix provides contact information for a variety of Linksys resources, including Technical Support. Chapter 1: Introduction What’s in this User Guide?
  • Page 12: Chapter 2: Planning Your Wireless Network

    Wireless-G Broadband Router Chapter 2: Planning Your Wireless Network Network Topology A wireless local area network (WLAN) is exactly like a regular local area network (LAN), except that each computer in the WLAN uses a wireless device to connect to the network. Computers in a WLAN share the same frequency channel and SSID, which is an identification name shared by the wireless devices belonging to the ssid (service set identifier): your wireless network’s name.
  • Page 13 Linksys's switches (such as the SD205 or SD208). With these, and many other, Linksys products, your networking options are limitless. Go to the Linksys website at www.linksys.com for more information about products that work with the Wireless-G Broadband Router.
  • Page 14: Chapter 3: Getting To Know The Wireless-G Broadband Router

    Wireless-G Broadband Router Chapter 3: Getting to Know the Wireless-G Broadband Router The Back Panel The Router's ports, where the cables are connected, are located on the back panel. IMPORTANT: Resetting the Router will erase all of your settings (Internet connection, Figure 3-1: The Router’s Back Panel wireless security, and other settings) and replace them with the factory defaults.
  • Page 15: The Front Panel

    Wireless-G Broadband Router The Front Panel The Router’s SecureEasySetup button (the Cisco logo) and LEDs are located on the front panel. Figure 3-2: The Router’s Front Panel NOTE: SecureEasySetup is a feature that makes it (Cisco logo) Orange/White. The Cisco logo is the Router’s SecureEasySetup button. It lights up and will stay easy to set up your wireless network.
  • Page 16: Chapter 4: Connecting The Wireless-G Broadband Router

    Wireless-G Broadband Router Chapter 4: Connecting the Wireless-G Broadband Router Overview This chapter includes two sets of instructions. If the Wireless-G Broadband Router will be the only router in your network, follow the instructions in “Hardware Installation for Connection to Your Broadband Modem.” If you want to install the Wireless-G Broadband Router behind another router in your network, then follow the instructions in “Hardware Installation for Connection to Another Router.”...
  • Page 17: Figure 4-2: Connecting Your Network Devices

    Wireless-G Broadband Router 5. Connect your network PCs or Ethernet devices to the Router’s numbered ports using standard Ethernet network cabling. Figure 4-2: Connecting Your Network Devices 6. Connect the AC power adapter to the Router's Power port and the other end into an electrical outlet. Only use the power adapter supplied with the Router.
  • Page 18: Hardware Installation For Connection To Another Router

    IP address, then you may not be able to set up the Router. NOTE: Steps 1-4 are instructions for a typical Linksys router; however, if you are using a non- First, make sure the Router is NOT connected to your network. Then follow these instructions: Linksys router, refer to the other router’s...
  • Page 19: Figure 4-6: Connecting Your Network Devices

    Wireless-G Broadband Router 9. Decide which network computers or Ethernet devices you want to connect to the Router. Disconnect the selected computers or devices from the other router, and then connect them to the Router’s numbered ports using standard Ethernet network cabling. Figure 4-6: Connecting Your Network Devices 10.
  • Page 20: Chapter 5: Setting Up The Wireless-G Broadband Router

    Wireless-G Broadband Router Chapter 5: Setting up the Wireless-G Broadband Router Overview The Wireless-G Broadband Router Setup Wizard will guide you through the installation procedure. It will go through the instructions for configuring the Router’s network and wireless settings. Using the Setup Wizard 1.
  • Page 21: Figure 5-3: Setup Wizard's License Agreement Screen

    Wireless-G Broadband Router 4. After reading the License Agreement, click the Next button if you accept, or click the Cancel button to end the installation. Figure 5-3: Setup Wizard’s License Agreement Screen 5. The Setup Wizard will ask you to disconnect your broadband modem from your PC. After you have done so, click the Next button.
  • Page 22: Figure 5-5: Setup Wizard's Connect The Modem To The Router Screen

    Wireless-G Broadband Router 6. The Setup Wizard will ask you to connect your broadband modem to the Router. After you have done so, click the Next button. Figure 5-5: Setup Wizard’s Connect the Modem to the Router Screen 7. The Setup Wizard will ask you to connect a network cable to your PC. After you have done so, click the Next button.
  • Page 23: Figure 5-7: Setup Wizard's Connect The Network Cable To The Router Screen

    Wireless-G Broadband Router 8. The Setup Wizard will ask you to connect the other end of the network cable to the Router. Then you can also connect additional PCs to the Router. After you have done so, click the Next button. Figure 5-7: Setup Wizard’s Connect the Network Cable to the Router Screen 9.
  • Page 24: Figure 5-9: Setup Wizard's Check The Router's Status Screen

    Wireless-G Broadband Router 10. Make sure the Router’s Power, Internet, and numbered LEDs (depending on the number of PCs connected) are lit on its front panel. After you have done so, click the Next button. Figure 5-9: Setup Wizard’s Check the Router’s Status Screen 11.
  • Page 25: Figure 5-11: Setup Wizard's Configure Dsl (Pppoe) Settings Screen

    Wireless-G Broadband Router DSL (PPPoE) User Name - Enter the User Name provided by your ISP. Password - Enter the Password provided by your ISP. Confirm - To confirm the Password, enter it again in this field. Keep Alive - If you want the Router to periodically check your Internet connection, select Keep Alive. Then specify how often you want the Router to check the Internet connection.
  • Page 26: Figure 5-13: Setup Wizard's Advanced Internet Settings - Pptp Screen

    Wireless-G Broadband Router PPTP Connection - PPTP (Point-to-Point Tunneling Protocol) service is used in Europe only. If you are using a PPTP connection, select PPTP from the drop-down menu. User Name - Enter the User Name provided by your ISP. Password - Enter the Password provided by your ISP.
  • Page 27: Figure 5-15: Setup Wizard's Advanced Internet Settings - L2Tp Screen

    Wireless-G Broadband Router L2TP Connection - If you are using an L2TP (Layer 2 Tunneling Protocol) connection, select L2TP from the drop- down menu. User Name - Enter the User Name provided by your ISP. Password - Enter the Password provided by your ISP. Confirm - To confirm the Password, enter it again in this field.
  • Page 28: Figure 5-16: Setup Wizard's Advanced Internet Settings - Telstra Screen

    Wireless-G Broadband Router Telstra Connection - Telstra is a service used in Australia only. If you are using this service, select Telstra from the drop-down menu. User Name - Enter the User Name provided by your ISP. Password - Enter the Password provided by your ISP. Confirm - To confirm the Password, enter it again in this field.
  • Page 29: Figure 5-17: Setup Wizard's Set The Router's Password Screen

    Wireless-G Broadband Router 12. The Router provides a Web-based Utility you can use for configuring the Router from any networked PC. Password - Enter a password that will control access to the Utility. Confirm - Enter the password again in the Confirm field. Click the Next button to continue or the Back button to return to the previous screen.
  • Page 30: Figure 5-19: Setup Wizard's Secureeasysetup Screen

    Wireless-G Broadband Router Using the Router’s SecureEasySetup Feature Read these instructions before you press any SecureEasySetup buttons. You should locate the SecureEasySetup buttons of your devices before using the Router’s SecureEasySetup feature. NOTE: SecureEasySetup uses WPA-Personal encryption. If your current wireless devices do not support WPA-Personal security, then you cannot use SecureEasySetup on your network.
  • Page 31: Figure 5-23: Setup Wizard's Configure Wireless Settings Screen

    Wireless-G Broadband Router 2. Press the Router’s orange Cisco logo on its front panel. When the logo turns white and begins to flash, press the SecureEasySetup button on another device. The Router’s Cisco logo will stop flashing when the device has been added to the network.
  • Page 32: Figure 5-25: Setup Wizard's Safe Surfing Screen

    Wireless-G Broadband Router 4. After the settings have been saved, the Safe Surfing screen will appear. Click the Norton Internet Security Suite button to install the special edition of Norton Internet Security on your computer, or click the Finish button to complete the Setup Wizard. Figure 5-25: Setup Wizard’s Safe Surfing Screen 5.
  • Page 33: Figure 5-27: Setup Wizard's Configure Wireless Settings Screen

    In the SSID field, enter the name of your wireless network. The SSID must be identical for all devices in the network. The default setting is linksys (all lowercase). NOTE: An SSID is the network name shared by all devices in a wireless network. Your network’s SSID should be unique to your network and identical for all devices within the network.
  • Page 34: Figure 5-29: Setup Wizard's Wireless Security - Wpa-Psk Screen

    Wireless-G Broadband Router 3. Select the method of security you want to use: WPA-PSK (also called WPA-Personal), WEP (64-Bit), or WEP (128-Bit). WPA stands for Wi-Fi Protected Access, and WEP stands for Wired Equivalent Privacy. WPA is a stronger security method than WEP. Proceed to the appropriate section for your security method. If you want to use WPA-RADIUS (also called WPA-Enterprise), then you should select Disabled and use the Router’s Web-based Utility to configure your wireless security settings.
  • Page 35: Figure 5-30: Setup Wizard's Wireless Security - Wep (64-Bit) Screen

    16 alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - The WEP key you enter must match the WEP key of your wireless network.
  • Page 36: Figure 5-31: Setup Wizard's Norton Screen

    Wireless-G Broadband Router 5. After the settings have been saved, the Safe Surfing screen will appear. Click the Norton Internet Security Suite button to install the special edition of Norton Internet Security on your computer, or click the Finish button to complete the Setup Wizard. Figure 5-31: Setup Wizard’s Norton Screen 6.
  • Page 37: Using Secureeasysetup To Configure Your Notebook

    Wireless-G Broadband Router Using SecureEasySetup to Configure Your Notebook This section explains how to use SecureEasySetup if you have a computer displaying the SecureEasySetup logo. NOTE: SecureEasySetup uses WPA-Personal encryption. If your current wireless devices do not support WPA-Personal security, then you cannot use SecureEasySetup on your network. You will need to manually configure your network security using the encryption supported by your existing devices.
  • Page 38: Figure 5-36: Configure Wireless Settings #1 Screen

    Wireless-G Broadband Router 2. The next screen will tell you to press the lighted Cisco logo on the Router. After you have pressed the logo, click the Next button to continue. To exit the Wireless Setup Wizard, click the Exit button. If you need more information, click the Help button. Figure 5-36: Configure Wireless Settings #1 Screen 3.
  • Page 39: Figure 5-38: Your Wireless Settings Screen

    Wireless-G Broadband Router 4. The Your Wireless Settings screen will appear when the wireless settings have been configured. To save your configuration settings to a text file on your computer, click the Save button. To print your configuration settings, click the Print button. (You may need these settings so you can manually configure any non- SecureEasySetup devices you may have.) To exit the Wireless Setup Wizard, click the Exit button.
  • Page 40: Chapter 6: Configuring The Wireless-G Broadband Router

    Overview NOTE: For first-time installation, Linksys Linksys recommends using the Setup CD-ROM for first-time installation of the Router. If you do not wish to run recommends using the Setup Wizard on the Setup the Setup Wizard on the Setup CD-ROM, then you can use the Web-based Utility to configure the Router. For CD-ROM.
  • Page 41: The Setup Tab - Basic Setup

    Wireless-G Broadband Router The Setup Tab - Basic Setup The first screen that appears displays the Setup tab. This allows you to change the Router's general settings. Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes.
  • Page 42: Figure 6-5: Pppoe Connection Type

    Wireless-G Broadband Router • PPPoE. Some DSL-based ISPs use PPPoE (Point-to-Point Protocol over Ethernet) to establish Internet connections. If you are connected to the Internet through a DSL line, check with your ISP to see if they use PPPoE. If they do, you will have to enable PPPoE. User Name and Password.
  • Page 43: Figure 6-7: Heartbeat Signal Connection Type

    Wireless-G Broadband Router • HeartBeat Signal. HeartBeat Signal (HBS) is a service that applies to connections in Australia only. If your ISP is Telstra, then select HeartBeat Signal. User Name and Password. Enter the User Name and Password provided by your ISP. Heart Beat Server.
  • Page 44: Figure 6-9: Router Ip

    Wireless-G Broadband Router Router IP This presents both the Router’s IP Address and Subnet Mask as seen by your network. Figure 6-9: Router IP Network Address Server Settings (DHCP) The settings allow you to configure the Router’s Dynamic Host Configuration Protocol (DHCP) server function. The Router can be used as a DHCP server for your network.
  • Page 45: The Setup Tab - Ddns

    Wireless-G Broadband Router The Setup Tab - DDNS The Router offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address. It is useful when you are hosting your own website, FTP server, or other server behind the Router.
  • Page 46: The Setup Tab - Mac Address Clone

    Wireless-G Broadband Router The Setup Tab - MAC Address Clone A MAC address is a 12-digit code assigned to a unique piece of hardware for identification. Some ISPs will require you to register a MAC address in order to access the Internet. If you do not wish to re-register the MAC address with your ISP, you may assign the MAC address you have currently registered with your ISP to the Router with the MAC Address Clone feature.
  • Page 47: The Setup Tab - Advanced Routing

    Wireless-G Broadband Router The Setup Tab - Advanced Routing This tab is used to set up the Router’s advanced functions. Operating Mode allows you to select the type(s) of advanced functions you use. Dynamic Routing will automatically adjust how packets travel on your network. Static Routing sets up a fixed route to another network destination.
  • Page 48: The Wireless Tab - Basic Wireless Settings

    (use any of the characters on the keyboard). Make sure this setting is the same for all devices in your Figure 6-16: Wireless Tab - Basic Wireless Settings wireless network. For added security, you should change the default SSID (linksys) to a unique name. Wireless Channel. Select the appropriate channel from the list provided to correspond with your network settings.
  • Page 49: The Wireless Tab - Wireless Security

    Wireless-G Broadband Router The Wireless Tab - Wireless Security IMPORTANT: If you are using WPA, always remember that each device in your wireless network MUST use the same WPA method The Wireless Security settings configure the security of your wireless network. There are four wireless security and shared key, or else the network will not mode options supported by the Router: WPA Personal, WPA Enterprise, WPA2 Personal, WPA2 Enterprise, RADIUS, function properly.
  • Page 50: Figure 6-19: Wireless Tab - Wireless Security (Wpa2 Personal)

    Wireless-G Broadband Router WPA2 Personal. WPA2 gives you two encryption methods, TKIP and AES, with dynamic encryption keys. Select the type of algorithm, AES, or TKIP + AES. Enter a WPA Shared Key of 8-63 characters. Then enter a Group Key Renewal period, which instructs the Router how often it should change the encryption keys.
  • Page 51: Figure 6-21: Wireless Tab - Wireless Security (Radius)

    Wireless-G Broadband Router RADIUS. This option features WEP used in coordination with a RADIUS server. (This should only be used when a IMPORTANT: If you are using WEP encryption, always remember that each RADIUS server is connected to the Router.) First, enter the RADIUS server’s IP Address and port number, along with a key shared between the Router and the server.
  • Page 52: The Wireless Tab - Wireless Mac Filter

    Wireless-G Broadband Router The Wireless Tab - Wireless MAC Filter Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network’s radius. Wireless MAC Filter. To filter wireless users by MAC Address, either permitting or blocking access, click Enable. If you do not wish to filter users by MAC Address, select Disable.
  • Page 53: The Wireless Tab - Advanced Wireless Settings

    Wireless-G Broadband Router The Wireless Tab - Advanced Wireless Settings This tab is used to set up the Router’s advanced wireless functions. These settings should only be adjusted by an expert administrator as incorrect settings can reduce wireless performance. Authentication Type. The default is set to Auto, which allows either Open System or Shared Key authentication to be used.
  • Page 54 Wireless-G Broadband Router Fragmentation Threshold. This value specifies the maximum size for a packet before data is fragmented into multiple packets. If you experience a high packet error rate, you may slightly increase the Fragmentation Threshold. Setting the Fragmentation Threshold too low may result in poor network performance. Only minor reduction of the default value is recommended.
  • Page 55: The Security Tab - Firewall

    Wireless-G Broadband Router The Security Tab - Firewall Firewall Protection. This feature employs Stateful Packet Inspection (SPI) for a more detailed review of data packets entering your network environment. Block WAN Requests. Enable the Block WAN Request feature by checking the box beside Block Anonymous Internet Requests and you can prevent your network from being “pinged,”...
  • Page 56: The Access Restrictions Tab - Internet Access

    Wireless-G Broadband Router Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes. The Access Restrictions Tab - Internet Access The Internet Access screen allows you to block or allow specific kinds of Internet usage and traffic, such as Internet access, designated services, websites, and inbound traffic during specific days and times.
  • Page 57: Figure 6-31: Port Services

    Wireless-G Broadband Router 8. You can filter access to various services accessed over the Internet, such as FTP or telnet, by selecting services from the drop-down menus next to Blocked Services. (You can block up to 20 services.) Then enter the range of ports you want to filter. If the service you want to block is not listed or you want to edit a service’s settings, then click the Add/Edit Service button.
  • Page 58: The Applications And Gaming Tab - Port Range Forward

    Wireless-G Broadband Router 6. Click the appropriate option, Deny or Allow, depending on whether you want to block or allow network traffic. 7. Decide which days and what times you want this policy to be enforced. Select the individual days during which the policy will be in effect, or select Everyday.
  • Page 59: The Applications & Gaming Tab - Port Triggering

    Wireless-G Broadband Router The Applications & Gaming Tab - Port Triggering The Port Triggering screen allows the Router to watch outgoing data for specific port numbers. The IP address of the computer that sends the matching data is remembered by the Router, so that when the requested data returns through the Router, the data is pulled back to the proper computer by way of IP address and port mapping rules.
  • Page 60: The Applications And Gaming Tab - Dmz

    Wireless-G Broadband Router The Applications and Gaming Tab - DMZ The DMZ feature allows one network user to be exposed to the Internet for use of a special-purpose service such as Internet gaming or videoconferencing. DMZ hosting forwards all the ports at the same time to one PC. The Port Range Forward feature is more secure because it only opens the ports you want to have opened, while DMZ hosting opens all the ports of one computer, exposing the computer to the Internet.
  • Page 61 Wireless-G Broadband Router bandwidth. To use this feature, select 8M, 4M, 2M, 1M, 512K, 256K, or 128K (M stands for Mbps, while K stands for kbps). If you do not want to use this feature, keep the default, Disable. Ethernet Port Priority QoS does not require support from your ISP because the prioritized ports are LAN ports going out to your network.
  • Page 62: The Administration Tab - Management

    Wireless-G Broadband Router The Administration Tab - Management This section of the Administration tab allows the network’s administrator to manage specific Router functions for access and security. Local Router Access. You can change the Router’s password from here. Enter a new Router password and then type it again in the Re-enter to confirm field to confirm.
  • Page 63: The Administration Tab - Diagnostics

    Wireless-G Broadband Router The Administration Tab - Diagnostics The diagnostic tests (Ping and Traceroute) allow you to check the connections of your network components. Ping Test. The Ping test will check the status of a connection. Click the Ping button to open the Ping Test screen. Enter the address of the PC whose connection you wish to test and how many times you wish to test it.
  • Page 64: The Administration Tab - Factory Defaults

    Firmware can be upgraded by clicking the Upgrade button after browsing for the firmware, which you can download from the Linksys website. Do not upgrade your firmware unless you are experiencing problems with the Router. For more information about upgrading firmware, refer to “Appendix C: Upgrading Firmware”.
  • Page 65: The Status Tab - Router

    Wireless-G Broadband Router The Status Tab - Router The Router screen on the Status Tab displays the Router’s current status. Firmware Version. This is the Router’s current firmware. Current Time. This shows the time, as you set on the Setup Tab. MAC Address.
  • Page 66: The Status Tab - Local Network

    Wireless-G Broadband Router The Status Tab - Local Network The Local Network screen on the Status Tab displays the status of your network. MAC Address. This is the Router’s MAC Address, as seen on your local, Ethernet network. IP Address. This shows the Router’s IP Address, as it appears on your local, Ethernet network. Subnet Mask.
  • Page 67: The Status Tab - Wireless

    Wireless-G Broadband Router The Status Tab - Wireless The Wireless screen on the Status Tab displays the status of your wireless network. MAC Address. This is the Router’s MAC Address, as seen on your local, wireless network. Mode. As selected from the Wireless tab, this will display the wireless mode (Mixed, G-Only, or Disabled) used by the network.
  • Page 68: Appendix A: Troubleshooting

    Provided are possible solutions to problems that may occur during the installation and operation of the Router. Read the descriptions below to help you solve your problems. If you can’t find an answer here, check the Linksys website at www.linksys.com.
  • Page 69 Wireless-G Broadband Router • For Windows 2000: 1. Click Start, Settings, and Control Panel. Double-click Network and Dial-Up Connections. 2. Right-click the Local Area Connection that is associated with the Ethernet adapter you are using, and select the Properties option. 3.
  • Page 70 Wireless-G Broadband Router B Open a command prompt. For Windows 98SE and Me: • Click Start and Run. In the Open field, type command. Press the Enter key or click the OK button. For Windows 2000 and XP: • Click Start and Run. In the Open field, type cmd. Press the Enter key or click the OK button. In the command prompt, type ping 192.168.1.1 and press the Enter key.
  • Page 71 Wireless-G Broadband Router 5. I am not able to access the Setup page of the Router’s web-based utility. • Refer to “Problem #3, I want to test my Internet connection” to verify that your computer is properly connected to the Router. •...
  • Page 72 Wireless-G Broadband Router 7. I need to set up online game hosting or use other Internet applications. If you want to play online games or use Internet applications, most will work without doing any port forwarding or DMZ hosting. There may be cases when you want to host an online game or Internet application.
  • Page 73 Wireless-G Broadband Router Follow these steps to set DMZ hosting: 1. Access the Router’s web-based utility by going to http://192.168.1.1 or the IP address of the Router. Go to the Applications & Gaming => Port Range Forward tab. 2. Disable or remove the entries you have entered for forwarding. Keep this information in case you want to use it at a later time.
  • Page 74 Router to the factory default settings. In other words, the Router will revert to its original factory configuration. 12. I need to upgrade the firmware. In order to upgrade the firmware with the latest features, you need to go to the Linksys website and download the latest firmware at www.linksys.com. Follow these steps: 1.
  • Page 75 Wireless-G Broadband Router 15. I can’t access my e-mail, web or I am getting corrupted data from the Internet. The Maximum Transmission Unit (MTU) setting may need to be adjusted. By default, the MTU is set at 1500. For most DSL users, it is strongly recommended to use MTU 1492. •...
  • Page 76: Frequently Asked Questions

    Wireless-G Broadband Router Frequently Asked Questions After using SecureEasySetup, my existing wireless devices can no longer connect to the Router. SecureEasySetup uses WPA-Personal encryption. If your current wireless devices do not support WPA-Personal security, then you cannot use SecureEasySetup on your network. You will need to manually configure your network security using the encryption supported by your existing devices.
  • Page 77 Does the Router support any operating system other than Windows 98SE, Windows Millennium, Windows 2000, or Windows XP? Yes, but Linksys does not, at this time, provide technical support for setup, configuration or troubleshooting of any non-Windows operating systems. Does the Router support ICQ send file? Yes, with the following fix: click ICQ menu ->...
  • Page 78 How will I be notified of new Router firmware upgrades? All Linksys firmware upgrades are posted on the Linksys website at www.linksys.com, where they can be downloaded for free. To upgrade the Router’s firmware, use the Administration - Firmware Upgrade tab of the Router’s web-based utility.
  • Page 79 Wireless-G Broadband Router What is DMZ Hosting? Demilitarized Zone (DMZ) allows one IP address (computer) to be exposed to the Internet. Some applications require multiple TCP/IP ports to be open. It is recommended that you set your computer with a static IP if you want to use DMZ Hosting.
  • Page 80 Wireless-G Broadband Router What is the IEEE 802.11b standard? It is one of the IEEE standards for wireless networks. The 802.11b standard allows wireless networking hardware from different manufacturers to communicate, provided that the hardware complies with the 802.11b standard. The 802.11b standard states a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GHz.
  • Page 81 Wireless-G Broadband Router maintain contact with the wireless network even when not actually transmitting data. Achieving these functions simultaneously requires a dynamic RF networking technology that links access points and nodes. In such a system, the user’s end node undertakes a search for the best possible access to the system. First, it evaluates such factors as signal strength and quality, as well as the message load currently being carried by each access point and the distance of each access point to the wired backbone.
  • Page 82 There are eleven available channels, ranging from 1 to 11, in North America. There may be additional channels available in other regions, subject to the regulations of your region and/or country. If your questions are not addressed here, refer to the Linksys website, www.linksys.com. Appendix A: Troubleshooting...
  • Page 83: Appendix B: Wireless Security

    Wireless-G Broadband Router Appendix B: Wireless Security Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation.
  • Page 84 This includes hackers. So, don’t broadcast the SSID. Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.
  • Page 85 These security recommendations should help keep your mind at ease while you are enjoying the most flexible and convenient technology Linksys has to offer. Appendix B: Wireless Security Security Threats Facing Wireless Networks...
  • Page 86: Appendix C: Upgrading Firmware

    Appendix C: Upgrading Firmware The Router's firmware is upgraded through the Web-based Utility's Administration tab. Follow these instructions: 1. Download the firmware from Linksys's website at www.linksys.com. 2. Extract the firmware file on your computer. 3. Open the Router’s Web-based Utility, and click the Administration tab.
  • Page 87: Appendix D: Windows Help

    Wireless-G Broadband Router Appendix D: Windows Help Almost Linksys wireless products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix.
  • Page 88: Appendix E: Finding The Mac Address And Ip Address For Your Ethernet Adapter

    Wireless-G Broadband Router Appendix E: Finding the MAC Address and IP Address for Your Ethernet Adapter This section describes how to find the MAC address for your computer’s Ethernet adapter so you can use the MAC filtering and/or MAC address cloning feature of the Router. You can also find the IP address of your computer’s Ethernet adapter.
  • Page 89: For The Router's Web-Based Utility

    Wireless-G Broadband Router 3. Write down the Physical Address as shown on your computer screen (Figure E-3); it is the MAC address for your Ethernet adapter. This appears as a series of numbers and letters. The MAC address/Physical Address is what you will use for MAC address cloning or MAC filtering. Note: The MAC address is also called the Physical Address.
  • Page 90: Appendix F: Glossary

    Wireless-G Broadband Router Appendix F: Glossary 802.11b - A wireless networking standard that specifies a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GHz. 802.11g - A wireless networking standard that specifies a maximum data transfer rate of 54Mbps, an operating frequency of 2.4GHz, and backward compatibility with 802.11b devices.
  • Page 91 Wireless-G Broadband Router Cable Modem - A device that connects a computer to the cable television network, which in turn connects to the Internet. CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) - A method of data transfer that is used to prevent data collisions.
  • Page 92 Wireless-G Broadband Router EAP (Extensible Authentication Protocol) - A general authentication protocol used to control network access. Many specific authentication methods work within this framework. EAP-PEAP (Extensible Authentication Protocol-Protected Extensible Authentication Protocol) - A mutual authentication method that uses a combination of digital certificates and another system, such as passwords. EAP-TLS (Extensible Authentication Protocol-Transport Layer Security) - A mutual authentication method that uses digital certificates.
  • Page 93 Packet - A unit of data sent over a network. Passphrase - Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products. PEAP (Protected Extensible Authentication Protocol) - A mutual authentication method that uses a combination of digital certificates and another system, such as passwords.
  • Page 94 Wireless-G Broadband Router Ping (Packet INternet Groper) - An Internet utility used to determine whether a particular IP address is online. POP3 (Post Office Protocol 3) - A standard mail server commonly used on the Internet. Port - The connection point on a computer or networking device used for plugging in cables or adapters. Power over Ethernet (PoE) - A technology enabling an Ethernet network cable to deliver both data and power.
  • Page 95 Wireless-G Broadband Router Spread Spectrum - Wideband radio frequency technique used for more reliable and secure data transmission. SSID (Service Set IDentifier) - Your wireless network's name. Static IP Address - A fixed address assigned to a computer or device that is connected to a network. Static Routing - Forwarding data in a network via a fixed path.
  • Page 96 Wireless-G Broadband Router VPN (Virtual Private Network) - A security measure to protect data as it leaves one network and goes to another over the Internet. WAN (Wide Area Network)- The Internet. WEP (Wired Equivalent Privacy) - A method of encrypting network data transmitted on a wireless network for greater security.
  • Page 97: Appendix G: Specifications

    Wireless-G Broadband Router Appendix G: Specifications Model WRT54G Standards IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.11b Channels 11 Channels (US, Canada) 13 Channels (Europe, Japan) Ports Internet: One 10/100 RJ-45 Port LAN: Four 10/100 RJ-45 Switched Ports One Power Port...
  • Page 98 Wireless-G Broadband Router Operating Temp. 0ºC to 40ºC (32ºF to 104ºF) Storage Temp. -20ºC to 70ºC (-4ºF to 158ºF) Operating Humidity 10% to 85%, Non-Condensing Storage Humidity 5% to 90%, Non-Condensing Appendix G: Specifications...
  • Page 99: Appendix H: Warranty Information

    Your exclusive remedy and Linksys' entire liability under this warranty will be for Linksys at its option to repair or replace the Product or refund Your purchase price less any rebates.
  • Page 100: Appendix I: Regulatory Information

    Canadian regulations. EC DECLARATION OF CONFORMITY (EUROPE) Linksys declares that this product conforms to the specifications listed below, following the provisions of the European R&TTE directive 1999/5/EC: EN 301 489-1, 301 489-17 General EMC requirements for Radio equipment.
  • Page 101 Linksys vakuuttaa täten että dieses produkt tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sitä koskevien näiden direktiivien muiden ehtojen mukainen. Linksys Group déclare que le produit est conforme aux conditions essentielles et aux dispositions relatives à la directive 1999/5/EC.
  • Page 102: Appendix J: Contact Information

    Can't find information about a product you want to buy on the web? Do you want to know more about networking with Linksys products? Give our advice line a call at: 800-546-5797 (LINKSYS) Or fax your request in to:...

Table of Contents