Cisco LINKSYS WRT54G2 User Manual

Cisco LINKSYS WRT54G2 User Manual

Wireless-g broadband router
Hide thumbs Also See for LINKSYS WRT54G2:
Table of Contents

Advertisement

USER GUIDE
Wireless-G Broadband Router
WRT54G2
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Cisco LINKSYS WRT54G2

  • Page 1 USER GUIDE Wireless-G Broadband Router WRT54G2 Model:...
  • Page 2: About This Guide

    Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/ or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
  • Page 3: Table Of Contents

    Chapter 1: Product Overview Front Panel..........1 Back Panel .
  • Page 4 Appendix D: Regulatory Information FCC Statement ..........28 FCC Radiation Exposure Statement .
  • Page 5: Chapter 1: Product Overview

    Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys Wireless-G Broadband Router. The Router lets you access the Internet via a wireless connection, broadcast at up to 54 Mbps, or through one of its four switched ports. You can also use the Router to share resources such as computers, printers and files.
  • Page 6 Chapter 1 Wall-Mounting Placement The Router has two wall-mount slots on its bottom panel. The distance between the slots is 152 mm (6 inches). Two screws are needed to mount the Router. Suggested Mounting Hardware 4-5 mm 1-1.5 mm Note: Mounting hardware illustrations are not †...
  • Page 7: Chapter 2: Wireless Security Checklist

    Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network.
  • Page 8: Chapter 3: Advanced Configuration

    Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you’d like to change its advanced settings, use the Router’s web-based utility. This chapter describes each web page of the utility and each page’s key functions.
  • Page 9 Chapter 3 Internet Connection Type > Automatic Configuration - DHCP Static IP If you are required to use a permanent IP address to connect to the Internet, select Static IP. Internet Connection Type > Static IP Internet IP Address This is the Router’s IP address, when seen from the Internet.
  • Page 10 Chapter 3 automatically re-establish your connection as soon as you attempt to access the Internet again. To use this option, select Connect on Demand. In the Max Idle Time field, enter the number of minutes you want to have elapsed before your Internet connection terminates.
  • Page 11: Setup > Ddns

    Chapter 3 MTU is the Maximum Transmission Unit. It specifies the largest packet size permitted for Internet transmission. Select Manual if you want to manually enter the largest packet size that is transmitted. To have the Router select the best MTU for your Internet connection, keep the default setting, Auto.
  • Page 12: Setup > Mac Address Clone

    Chapter 3 name to a dynamic Internet IP address. It is useful when you are hosting your own website, FTP server, or other server behind the Router. Before you can use this feature, you need to sign up for DDNS service at one of two DDNS service providers, DynDNS.org or TZO.com.
  • Page 13: Setup > Advanced Routing

    Chapter 3 User Defined Entry Enter the MAC Address registered with your ISP here. Clone Your PC’s MAC Clicking this button will clone the MAC address of the computer you are using. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes.
  • Page 14: Wireless > Basic Wireless Settings

    Chapter 3 Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Wireless > Basic Wireless Settings The basic settings for wireless networking are set on this screen. There are two ways to configure the Router’s wireless network(s), manual and Wi-Fi Protected Setup.
  • Page 15: Wireless > Wireless Security

    Chapter 3 Method #1 Use this method if your client device has a Wi-Fi Protected Setup button. Wi-Fi Protected Setup button on Click or press the the client device. Wi-Fi Protected Setup button on this Click the screen. After the client device has been configured, click OK.
  • Page 16 Chapter 3 Security Mode > WPA Enterprise WPA Algorithm WPA supports two encryption methods, TKIP and AES, with dynamic encryption keys. Select the type of algorithm, TKIP or AES. (AES is a stronger encryption method than TKIP.) RADIUS Server Address Enter the IP Address of the RADIUS server.
  • Page 17: Wireless > Wireless Mac Filter

    Chapter 3 Security Mode > RADIUS IMPORTANT: If you are using WEP encryption, always remember that each device in your wireless network MUST use the same WEP encryption method and encryption key, or else your wireless network will not function properly. RADIUS Server Address Enter the IP Address of the RADIUS server.
  • Page 18: Wireless > Advanced Wireless Settings

    Chapter 3 Permit Only Select this to allow wireless access by MAC Address. This button is not selected by default. Edit MAC Filter List Click this to open the MAC Address Filter List screen. On this screen, you can list users, by MAC Address, to whom you wish to provide or block access.
  • Page 19: Security > Firewall

    Chapter 3 hear the beacons and awaken to receive the broadcast and multicast messages. The default value is 1. Fragmentation Threshold This value specifies the maximum size for a packet before data is fragmented into multiple packets. If you experience a high packet error rate, you may slightly increase the Fragmentation Threshold.
  • Page 20: Access Restrictions > Internet Access

    Chapter 3 Internet on the Layer 2 level. To allow L2TP tunnels to pass through the Router, keep the default, Enable. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Access Restrictions > Internet Access The Access Restrictions >...
  • Page 21: Applications And Gaming > Port Range Forward

    Chapter 3 Port Services To add a service, enter the service’s name in the Service Name field. Select its protocol from the Protocol drop- down menu, and enter its range in the Port Range fields. Then click Add. To modify a service, select it from the list on the right. Change its name, protocol setting, or port range.
  • Page 22: Applications And Gaming > Dmz

    Chapter 3 Applications and Gaming > Port Triggering Port Triggering Application Enter the application name of the trigger. Triggered Range For each application, list the triggered port number range. Check with the Internet application documentation for the port number(s) needed. Start Port Enter the starting port number of the Triggered Range.
  • Page 23: Administration > Management

    Chapter 3 Applications and Gaming > QoS Device Priority Enter the name of your network device in the Device name field, enter its MAC Address, and then select its priority from the drop-down menu. Ethernet Port Priority Ethernet Port Priority QoS allows you to prioritize performance for the Router’s four ports, LAN Ports 1-4.
  • Page 24: Administration > Log

    Chapter 3 Router Password Local Router Access Router Password Enter a new Password for the Router. Re-enter to confirm Enter the Password again to confirm. Web Access Access Server HTTP (HyperText Transport Protocol) is the communications protocol used to connect to servers on the World Wide Web.
  • Page 25: Administration > Factory Defaults

    Chapter 3 if the test was successful. To stop the test, click Stop. Click Clear Log to clear the screen. Click Close to return to the Diagnostics screen. The Traceroute Test Administration > Factory Defaults The Administration > Factory Defaults screen allows you to restore the Router’s configuration to its factory default settings.
  • Page 26: Status > Router

    Chapter 3 Status > Router The Status > Router screen displays the Router’s current status. Status > Router Router Information Firmware Version This is the Router’s current firmware. Current Time This shows the time, as you set on the Setup tab. MAC Address This is the Router’s MAC Address, as seen by your ISP.
  • Page 27: Status > Wireless

    Advanced Configuration Chapter 3 Status > Wireless The Status > Wireless screen displays the status of your wireless network. Status > Wireless Wireless MAC Address This is the Router’s MAC Address, as seen on your local, wireless network. Mode As selected from the Wireless > Basic Wireless Settings screen, this displays the wireless mode (Mixed, G- Only, or Disabled) used by the network.
  • Page 28: Appendix A: Troubleshooting

    Appendix A Appendix A: Troubleshooting Your computer cannot connect to the Internet. Follow these instructions until your computer can connect to the Internet: Make sure that the Router is powered on. The Power • LED should be green and not flashing. If the Power LED is flashing, then power off all of •...
  • Page 29: Appendix B: Specifications

    Appendix B Appendix B: Specifications Model WRT54G2 Standards IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.11b Ports Internet: One 10/100 RJ-45 Port LAN: Four 10/100 RJ-45 Switched Ports One Power Port Button One Reset Button One Wi-Fi Protected Setup (WPS) Button LEDs Power, Wireless, LAN (1-4), Internet,...
  • Page 30: Appendix C: Warranty Information

    Appendix C Appendix C: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which begins on the date of purchase by the original end-user purchaser and lasts for the period specified below: One (1) year for new product •...
  • Page 31 Warranty Information Appendix C rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
  • Page 32: Appendix D: Regulatory Information

    Appendix D Appendix D: Regulatory Information FCC Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
  • Page 33: Avis D'industrie Canada

    Appendix D Avis d’Industrie Canada Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. L’utilisation de ce dispositif est autorisée seulement aux conditions suivantes : il ne doit pas produire de brouillage et il doit accepter tout brouillage radioélectrique reçu, même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif.
  • Page 34: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    Appendix D User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products. Consumers are required to comply with this notice for all electronic products bearing the following symbol: English - Environmental Information for Customers in...
  • Page 35 Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
  • Page 36 Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių...
  • Page 37 Appendix D Português (Portuguese) - Informação ambiental para clientes da União Europeia A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
  • Page 38: Appendix E: Software License Agreement

    License Agreement Software in Linksys Products This product from Cisco-Linksys LLC or from one of its affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco- Linksys K.K. (“Linksys”) contains software (including firmware) originating from Linksys and its suppliers and may also contain software from the open source community.
  • Page 39 Appendix E used in accordance with the terms of this Agreement; (iii) to provide improvements to the way Linksys delivers technology to you and to other Linksys customers; (iv) to enable Linksys to comply with the terms of any agreements it has with any third parties regarding your Linksys product and/or Software and/or (v) to enable Linksys to comply with all applicable laws and/or regulations, or the...
  • Page 40 Appendix E freedom to share and change free software–to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too.
  • Page 41 Appendix E If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions,...
  • Page 42 Appendix E If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
  • Page 43 Appendix E This product includes software written by Tim Hudson (tjh@cryptsoft.com). In addition, if this Linksys product contains open source software licensed under the OpenSSL license then the license terms below in this Schedule 3 will apply to that open source software. The license terms below in this Schedule 3 are from the public web site at http://www.openssl.org/source/license.html.
  • Page 44 Appendix E The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptographic related. If you include any Windows specific code (or a derivative thereof ) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@ cryptsoft.com)”...

Table of Contents