Cisco RB-WRT54GS2 - Wireless-G Broadband Router User Manual
Cisco RB-WRT54GS2 - Wireless-G Broadband Router User Manual

Cisco RB-WRT54GS2 - Wireless-G Broadband Router User Manual

Wireless-g broadband router with speedbooster
Hide thumbs Also See for RB-WRT54GS2 - Wireless-G Broadband Router:
Table of Contents

Advertisement

Quick Links

USER GUIDE
Wireless-G Broadband Router
with SpeedBooster
WRT54GS2
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Cisco RB-WRT54GS2 - Wireless-G Broadband Router

  • Page 1 USER GUIDE Wireless-G Broadband Router with SpeedBooster WRT54GS2 Model:...
  • Page 2: About This Guide

    Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2009 Cisco Systems, Inc. All rights reserved.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview Front Panel..........1 Back Panel .
  • Page 4 Software in Linksys Products ........
  • Page 5: Chapter 1: Product Overview

    If the LED Product Overview is flashing, the Router is actively sending or receiving data over the network. Thank you for choosing the Linksys Wireless-G Broadband Internet (Green) The Internet LED lights up Router with SpeedBooster. The Router lets you access...
  • Page 6 Router down until the screws fit snugly into the true to scale. wall-mount slots. NOTE: Linksys is not responsible for damages incurred by insecure wall-mounting hardware. 152 mm Print this page at 100% size. Cut along the dotted line, and place on the wall to drill precise spacing.
  • Page 7: Chapter 2: Wireless Security Checklist

    Combine letters and numbers to avoid using 3. Enable MAC address filtering standard words that can be found in the dictionary. Linksys routers give you the ability to enable Media Access WEB: For more information on wireless security, Control (MAC) address filtering.
  • Page 8: Access Web-Based Utility

    Advanced Configuration Chapter 3 Chapter 3: Setup > Basic Setup Advanced Configuration The first screen that appears is the Basic Setup screen. This allows you to change the Router’s general settings. After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use.
  • Page 9 Advanced Configuration Chapter 3 Keep Alive: Redial Period If you select this option, the Router will periodically check your Internet connection. If you are disconnected, then the Router Internet Connection Type > Automatic Configuration - DHCP will automatically re-establish your connection. To use Static IP this option, select Keep Alive.
  • Page 10 Advanced Configuration Chapter 3 attempt to access the Internet again. To use this option, select Connect on Demand. In the Max Idle Time field, enter the number of minutes you want to have elapsed before your Internet connection terminates. The default Max Idle Time is 5 minutes.
  • Page 11: Setup > Ddns

    Advanced Configuration Chapter 3 MTU is the Maximum Transmission Unit. It specifies be 192.168.1.2 or greater, but smaller than 192.168.1.253. The default Starting IP Address is 192.168.1.100. the largest packet size permitted for Internet transmission. Select Manual if you want to manually enter the largest Maximum Number of DHCP Users Enter the maximum packet size that is transmitted.
  • Page 12: Setup > Mac Address Clone

    Advanced Configuration Chapter 3 you are hosting your own website, FTP server, or other TZO.com server behind the Router. Before you can use this feature, you need to sign up for DDNS service at one of two DDNS service providers, DynDNS.org or TZO.com.
  • Page 13: Setup > Advanced Routing

    Advanced Configuration Chapter 3 Advanced Routing User Defined Entry Enter the MAC Address registered with your ISP here. Operating Mode Select the mode in which this Router Clone Your PC’s MAC Clicking this button will clone the will function. If this Router is hosting your network’s MAC address of the computer you are using.
  • Page 14: Wireless > Basic Wireless Settings

    32 characters (use any of the characters on the keyboard). Protected Setup. Make sure this setting is the same for all points in your wireless network. For added security, you should change the default SSID (linksys) to a unique name. Wireless-G Broadband Router with SpeedBooster...
  • Page 15: Wireless > Wireless Security

    Advanced Configuration Chapter 3 Wireless Security Method #1 Use this method if your client device has a Wi-Fi Protected Security Mode Setup button. Select the security method for your wireless network. If Wi-Fi Protected Setup button on Click or press the you do not want to use wireless security, keep the default, the client device.
  • Page 16 Advanced Configuration Chapter 3 Select the type of algorithm, AES, or TKIP + AES. The default selection is AES. WPA Shared Key Enter a WPA Shared Key of 8-63 characters. Group Key Renewal Enter a Group Key Renewal period, which instructs the Router how often it should change the encryption keys.
  • Page 17: Wireless > Wireless Mac Filter

    Advanced Configuration Chapter 3 IMPORTANT: If you are using WEP encryption, always remember that each device in your wireless network MUST use the same WEP encryption method and encryption key, or else your wireless network will not function properly. RADIUS Server Address Enter the IP Address of the RADIUS server.
  • Page 18: Wireless > Advanced Wireless Settings

    Advanced Configuration Chapter 3 Select Enable Address Filter List for any device you want use with older wireless technology, and All, when the to add to the MAC Address Filter List. Then click Update Router can transmit at all wireless rates. The Basic Rate Filter List.
  • Page 19: Security > Firewall

    Advanced Configuration Chapter 3 wireless station responds with a Clear to Send (CTS) frame Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. to acknowledge the right to begin transmission. The RTS Threshold value should remain at its default value of Security >...
  • Page 20: Access Restrictions > Internet Access

    Advanced Configuration Chapter 3 Access Restrictions > Internet Access To create an Internet Access policy: Select a number from the Internet Access Policy drop- The Access Restrictions > Internet Access screen allows you down menu. to block or allow specific kinds of Internet usage and traffic, such as Internet access, designated services, and To enable this policy, select Enable.
  • Page 21: Applications And Gaming > Port Range Forward

    Advanced Configuration Chapter 3 Port Services To add a service, enter the service’s name in the Service Name field. Select its protocol from the Protocol drop- down menu, and enter its range in the Port Range fields. Then click Add. To modify a service, select it from the list on the right.
  • Page 22: Applications & Gaming > Port Triggering

    Advanced Configuration Chapter 3 Applications & Gaming > Port Triggering Applications and Gaming > DMZ The Applications & Gaming > Port Triggering screen allows The DMZ feature allows one network computer to be the Router to watch outgoing data for specific port exposed to the Internet for use of a special-purpose numbers.
  • Page 23: Administration > Management

    Advanced Configuration Chapter 3 Optimize Gaming Applications Select this automatically allow common game application ports to have a higher priority. These games include, but are not limited to: Counter-Strike, Half-Life, Age of Empires, EverQuest, Quake2/Quake3, and Diablo II. The default setting is unselected.
  • Page 24: Administration > Log

    Advanced Configuration Chapter 3 Router Password To disable the Log function, keep the default setting, Local Router Access Disable. To monitor traffic between the network and the Router Password Enter a new Password for the Router. Internet, select Enable. Re-enter to confirm Enter the Password again to confirm.
  • Page 25: Administration > Factory Defaults

    Diagnostics screen. Administration > Upgrade Firmware The Traceroute Test Before upgrading the firmware, download the Router’s firmware upgrade file from the Linksys website, www. Administration > Factory Defaults linksys.com. Then extract the file. The Administration > Factory Defaults screen allows you Upgrade Firmware to restore the Router’s configuration to its factory default...
  • Page 26: Status > Router

    Advanced Configuration Chapter 3 Status > Router Status > Local Network The Status > Router screen displays the Router’s current The Status > Local Network screen displays the status of status. your network. Status > Local Network Local Network MAC Address The Router’s MAC Address, as seen on your local, Ethernet network, is displayed.
  • Page 27: Status > Wireless

    Advanced Configuration Chapter 3 Status > Wireless The Status > Wireless screen displays the status of your wireless network. Status > Wireless Wireless MAC Address The Router’s MAC Address, as seen on your local, wireless network, is displayed. Mode As selected from the Wireless > Basic Wireless Settings screen, The wireless mode (Mixed, G-Only, B-Only, or Disabled) used by the network is displayed.
  • Page 28: Appendix A: Troubleshooting

    If your questions are not addressed here, The Router does not replace your modem. You still need refer to the Linksys website, www.linksys.com. your DSL modem in order to use the Router. Connect the telephone line to the DSL modem, insert the setup CD into your computer, and then follow the on-screen instructions.
  • Page 29: Appendix B: Specifications

    Specifications Appendix B Appendix B: Specifications Model WRT54GS2 Standards IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.11b Channels 11 Channels (US, Canada) 13 Channels (Europe, Japan) Ports Internet, Ethernet (1-4), Power Button Reset, Wi-Fi Protected Setup™ Cabling Type CAT5 LEDs Power, Internet, Ethernet (1-4), Wireless, Wi-Fi Protected Setup™...
  • Page 30: Appendix C: Warranty Information

    Linksys’ entire liability under this limited warranty jurisdiction. will be for Linksys, at its option, to (a) repair the product TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT with new or refurbished parts, (b) replace the product...
  • Page 31 This limited warranty is governed by the laws of the jurisdiction in which the Product was purchased by you. Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623. Wireless-G Broadband Router with SpeedBooster...
  • Page 32: Appendix D: Regulatory Information

    Regulatory Information Appendix D Appendix D: Safety Notices Regulatory Information Caution: To reduce the risk of fire, use only No.26 AWG • or larger telecommunication line cord. Do not use this product near water, for example, in a • FCC Statement wet basement or near a swimming pool.
  • Page 33: Avis D'industrie Canada

    Regulatory Information Appendix D Avis d’Industrie Canada Avis de non-responsabilité concernant les appareils sans fil Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. Les performances maximales pour les réseaux sans fil L’utilisation de ce dispositif est autorisée seulement aux sont tirées des spécifications de la norme IEEE 802.11.
  • Page 34: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    úřady. Správná likvidace a recyklace pomáhá předcházet Linksys products. Consumers are required to comply with potenciálním negativním dopadům na životní prostředí a lidské this notice for all electronic products bearing the following zdraví.
  • Page 35 Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 36 Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 37 ľudí. Ak máte záujem o podrobnejšie WEB: For additional information, please visit informácie o likvidácii starého zariadenia, obráťte sa, prosím, na www.linksys.com miestne orgány, organizácie zaoberajúce sa likvidáciou odpadov alebo obchod, v ktorom ste si produkt zakúpili. Wireless-G Broadband Router with SpeedBooster...
  • Page 38: Appendix E: Software License Agreement

    Schedules 2, 3 or 4 below as applicable. “Software” includes, and this Agreement will apply to BY DOWNLOADING OR INSTALLING THE SOFTWARE, (a) the software of Linksys or its suppliers provided in or OR USING THE PRODUCT CONTAINING THE SOFTWARE, with the applicable Linksys product, excluding technology...
  • Page 39 Schedule 2 are from the public web site at of the GPL or other open source code in this Software on a http://www.gnu.org/copyleft/gpl.html CD, Linksys will mail to You a CD with such code for $9.99 plus the cost of shipping, upon request. GNU GENERAL PUBLIC LICENSE Term and Termination.
  • Page 40 Software License Agreement Appendix E GNU General Public License is intended to guarantee your TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND freedom to share and change free software–to make sure MODIFICATION the software is free for all its users. This General Public This License applies to any program or other work License applies to most of the Free Software Foundation’s which contains a notice placed by the copyright...
  • Page 41 Software License Agreement Appendix E If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
  • Page 42 General Public License from time to time. Such new versions will be similar in If this Linksys product contains open source software spirit to the present version, but may differ in detail to licensed under Version 2.1 of the “GNU Lesser General Public address new problems or concerns.
  • Page 43 Software License Agreement Appendix E GNU LESSER GENERAL PUBLIC LICENSE To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the Version 2.1, February 1999 library is modified by someone else and passed on, the recipients should know that what they have is not the Copyright (C) 1991, 1999 Free Software Foundation, Inc.
  • Page 44 Software License Agreement Appendix E freedom and the wherewithal to run that program using a You may copy and distribute verbatim copies of the modified version of the Library. Library’s complete source code as you receive it, in any medium, provided that you conspicuously and The precise terms and conditions for copying, distribution appropriately publish on each copy an appropriate and modification follow.
  • Page 45 Software License Agreement Appendix E Thus, it is not the intent of this section to claim When a “work that uses the Library” uses material from rights or contest your rights to work written entirely a header file that is part of the Library, the object code by you;...
  • Page 46 Software License Agreement Appendix E Use a suitable shared library mechanism for linking You may not copy, modify, sublicense, link with, or with the Library. A suitable mechanism is one that distribute the Library except as expressly provided (1) uses at run time a copy of the library already under this License.
  • Page 47 If you wish to incorporate parts of the Library into other free programs whose distribution conditions are If this Linksys product contains open source software incompatible with these, write to the author to ask for licensed under the OpenSSL license: permission.
  • Page 48 Software License Agreement Appendix E OpenSSL License Original SSLeay License Copyright © 1998-2007 The OpenSSL Project. All rights Copyright © 1995-1998 Eric Young (eay@cryptsoft.com) reserved. All rights reserved. Redistribution and use in source and binary forms, with This package is an SSL implementation written by Eric or without modification, are permitted provided that the Young (eay@cryptsoft.com).
  • Page 49 Software License Agreement Appendix E DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

This manual is also suitable for:

Linksys wrt54gs2

Table of Contents