Linksys WRT54G3GV2-ST - Wireless-G Router For Mobile Broadband Wireless User Manual

Wireless-g router for mobile broadband
Hide thumbs Also See for WRT54G3GV2-ST - Wireless-G Router For Mobile Broadband Wireless:
Table of Contents

Advertisement

Quick Links

USER GUIDE
Wireless-G
Router for

Mobile Broadband

WRT54G3GV2-ST
Model No:

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WRT54G3GV2-ST - Wireless-G Router For Mobile Broadband Wireless

  • Page 1: Mobile Broadband

    USER GUIDE Wireless-G Router for Mobile Broadband WRT54G3GV2-ST Model No:...
  • Page 2: Copyright And Trademarks

    Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/ or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview Top Panel........... 4 Side Panel .
  • Page 4 Software in Linksys Products ........
  • Page 5: Chapter 1: Product Overview

    Side Panel Chapter 1: Product Overvew Thank you for choosing the Linksys Wireless-G Router for Mobile Broadband. The Router lets you access the Internet through either your mobile broadband service (requires a mobile broadband data card or USB adapter, available USB Port Reserved for future use.
  • Page 6: Front Panel

    Product Overview Chapter1 Placement Positions Securty Bracket The security bracket labeled “Reset” clips onto the Router. It covers the Reset There are three ways to physically install the Router. The button and the security slot on the Router’s top first way is to place the Router horizontally on a surface. panel.
  • Page 7 Note: Mounting hardware illustrations are not † true to scale. NOTE: Linksys is not responsible for damages incurred by insecure wall-mounting hardware. Follow these instructions: Determine where you want to mount the Router. Make sure that the wall you use is smooth, flat, dry, and sturdy.
  • Page 8: Chapter 2: Wireless Security Checklist

    These devices have a default password set by the factory. The Linksys default password • Turn wireless routers, access points, or gateways is admn.
  • Page 9: Chapter 3: Advanced Configuration

    Advanced Configuration Chapter3 Chapter 3: Advanced Confguraton After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you’d like to change its advanced settings, use the Router’s web-based utility. This chapter describes each web page of the utility and each page’s key functions.
  • Page 10 Advanced Configuration Chapter3 select Connect on Demand. In the Max Idle Time field, enter the number of minutes you want to have elapsed before your Internet connection terminates. The default Internet Connection Type > Automatic Configuration - DHCP Max Idle Time is 1 minutes. Static IP Keep Alve: Redal Perod If you select this option, the...
  • Page 11 Advanced Configuration Chapter3 L2TP packet size that is transmitted. To have the Router select the best MTU for your Internet connection, keep the L2TP is a service that applies to connections in Israel only. default, Auto. Sze When Manual is selected in the MTU field, this option is enabled.
  • Page 12 Advanced Configuration Chapter3 Network Address Server Settings (DHCP) the Assign IP Address field. Enter its MAC address in the To This MAC Address field. Then click Add. The settings allow you to configure the Router’s Dynamic Clients Already Reserved Host Configuration Protocol (DHCP) server function. The Router can be used as a DHCP server for your network.
  • Page 13: Setup > Mobile Network

    Advanced Configuration Chapter3 terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again. To Time Setting use this option, select Connect on Demand. In the Max Idle Time field, enter the number of minutes you want to Click Save Settngs to apply your changes, or click Cancel have elapsed before your mobile network connection...
  • Page 14: Setup > Ddns

    Advanced Configuration Chapter3 Mal Exchange (Optonal) Enter the address of your mail Actve Vson User Name The user name of your Active exchange server, so e-mails to your DynDNS address go to Vision account is displayed after the account has been your mail server.
  • Page 15: Setup > Advanced Routing

    Advanced Configuration Chapter3 Advanced Routing you to register a MAC address in order to access the Internet. If you do not wish to re-register the MAC address with your ISP, you may assign the MAC address you have currently registered with your ISP to the Router with the Enabled/Dsabled If this Router is hosting your network’s MAC Address Clone feature.
  • Page 16: Wireless > Basic Wireless Settings

    Advanced Configuration Chapter3 SSID Broadcast When wireless clients survey the local area for wireless networks to associate with, they will detect the SSID broadcast by the Router. To broadcast the Router’s SSID, keep the default, Enabled. If you do not want to broadcast the Router’s SSID, then select Dsabled.
  • Page 17 Advanced Configuration Chapter3 Key Renewal Enter a Key Renewal period, which instructs Shared Secret Enter the key shared between the Router the Router how often it should change the encryption and the server. keys. The default is 300 seconds. Key Renewal Enter a Key Renewal period, which instructs the Router how often it should change the encryption WPA2 Personal...
  • Page 18: Wireless > Wireless Mac Filter

    Advanced Configuration Chapter3 Security Mode > WEP Security Mode > RADIUS Encrypton Select level encryption, 0/ bts (10 hex dgts) or 10/12 bts (2 hex dgts). IMPORTANT: If you are using WEP encryption, The default is 0/ bts (10 hex dgts). always remember that each device in your Passphrase Enter a Passphrase to automatically generate...
  • Page 19: Wireless > Advanced Wireless Settings

    Advanced Configuration Chapter3 Wireless Client List This screen shows computers and other devices on the wireless network. The list can be sorted by Client Name, Interface, IP Address, MAC Address, and Status. Select Save to MAC Address Flter Lst for any device you want to add to the MAC Address Filter List.
  • Page 20: Security > Firewall

    Advanced Configuration Chapter3 use a WEP key for authentication. Select Shared Key to RTS Threshold Should you encounter inconsistent data only use Shared Key authentication. flow, only minor reduction of the default value, 23, is recommended. If a network packet is smaller than the Basc Rate The Basic Rate setting is not actually one rate preset RTS threshold size, the RTS/CTS mechanism will...
  • Page 21: Security > Vpn Passthrough

    Advanced Configuration Chapter3 Flter IDENT (Port 113) This feature keeps port 113 from L2TP Passthrough Layer 2 Tunneling Protocol is the being scanned by devices outside of your local network. method used to enable Point-to-Point sessions via the This feature is selected by default. Deselect this feature to Internet on the Layer 2 level.
  • Page 22: Applications And Gaming > Single Port Forwarding

    Advanced Configuration Chapter3 Decide which days and what times you want this policy to be enforced. Select the individual days during which the policy will be in effect, or select Everyday. Then enter a range of hours and minutes during which the policy will be in effect, or select 2 Hours.
  • Page 23: Applications And Gaming > Port Range Forwarding

    Advanced Configuration Chapter3 applications that use Internet access to perform functions such as videoconferencing or online gaming. Some Internet applications may not require any forwarding.) When users send these types of requests to your network via the Internet, the Router will forward those requests to the appropriate servers (computers).
  • Page 24: Applications & Gaming > Port Range Triggering

    Advanced Configuration Chapter3 Applications & Gaming > Port Range Triggering The Port Range Triggering screen allows the Router to watch outgoing data for specific port numbers. The IP address of the computer that sends the matching data is remembered by the Router, so that when the requested data returns through the Router, the data is pulled back to the proper computer by way of IP address and port mapping rules.
  • Page 25: Applications And Gaming > Qos

    Advanced Configuration Chapter3 Applications Click Save Settngs to apply your changes, or click Cancel Changes to cancel your changes. Applcatons Select the appropriate application. If you Applications and Gaming > QoS select Add a New Application, follow the Add a New Application instructions.
  • Page 26: Administration > Management

    Advanced Configuration Chapter3 MAC Address Name This column displays the application, device, or port name. Informaton This column displays the port range or MAC address entered for your entry. If a pre-configured application or game was selected, there will be no valid entry shown in this section.
  • Page 27: Administration > Log

    Advanced Configuration Chapter3 Web Utlty Access va Wreless If you are using the Allow Users to Dsable Internet Access Select Enabled, Router in a public domain where you are giving wireless if you want to be able to prohibit any and all Internet access to your guests, you can disable wireless access to connections.
  • Page 28: Administration > Diagnostics

    Advanced Configuration Chapter3 Type Select Incomng Log, Outgong Log, Securty • Log, or DHCP Clent Log. • <Type> Log The Incoming Log will display a temporary log of the source IP addresses and destination port numbers for the incoming Internet traffic.
  • Page 29: Administration > Firmware Upgrade

    Before upgrading the firmware, download the Router’s your last connection is displayed. firmware upgrade file from the Linksys website, www.linksys.com. Then extract the file. Data Card Status Please select a fle to upgrade the frmware Click Browse and select the extracted firmware upgrade file.
  • Page 30: Status > Router

    Advanced Configuration Chapter3 Status > Local Network service provider. The version of the PRL specifies the radio frequency channels that the device is permitted to use, and it also instructs your device which cell towers to look The Local Network screen displays information about the for when establishing a connection.
  • Page 31: Status > Wireless Network

    Advanced Configuration Chapter3 the Router. The list can be sorted by Client Name, Interface, IP Address, or MAC Address. To remove a DHCP client, click Delete. To retrieve the most up-to- date information, click Refresh. To exit this screen and return to the Local Network screen, click Close.
  • Page 32: Appendix A: Troubleshooting

    Troubleshooting AppendixA Appendx A: You need to modify the basic settings on the Router. Run the Setup Wizard on the Setup CD-ROM. Troubleshootng You need to modify the advanced settings on the Router. Your computer cannot connect to the Internet. Open the web browser (for example, Internet Explorer or Follow the instructions until your computer can connect Firefox), and enter the Router’s IP address in the address...
  • Page 33 Troubleshooting AppendixA On the first screen you see, the Basic Setup screen, Click the Moble Network tab. In the Mobile Network click the Moble Network tab. Status section, on the Network Name line, you will see the name of the network you are currently using. On the Mobile Network screen, there is an Auto Connect option at the top of the screen.
  • Page 34: Appendix B: Specifications

    Specifications AppendixB Appendx B: Specfcatons Model Number WRT54G3GV2-ST Standards IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.11b Ports Internet, Ethernet (4), PC Card, USB 2.0 (3), Power, and Antenna (SMA) Button Mobile Connect/Disconnect, Reset LEDs Power, Ethernet (1-4), Wireless, Modem Internet, Mobile Internet Cabling Type UTP CAT 5 # of Antennas...
  • Page 35: Appendix C: Warranty Information

    Linksys’ entire liability under this limited warranty jurisdiction. will be for Linksys, at its option, to (a) repair the product TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT with new or refurbished parts, (b) replace the product...
  • Page 36: Technical Support

    This limited warranty is governed by the laws of the jurisdiction in which the Linksys product was purchased by you. Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623 Wreless-G Router for Moble Broadband...
  • Page 37: Appendix D: Regulatory Information

    Regulatory Information AppendixD Safety Notices Appendx D: Regulatory Informaton • Caution: To reduce the risk of fire, use only No.26 AWG or larger telecommunication line cord. Do not use this product near water, for example, in a • FCC Statement wet basement or near a swimming pool.
  • Page 38: Avis D'industrie Canada

    Regulatory Information AppendixD Avis d’Industrie Canada Avis de non-responsabilité concernant les appareils sans fil Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. Les performances maximales pour les réseaux sans fil L’utilisation de ce dispositif est autorisée seulement aux sont tirées des spécifications de la norme IEEE 802.11.
  • Page 39: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    úřady. Správná likvidace a recyklace pomáhá předcházet Linksys products. Consumers are required to comply with potenciálním negativním dopadům na životní prostředí a lidské this notice for all electronic products bearing the following zdraví.
  • Page 40 Regulatory Information AppendixD Eest (Estonan) - Keskkonnaalane nformatsoon Franças (French) - Informatons envronnementales Euroopa Ldus asuvatele klentdele pour les clents de l’Unon européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 41 Regulatory Information AppendixD Letuvška (Lthuanan) - Aplnkosaugos nformacja, Nederlands (Dutch) - Mleu-nformate voor klanten skrta Europos Sąjungos vartotojams n de Europese Une Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), is voorzien van dit symbool op het product of de verpakking, negalima šalinti kartu su nerūšiuotomis komunalinėmis...
  • Page 42 Regulatory Information AppendixD Português (Portuguese) - Informação ambental para Slovenčna (Slovene) - Okoljske nformacje za stranke clentes da Unão Europea v Evropsk unj A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/EC prepoveduje odlaganje opreme, que exibe este símbolo no produto e/ou na sua embalagem označene s tem simbolom –...
  • Page 43: Appendix D: Software License Agreement

    “Software” includes, and this Agreement will apply to (a) BY DOWNLOADING OR INSTALLING THE SOFTWARE, the software of Linksys or its suppliers provided in or with OR USING THE PRODUCT CONTAINING THE SOFTWARE, the applicable Linksys product, and (b) any upgrades, YOU ARE CONSENTING TO BE BOUND BY THE SOFTWARE updates, bug fixes or modified versions (“Upgrades”) or...
  • Page 44 Schedule 2 are from the public web site at of the GPL or other open source code in this Software on a http://www.gnu.org/copyleft/gpl.html CD, Linksys will mail to You a CD with such code for $9.99 plus the cost of shipping, upon request. GNU GENERAL PUBLIC LICENSE Term and Termination.
  • Page 45 Software License Agreement ChapterNumber TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND freedom to share and change free software–to make sure the software is free for all its users. This General Public MODIFICATION License applies to most of the Free Software Foundation’s This License applies to any program or other work software and to any other program whose authors which contains a notice placed by the copyright...
  • Page 46 Software License Agreement ChapterNumber If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
  • Page 47 General Public License from time to time. Such new versions will be similar in If this Linksys product contains open source software spirit to the present version, but may differ in detail to licensed under the OpenSSL license: address new problems or concerns.
  • Page 48 (tjh@cryptsoft.com). BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; In addition, if this Linksys product contains open OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND source software licensed under the OpenSSL license ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,...
  • Page 49 Software License Agreement ChapterNumber The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptographic related. If you include any Windows specific code (or a derivative thereof ) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@ cryptsoft.com)”...
  • Page 50: Appendix E: Contact Information

    Specifications AppendixE Appendx E: Contact Informaton Sprint Online Resource Visit the Sprint website at www.sprint.com Sprint Technical Support Contact Sprint at 1-888-211-4727. NOTE: Make sure you have the Sprint phone number of your mobile broadband connection card or USB adapter ready before calling. To get the Sprint phone number, start the Connection Manager, and then click Menu, Devce Info &...

Table of Contents