Back Panel Chapter 1: Product Overview Thank you for choosing the Linksys by Cisco Wireless-G Home Router with SpeedBurst. The Router lets you access the Internet via a wireless connection or through one of its four switched ports. You can also use the Router to share resources such as computers, printers and files.
Page 6
1-1.5 mm Note: Mounting hardware illustrations are not † true to scale. NOTE: Linksys is not responsible for damages incurred by insecure wall-mounting hardware. Follow these instructions: Wall-Mounting Template 1. Determine where you want to mount the Router. Make Print this page at 100% size.
WEB: For more information on wireless security, visit www.linksysbycisco.com/security Linksys routers give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device. With MAC address filtering enabled, wireless network access is provided solely for wireless devices with specific MAC addresses.
Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you want to change its advanced settings, use the Router’s browser-based utility. This chapter describes each web page of the utility and each page’s key functions.
Page 9
Advanced Configuration Chapter 3 Static IP before your Internet connection terminates. The default Max Idle Time is 5 minutes. If you are required to use a permanent IP address to Keep Alive: Redial Period If you select this option, connect to the Internet, select Static IP. the Router will periodically check your Internet connection.
Page 10
Advanced Configuration Chapter 3 automatically re-establish your connection as soon as you attempt to access the Internet again. To use this option, select Connect on Demand. In the Max Idle Time field, enter the number of minutes you want to have elapsed before your Internet connection terminates.
Page 11
Advanced Configuration Chapter 3 the best MTU for your Internet connection, keep the default, Auto. Size When Manual is selected in the MTU field, this option is enabled. Leave this value in the 1200 to 1500 range. The default size depends on the Internet Connection Type: DHCP, Static IP, or Telstra: 1500 •...
Advanced Configuration Chapter 3 DynDNS.org Static DNS 1-3 The Domain Name System (DNS) is how the Internet translates domain or website names into Internet addresses or URLs. Your ISP will provide you with at least one DNS Server IP Address. If you wish to use another, enter that IP Address in one of these fields.
Make sure this setting is the same for all points in your MAC Address Clone feature. wireless network. For added security, you should change the default SSID (linksys) to a unique name. Standard Channel Select the appropriate channel for your wireless network. If you are not sure which channel to select, then keep the default, Auto.
Page 14
Advanced Configuration Chapter 3 Wireless > Wireless Security The Wireless Security screen configures the security of your wireless network. The Router supports the following wireless security mode options: WPA2 Personal, WPA Personal, and WEP. (WPA stands for Wi-Fi Protected Access, which is a security standard stronger than WEP encryption.
Advanced Configuration Chapter 3 Wireless > Wireless MAC Filter Wireless Client List This screen shows computers and other devices on Wireless access can be filtered by using the MAC addresses of the wireless network. The list can be sorted by Client the wireless devices transmitting within your network’s radius.
Advanced Configuration Chapter 3 authentication, the sender and the recipient do NOT error rate, you may slightly increase the Fragmentation use a WEP key for authentication. With Shared Key Threshold. Setting the Fragmentation Threshold too low authentication, the sender and recipient use a WEP key for may result in poor network performance.
Advanced Configuration Chapter 3 Security > VPN Passthrough Filter Multicast Multicasting allows multiple transmissions to specific recipients at the same time. If multicasting is permitted, then the Router will allow IP The VPN Passthrough screen allows you to enable VPN multicast packets to be forwarded to the appropriate tunnels using IPSec, PPTP, or L2TP protocols to pass through the Router’s firewall.
Advanced Configuration Chapter 3 Access Restrictions > Internet Access The Internet Access screen allows you to block or allow specific kinds of Internet usage and traffic, such as Internet access, designated services, and websites during specific days and times. Summary Status Policies are disabled by default.
Advanced Configuration Chapter 3 5. Select the appropriate option, Deny or Allow, depending on whether you want to block or allow Internet access for the computers you listed on the Internet Access PC List screen. 6. Decide which days and what times you want this policy to be enforced.
Advanced Configuration Chapter 3 Applications and Gaming > Port Range Enabled Select Enabled to enable port forwarding for the applications you have defined. Forwarding Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. The Port Range Forwarding screen allows you to set up public services on your network, such as web servers, Applications &...
Advanced Configuration Chapter 3 Applications and Gaming > DMZ The DMZ feature allows one network computer to be exposed to the Internet for use of a special-purpose service such as Internet gaming or videoconferencing. DMZ hosting forwards all the ports at the same time to one computer.
Advanced Configuration Chapter 3 Administration > Management feature enabled as well.) Otherwise, keep the default, Disabled. The Administration > Management screen allows the Allowed Remote IP Address If you want to be able to network’s administrator to manage specific Router access the Router from any external IP address, select Any functions for access and security.
Advanced Configuration Chapter 3 Administration > Log Administration > Diagnostics The Router can keep logs of all traffic for your Internet The diagnostic tests (Ping and Traceroute) allow you to connection. check the connections of your network devices, including connection to the Internet. Administration >...
Administration > Factory Defaults Before upgrading the firmware, download the Router’s NOTE: Do not restore the factory defaults unless firmware upgrade file from the Linksys website, you are having difficulties with the Router and www.linksysbycisco.com. have exhausted all other troubleshooting...
Advanced Configuration Chapter 3 Status > Router Status > Local Network The Router screen displays information about the Router The Local Network screen displays information about the and its current settings. local, wired network. Status > Local Network Local Network Local MAC Address The MAC address of the Router’s Status >...
Advanced Configuration Chapter 3 DHCP Clients Table DHCP Client Table The DHCP Client Table lists computers and other devices that have been assigned IP addresses by the Router. The list can be sorted by IP Address, MAC Address, Interface, and Client Name. To remove a DHCP client, click Delete.
The modem does not have an Ethernet port. WEB: If your questions are not addressed here, refer Linksys website, The modem is a dial-up modem for traditional dial-up www.linksysbycisco.com service. To use the Router, you need a cable/DSL modem and high-speed Internet connection.
Your exclusive remedy and Linksys’ entire liability under TO THE EXTENT NOT PROHIBITED BY APPLICABLE this limited warranty will be for Linksys, at its option, to LAW, ALL IMPLIED WARRANTIES AND CONDITIONS (a) repair the product with new or refurbished parts,...
Page 30
The telephone number for Linksys Technical Support in your area can be found by clicking the “Contact Us” link on the home page of www.linksysbycisco.com. Have your product serial number and proof of purchase on hand when calling.
Regulatory Information Appendix D Safety Notices Appendix D: Regulatory Information WARNING: Do not use this product near water, for example, in a wet basement or near a swimming pool. FCC Statement This device complies with Part 15 of the FCC Rules. WARNING: Avoid using this product during an Operation is subject to the following two conditions: (1)
Regulatory Information Appendix D Avis d’Industrie Canada Wireless Disclaimer Cet appareil numérique de la classe B est conforme aux The maximum performance for wireless is derived from normes NMB-003 et RSS210 du Canada. IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, L’utilisation de ce dispositif est autorisée seulement aux data throughput rate, range and coverage.
úřady. Správná likvidace a recyklace pomáhá předcházet Linksys products. Consumers are required to comply with potenciálním negativním dopadům na životní prostředí a lidské this notice for all electronic products bearing the following zdraví.
Page 34
Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
Page 35
Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
Page 36
Regulatory Information Appendix D Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
Software End User License Agreement Appendix E Appendix E: Software End THE RETURN PROCESS AND POLICIES OF THE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE. User License Agreement IN THE EVENT THAT YOU HAVE ELECTED TO OBTAIN A SUBSCRIPTION LICENSE, AS INDICATED IN YOUR ORDER, YOU ADDITIONALLY AGREE TO BE BOUND BY THE “TERMS Cisco Products...
Page 38
Software End User License Agreement Appendix E License Restrictions. Other than as set forth in this suitability, functionality, or legality of any sites or products Agreement, you may not (i) make or distribute copies to which links may be provided or third party services, and of the Software or its related Documentation, or you hereby waive any claim you might have against Cisco electronically transfer the Software or Documentation...
Page 39
Software End User License Agreement Appendix E Software can enable any other computer (on the same part of the installation process or by requesting a change primary network) to generate reports. When a computer to your software settings in the error process. Installing is enabled, that computer shows a notification that it is the software and changing these software settings may being monitored.
Page 40
BY APPLICABLE LAW, IN NO EVENT WILL CISCO BE LIABLE in any purchase order or elsewhere. FOR ANY LOST DATA, REVENUE OR PROFIT, OR FOR SPECIAL, Linksys, Cisco and the Cisco Logo and other trademarks INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE contained in the Software and Documentation are...
Page 41
Software End User License Agreement Appendix E send you Service related email messages as long as you For example, if you distribute copies of such a program, are a subscriber to the Service. If you wish to opt-out whether gratis or for a fee, you must give the recipients of receiving Service related email messages, you may all the rights that you have.
Page 42
Software End User License Agreement Appendix E 1. You may copy and distribute verbatim copies of the distribution of derivative or collective works based on Program’s source code as you receive it, in any medium, the Program. provided that you conspicuously and appropriately In addition, mere aggregation of another work not publish on each copy an appropriate copyright notice based on the Program with the Program (or with a...
Page 43
Software End User License Agreement Appendix E 4. You may not copy, modify, sublicense, or distribute on consistent application of that system; it is up to the Program except as expressly provided under the author/donor to decide if he or she is willing to this License.
Page 44
Software End User License Agreement Appendix E 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR When we speak of free software, we are referring to AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, freedom of use, not price. Our General Public Licenses OR ANY OTHER PARTY WHO MAY MODIFY AND/OR are designed to make sure that you have the freedom REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE,...
Page 45
Software End User License Agreement Appendix E Public License permits more lax criteria for linking other either verbatim or with modifications and/or translated code with the library. straightforwardly into another language. (Hereinafter, translation is included without limitation in the term We call this license the “Lesser”...
Page 46
Software End User License Agreement Appendix E (For example, a function in a library to compute square If distribution of object code is made by offering roots has a purpose that is entirely well-defined access to copy from a designated place, then offering independent of the application.
Page 47
Software End User License Agreement Appendix E a) Accompany work with complete 7. You may place library facilities that are a work based corresponding machine-readable source code on the Library side-by-side in a single library together for the Library including whatever changes were with other library facilities not covered by this License, used in the work (which must be distributed and distribute such a combined library, provided that...
Page 48
Software End User License Agreement Appendix E 11. If, as a consequence of a court judgment or allegation license version number, you may choose any version of patent infringement or for any other reason (not ever published by the Free Software Foundation. limited to patent issues), conditions are imposed on 14.
Page 49
Software End User License Agreement Appendix E Schedule 3-C 6. Redistributions of any form whatsoever must retain the following acknowledgment: “This product includes OPENSSL LICENSE software developed by the OpenSSL Project for use in If this Cisco product contains open source software the OpenSSL Toolkit (http://www.openssl.org/)”...
Page 50
Software End User License Agreement Appendix E 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes cryptographic software written...