Linksys WRT54GH User Manual

Wireless-g home router with speedburst
Hide thumbs Also See for WRT54GH:

Advertisement

USER GUIDE
Wireless-G Home Router
with SpeedBurst
WRT54GH
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WRT54GH

  • Page 1 USER GUIDE Wireless-G Home Router with SpeedBurst WRT54GH Model:...
  • Page 2: About This Guide

    Network Security www.linksysbycisco.com/security Copyright and Trademarks © 2009 Cisco Systems, Inc. All rights reserved. Cisco, the Cisco logo, and Linksys are trademarks or registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview Front Panel..........1 Back Panel .
  • Page 4 Table of Contents Appendix D: Regulatory Information FCC Statement ..........27 FCC Radiation Exposure Statement .
  • Page 5: Chapter 1: Product Overview

    Back Panel Chapter 1: Product Overview Thank you for choosing the Linksys by Cisco Wireless-G Home Router with SpeedBurst. The Router lets you access the Internet via a wireless connection or through one of its four switched ports. You can also use the Router to share resources such as computers, printers and files.
  • Page 6 1-1.5 mm Note: Mounting hardware illustrations are not † true to scale. NOTE: Linksys is not responsible for damages incurred by insecure wall-mounting hardware. Follow these instructions: Wall-Mounting Template 1. Determine where you want to mount the Router. Make Print this page at 100% size.
  • Page 7: Chapter 2: Wireless Security Checklist

    WEB: For more information on wireless security, visit www.linksysbycisco.com/security Linksys routers give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device. With MAC address filtering enabled, wireless network access is provided solely for wireless devices with specific MAC addresses.
  • Page 8: Chapter 3: Advanced Configuration

    Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you want to change its advanced settings, use the Router’s browser-based utility. This chapter describes each web page of the utility and each page’s key functions.
  • Page 9 Advanced Configuration Chapter 3 Static IP before your Internet connection terminates. The default Max Idle Time is 5 minutes. If you are required to use a permanent IP address to Keep Alive: Redial Period If you select this option, connect to the Internet, select Static IP. the Router will periodically check your Internet connection.
  • Page 10 Advanced Configuration Chapter 3 automatically re-establish your connection as soon as you attempt to access the Internet again. To use this option, select Connect on Demand. In the Max Idle Time field, enter the number of minutes you want to have elapsed before your Internet connection terminates.
  • Page 11 Advanced Configuration Chapter 3 the best MTU for your Internet connection, keep the default, Auto. Size When Manual is selected in the MTU field, this option is enabled. Leave this value in the 1200 to 1500 range. The default size depends on the Internet Connection Type: DHCP, Static IP, or Telstra: 1500 •...
  • Page 12: Setup > Ddns

    Advanced Configuration Chapter 3 DynDNS.org Static DNS 1-3 The Domain Name System (DNS) is how the Internet translates domain or website names into Internet addresses or URLs. Your ISP will provide you with at least one DNS Server IP Address. If you wish to use another, enter that IP Address in one of these fields.
  • Page 13: Setup > Mac Address Clone

    Make sure this setting is the same for all points in your MAC Address Clone feature. wireless network. For added security, you should change the default SSID (linksys) to a unique name. Standard Channel Select the appropriate channel for your wireless network. If you are not sure which channel to select, then keep the default, Auto.
  • Page 14 Advanced Configuration Chapter 3 Wireless > Wireless Security The Wireless Security screen configures the security of your wireless network. The Router supports the following wireless security mode options: WPA2 Personal, WPA Personal, and WEP. (WPA stands for Wi-Fi Protected Access, which is a security standard stronger than WEP encryption.
  • Page 15: Wireless > Wireless Mac Filter

    Advanced Configuration Chapter 3 Wireless > Wireless MAC Filter Wireless Client List This screen shows computers and other devices on Wireless access can be filtered by using the MAC addresses of the wireless network. The list can be sorted by Client the wireless devices transmitting within your network’s radius.
  • Page 16: Security > Firewall

    Advanced Configuration Chapter 3 authentication, the sender and the recipient do NOT error rate, you may slightly increase the Fragmentation use a WEP key for authentication. With Shared Key Threshold. Setting the Fragmentation Threshold too low authentication, the sender and recipient use a WEP key for may result in poor network performance.
  • Page 17: Security > Vpn Passthrough

    Advanced Configuration Chapter 3 Security > VPN Passthrough Filter Multicast Multicasting allows multiple transmissions to specific recipients at the same time. If multicasting is permitted, then the Router will allow IP The VPN Passthrough screen allows you to enable VPN multicast packets to be forwarded to the appropriate tunnels using IPSec, PPTP, or L2TP protocols to pass through the Router’s firewall.
  • Page 18: Access Restrictions > Internet Access

    Advanced Configuration Chapter 3 Access Restrictions > Internet Access The Internet Access screen allows you to block or allow specific kinds of Internet usage and traffic, such as Internet access, designated services, and websites during specific days and times. Summary Status Policies are disabled by default.
  • Page 19: Applications And Gaming > Single Port Forwarding

    Advanced Configuration Chapter 3 5. Select the appropriate option, Deny or Allow, depending on whether you want to block or allow Internet access for the computers you listed on the Internet Access PC List screen. 6. Decide which days and what times you want this policy to be enforced.
  • Page 20: Applications And Gaming > Port Range Forwarding

    Advanced Configuration Chapter 3 Applications and Gaming > Port Range Enabled Select Enabled to enable port forwarding for the applications you have defined. Forwarding Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. The Port Range Forwarding screen allows you to set up public services on your network, such as web servers, Applications &...
  • Page 21: Applications And Gaming > Dmz

    Advanced Configuration Chapter 3 Applications and Gaming > DMZ The DMZ feature allows one network computer to be exposed to the Internet for use of a special-purpose service such as Internet gaming or videoconferencing. DMZ hosting forwards all the ports at the same time to one computer.
  • Page 22: Administration > Management

    Advanced Configuration Chapter 3 Administration > Management feature enabled as well.) Otherwise, keep the default, Disabled. The Administration > Management screen allows the Allowed Remote IP Address If you want to be able to network’s administrator to manage specific Router access the Router from any external IP address, select Any functions for access and security.
  • Page 23: Administration > Log

    Advanced Configuration Chapter 3 Administration > Log Administration > Diagnostics The Router can keep logs of all traffic for your Internet The diagnostic tests (Ping and Traceroute) allow you to connection. check the connections of your network devices, including connection to the Internet. Administration >...
  • Page 24: Administration > Factory Defaults

    Administration > Factory Defaults Before upgrading the firmware, download the Router’s NOTE: Do not restore the factory defaults unless firmware upgrade file from the Linksys website, you are having difficulties with the Router and www.linksysbycisco.com. have exhausted all other troubleshooting...
  • Page 25: Status > Router

    Advanced Configuration Chapter 3 Status > Router Status > Local Network The Router screen displays information about the Router The Local Network screen displays information about the and its current settings. local, wired network. Status > Local Network Local Network Local MAC Address The MAC address of the Router’s Status >...
  • Page 26: Status > Wireless Network

    Advanced Configuration Chapter 3 DHCP Clients Table DHCP Client Table The DHCP Client Table lists computers and other devices that have been assigned IP addresses by the Router. The list can be sorted by IP Address, MAC Address, Interface, and Client Name. To remove a DHCP client, click Delete.
  • Page 27: Appendix A: Troubleshooting

    The modem does not have an Ethernet port. WEB: If your questions are not addressed here, refer Linksys website, The modem is a dial-up modem for traditional dial-up www.linksysbycisco.com service. To use the Router, you need a cable/DSL modem and high-speed Internet connection.
  • Page 28: Appendix B: Specifications

    Specifications Appendix B Appendix B: Specifications Model WRT54GH Standards IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.11b Ports Power, Internet, Ethernet (1-4) Buttons Power, Reset LEDs Power, Internet, Wireless, Ethernet (1-4) Modulations 802.11b: CCK, QPSK, BPSK 802.11g: OFDM RF Pwr (EIRP) in dBm 802.11g: Typ. 14 +/- 1.5 dBm @ Normal Temp 802.11b: Typ: 17.5 +/- 1.5 dBm @ Normal Temp...
  • Page 29: Appendix C: Warranty Information

    Your exclusive remedy and Linksys’ entire liability under TO THE EXTENT NOT PROHIBITED BY APPLICABLE this limited warranty will be for Linksys, at its option, to LAW, ALL IMPLIED WARRANTIES AND CONDITIONS (a) repair the product with new or refurbished parts,...
  • Page 30 The telephone number for Linksys Technical Support in your area can be found by clicking the “Contact Us” link on the home page of www.linksysbycisco.com. Have your product serial number and proof of purchase on hand when calling.
  • Page 31: Appendix D: Regulatory Information

    Regulatory Information Appendix D Safety Notices Appendix D: Regulatory Information WARNING: Do not use this product near water, for example, in a wet basement or near a swimming pool. FCC Statement This device complies with Part 15 of the FCC Rules. WARNING: Avoid using this product during an Operation is subject to the following two conditions: (1)
  • Page 32: Avis D'industrie Canada

    Regulatory Information Appendix D Avis d’Industrie Canada Wireless Disclaimer Cet appareil numérique de la classe B est conforme aux The maximum performance for wireless is derived from normes NMB-003 et RSS210 du Canada. IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, L’utilisation de ce dispositif est autorisée seulement aux data throughput rate, range and coverage.
  • Page 33: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    úřady. Správná likvidace a recyklace pomáhá předcházet Linksys products. Consumers are required to comply with potenciálním negativním dopadům na životní prostředí a lidské this notice for all electronic products bearing the following zdraví.
  • Page 34 Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 35 Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 36 Regulatory Information Appendix D Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
  • Page 37: Appendix E: Software End User License Agreement

    Software End User License Agreement Appendix E Appendix E: Software End THE RETURN PROCESS AND POLICIES OF THE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE. User License Agreement IN THE EVENT THAT YOU HAVE ELECTED TO OBTAIN A SUBSCRIPTION LICENSE, AS INDICATED IN YOUR ORDER, YOU ADDITIONALLY AGREE TO BE BOUND BY THE “TERMS Cisco Products...
  • Page 38 Software End User License Agreement Appendix E License Restrictions. Other than as set forth in this suitability, functionality, or legality of any sites or products Agreement, you may not (i) make or distribute copies to which links may be provided or third party services, and of the Software or its related Documentation, or you hereby waive any claim you might have against Cisco electronically transfer the Software or Documentation...
  • Page 39 Software End User License Agreement Appendix E Software can enable any other computer (on the same part of the installation process or by requesting a change primary network) to generate reports. When a computer to your software settings in the error process. Installing is enabled, that computer shows a notification that it is the software and changing these software settings may being monitored.
  • Page 40 BY APPLICABLE LAW, IN NO EVENT WILL CISCO BE LIABLE in any purchase order or elsewhere. FOR ANY LOST DATA, REVENUE OR PROFIT, OR FOR SPECIAL, Linksys, Cisco and the Cisco Logo and other trademarks INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE contained in the Software and Documentation are...
  • Page 41 Software End User License Agreement Appendix E send you Service related email messages as long as you For example, if you distribute copies of such a program, are a subscriber to the Service. If you wish to opt-out whether gratis or for a fee, you must give the recipients of receiving Service related email messages, you may all the rights that you have.
  • Page 42 Software End User License Agreement Appendix E 1. You may copy and distribute verbatim copies of the distribution of derivative or collective works based on Program’s source code as you receive it, in any medium, the Program. provided that you conspicuously and appropriately In addition, mere aggregation of another work not publish on each copy an appropriate copyright notice based on the Program with the Program (or with a...
  • Page 43 Software End User License Agreement Appendix E 4. You may not copy, modify, sublicense, or distribute on consistent application of that system; it is up to the Program except as expressly provided under the author/donor to decide if he or she is willing to this License.
  • Page 44 Software End User License Agreement Appendix E 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR When we speak of free software, we are referring to AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, freedom of use, not price. Our General Public Licenses OR ANY OTHER PARTY WHO MAY MODIFY AND/OR are designed to make sure that you have the freedom REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE,...
  • Page 45 Software End User License Agreement Appendix E Public License permits more lax criteria for linking other either verbatim or with modifications and/or translated code with the library. straightforwardly into another language. (Hereinafter, translation is included without limitation in the term We call this license the “Lesser”...
  • Page 46 Software End User License Agreement Appendix E (For example, a function in a library to compute square If distribution of object code is made by offering roots has a purpose that is entirely well-defined access to copy from a designated place, then offering independent of the application.
  • Page 47 Software End User License Agreement Appendix E a) Accompany work with complete 7. You may place library facilities that are a work based corresponding machine-readable source code on the Library side-by-side in a single library together for the Library including whatever changes were with other library facilities not covered by this License, used in the work (which must be distributed and distribute such a combined library, provided that...
  • Page 48 Software End User License Agreement Appendix E 11. If, as a consequence of a court judgment or allegation license version number, you may choose any version of patent infringement or for any other reason (not ever published by the Free Software Foundation. limited to patent issues), conditions are imposed on 14.
  • Page 49 Software End User License Agreement Appendix E Schedule 3-C 6. Redistributions of any form whatsoever must retain the following acknowledgment: “This product includes OPENSSL LICENSE software developed by the OpenSSL Project for use in If this Cisco product contains open source software the OpenSSL Toolkit (http://www.openssl.org/)”...
  • Page 50 Software End User License Agreement Appendix E 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes cryptographic software written...

Table of Contents