Linksys WRT54GL User Manual

Wireless-g broadband router
Hide thumbs Also See for WRT54GL:
Table of Contents

Advertisement

USER GUIDE
Wireless-G

Broadband Router

WRT54GL (EU)
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WRT54GL

  • Page 1: Broadband Router

    USER GUIDE Wireless-G Broadband Router WRT54GL (EU) Model:...
  • Page 2: Table Of Contents

    Table of Contents Chapter 1: Product Overview Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Back Panel .
  • Page 3 Technical Documents on www .linksys .com/international . . . . . . . . . . . . . . . . .
  • Page 4: About This Guide

    .linksys .com/glossary Network Security www .linksys .com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc . and/or its affiliates in the U .S . and certain other countries .
  • Page 5: Chapter 1: Product Overview

    LED will flash . When the diagnostic is complete, Thank you for choosing the Linksys Wireless-G Broadband the LED will be solidly lit . Router . The Router lets you access the Internet via a...
  • Page 6: Chapter 2: Wireless Security Checklist

    . These devices have a default password set Keep wireless routers, access points, or gateways away • by the factory . The Linksys default password is admin . from exterior walls and windows . Hackers know these defaults and may try to use them...
  • Page 7: Chapter 3: Advanced Configuration

    Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use . However, if you’d like to change its advanced settings, use the Router’s web-based utility .
  • Page 8 Advanced Configuration Chapter 3 Static IP before your Internet connection terminates . The default Max Idle Time is 5 minutes . If you are required to use a permanent IP address to Keep Alive: Redial Period If you select this option, connect to the Internet, select Static IP .
  • Page 9 Advanced Configuration Chapter 3 L2TP Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been L2TP is a service that applies to connections in Israel only . inactive for a specified period of time (Max Idle Time) . If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you...
  • Page 10: Setup > Ddns

    Advanced Configuration Chapter 3 Network Setup Static DNS (1-3) The Domain Name System (DNS) is how the Internet translates domain or website names into The Network Setup section changes the settings on the Internet addresses or URLs . Your ISP will provide you with at network connected to the Router’s Ethernet ports .
  • Page 11: Setup > Mac Address Clone

    Advanced Configuration Chapter 3 DynDNS.org TZO.com Setup > DDNS > TZO E-mail Address, Password, and Domain Name Enter Setup > DDNS > DynDNS the settings of the account you set up with TZO . System Select the DynDNS service you use: Dynamic, Internet IP Address The Router’s Internet IP address is Static, or Custom .
  • Page 12: Setup > Advanced Routing

    Advanced Configuration Chapter 3 Click Save Settings to apply your changes, or click Cancel exchange routing tables with the other router(s) . The Changes to cancel your changes . Router determines the network packets’ route based on the fewest number of hops between the source and the Setup >...
  • Page 13: Wireless > Wireless Security

    32 characters (use any of the characters on the keyboard) . Make sure this setting is the same for all points in your wireless network . For added security, you should change the default SSID (linksys) to a unique name . Wireless Channel Select the appropriate channel from the list provided to correspond with your network settings .
  • Page 14 Advanced Configuration Chapter 3 WPA2 Enterprise This option features WPA2 used in coordination with a RADIUS server . (This should only be used when a RADIUS server is connected to the Router .) Security Mode > WPA Enterprise WPA Algorithm WPA supports two encryption methods, TKIP and AES, with dynamic encryption keys .
  • Page 15: Wireless > Wireless Mac Filter

    Advanced Configuration Chapter 3 Wireless > Wireless MAC Filter IMPORTANT: If you are using WEP encryption, always remember that each device in your Wireless access can be filtered by using the MAC addresses of wireless network MUST use the same WEP the wireless devices transmitting within your network’s radius .
  • Page 16: Wireless > Advanced Wireless Settings

    Advanced Configuration Chapter 3 Wireless > Advanced Wireless Settings to transmit to the Router in an environment with heavy 802 .11b traffic . This function boosts the Router’s ability This Wireless > Advanced Wireless Settings screen is used to catch all Wireless-G transmissions but will severely to set up the Router’s advanced wireless functions .
  • Page 17: Security > Firewall

    Advanced Configuration Chapter 3 Security > Firewall Security > VPN Passthrough The Security > Firewall screen is used to configure a firewall The Security > VPN Passthrough screen allows you to enable that can filter out various types of unwanted traffic on the VPN tunnels using IPSec, PPTP, or L2TP protocols to pass Router’s local network .
  • Page 18: Access Restrictions > Internet Access

    Advanced Configuration Chapter 3 Access Restrictions > Internet Access To enable this policy, select Enable . Enter a Policy Name in the field provided . The Access Restrictions > Internet Access screen allows you Edit List of PCs to select which PCs will be affected Click to block or allow specific kinds of Internet usage and by the policy .
  • Page 19: Applications And Gaming > Port Range Forward

    Advanced Configuration Chapter 3 Port Range Forward To add a service, enter the service’s name in the Service Name field . Select its protocol from the Protocol drop- To forward a port, enter the information on each line for down menu, and enter its range in the Port Range fields . the criteria required .
  • Page 20: Applications And Gaming > Dmz

    Advanced Configuration Chapter 3 Applications and Gaming > QoS Start Port Enter the starting port number of the Triggered Range . Quality of Service (QoS) ensures better service to End Port Enter the ending port number of the Triggered high-priority types of network traffic, which may Range .
  • Page 21: Administration > Management

    Advanced Configuration Chapter 3 Priority Select High or Low in the Priority column . The Router’s four ports have been assigned low priority by default . Flow Control If you want the Router to control the transmission of data between network devices, select Enabled .
  • Page 22: Administration > Log

    Advanced Configuration Chapter 3 Administration > Log The Router can keep logs of all traffic for your Internet connection . The Ping Test Traceroute Test Administration > Log Traceroute To test the performance of a connection, click Traceroute to open the Traceroute Test screen . Enter the address of the PC whose connection you wish to test To disable the Log function, keep the default setting, and click Traceroute .
  • Page 23: Administration > Firmware Upgrade

    Router or the new firmware has a feature you want to use . Administration > Firmware Upgrade Before upgrading the firmware, download the Router’s firmware upgrade file from the Linksys website, www . linksys .com . Then extract the file . Administration > Factory Defaults...
  • Page 24: Status > Local Network

    Advanced Configuration Chapter 3 Status > Local Network Status > Wireless The Status > Local Network screen displays the status of The Status > Wireless screen displays the status of your your network . wireless network . Status > Wireless Status >...
  • Page 25: Appendix A: Troubleshooting

    If your questions are not addressed here, The Router does not replace your modem . You still need refer to the Linksys website, www.linksys.com . your DSL modem in order to use the Router . Connect the telephone line to the DSL modem, insert the setup CD into your computer, and then follow the on-screen instructions .
  • Page 26: Appendix B: Specifications

    Specifications Appendix B Appendix B: Specifications Model WRT54GL Standards IEEE 802 .3, IEEE 802 .3u, IEEE 802 .11g, IEEE 802 .11b Channels 11 Channels (US, Canada) 13 Channels (Europe, Japan) Ports Internet: One 10/100 RJ-45 Port LAN: Four 10/100 RJ-45 Switched...
  • Page 27: Appendix C: Warranty Information

    Linksys’ entire liability under this limited warranty an implied warranty lasts, so the above limitation may not will be for Linksys, at its option, to (a) repair the product apply to you . This limited warranty gives you specific legal...
  • Page 28 If any portion of this limited warranty is found to be void or unenforceable, its remaining provisions shall remain in full force and effect . Please direct all inquiries to: Linksys, P .O . Box 18558, Irvine, CA 92623 . For more information, please contact us www.linksys.com...
  • Page 29: Appendix D: Regulatory Information

    Regulatory Information Appendix D Appendix D: Industry Canada Statement Regulatory Information This Class B digital apparatus complies with Canadian ICES-003 and RSS210 . Operation is subject to the following two conditions: FCC Statement This device may not cause interference and This product has been tested and complies with the This device must accept any interference, including specifications for a Class B digital device, pursuant to Part...
  • Page 30: Wireless Disclaimer

    Regulatory Information Appendix D Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802 .11 specifications . Actual performance can vary, including lower wireless network capacity, data throughput rate, range and coverage . Performance depends on many factors, conditions and variables, including distance from the access point, volume of network traffic, building materials and construction, operating system used, mix of wireless products used,...
  • Page 31: Declaration Of Conformity With Regard To Eu Directive 1999/5/Ec (R&Tte Directive)

    . Then select your product . [Latvian]: saistītajiem noteikumiem . If you need any other technical documentation, see the “Technical Documents on www .linksys .com/international” Šis įrenginys tenkina 1999/5/EB Direktyvos Lietuvių section, as shown later in this appendix .
  • Page 32: Wireless Equipment (Wireless-N/G/A/B Products)

    Wireless LANs” provides an overview of the regulatory CE Marking requirements applicable for the 2,4- and 5-GHz bands . For the Linksys Wireless-N, -G, -B, and/or -A products, Later in this document you will find an overview of the following CE mark, notified body number (where...
  • Page 33: Product Usage Restrictions

    The use of software or firmware not supported/provided Allocation Table for Italy . Unless this 2,4-GHz wireless LAN by Linksys may result that the equipment is no longer product is operating within the boundaries of the owner’s compliant with the regulatory requirements .
  • Page 34: Electric And Electronic Equipment (Weee)

    úřady . Správná likvidace a recyklace pomáhá předcházet Linksys products . Consumers are required to comply with potenciálním negativním dopadům na životní prostředí a lidské this notice for all electronic products bearing the following zdraví...
  • Page 35 Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 36 Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 37 ľudí . Ak máte záujem o podrobnejšie WEB: For additional information, please visit informácie o likvidácii starého zariadenia, obráťte sa, prosím, na www.linksys.com/international miestne orgány, organizácie zaoberajúce sa likvidáciou odpadov alebo obchod, v ktorom ste si produkt zakúpili . 8040410A-ST...
  • Page 38: Appendix E: Software License Agreement

    Schedules 2, 3 or 4 below as applicable . “Software” includes, and this Agreement will apply to BY DOWNLOADING OR INSTALLING THE SOFTWARE, (a) the software of Linksys or its suppliers provided in or OR USING THE PRODUCT CONTAINING THE SOFTWARE, with the applicable Linksys product, excluding technology...
  • Page 39 GPL or other open source code in this Software on a http://www.gnu.org/copyleft/gpl.html CD, Linksys will mail to You a CD with such code for $9 .99 plus the cost of shipping, upon request . GNU GENERAL PUBLIC LICENSE Term and Termination.
  • Page 40 Software License Agreement Appendix E GNU General Public License is intended to guarantee your TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND freedom to share and change free software–to make sure MODIFICATION the software is free for all its users . This General Public This License applies to any program or other work License applies to most of the Free Software Foundation’s which contains a notice placed by the copyright...
  • Page 41 Software License Agreement Appendix E If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code . started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
  • Page 42 General Public License from time to time . Such new versions will be similar in If this Linksys product contains open source software spirit to the present version, but may differ in detail to licensed under Version 2 .1 of the “GNU Lesser General Public address new problems or concerns .
  • Page 43 Software License Agreement Appendix E GNU LESSER GENERAL PUBLIC LICENSE To protect each distributor, we want to make it very clear that there is no warranty for the free library . Also, if the Version 2 .1, February 1999 library is modified by someone else and passed on, the recipients should know that what they have is not the Copyright (C) 1991, 1999 Free Software Foundation, Inc .
  • Page 44 Software License Agreement Appendix E freedom and the wherewithal to run that program using a You may copy and distribute verbatim copies of the modified version of the Library . Library’s complete source code as you receive it, in any medium, provided that you conspicuously and The precise terms and conditions for copying, distribution appropriately publish on each copy an appropriate and modification follow .
  • Page 45 Software License Agreement Appendix E Thus, it is not the intent of this section to claim When a “work that uses the Library” uses material from rights or contest your rights to work written entirely a header file that is part of the Library, the object code by you;...
  • Page 46 Software License Agreement Appendix E Use a suitable shared library mechanism for linking You may not copy, modify, sublicense, link with, or with the Library . A suitable mechanism is one that distribute the Library except as expressly provided (1) uses at run time a copy of the library already under this License .
  • Page 47 If you wish to incorporate parts of the Library into other free programs whose distribution conditions are If this Linksys product contains open source software incompatible with these, write to the author to ask for licensed under the OpenSSL license: permission .
  • Page 48 Software License Agreement Appendix E OpenSSL License Original SSLeay License Copyright © 1998-2007 The OpenSSL Project . All rights Copyright © 1995-1998 Eric Young (eay@cryptsoft .com)All reserved . rights reserved . Redistribution and use in source and binary forms, with This package is an SSL implementation written by Eric or without modification, are permitted provided that the Young (eay@cryptsoft .com) .
  • Page 49 Software License Agreement Appendix E DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE .

Table of Contents