Linksys WRT54G2 - Wireless-G Broadband Router User Manual
Linksys WRT54G2 - Wireless-G Broadband Router User Manual

Linksys WRT54G2 - Wireless-G Broadband Router User Manual

Wireless-g broadband router
Hide thumbs Also See for WRT54G2 - Wireless-G Broadband Router:
Table of Contents

Advertisement

USER GUIDE
Wireless-G Broadband Router
WRT54G2
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WRT54G2 - Wireless-G Broadband Router

  • Page 1 USER GUIDE Wireless-G Broadband Router WRT54G2 Model:...
  • Page 2: About This Guide

    Glossary www.linksysbycisco.com/glossary Network Security www.linksysbycisco.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Other brands and product names are trademarks or registered trademarks of their respective holders.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview Front Panel..........1 Back Panel .
  • Page 4 Table of Contents Appendix D: Regulatory Information FCC Statement ..........28 FCC Radiation Exposure Statement .
  • Page 5: Chapter 1: Product Overview

    Product Overview is flashing, the Router is actively sending or receiving data over the network. Thank you for choosing the Linksys by Cisco Wireless-G Internet (Green) The Internet LED lights up Broadband Router. The Router lets you access the Internet...
  • Page 6: Wall-Mounting Placement/Template

    Router down until the screws fit snugly into the to scale. wall-mount slots. NOTE: Linksys is not responsible for damages incurred by insecure wall-mounting hardware. 152 mm Print this page at 100% size. Cut along the dotted line, and place on the wall to drill precise spacing.
  • Page 7: Chapter 2: Wireless Security Checklist

    Combine letters and numbers to avoid using 3. Enable MAC address filtering standard words that can be found in the dictionary. Linksys routers give you the ability to enable Media Access WEB: Control (MAC) address filtering. The MAC address is a For more information on wireless security, visit www.linksys.com/security...
  • Page 8: Chapter 3: Advanced Configuration

    Advanced Configuration Chapter 3 Chapter 3: Setup > Basic Setup Advanced Configuration The first screen that appears is the Basic Setup screen. This allows you to change the Router’s general settings. After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use.
  • Page 9 Advanced Configuration Chapter 3 Static IP you are disconnected, then the Router will automatically re-establish your connection. To use this option, select If you are required to use a permanent IP address to Keep Alive. In the Redial Period field, specify how often connect to the Internet, select Static IP.
  • Page 10 Advanced Configuration Chapter 3 Keep Alive: Redial Period If you select this option, the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re-establish your connection. To use this option, select Keep Alive. In the Redial Period field, specify how often the Router should check the Internet connection.
  • Page 11: Setup > Ddns

    Advanced Configuration Chapter 3 MTU is the Maximum Transmission Unit. It specifies Router’s default IP address is 192.168.1.1, the Starting IP the largest packet size permitted for Internet transmission. Address must be 192.168.1.2 or greater, but smaller than Select Manual if you want to manually enter the largest 192.168.1.253.
  • Page 12: Setup > Mac Address Clone

    Advanced Configuration Chapter 3 DDNS TZO.com The Router offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address. It is useful when you are hosting your own website, FTP server, or other server behind the Router.
  • Page 13: Setup > Advanced Routing

    Advanced Configuration Chapter 3 Router is chosen, Dynamic Routing will be available as User Defined Entry Enter the MAC Address registered with your ISP here. an option. Clone Your PC’s MAC Clicking this button will clone the Dynamic Routing MAC address of the computer you are using. This feature enables the Router to automatically Click Save Settings to apply your changes, or click Cancel adjust to physical changes in the network’s layout and...
  • Page 14: Wireless > Basic Wireless Settings

    It is case-sensitive and must not exceed 32 keyboard characters. For added security, you should NOTE: Wi-Fi Protected Setup configures one change the default SSID (linksys) to a unique name. client device at a time. Repeat the instructions Wireless Channel Select the channel from the list for each client device that supports Wi-Fi provided to correspond with your network settings.
  • Page 15: Wireless > Wireless Security

    Advanced Configuration Chapter 3 Wireless Security Method #1 Use this method if your client device has a Wi-Fi Protected Wireless security is strongly recommended, and WPA2 is Setup button. the strongest method available. Use WPA2 if it is supported by all of your wireless devices. Wi-Fi Protected Setup button on Click or press the the client device.
  • Page 16 Advanced Configuration Chapter 3 WPA Personal RADIUS Server Address Enter the IP Address of the RADIUS server. NOTE: If you are using WPA2 or WPA, each RADIUS Port Enter the port number of the RADIUS device in your wireless network MUST use the server.
  • Page 17: Wireless > Wireless Mac Filter

    Advanced Configuration Chapter 3 RADIUS IMPORTANT: If you are using WEP encryption, each device in your wireless network MUST This option features WEP used in coordination with a use the same WEP encryption method and RADIUS server. (This should only be used when a RADIUS encryption key, or else your wireless network will server is connected to the Router.) not function properly.
  • Page 18: Wireless > Advanced Wireless Settings

    Advanced Configuration Chapter 3 Wireless MAC Filter Wireless MAC Filter To filter wireless users by MAC Address, either permitting or blocking access, click Enable. If you do not wish to filter users by MAC Address, keep the default, Disable. Prevent Select this to block wireless access by MAC Address.
  • Page 19: Security > Firewall

    Advanced Configuration Chapter 3 manufacturer of your wireless products. To turn on the Frame Burst option, select Enable. The default is Disable. Beacon Interval A beacon is a packet broadcast by the Router to synchronize the wireless network. The default is 100.
  • Page 20: Access Restrictions > Internet Access

    Advanced Configuration Chapter 3 Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, keep the default, Enable. PPTP Passthrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be...
  • Page 21: Applications And Gaming > Port Range Forward

    Advanced Configuration Chapter 3 select a PC by MAC Address or IP Address. You can also To modify a service, select it from the list on the right. enter a range of IP Addresses if you want this policy Change its name, protocol setting, or port range. Then to affect a group of PCs.
  • Page 22: Applications & Gaming > Port Triggering

    Advanced Configuration Chapter 3 Port Range Forward Start Port Enter the starting port number of the Triggered Range. To forward a port, enter the information on each line for End Port Enter the ending port number of the Triggered the criteria required. Range.
  • Page 23: Applications And Gaming > Qos

    Advanced Configuration Chapter 3 Applications and Gaming > QoS Priority Select High or Low in the Priority column. The Router’s four ports have been assigned low priority by Quality of Service (QoS) ensures better service to default. high-priority types of network traffic, which may Flow Control If you want the Router to control the involve demanding, real-time applications, such as...
  • Page 24: Administration > Log

    Advanced Configuration Chapter 3 Administration > Log The Router can keep logs of all traffic for your Internet connection. Administration > Log Administration > Management Router Password To disable the Log function, keep the default setting, Disable. To monitor traffic between the network and the Local Router Access Internet, select Enable.
  • Page 25: Administration > Factory Defaults

    Administration > Upgrade Firmware Clear Log to clear the screen. Click Close to return to the Before upgrading the firmware, download the Router’s Diagnostics screen. firmware upgrade file from the Linksys website, www.linksysbycisco.com. Upgrade Firmware Please select a file to upgrade Click Browse and select the firmware upgrade file.
  • Page 26: Status > Router

    Advanced Configuration Chapter 3 Status > Local Network Restore Configuration Please select a file to restore Click Browse and select The Status > Local Network screen displays the status of the configuration file. Then click Restore. your network. Status > Router The Status >...
  • Page 27: Status > Wireless

    Advanced Configuration Chapter 3 DHCP Client Table The DHCP Client Table lists computers and other devices that have been assigned IP addresses by the Router. The list can be sorted by IP Address, MAC Address, Interface, and Client Name. To remove a DHCP client, select the Delete check box, and then click Delete.
  • Page 28: Appendix A: Troubleshooting

    WEB: If your questions are not addressed Internet port. here, refer Linksys website, The Router does not replace your modem. You still need www.linksysbycisco.com your DSL modem in order to use the Router. Connect the telephone line to the DSL modem, insert the setup CD into your computer, and then follow the on-screen instructions.
  • Page 29: Appendix B: Specifications

    Specifications Appendix B Appendix B: Specifications Model WRT54G2 Standards IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.11b Ports Internet, Ethernet (1-4), Power Button Reset, Wi-Fi Protected Setup™ LEDs Power, Internet, Ethernet (1-4), Wireless, Wi-Fi Protected Setup™ Cabling Type CAT5 Number of Antennas 1 Internal Antenna Detachable RF Power Output 18 dBm...
  • Page 30: Appendix C: Warranty Information

    Your exclusive remedy and Linksys’ entire liability under OF MERCHANTABILITY, SATISFACTORY QUALITY OR this limited warranty will be for Linksys, at its option, to FITNESS FOR A PARTICULAR PURPOSE ARE LIMITED TO (a) repair the product with new or refurbished parts, THE DURATION OF THE WARRANTY PERIOD.
  • Page 31 This limited warranty is governed by the laws of the jurisdiction in which the Product was purchased by you. Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623. Wireless-G Broadband Router...
  • Page 32: Appendix D: Regulatory Information

    Regulatory Information Appendix D Appendix D: Safety Notices Regulatory Information WARNING: Do not use this product near water, for example, in a wet basement or near a swimming pool. FCC Statement This device complies with Part 15 of the FCC Rules. WARNING: Avoid using this product during an Operation is subject to the following two conditions: (1)
  • Page 33: Avis D'industrie Canada

    Regulatory Information Appendix D Avis d’Industrie Canada Wireless Disclaimer Cet appareil numérique de la classe B est conforme aux The maximum performance for wireless is derived from normes NMB-003 et RSS210 du Canada. IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, L’utilisation de ce dispositif est autorisée seulement aux data throughput rate, range and coverage.
  • Page 34: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    úřady. Správná likvidace a recyklace pomáhá předcházet Linksys products. Consumers are required to comply with potenciálním negativním dopadům na životní prostředí a lidské this notice for all electronic products bearing the following zdraví.
  • Page 35 Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 36 Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 37 Regulatory Information Appendix D Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
  • Page 38: Appendix E: Software End User License Agreement

    Software End User License Agreement Appendix E Appendix E: Software End THE RETURN PROCESS AND POLICIES OF THE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE. User License Agreement IN THE EVENT THAT YOU HAVE ELECTED TO OBTAIN A SUBSCRIPTION LICENSE, AS INDICATED IN YOUR ORDER, YOU ADDITIONALLY AGREE TO BE BOUND BY THE “TERMS Cisco Products...
  • Page 39 Software End User License Agreement Appendix E License Restrictions. Other than as set forth in this suitability, functionality, or legality of any sites or products Agreement, you may not (i) make or distribute copies to which links may be provided or third party services, and of the Software or its related Documentation, or you hereby waive any claim you might have against Cisco electronically transfer the Software or Documentation...
  • Page 40 Software End User License Agreement Appendix E Software can enable any other computer (on the same part of the installation process or by requesting a change primary network) to generate reports. When a computer to your software settings in the error process. Installing is enabled, that computer shows a notification that it is the software and changing these software settings may being monitored.
  • Page 41 BY APPLICABLE LAW, IN NO EVENT WILL CISCO BE LIABLE in any purchase order or elsewhere. FOR ANY LOST DATA, REVENUE OR PROFIT, OR FOR SPECIAL, Linksys, Cisco and the Cisco Logo and other trademarks INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE contained in the Software and Documentation are...
  • Page 42 Software End User License Agreement Appendix E send you Service related email messages as long as you For example, if you distribute copies of such a program, are a subscriber to the Service. If you wish to opt-out whether gratis or for a fee, you must give the recipients of receiving Service related email messages, you may all the rights that you have.
  • Page 43 Software End User License Agreement Appendix E You may copy and distribute verbatim copies of the distribution of derivative or collective works based on Program’s source code as you receive it, in any medium, the Program. provided that you conspicuously and appropriately In addition, mere aggregation of another work not publish on each copy an appropriate copyright based on the Program with the Program (or with a...
  • Page 44 Software End User License Agreement Appendix E You may not copy, modify, sublicense, or distribute on consistent application of that system; it is up to the Program except as expressly provided under the author/donor to decide if he or she is willing to this License.
  • Page 45 Software End User License Agreement Appendix E IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR When we speak of free software, we are referring to AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, freedom of use, not price. Our General Public Licenses OR ANY OTHER PARTY WHO MAY MODIFY AND/OR are designed to make sure that you have the freedom REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE,...
  • Page 46 Software End User License Agreement Appendix E Public License permits more lax criteria for linking other either verbatim or with modifications and/or translated code with the library. straightforwardly into another language. (Hereinafter, translation is included without limitation in the term We call this license the “Lesser”...
  • Page 47 Software End User License Agreement Appendix E (For example, a function in a library to compute square If distribution of object code is made by offering roots has a purpose that is entirely well-defined access to copy from a designated place, then offering independent of the application.
  • Page 48 Software End User License Agreement Appendix E Accompany work with complete You may place library facilities that are a work based corresponding machine-readable source code on the Library side-by-side in a single library together for the Library including whatever changes were with other library facilities not covered by this License, used in the work (which must be distributed and distribute such a combined library, provided that...
  • Page 49 Software End User License Agreement Appendix E If, as a consequence of a court judgment or allegation license version number, you may choose any version of patent infringement or for any other reason (not ever published by the Free Software Foundation. limited to patent issues), conditions are imposed on If you wish to incorporate parts of the Library into you (whether by court order, agreement or otherwise)
  • Page 50 Software End User License Agreement Appendix E Schedule 3-C Redistributions of any form whatsoever must retain the following acknowledgment: “This product includes OPENSSL LICENSE software developed by the OpenSSL Project for use in If this Cisco product contains open source software the OpenSSL Toolkit (http://www.openssl.org/)”...
  • Page 51 Software End User License Agreement Appendix E Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes cryptographic software written...

Table of Contents