Linksys Vonage WRTP54G Installation And Troubleshooting Manual

2.4ghz wireless-g broadband router with 2 phone ports
Hide thumbs Also See for Vonage WRTP54G:
Table of Contents

Advertisement

Quick Links

®
A Division of Cisco Systems, Inc.
2.4
GHz
Wireless-G
802.11g
Broadband Router with 2 Phone Ports
Voice
Installation and Troubleshooting Guide
WRTP54G
Model No.

Advertisement

Table of Contents
loading

Summary of Contents for Linksys Vonage WRTP54G

  • Page 1 ® A Division of Cisco Systems, Inc. Wireless-G 802.11g Broadband Router with 2 Phone Ports Voice Installation and Troubleshooting Guide WRTP54G Model No.
  • Page 3 Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2005 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
  • Page 4 Wireless-G Broadband Router with 2 Phone Ports...
  • Page 5: Table Of Contents

    Table of Contents Chapter 1: Introduction Welcome What’s in this Guide? Chapter 2: Planning Your Wireless Network Network Topology Ad-Hoc versus Infrastructure Mode Network Layout Chapter 3: Getting to Know the Router The Back Panel The Front Panel Chapter 4: Connecting the Router Overview Connection Instructions Placement Options...
  • Page 6 Address for Your Ethernet Adapter Windows 98 or Me Instructions Windows 2000 or XP Instructions For the Router’s Web-based Utility Appendix D: Windows Help Appendix E: Glossary Appendix F: Specifications Appendix G: Warranty Information Appendix H: Regulatory Information Appendix I: Contact Information Vonage Linksys...
  • Page 7 List of Figures Figure 3-1: Back Panel Figure 3-2: Front Panel Figure 4-1: Router Connection Diagram Figure 4-1: Connect the Modem Figure 4-2: Connect a Telephone Figure 4-3: Connect a PC Figure 4-4: Connect the Power Figure 4-5: Attach the Stand to the Router Figure 4-6: Measurement between Wall-Mount Slots Figure 5-1: Router’s IP Address Figure 5-2: Router Login...
  • Page 8 Wireless-G Broadband Router with 2 Phone Ports Figure 5-37: DHCP Active IP Table Figure 5-38: Status Tab - Router Figure 5-39: Status Tab - Wireless Figure 5-40: Wireless Client MAC List Figure 5-41: Status Tab - Voice Figure 5-42: Voice Tab Figure C-1: IP Configuration Screen Figure C-2: MAC/Adapter Address Figure C-3: MAC/Physical Address...
  • Page 9: Chapter 1: Introduction

    Chapter 1: Introduction Welcome Thank you for choosing the Linksys Wireless-G Broadband Router with 2 Phone Ports. This Router will allow you to network wirelessly better than ever, sharing Internet access, files and fun, easily and securely. Plus, after you have set up your Vonage service, you can make phone or fax calls using your Internet connection.
  • Page 10: What's In This Guide

    802.11g standards and wired networks, allowing them to communicate with each other. To create your network, install and set up the Router. To guide you through the process, Linksys strongly recommends that you run the Setup Wizard on the Setup CD-ROM. If you prefer to manually set up the Router, use the instructions in the Quick Installation or this Installation and Troubleshooting Guide to help you.
  • Page 11 You also have other chapters available for reference: • Chapter 1: Introduction This chapter describes the Router’s applications and this Installation and Troubleshooting Guide. • Chapter 2: Planning Your Wireless Network This chapter describes the basics of wireless networking. • Appendix A: Troubleshooting This appendix describes some possible problems and solutions, as well as frequently asked questions, regarding installation and use of the Router.
  • Page 12 Appendix H: Regulatory Information This appendix supplies the regulatory information regarding the Router. • Appendix I: Contact Information This appendix provides contact information for a variety of Linksys resources, including Technical Support, as well as Vonage. Chapter 1: Introduction What’s in this Guide?
  • Page 13: Chapter 2: Planning Your Wireless Network

    Chapter 2: Planning Your Wireless Network Network Topology A wireless local area network (WLAN) is exactly like a regular local area network (LAN), except that each computer in the WLAN uses a wireless device to connect to the network. Computers in a WLAN share the same frequency channel and SSID, which is an identification name shared by the wireless devices belonging to the same wireless network.
  • Page 14: Network Layout

    Ethernet network ports. To add more ports, any of the Broadband Router's Ethernet network ports can be connected to any of Linksys's switches. With these, and many other, Linksys products, your networking options are limitless. Go to the Linksys website at www.linksys.com for more information about products that work with the Wireless-G Broadband Router with 2 Phone Ports.
  • Page 15: Chapter 3: Getting To Know The Router

    Chapter 3: Getting to Know the Router The Back Panel The Router’s ports and the Reset button are located on the back panel of the Router. Figure 3-1: Back Panel Internet This Internet port connects to your cable or DSL modem. Phone1 For your primary Vonage line, the Phone1 port allows you to connect the Router to your telephone (or fax machine) using an RJ-11 telephone cable (not included).
  • Page 16: The Front Panel

    Wireless-G Broadband Router with 2 Phone Ports The Front Panel The Router’s LEDs, which inform you about network activities, are located on the front panel. Figure 3-2: Front Panel POWER Blue/Red. The POWER LED lights up blue when the Router is powered on. If the blue LED is flashing, the Router is booting up or upgrading its firmware.
  • Page 17: Chapter 4: Connecting The Router

    Chapter 4: Connecting the Router Overview To begin installation of the Router, you will connect the Router to your PCs, telephone(s) or fax machine(s), and cable or DSL modem. The following connection diagram illustrates a basic network setup with wired connections to one desktop PC and telephone and a wireless connection to one notebook PC.
  • Page 18: Connection Instructions

    Wireless-G Broadband Router with 2 Phone Ports Connection Instructions 1. Make sure that all of your hardware is powered off, including the Router, PCs, and broadband modem. 2. Attach the antenna to the Router’s antenna port. 3. Connect your broadband modem’s Ethernet cable to the Router’s Internet port. 4.
  • Page 19: Placement Options

    Placement Options There are three ways to place the Router. The first way is to place it horizontally on a surface, so it sits on its four rubber feet. The second way is to stand the Router vertically on a surface. The third way is to mount it on a wall. The second and third options are explained in further detail below.
  • Page 20: Figure 4-6: Measurement Between Wall-Mount Slots

    Wireless-G Broadband Router with 2 Phone Ports Wall-Mount Option The Router has four wall-mount slots on its bottom panel. The distance between two adjacent slots is 62 mm (2.44 inches). Before you begin, make sure you have four screws that are size #4—this indicates a diameter measurement of 0.112 inches (2.845 mm).
  • Page 21: Chapter 5: Configuring The Router

    Chapter 5: Configuring the Router Overview Linksys recommends using the Setup CD-ROM for first-time installation of the Router. If you do not wish to run the Setup Wizard on the Setup CD-ROM, then you can use the Web-based Utility to configure the Router. For advanced users, you may configure the Router’s advanced settings through the Web-based Utility.
  • Page 22 Wireless-G Broadband Router with 2 Phone Ports Setup • Basic Setup. Enter the Internet connection and network settings on this screen. • DDNS. Enable the Router’s Dynamic Domain Name System (DDNS) feature on this screen. • MAC Address Clone. If you need to clone a MAC address onto the Router, use this screen. •...
  • Page 23: Access Restrictions

    Access Restrictions • Filter. To block specific users from Internet access, you can set up IP address, port, and MAC address filtering. • Device Access Control. Use this screen to control remote access of the Router. Applications & Gaming • Port Range Forwarding.
  • Page 24: How To Access The Web-Based Utility

    Wireless-G Broadband Router with 2 Phone Ports • Router. This screen provides status information about the Router. • Wireless. This screen provides status information about the Router’s wireless network. • Voice. This screen provides status information about your Vonage phone line(s). Voice Access to the Voice tab is restricted by Vonage.
  • Page 25: The Setup Tab - Basic Setup

    The Setup Tab - Basic Setup The Basic Setup screen is the first screen you see when you access the Web-based Utility. Internet Setup The Internet Setup section configures the Router for your Internet connection type. This information can be obtained from your ISP.
  • Page 26: Figure 5-4: Static Ip

    Wireless-G Broadband Router with 2 Phone Ports Static IP If you are required to use a permanent IP address, then select Static IP. IP Address. This is the IP address that the Router has, when seen from the Internet. Your ISP will provide you with the IP Address you need to specify here.
  • Page 27: Figure 5-5: Pppoe

    button. If you want your Internet connection to remain on at all times, enter 0 in the Idle Timeout field. Otherwise, enter the number of minutes you want to have elapsed before your Internet access disconnects. Keep Alive and Redial Period. This option keeps your Internet access connected indefinitely, even when it sits idle.
  • Page 28 Wireless-G Broadband Router with 2 Phone Ports Router IP The values for the Router’s Local IP Address and Subnet Mask are shown here. In most cases, keeping the default values will work. Local IP Address. The default value is 192.168.15.1. Subnet Mask.
  • Page 29: The Setup Tab - Ddns

    Client Lease Time. The Client Lease Time is the amount of time a network user will be allowed connection to the Router with their current dynamic IP address. Enter the amount of time, in minutes, that the user will be “leased” this dynamic IP address.
  • Page 30: Figure 5-6: Setup Tab - Ddns (Dyndns.org)

    Wireless-G Broadband Router with 2 Phone Ports DDNS DDNS Service. If you use DynDNS.org, then select DynDNS.org. If you use TZO, then select TZO.com. The features available on the DDNS screen will vary, depending on which DDNS service provider you use. DynDNS.org User Name, Password, and Host Name.
  • Page 31: The Setup Tab - Mac Address Clone

    The Setup Tab - MAC Address Clone A MAC address is a 12-digit code assigned to a unique piece of hardware for identification, like a social security number. Some ISPs will require you to register a MAC address in order to access the Internet. If you do not wish to re-register the MAC address with your ISP, you may assign the MAC address you have currently registered with your ISP to the Router with the MAC Address Clone feature.
  • Page 32: The Setup Tab - Advanced Routing

    Wireless-G Broadband Router with 2 Phone Ports The Setup Tab - Advanced Routing The Advanced Routing screen allows you to configure the firewall, Network Address Translation (NAT), dynamic routing, and static routing settings. Advanced Routing Firewall & NAT. The Stateful Packet Inspection (SPI) firewall reviews data packets entering your network. NAT is a security feature that enables the Router to translate IP addresses of your local area network to a different IP address for the Internet.
  • Page 33: Figure 5-10: Routing Table Entry List

    Subnet Mask. The Subnet Mask determines which portion of a Destination IP address is the network portion, and which portion is the host portion. Gateway. This is the IP address of the gateway device that allows for contact between the Router and the remote network or host.
  • Page 34: The Wireless Tab - Basic Wireless Settings

    (use any of the characters on the keyboard). Make sure this setting is the same for all points in your wireless network. For added security, you should change the default SSID (linksys) to a unique name. Wireless Channel. Select the appropriate channel from the list provided to correspond with your network settings.
  • Page 35: The Wireless Tab - Wireless Security

    The Wireless Tab - Wireless Security The Wireless Security settings configure the security of your wireless network. If you do not want to use wireless security, keep the default, Disabled. There are four wireless security mode options supported by the Router: WPA Pre-Shared Key, WPA RADIUS, RADIUS, and WEP.
  • Page 36: Figure 5-13: Wireless Tab - Wireless Security (Wpa-Radius)

    Wireless-G Broadband Router with 2 Phone Ports WPA-RADIUS. This option features WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) Select TKIP or AES from the WPA Algorithm drop-down menu.
  • Page 37: Figure 5-15: Wireless Tab - Wireless Security (Wep)

    WEP. WEP is a basic encryption method, which is not as secure as WPA. To indicate which WEP key to use, select the appropriate Default Transmit Key number. Select a level of WEP encryption, 64 bits 10 hex digits or 128 bits 26 hex digits.
  • Page 38: The Wireless Tab - Wireless Mac Filter

    Wireless-G Broadband Router with 2 Phone Ports The Wireless Tab - Wireless MAC Filter Wireless MAC Filter Wireless MAC Filter. If you want to filter wireless access by MAC address, select Enable. Otherwise, select Disable. Click Prevent to block access for the designated computers, or click Permit only to permit access for the designated computers.
  • Page 39: The Wireless Tab - Advanced Wireless Settings

    The Wireless Tab - Advanced Wireless Settings This tab is used to set up the Router’s advanced wireless functions. These settings should only be adjusted by an expert administrator as incorrect settings can reduce wireless performance. Advanced Wireless Settings Preamble Type. The preamble defines the length of the CRC block for communication between the Router and the roaming wireless adapters.
  • Page 40 Wireless-G Broadband Router with 2 Phone Ports Power Level. You can adjust the output power of the Router to get the appropriate coverage for your wireless network. Select the percentage of power you need for your environment. If you are not sure which setting to select, then keep the default setting, Full.
  • Page 41: The Security Tab - Firewall

    The Security Tab - Firewall When you click the Security tab, you will see the Firewall screen. You can use this screen to enable a variety of web filters, which will enhance the firewall protecting your network. Web Filters Filter Proxy. Use of WAN proxy servers may compromise the Gateway's security. Denying Filter Proxy will disable access to any WAN proxy servers.
  • Page 42: The Access Restrictions Tab - Filter

    Wireless-G Broadband Router with 2 Phone Ports The Access Restrictions Tab - Filter Filters can block specific internal users from accessing the Internet, anonymous Internet requests, and/or multicasting. Filter IP Address Range You can create up to five different IP Address filters. To set up a filter, enter the IP address you wish to filter in the field provided.
  • Page 43 Block WAN Requests Use these features to enhance your network’s security and filter multicasting. Block Anonymous Internet Requests. This keeps your network from being “pinged” or detected and reinforces your network security by hiding your network ports, so it is more difficult for intruders to work their way into your network.
  • Page 44: The Access Restrictions Tab - Device Access Control

    Wireless-G Broadband Router with 2 Phone Ports The Access Restrictions Tab - Device Access Control Use this screen to control local and remote access to the Router’s management ports via different services. Access Control Enable Access Control. If you want to control access to the Router’s management ports via the services listed below, click the checkbox.
  • Page 45: The Applications & Gaming Tab - Port Range Forwarding

    The Applications & Gaming Tab - Port Range Forwarding When you click the Applications & Gaming tab, you will see the Port Range Forwarding screen. Port Range Forwarding sets up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized Internet applications.
  • Page 46: The Applications & Gaming Tab - Port Triggering

    Wireless-G Broadband Router with 2 Phone Ports Enable. Check the Enable box to enable the services you have defined. Port Range Forwarding will not function if the Enabled button is left unchecked. This is disabled (unchecked) by default. When you have finished making changes to this screen, click the Save Settings button to save the changes, or click the Cancel Changes button to undo your changes.
  • Page 47: The Applications & Gaming Tab - Upnp Forwarding

    Forwarded Range For each application, list the forwarded port number range. Check with the Internet application documentation for the port number(s) needed. Start Port. Enter the starting port number of the Forwarded Range. End Port. Enter the ending port number of the Forwarded Range. When you have finished making changes to this screen, click the Save Settings button to save the changes, or click the Cancel Changes button to undo your changes.
  • Page 48 Wireless-G Broadband Router with 2 Phone Ports Telnet. A terminal emulation protocol commonly used on Internet and TCP/IP-based networks. It allows a user at a terminal or computer to log onto a remote device and run a program. SMTP (Simple Mail Transfer Protocol). The standard e-mail protocol on the Internet. It is a TCP/IP protocol that defines the message format and the message transfer agent (MTA), which stores and forwards the mail.
  • Page 49 SNMP (Simple Network Management Protocol). A widely used network monitoring and control protocol. Data is passed from SNMP agents, which are hardware and/or software processes reporting activity in each network device (hub, router, bridge, etc.) to the workstation console used to oversee the network. The agents return information contained in a MIB (Management Information Base), which is a data structure that defines what is obtainable from the device and what can be controlled (turned off, on, etc.).
  • Page 50: The Applications & Gaming Tab - Dmz

    Wireless-G Broadband Router with 2 Phone Ports The Applications & Gaming Tab - DMZ The DMZ screen allows one local user to be exposed to the Internet for use of a special-purpose service such as Internet gaming and videoconferencing. DMZ hosting forwards all the ports at the same time to one PC. The Port Range Forwarding is more secure because it only opens the ports you want to have opened, while DMZ hosting opens all the ports of one computer, exposing the computer to the Internet.
  • Page 51: The Applications & Gaming Tab - Qos

    The Applications & Gaming Tab - QoS Quality of Service (QoS) ensures better service to high-priority types of network traffic, which may involve demanding, real-time applications, such as Internet phone calls or videoconferencing. Use this screen to configure IP QoS for connections, view the rules you have set up, and manage your rules. IP QoS Choose a connection.
  • Page 52: Figure 5-29: Qos - Create Rule

    Wireless-G Broadband Router with 2 Phone Ports To create a rule, follow these instructions: 1. Click the Add button located below the table of rules. 2. A new screen will appear. Enter a name in the Rule Name field. 3. Identify the application traffic by providing the following information: Source IP, Source Netmask, Source Start and End Ports, Destination IP, Destination Netmask, Destination Start and End ports, and Packet Length Start and End settings.
  • Page 53: The Administration Tab - Management

    The Administration Tab - Management When you click the Administration tab, you will see the Management screen. This screen allows you to change the Router’s access settings as well as configure the UPnP (Universal Plug and Play) feature. Router Password Local Router Access To ensure the Router’s security, you will be asked for your user name and password when you access the Router’s Web-based Utility.
  • Page 54: The Administration Tab - Log

    When you click the Administration tab, you will see the Log screen. You can select which PC will receive the specified type of system logs for your Internet connection. NOTE: The PC that receives these logs must be running a SYSLOG application. Linksys offers free software that can view system logs. You can download Logviewer software at www.linksys.com.
  • Page 55: The Administration Tab - Factory Defaults

    The Administration Tab - Factory Defaults The Factory Defaults screen is protected by a password available only from Vonage, so if you want to reset the Router to its factory default settings, contact Vonage. If you click the Yes radio button and then the Save Settings button, you will see a screen asking for a password.
  • Page 56: The Administration Tab - Diagnostics

    Wireless-G Broadband Router with 2 Phone Ports The Administration Tab - Diagnostics The diagnostic tests allow you to check the connections of your network components. Ping Test Ping Parameters. The Ping test will check the status of a connection. Click the Ping button to open the Ping Test screen.
  • Page 57: The Status Tab - Local Network

    The Status Tab - Local Network The Local Network screen displays information about the local network. Local Network MAC Address. The MAC Address of the Router’s LAN (local area network) interface is displayed here. IP Address. The Router’s local IP Address is shown here. Subnet Mask.
  • Page 58: The Status Tab - Router

    Wireless-G Broadband Router with 2 Phone Ports The Status Tab - Router The Router screen displays information about the Router and its current settings. The on-screen information will vary depending on the Internet Connection Type selected on the Setup screen. Information Firmware Version.
  • Page 59 DHCP Release. Available for a DHCP connection, click the DHCP Release button to release the current IP address of the device connected to the Router’s Internet port. DHCP Renew. Available for a DHCP connection, click the DHCP Renew button to replace the current IP address—of the device connected to the Router’s Internet port—with a new IP address.
  • Page 60: The Status Tab - Wireless

    Wireless-G Broadband Router with 2 Phone Ports The Status Tab - Wireless The Wireless screen displays status information about your wireless network. Wireless Wireless Firmware Version. This shows the version number of the wireless firmware. MAC Address. The MAC Address of the Router’s wireless network interface is displayed here. Figure 5-39: Status Tab - Wireless Status.
  • Page 61: The Status Tab - Voice

    The Status Tab - Voice The Voice screen displays information about your Internet phone line(s). Information Voice Version. This shows the version number of the voice firmware currently installed on the Router. Line1 Status Registration Status. The phone number and status of this Internet phone line are displayed here, so you know whether or not the phone line is registered with Vonage.
  • Page 62: The Voice Tab

    Wireless-G Broadband Router with 2 Phone Ports The Voice Tab Access to the Voice tab is restricted by Vonage. Contact Vonage for more information. Figure 5-42: Voice Tab Chapter 5: Configuring the Router The Voice Tab...
  • Page 63: Appendix A: Troubleshooting

    This appendix provides solutions to problems that may occur during the installation and operation of the Router. Read the description below to solve your problems. If you can't find an answer here, check the Vonage website at www.vonage.com or the Linksys website at www.linksys.com. Common Problems and Solutions 1.
  • Page 64 Wireless-G Broadband Router with 2 Phone Ports C. Click Tools. Click Internet Options. Click the Security tab. Click the Default level button. Make sure the security level is Medium or lower. Then click the OK button. 3. I need to set a static IP address on a PC. The Router, by default, assigns an IP address range of 192.168.15.100 to 192.168.15.150 using the DHCP server on the Router.
  • Page 65 For Windows 2000: A. Click Start, Settings, and Control Panel. Double-click Network and Dial-Up Connections. B. Right-click the Local Area Connection that is associated with the Ethernet adapter you are using, and select the Properties option. C. In the Components checked are used by this connection box, highlight Internet Protocol (TCP/IP), and click the Properties button.
  • Page 66 Wireless-G Broadband Router with 2 Phone Ports D. In the This connection uses the following items box, highlight Internet Protocol (TCP/IP). Click the Properties button. E. Enter a unique IP address that is not used by any other computer on the network connected to the Router.
  • Page 67 4. Click the OK button in the Internet Protocol (TCP/IP) Properties window, and click the OK button in the Local Area Connection Properties window. 5. Restart the computer if asked. 6. Click the OK button in the Internet Protocol (TCP/IP) Properties window, and click the OK button in the Local Area Connection Properties window.
  • Page 68 If you do NOT get a reply, try the ping command from a different computer to verify that your original computer is not the cause of the problem. E. In the command prompt, type ping www.linksys.com and press the Enter key. •...
  • Page 69 E. Make sure the cable connecting from your cable or DSL modem is connected to the Router’s Internet port. Verify that the Status page of the Router’s Web-based Utility shows a valid IP address from your ISP. F. Turn off the computer, Router, and cable/DSL modem. Wait 30 seconds, and then turn on the Router, cable/DSL modem, and computer.
  • Page 70 Refer to “Problem #9, I need to set up online game hosting or use other Internet applications” for details. Check the Linksys website at www.linksys.com for more information. 8. I need to set up a server behind my Router.
  • Page 71 provided. Check “Appendix C: Finding the MAC Address and IP Address for Your Ethernet Adapter” for details on getting an IP address. F. Check the Enabled option for the port services you want to use. Consider the examples below: Application Start and End Web server 80 to 80...
  • Page 72 Wireless-G Broadband Router with 2 Phone Ports C. Enter the port range of the service you are using. For example, if you have a web server, you would enter the range 80 to 80. D. Select the protocol you will be using, TCP or UDP, or select Both. E.
  • Page 73 send the data to whichever PC or network device you set for DMZ hosting.) Follow these steps to set DMZ hosting: A. Access the Router’s Web-based Utility by going to http://192.168.15.1 or the IP address of the Router. Go to the Applications & Gaming => Port Range Forwarding tab. B.
  • Page 74 Wireless-G Broadband Router with 2 Phone Ports these directions to verify that you do not have any proxy settings and that the browser you use is set to connect directly to the LAN. For Microsoft Internet Explorer 5.0 or higher: A.
  • Page 75 A. To connect to the Router, go to the web browser, and enter http://192.168.15.1 or the IP address of the Router. B. Enter the password, if asked. (The default password is admin.) C. On the Basic Setup tab, select the option Keep Alive, and set the Redial Period option at 20 (seconds). D.
  • Page 76 Wireless-G Broadband Router with 2 Phone Ports 16. I need to use port triggering. Port triggering looks at the outgoing port services used and will trigger the Router to open a specific port, depending on which port an Internet application uses. Follow these steps: A.
  • Page 77: Frequently Asked Questions

    Frequently Asked Questions How do I make a phone call? Pick up the phone and dial. Use 7-, 10-, or 11-digit dialing for calls within the same area code as your Vonage phone number. Use 10- or 11-digit dialing for calls outside of your area code. Can I make calls if my Internet connection is down? No.
  • Page 78 ISP. Does the Router support any operating system other than Windows 98, Millennium, 2000, or XP? Yes, but Linksys does not, at this time, provide technical support for setup, configuration or troubleshooting of any non-Windows operating systems.
  • Page 79 Ethernet adapter as a temporary measure. (Please look at the Network Control Panel in your Ethernet adapter’s Advanced Properties tab.) Make sure that your proxy setting is disabled in the browser. Check our website at www.linksys.com for more information. Appendix A: Troubleshooting...
  • Page 80 Wireless-G Broadband Router with 2 Phone Ports If all else fails in the installation, what can I do? Reset the Router by holding down the Reset button for approximately five seconds. Reset your cable or DSL modem by powering the unit off and then on. Contact Vonage for assistance. Refer to “Appendix H: Contact Information”...
  • Page 81 Is the Router cross-platform compatible? Any platform that supports Ethernet and TCP/IP is compatible with the Router. How many ports can be simultaneously forwarded? Theoretically, the Router can establish 520 sessions at the same time, but you can only forward 10 ranges of ports.
  • Page 82 Wireless-G Broadband Router with 2 Phone Ports standard. The 802.11b standard states a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GHz. What is the IEEE 802.11g standard? It is one of the IEEE standards for wireless networks. The 802.11g standard allows wireless networking hardware from different manufacturers to communicate, provided that the hardware complies with the 802.11g standard.
  • Page 83 What is ad-hoc mode? When a wireless network is set to ad-hoc mode, the wireless-equipped computers are configured to communicate directly with each other. The ad-hoc wireless network will not communicate with any wired network. What is infrastructure mode? When a wireless network is set to infrastructure mode, the wireless network is configured to communicate with a wired network through a wireless access point.
  • Page 84 Wireless-G Broadband Router with 2 Phone Ports acknowledgment from its original access point, it undertakes a new search. Upon finding a new access point, it then re-registers, and the communication process continues. What is ISM band? The FCC and their counterparts outside of the U.S. have set aside bandwidth for unlicensed use in the ISM (Industrial, Scientific and Medical) band.
  • Page 85 What is WEP? WEP is Wired Equivalent Privacy, a data privacy mechanism based on a shared key algorithm, as described in the IEEE 802.11 standard. What is WPA? WPA is Wi-Fi Protected Access, a wireless security protocol that can be used in conjunction with a RADIUS server.
  • Page 86 Wireless-G Broadband Router with 2 Phone Ports I have excellent signal strength, but I cannot see my network. Wireless security is probably enabled on the Router, but not on your wireless adapter (or vice versa). Verify that the same wireless security settings are being used by all devices in your wireless network. How many channels/frequencies are available with the Router? There are eleven available channels, ranging from 1 to 11 (in North America).
  • Page 87: Appendix B: Wireless Security

    Appendix B: Wireless Security Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation. So, keep the following in mind whenever you are setting up or using your wireless network.
  • Page 88: Security Threats Facing Wireless Networks

    This includes hackers. So, don’t broadcast the SSID. Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.
  • Page 89 Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in. MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses.
  • Page 90 These security recommendations should help keep your mind at ease while you are enjoying the most flexible and convenient technology Linksys has to offer. Appendix B: Wireless Security Security Threats Facing Wireless Networks...
  • Page 91: Appendix C: Finding The Mac Address And Ip Address For Your Ethernet Adapter

    Appendix C: Finding the MAC Address and IP Address for Your Ethernet Adapter This section describes how to find the MAC address for your computer’s Ethernet adapter so you can use the MAC filtering and/or MAC address cloning feature of the Router. You can also find the IP address of your computer’s Ethernet adapter.
  • Page 92: Windows 2000 Or Xp Instructions

    Wireless-G Broadband Router with 2 Phone Ports Windows 2000 or XP Instructions 1. Click Start and Run. In the Open field, enter cmd. Press the Enter key or click the OK button. 2. At the command prompt, enter ipconfig /all. Then press the Enter key. 3.
  • Page 93: Appendix D: Windows Help

    Wireless-G Broadband Router with 2 Phone Ports Appendix D: Windows Help Almost all Linksys products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix.
  • Page 94 Wireless-G Broadband Router with 2 Phone Ports Appendix D: Windows Help...
  • Page 95: Appendix E: Glossary

    Wireless-G Broadband Router with 2 Phone Ports Appendix E: Glossary 802.11b - A wireless networking standard that specifies a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GHz. 802.11g - A wireless networking standard that specifies a maximum data transfer rate of 54Mbps, an operating frequency of 2.4GHz, and backward compatibility with 802.11b devices.
  • Page 96 Wireless-G Broadband Router with 2 Phone Ports Browser - An application program that provides a way to look at and interact with all the information on the World Wide Web. Buffer - A shared or assigned memory area that is used to support and coordinate different computing and networking activities so one isn't held up by the other.
  • Page 97 Wireless-G Broadband Router with 2 Phone Ports DSL (Digital Subscriber Line) - An always-on broadband connection over traditional phone lines. DSSS (Direct-Sequence Spread-Spectrum) - Frequency transmission with a redundant bit pattern resulting in a lower probability of information being lost in transit. DTIM (Delivery Traffic Indication Message) - A message included in data packets that can increase wireless efficiency.
  • Page 98 Wireless-G Broadband Router with 2 Phone Ports Full Duplex - The ability of a networking device to receive and transmit data simultaneously. Gateway - A device that interconnects networks with different, incompatible communications protocols. Half Duplex - Data transmission that can occur in two directions over a single line, but only one direction at a time. Hardware - The physical aspect of computers, telecommunications, and other information technology devices.
  • Page 99 Passphrase - Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products. Ping (Packet INternet Groper) - An Internet utility used to determine whether a particular IP address is online.
  • Page 100 Wireless-G Broadband Router with 2 Phone Ports PPTP (Point-to-Point Tunneling Protocol) - A VPN protocol that allows the Point to Point Protocol (PPP) to be tunneled through an IP network. This protocol is also used as a type of broadband connection in Europe. Preamble - Part of the wireless signal that synchronizes network traffic.
  • Page 101 Wireless-G Broadband Router with 2 Phone Ports SSID (Service Set IDentifier) - Your wireless network's name. Static IP Address - A fixed address assigned to a computer or device that is connected to a network. Static Routing - Forwarding data in a network via a fixed path. STUN (Simple Traversal of UDP through NATs) - A protocol that enables specialized applications, such as Internet phone calls, video, and audio, to travel between your local network and the Internet.
  • Page 102 Wireless-G Broadband Router with 2 Phone Ports Upgrade - To replace existing software or firmware with a newer version. Upload - To transmit a file over a network. URL (Uniform Resource Locator) - The address of a file located on the Internet. VPN (Virtual Private Network) - A security measure to protect data as it leaves one network and goes to another over the Internet.
  • Page 103: Appendix F: Specifications

    Appendix F: Specifications Model WRTP54G Standards IEEE 802.3, IEEE 802.3u, 802.11b, 802.11g Channels 11 Channels (US, Canada) Transmit Power 18 dBm for 802.11b and 16 for 802.11g @ Normal Temp Range Ports One 10/100 RJ-45 Internet Port, Four 10/100 RJ-45 Network Ports,...
  • Page 104 Wireless-G Broadband Router with 2 Phone Ports Power External, 12V DC, 1.0A Certifications FCC, CE, cUL Operating Temp. 0º to 40ºC (32º to 104ºF) Storage Temp. -20º to 60ºC (-4º to 140ºF) Operating Humidity 10 to 85%, Non-Condensing Storage Humidity 5 to 90%, Non-Condensing Warranty 1-Year Limited...
  • Page 105: Appendix G: Warranty Information

    LIMITED WARRANTY Vonage warrants to You that, for a period of one year (the “Warranty Period”), your Linksys Product will be substantially free of defects in materials and workmanship under normal use. Your exclusive remedy and Vonage’s entire liability under this warranty will be for Vonage at its option to repair or replace the Product or refund Your purchase price less any rebates.
  • Page 106 Wireless-G Broadband Router with 2 Phone Ports remedy provided under this Agreement fails of its essential purpose. Some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages, so the above limitation or exclusion may not apply to You. Please contact Vonage regarding the warranty for the Product.
  • Page 107: Appendix H: Regulatory Information

    Wireless-G Broadband Router with 2 Phone Ports Appendix H: Regulatory Information Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 108 FCC Part 2.1091. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. Linksys declares that the WRTP54G is limited in CH1~11 from 2412 to 2462 MHz by specified firmware controlled in USA. Industry Canada Statement...
  • Page 109 Wireless-G Broadband Router with 2 Phone Ports EC Declaration of Conformity (Europe) Linksys declares that this product conforms to the specifications listed below, following the provisions of the European R&TTE directive 1999/5/EC: EN 301 489-1, 301 489-17 General EMC requirements for Radio equipment.
  • Page 110 Wireless-G Broadband Router with 2 Phone Ports France: 2.4 GHz Bande : les canaux 10, 11, 12, 13 (2457, 2462, 2467, et 2472 MHz respectivement) sont complétement libres d'utilisation en France (en utilisation intérieur). Pour ce qui est des autres canaux, ils peuvent être soumis à autorisation selon le départment. L'utilisation en extérieur est soumis à autorisation préalable et très restreint.
  • Page 111: Appendix I: Contact Information

    Visit Vonage online to access your account at: Linksys Need to contact Linksys? Visit Linksys online for information on the latest products and updates to your existing products at: Can't find information about a product you want to buy on the web?
  • Page 112 Wireless-G Broadband Router with 2 Phone Ports Appendix I: Contact Information Linksys...
  • Page 114 www.linksys.com...

Table of Contents