Cisco Linksys WRT54G3GV2-ST User Manual

Wireless-g mobile
Hide thumbs Also See for Linksys WRT54G3GV2-ST:

Advertisement

Quick Links

USER GUIDE
Wireless-G
Router for
Mobile Broadband
WRT54G3GV2-ST
Model No:

Advertisement

Table of Contents
loading

Summary of Contents for Cisco Linksys WRT54G3GV2-ST

  • Page 1 USER GUIDE Wireless-G Router for Mobile Broadband WRT54G3GV2-ST Model No:...
  • Page 2 Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2007 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview Top Panel........... 4 Side Panel .
  • Page 4 Table of Contents Appendix D: Regulatory Information FCC Statement ..........37 FCC Radiation Exposure Statement .
  • Page 5: Chapter 1: Product Overview

    Product Overview Chapter1 Chapter 1: USB Port Reserved for future use. Product Overvew Power (Green) The Power LED lights up and stays on while the Router is powered on. Thank you for choosing the Linksys Wireless-G Router for Ethernet 1- (Green) These numbered LEDs, Mobile Broadband.
  • Page 6: Front Panel

    Product Overview Chapter1 Placement Positions Reset There are two ways to reset the Router’s factory defaults. Either press and hold the Reset There are three ways to physically install the Router. The button for approximately five seconds, or restore first way is to place the Router horizontally on a surface. the defaults from the Administration >...
  • Page 7 Product Overview Chapter1 Wall-Mounting Placement The Router has four wall-mount slots on its back panel. The distance between two adjacent slots is 68 mm (2.68 inches). Two screws are needed to mount the Router. Suggested Mountng Hardware 4-5 mm 1-1.5 mm Note: Mounting hardware illustrations are not †...
  • Page 8: Chapter 2: Wireless Security Checklist

    Wireless Security Checklist Chapter2 Chapter 2: . Enable encrypton Wreless Securty Checklst Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalency Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
  • Page 9: Chapter 3: Advanced Configuration

    Advanced Configuration Chapter3 Chapter 3: Advanced Confguraton After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you’d like to change its advanced settings, use the Router’s web-based utility. This chapter describes each web page of the utility and each page’s key functions.
  • Page 10 Advanced Configuration Chapter3 Static IP Keep Alve: Redal Perod If you select this option, the Router will periodically check your Internet connection. If If you are required to use a permanent IP address to you are disconnected, then the Router will automatically connect to the Internet, select Statc IP.
  • Page 11 Advanced Configuration Chapter3 Sze When Manual is selected in the MTU field, this option is enabled. Leave this value in the 1200 to 1500 range. The default size depends on the Internet Connection Type: DHCP, Static IP, or Telstra: 100 •...
  • Page 12 Advanced Configuration Chapter3 computer on your network. If you choose to enable the Click Save Settngs to apply your changes, or click Cancel Changes to cancel your changes. To view the Router’s DHCP server option, make sure there is no other DHCP server on your network.
  • Page 13: Setup > Mobile Network

    Advanced Configuration Chapter3 Setup > Mobile Network how often you want the Router to check the mobile network connection. The default Redial Period is 30 seconds. Configure mobile network settings and view mobile ICMP To use the default Network Time Protocol (NTP) broadband status information for the Router.
  • Page 14: Setup > Mac Address Clone

    Advanced Configuration Chapter3 TZO.com DynDNS.org Setup > DDNS > TZO E-mal Address, TZO Key, and Doman Name Enter the Setup > DDNS > DynDNS settings of the account you set up with TZO. Username Enter the Username for your DDNS account. Internet IP Address The Router’s Internet IP address is displayed here.
  • Page 15: Setup > Advanced Routing

    Advanced Configuration Chapter3 Clone My PC’s MAC Click this button to clone the MAC Route Entres To set up a static route between the Router address of the computer you are using. and another network, select a number from the drop- down list.
  • Page 16: Wireless > Wireless Security

    Advanced Configuration Chapter3 Wireless Security Security Mode Select the security method for your wireless network. If you do not want to use wireless security, keep the default, Dsabled. WPA Personal NOTE: If you are using WPA, always remember Wireless > Basic Wireless Settings that each device in your wireless network MUST Basic Wireless Settings use the same WPA method and passphrase, or...
  • Page 17 Advanced Configuration Chapter3 Key Renewal Enter a Key Renewal period, which instructs Encrypton WPA2 supports two encryption methods, the Router how often it should change the encryption TKIP and AES, with dynamic encryption keys. Select the keys. The default is 300 seconds. type of algorithm, AES or AES or TKIP.
  • Page 18: Wireless > Wireless Mac Filter

    Advanced Configuration Chapter3 Key 1- If you did not enter a Passphrase, enter the WEP key(s) manually. TX Key Select which TX (Transmit) Key to use. The default is 1. WEP is a basic encryption method, which is not as secure as WPA.
  • Page 19: Wireless > Advanced Wireless Settings

    Advanced Configuration Chapter3 Wireless Client List use a WEP key for authentication. Select Shared Key to only use Shared Key authentication. This screen shows computers and other devices on the wireless network. The list can be sorted by Client Basc Rate The Basic Rate setting is not actually one rate Name, Interface, IP Address, MAC Address, and Status.
  • Page 20: Security > Firewall

    Advanced Configuration Chapter3 RTS Threshold Should you encounter inconsistent data Flter IDENT (Port 113) This feature keeps port 113 from flow, only minor reduction of the default value, 23, is being scanned by devices outside of your local network. recommended. If a network packet is smaller than the This feature is selected by default.
  • Page 21 Advanced Configuration Chapter3 VPN Settings Summary At the top of the screen is the WAN IP address of the Router. The screen also displays the No., Tunnel Name, Status, Local Group, Remote Group, Remote Gateway, and Security Method of the VPN tunnels. Click Refresh to update the information.

Table of Contents