Linksys WRT54GC User Giude
Linksys WRT54GC User Giude

Linksys WRT54GC User Giude

Compact wireless-g broadband router
Hide thumbs Also See for WRT54GC:
Table of Contents

Advertisement

USER GUIDE
Compact Wireless-G
Broadband Router
Model: WRT54GC (EU)

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WRT54GC

  • Page 1 USER GUIDE Compact Wireless-G Broadband Router Model: WRT54GC (EU)
  • Page 2: About This Guide

    Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview Front Panel..........4 Back Panel .
  • Page 4 Software in Linksys Products ........
  • Page 5: Chapter 1: Product Overview

    Chapter 1 Back Panel Chapter 1: Product Overview Thank you for choosing the Linksys Compact Wireless-G Broadband Router. The Compact Wireless-G Broadband Router will allow you to network wirelessly better than ever, sharing Internet access, files and fun, easily and securely.
  • Page 6: Chapter 2: Wireless Security Checklist

    32 characters in length. Linksys wireless products • Password protect all computers on the network and use linksys as the default wireless network name. You individually password protect sensitive files. should change the wireless network name to something Change passwords on a regular basis.
  • Page 7: Chapter 3: Advanced Configuration

    Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you’d like to change its advanced settings, use the Router’s web-based utility. This chapter describes each web page of the utility and each page’s key functions.
  • Page 8 Advanced Configuration Chapter 3 Static IP you specify how often you want the Router to check the Internet connection. The default Redial Period is If you are required to use a permanent IP address to 30 seconds. connect to the Internet, select Static IP. PPTP Point-to-Point Tunneling Protocol (PPTP) is a service that applies to connections in Europe only.
  • Page 9 Advanced Configuration Chapter 3 L2TP Host Name/Domain Name These fields allow you to supply a host and domain name for the Router. Some ISPs, L2TP is a service that applies to connections in Israel only. usually cable ISPs, require these names as identification. You may have to check with your ISP to see if your broadband Internet service has been configured with a host and domain name.
  • Page 10: Setup > Ddns

    Advanced Configuration Chapter 3 want a DHCP server, then select Disabled (no other DHCP Before you can use this feature, you need to sign up for features will be available). DDNS service at one of two DDNS service providers, DynDNS.org or TZO.com. If you do not want to use this Starting IP Address Enter a value for the DHCP server to feature, keep the default setting, Disabled.
  • Page 11: Setup > Mac Address Clone

    Advanced Configuration Chapter 3 Status The status of the DDNS service connection is displayed here. Connect Click Connect establish DDNS connection. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Setup > MAC Address Clone A MAC address is a 12-digit code assigned to a unique piece of hardware for identification.
  • Page 12: Wireless > Basic Wireless Settings

    IP Address is on the LAN & Wireless (Ethernet and wireless wireless network. For added security, you should change networks) or the WAN (Internet). the default SSID (linksys) to a unique name. Delete This Entry To delete a route, select its number...
  • Page 13 Advanced Configuration Chapter 3 WPA Personal WPA2 Personal Security Mode >WPA Personal Security Mode > WPA2 Personal Encryption WPA2 supports two encryption methods, Encryption WPA supports two encryption methods, TKIP and AES, with dynamic encryption keys. Select the type TKIP and AES, with dynamic encryption keys. Select the type of algorithm, AES, or TKIP + AES.
  • Page 14: Wireless > Wireless Mac Filter

    Advanced Configuration Chapter 3 RADIUS This option features WEP used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) Security Mode > WEP WEP Encryption Select a level of WEP encryption, 40/64- bit (10 hex digits) or 108/128-bit (26 hex digits).
  • Page 15: Wireless > Advanced Wireless Settings

    Advanced Configuration Chapter 3 can select Auto to have the Router automatically use the Wireless > Wireless MAC Filter fastest possible data rate and enable the Auto-Fallback Wireless MAC Filter feature. Auto-Fallback will negotiate the best possible connection speed between the Router and a wireless Wireless MAC Filter To filter wireless users by MAC Address, client.
  • Page 16: Security > Firewall

    Advanced Configuration Chapter 3 Security > Firewall Beacon Interval The default value is 100. Enter a value between 20 and 1,000 milliseconds. The Beacon Interval The Security > Firewall screen is used to configure a firewall value indicates the frequency interval of the beacon. A beacon is a packet broadcast by the Router to synchronize that can filter out various types of unwanted traffic on the Router’s local network.
  • Page 17: Security > Vpn Passthrough

    Advanced Configuration Chapter 3 programming language. To enable ActiveX filtering, Access Restrictions > Internet Access click the box in front of this option. The Access Restrictions > Internet Access screen allows you • Cookies A cookie is data stored on your PC and used to block or allow specific kinds of Internet usage and by Internet sites when you interact with them.
  • Page 18: Applications And Gaming > Port Range Forwarding

    Advanced Configuration Chapter 3 To create an Internet Access policy: Internet Access Policy drop- Select a number from the down menu. Enabled. To enable this policy, select Enter a Policy Name in the field provided. Click Edit List of PCs to select which PCs will be affected Port Services by the policy.
  • Page 19: Applications & Gaming > Port Range Triggering

    Advanced Configuration Chapter 3 Applications and Gaming > Port Range Triggering Applications and Gaming > Port Range Forwarding Port Range Triggering Port Range Forwarding Application Name Enter the application name of the trigger. To forward a port, enter the information on each line for the criteria required.
  • Page 20: Administration > Management

    Advanced Configuration Chapter 3 Administration > Management Any PC whose port is being forwarded must have its DHCP The Administration > Management screen allows the client function disabled and should have a new static IP network’s administrator to manage specific Router address assigned to it because its IP address may change functions for access and security.
  • Page 21: Administration > Diagnostics

    Advanced Configuration Chapter 3 Administration > Diagnostics UPnP UPnP Keep the default, Enabled to enable the UPnP The diagnostic tests (Ping and Traceroute) allow you to feature; otherwise, select Disabled. check the connections of your network components. Allow Users to Configure To use the Allow Users to Configure UPnP options from the Windows operating system, select Enabled.
  • Page 22: Administration > Factory Defaults

    This section shows the current network information Before upgrading the firmware, download the Router’s stored in the Router. The information varies depending on firmware upgrade file from the Linksys website, www. the Internet connection type selected on the Setup > Basic linksys.com. Then extract the file.
  • Page 23: Status > Local Network

    Advanced Configuration Chapter 3 Status > Local Network Status > Wireless The Status > Local Network screen displays the status of The Status > Wireless screen displays the status of your your network. wireless network. Status > Wireless Wireless Status > Local Network Local Network MAC Address This is the Router’s MAC Address, as seen...
  • Page 24: Appendix A: Troubleshooting

    WEB: If your questions are not addressed here, The DSL telephone line does not fit into the Router’s refer to the Linksys website, www.linksys.com Internet port. The Router does not replace your modem. You still need your DSL modem in order to use the Router. Connect the telephone line to the DSL modem, and then insert the setup CD into your computer.
  • Page 25: Appendix B: Specifications

    Specifications Appendix B Appendix B: Specifications Model WRT54GC v3 Standards IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.11b Channels 11 Channels (US, Canada) 13 Channels (most of Europe) Ports Internet: One 10/100 RJ-45 Port LAN: Four 10/100 RJ-45 Switched Ports...
  • Page 26: Appendix C: Warranty Information

    Linksys’ entire liability under this limited warranty an implied warranty lasts, so the above limitation may not will be for Linksys, at its option, to (a) repair the product apply to you. This limited warranty gives you specific legal...
  • Page 27 If any portion of this limited warranty is found to be void or unenforceable, its remaining provisions shall remain in full force and effect. Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623. For more information, please contact us www.linksys.com...
  • Page 28: Appendix D: Regulatory Information

    Regulatory Information Appendix D Wireless Disclaimer Appendix D: Regulatory Information The maximum performance for wireless is derived from IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, FCC Statement data throughput rate, range and coverage. Performance depends on many factors, conditions and variables, including distance from the access point, volume of This product has been tested and complies with the...
  • Page 29: Declaration Of Conformity With Regard To Eu Directive 1999/5/Ec (R&Tte Directive)

    A pdf file is available on the product’s webpage. Šī iekārta atbilst Direktīvas 1999/5/EK Visit www.linksys.com/international and select your Latviski būtiskajām prasībām un citiem ar to country or region. Then select your product. [Latvian]: saistītajiem noteikumiem. If you need any other technical documentation, see the “Technical Documents on www.linksys.com/international”...
  • Page 30: Wireless Equipment (Wireless-N/G/A/B Products)

    Wireless LANs” provides an overview of the regulatory CE Marking requirements applicable for the 2,4- and 5-GHz bands. For the Linksys Wireless-N, -G, -B, and/or -A products, Later in this document you will find an overview of the following CE mark, notified body number (where...
  • Page 31: Product Usage Restrictions

    The use of software or firmware not supported/provided Allocation Table for Italy. Unless this 2,4-GHz wireless LAN by Linksys may result that the equipment is no longer product is operating within the boundaries of the owner’s compliant with the regulatory requirements.
  • Page 32: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    úřady. Správná likvidace a recyklace pomáhá předcházet Linksys products. Consumers are required to comply with potenciálním negativním dopadům na životní prostředí a lidské this notice for all electronic products bearing the following zdraví.
  • Page 33 Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 34 Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 35 ľudí. Ak máte záujem o podrobnejšie WEB: For additional information, please visit informácie o likvidácii starého zariadenia, obráťte sa, prosím, na www.linksys.com/international miestne orgány, organizácie zaoberajúce sa likvidáciou odpadov alebo obchod, v ktorom ste si produkt zakúpili. Compact Wireless-G Broadband Router...
  • Page 36: Appendix E: Software License Agreement

    Schedules 2, 3 or 4 below as applicable. “Software” includes, and this Agreement will apply to BY DOWNLOADING OR INSTALLING THE SOFTWARE, (a) the software of Linksys or its suppliers provided in or OR USING THE PRODUCT CONTAINING THE SOFTWARE, with the applicable Linksys product, excluding technology...
  • Page 37 Schedule 2 are from the public web site at of the GPL or other open source code in this Software on a http://www.gnu.org/copyleft/gpl.html CD, Linksys will mail to You a CD with such code for $9.99 plus the cost of shipping, upon request. GNU GENERAL PUBLIC LICENSE Term and Termination.
  • Page 38 Software License Agreement Appendix E TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND GNU General Public License is intended to guarantee your freedom to share and change free software–to make sure MODIFICATION the software is free for all its users. This General Public This License applies to any program or other work License applies to most of the Free Software Foundation’s which contains a notice placed by the copyright...
  • Page 39 Software License Agreement Appendix E If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
  • Page 40 General Public License from time to time. Such new versions will be similar in If this Linksys product contains open source software spirit to the present version, but may differ in detail to licensed under Version 2.1 of the “GNU Lesser General Public address new problems or concerns.
  • Page 41 Software License Agreement Appendix E GNU LESSER GENERAL PUBLIC LICENSE To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the Version 2.1, February 1999 library is modified by someone else and passed on, the recipients should know that what they have is not the Copyright (C) 1991, 1999 Free Software Foundation, Inc.
  • Page 42 Software License Agreement Appendix E freedom and the wherewithal to run that program using a You may copy and distribute verbatim copies of the modified version of the Library. Library’s complete source code as you receive it, in any medium, provided that you conspicuously and The precise terms and conditions for copying, distribution appropriately publish on each copy an appropriate and modification follow.
  • Page 43 Software License Agreement Appendix E Thus, it is not the intent of this section to claim When a “work that uses the Library” uses material from rights or contest your rights to work written entirely a header file that is part of the Library, the object code by you;...
  • Page 44 Software License Agreement Appendix E Use a suitable shared library mechanism for linking You may not copy, modify, sublicense, link with, or with the Library. A suitable mechanism is one that distribute the Library except as expressly provided (1) uses at run time a copy of the library already under this License.
  • Page 45 If you wish to incorporate parts of the Library into other free programs whose distribution conditions are If this Linksys product contains open source software incompatible with these, write to the author to ask for licensed under the OpenSSL license: permission.
  • Page 46 Software License Agreement Appendix E OpenSSL License Original SSLeay License Copyright © 1998-2007 The OpenSSL Project. All rights Copyright © 1995-1998 Eric Young (eay@cryptsoft.com)All reserved. rights reserved. Redistribution and use in source and binary forms, with This package is an SSL implementation written by Eric or without modification, are permitted provided that the Young (eay@cryptsoft.com).
  • Page 47 Software License Agreement Appendix E DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Table of Contents