LINKSYS WRT54AG Wireless A/G Broadband Router User Manual WRT54AG ug Rev NC

LINKSYS LLC Wireless A/G Broadband Router WRT54AG ug Rev NC

Users Manual 2

Download: LINKSYS WRT54AG Wireless A/G Broadband Router User Manual WRT54AG ug Rev NC
Mirror Download [FCC.gov]LINKSYS WRT54AG Wireless A/G Broadband Router User Manual WRT54AG ug Rev NC
Document ID402256
Application IDqHEvQeXx5XA7zyO968PMfQ==
Document DescriptionUsers Manual 2
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize119.15kB (1489407 bits)
Date Submitted2004-03-05 00:00:00
Date Available2004-03-05 00:00:00
Creation Date2004-03-04 16:27:31
Producing SoftwareAcrobat Distiller 5.0.5 (Windows)
Document Lastmod2004-03-04 16:27:56
Document TitleWRT54AG-ug-Rev_NC.qxd
Document CreatorPScript5.dll Version 5.2
Document Author: klacelle

Dual-Band Wireless A/G Broadband Router
Wireless-G (802.11g)
The 2.4GHz, 802.11g portion of the Setup screen, shown in Figure 6-9allows
you to configure your 2.4GHz, Wireless-G wireless network settings.
Figure 6-9
MAC Address This shows the Router’s wireless MAC address.
Security This enables or disables WEP Encryption. An acronym for Wired
Equivalent Privacy, WEP is an encryption method used to protect your wireless
data communications. WEP uses a combination of 64-bit or 128-bit keys to
provide access control to your network and encryption security for every data
transmission. To decode a data transmission, each device in a network must use
an identical 64-bit or 128-bit key. Higher encryption levels offer higher levels
of security, but due to the complexity of the encryption, they may decrease
network performance. To enable WEP, click the radio button beside Enable.
Click the Edit Wireless Security button to configure the WEP keys for your
2.4GHz, Wireless-G network (see Figure 6-10).
Check all the values, and click the Apply button to save your 2.4GHz, WirelessG settings. To cancel any changes you’ve entered on this page, click the Cancel
button. To get more information about the features, click the Help button.
Wireless-G (802.11g) Security
Mode If you have Wireless-G and 802.11b devices in your network, then keep
the default setting, Mixed. If you have only Wireless-G devices, select G-Only.
If you do not have any Wireless-G and 802.11b devices in your network, select
Disable.
The 2.4GHz, 802.11b (WEP) screen, shown in Figure 6-10, allows you to configure your 2.4GHz, Wireless-G WEP settings. WEP encryption is recommended to increase the security of your wireless network.
Channel Select the appropriate channel from the list provided to correspond
with your network settings, between 36 and 64. All devices in your wireless
network must use the same channel in order to function correctly. If you want
the Router to automatically scan for a clear channel, then click the checkbox.
SSID The SSID is the network name shared among all points in a wireless network. The SSID must be identical for all points in the wireless network. It is
case-sensitive and must not exceed 32 characters (use any of the characters on
the keyboard). Make sure this setting is the same for all points in your wireless
network. For added security, you should change the default SSID (linksys-g) to
a unique name.
SSID Broadcast When wireless clients survey the local area for wireless networks to associate with, they will detect the SSID broadcast by the Router. To
broadcast the Router's SSID, keep the default setting, Enable. If you do not
want to broadcast the Router's SSID, then select Disable.
Figure 6-10
34
35
Dual-Band Wireless A/G Broadband Router
Default Transmit Key Select which WEP key (1-4) will be used when the
Router sends data. Make sure the receiver is using the same key.
Security
WEP Encryption Keys 1-4 offer 64-bit or 128-bit encryption; select the type
of encryption you want from the drop-down box. To disable WEP Encryption,
select Disable.
The Security screen, shown in Figure 6-11, allows you to change the Router’s
security settings. You should change the factory default password, which is
admin, to your own as soon as possible. All users who try to access the
Router’s web-based utility or Setup Wizard will be prompted for the Router’s
password.
Passphrase Instead of manually entering WEP keys, you can enter a
Passphrase. This Passphrase is used to generate one or more WEP keys. It is
case-sensitive and should not be longer than 16 alphanumeric characters. This
Passphrase function is compatible with Linksys wireless products only. [If you
want to communicate with non-Linksys wireless products, enter the WEP
key(s) manually on the non-Linksys wireless products.] After you enter the
Passphrase, click the Generate button to create WEP keys.
Keys 1-4 WEP keys enable you to create an encryption scheme for wireless
LAN transmissions. Manually enter a set of values. (Do not leave a key field
blank, and do not enter all zeroes. These are not valid key values.) Keys 1-4
offer 64-bit or 128-bit encryption.
If you are using 64-bit WEP encryption, then the key must be exactly 10 hexadecimal characters in length. If you are using 128-bit WEP encryption, then the
key must be exactly 26 hexadecimal characters in length. Valid hexadecimal
characters are “0”-“9” and “A”-“F”.
Check all the values, and click the Apply button to save your 2.4GHz, WirelessG WEP settings.
To apply any of the settings you change on this page, click the Apply button.
To cancel any changes you’ve entered on this page, click the Cancel button. To
get more information about the features, click the Help button.
Note: All Wireless devices in your network must use the same
Passphrase or WEP key.
Figure 6-11
Router Password The new Password must not exceed 32 characters in length
and must not include any spaces. Enter the new Password in the second field to
confirm it.
VPN Pass-Through Virtual Private Networking (VPN) is typically used for
work-related networking. For VPN tunnels, the Router supports IPSec PassThrough and PPTP Pass-Through.
IPSec - Internet Protocol Security (IPSec) is a suite of protocols used to
implement secure exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, IPSec Pass-Through is enabled by default.
To disable IPSec Pass-Through, uncheck the box next to IPSec.
L2TP - Layer Two Tunneling Protocol is an extension of the Point-to-Point
Tunneling Protocol (PPTP) used by to enable the operation of a virtual private network (VPN) over the Internet.
36
37
Dual-Band Wireless A/G Broadband Router
PPTP - Point-to-Point Tunneling Protocol is the method used to enable VPN
sessions to a Windows NT 4.0 or 2000 server. To allow PPTP tunnels to pass
through the Router, PPTP Pass-Through is enabled by default. To disable
PPTP Pass-Through, uncheck the box next to PPTP.
Web Filters Using the Web Filters feature, you may enable up to four specific filtering methods.
Block Proxy - Use of WAN proxy servers may compromise the Router's
security. Denying Proxy will disable access to any WAN proxy servers. To
enable proxy filtering, click the Block Proxy box.
Block WAN Request By enabling the Block WAN Request feature, you can
prevent your network from being “pinged,” or detected, by other Internet users.
The Block WAN Request feature also reinforces your network security by hiding your network ports. Both functions of the Block WAN Request feature
make it more difficult for outside users to work their way into your network.
This feature is enabled by default. Select Disable to disable this feature.
To save your changes on this page, click the Apply button. To cancel any
unsaved changes on this page, click the Cancel button. To get more information about the features, click the Help button.
System
Block Java - Java is a programming language for websites. If you deny Java,
you run the risk of not having access to Internet sites created using this programming language. To enable Java filtering, click the Block Java box.
Block ActiveX - ActiveX is a programming language for websites. If you
deny ActiveX, you run the risk of not having access to Internet sites created using this programming language. To enable ActiveX filtering, click the
Block ActiveX box.
The System screen, shown in Figure 6-12, lets you control a variety of the
Router’s general features, from restoring factory defaults to enabling its remote
management capability.
Restore Defaults Click the Yes button to reset all configuration settings to
their default values, and then click the Apply button. Any settings you have
saved will be lost when the default settings are restored. This feature is disabled
by default.
Block Cookies - A cookie is data stored on your PC and used by Internet
sites when you interact with them. To enable cookie filtering, click the
Block Cookies box.
DMZ The DMZ hosting feature allows one local user to be exposed to the
Internet for use of a special-purpose service such as Internet gaming or videoconferencing. DMZ hosting forwards all the ports at the same time to one PC.
The Port Forwarding feature is more secure because it only opens the ports you
want to have opened, while DMZ hosting opens all the ports of one computer,
exposing the computer so the Internet can see it.
Any PC whose port is being forwarded must have its DHCP client function disabled and should have a new static IP address assigned to it because its IP
address may change when using the DHCP function.
1. To expose one PC, select Enable.
2. Enter the computer's IP address in the DMZ Host IP Address field.
3. Click the Apply button.
Figure 6-12
38
39
Dual-Band Wireless A/G Broadband Router
Firmware Upgrade New firmware versions are posted at www.linksys.com
and can be downloaded for free. If the Router already works well, there’s no
need to download a newer firmware version, unless that version has a new feature that you want to use. (To learn about any new firmware with new features,
visit www.linksys.com.)
Multicast Pass-Through IP Multicasting occurs when a single data transmission is sent to multiple recipients at the same time. Using the Multicast PassThrough feature, the Router allows IP multicast packets to be forwarded to the
appropriate computers. Keep the default setting, Enable, to support the feature,
or select Disable to disable it.
Note: By upgrading the Router’s firmware, you may lose the Router’s
configuration settings, so make sure you write down the Router’s settings before you upgrade its firmware.
MAC Cloning You can clone the MAC address of your PC’s network adapter
onto the Router.
1. Download the firmware upgrade file from www.linksys.com, and extract
the file using a file archive utility such as WinZip.
A MAC address is a 12-digit code assigned to a unique piece of hardware for
identification. Some ISPs require that you register the MAC address of your
PC’s network adapter, which was connected to your cable or DSL modem during installation. To avoid calling your ISP and changing the MAC address that
is registered with the ISP, follow these instructions:
2. Click the Upgrade button.
1. Select Enable.
3. On the Upgrade Firmware screen (see Figure 6-13), click the Browse button to find the firmware upgrade file you extracted.
2. Enter your adapter’s MAC address in the MAC Address field.
To upgrade the Router’s firmware:
3. To save your new settings, click the Apply button. To cancel your changes,
click the Cancel button. To get more information about the features, click
the Help button.
To disable MAC address cloning, keep the default setting, Disable.
If you do not know your adapter’s MAC address, follow these instructions:
1. Click the Start button, and select Run.
2. Enter command in the field provided, and press the OK button.
3. At the command prompt, enter ipconfig /all. Then press the Enter key.
Figure 6-13
4. Write down your adapter’s physical address; this is the adapter’s MAC
address.
4. Double-click the firmware upgrade file you extracted.
5. Click the Upgrade button, and follow the on-screen instructions.
Important: When you are upgrading the firmware, do NOT turn off
the Router, and do NOT press the Reset button.
40
Remote Management This feature allows you to manage your Router from a
remote location, via the Internet. To disable this feature, keep the default setting, Disable. To enable this feature, select Enable, and use the specified port
(default is 8080) on your PC to remotely manage the Router. You must also
change the Router's default password to one of your own, if you haven’t
already. A unique password will increase security.
41

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
Encryption                      : Standard V1.2 (40-bit)
User Access                     : Print, Copy, Fill forms, Extract, Assemble, Print high-res
Modify Date                     : 2004:03:04 16:27:56+08:00
Create Date                     : 2004:03:04 16:27:31+08:00
Title                           : WRT54AG-ug-Rev_NC.qxd
Author                          : klacelle
Creator                         : PScript5.dll Version 5.2
Producer                        : Acrobat Distiller 5.0.5 (Windows)
Page Count                      : 4
Mod Date                        : 2004:03:04 16:27:56+08:00
Creation Date                   : 2004:03:04 16:27:31+08:00
Metadata Date                   : 2004:03:04 16:27:56+08:00
Has XFA                         : No
EXIF Metadata provided by EXIF.tools
FCC ID Filing: Q87-WRT54AG

Navigation menu