LINKSYS WRT54G2V1 Wireless-G Broadband Router User Manual Manual Part 1

LINKSYS LLC Wireless-G Broadband Router Manual Part 1

Manual Part 1

USER GUIDEWireless-G Broadband RouterModel No: WRT54G2V1
 About This GuideiWireless-G Broadband RouterAbout This GuideIcon DescriptionsWhile  reading  through  the  User  Guide  you  may  see various icons that call attention to specific items. Below is a description of these icons:NOTE: This  check  mark  indicates  that there  is a  note  of  interest  and  is  something  that  you should pay special attention to while using the product. WARNING:  This  exclamation  point  indicates that  there  is  a  caution  or  warning  and  it  is something that could damage your property or product.WEB:  This  globe  icon  indicates  a  noteworthy website address or e-mail address.Online ResourcesMost web browsers allow you to enter the web address without  adding  the  http://  in  front  of  the  address. This User Guide will refer to websites without including http:// in  front  of  the  address.  Some  older  web  browsers  may require you to add it.Resource WebsiteLinksys www.linksys.comLinksys International  www.linksys.com/internationalGlossary www.linksys.com/glossaryNetwork Security www.linksys.com/securityCopyright and TrademarksLinksys  is a  registered  trademark  or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other  countries.  Copyright  ©  2008 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
 Table of ContentsiiWireless-G Broadband RouterChapter 1: Product Overview  1Front Panel.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  1Back Panel .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  1Chapter 2: Wireless Security Checklist  2General Network Security Guidelines .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  2Additional Security Tips   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  2Chapter 3: Advanced Conguration  3Setup > Basic Setup .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  3Setup > DDNS.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  6Setup > MAC Address Clone.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  7Setup > Advanced Routing  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  7Wireless > Basic Wireless Settings  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  8Wireless > Wireless Security .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .10Wireless > Wireless MAC Filter.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .12Wireless > Advanced Wireless Settings .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .12Security > Firewall .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .14Firewall .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .14Security > VPN Passthrough .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .14Access Restrictions > Internet Access .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .14Applications and Gaming > Port Range Forward.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .16Applications & Gaming > Port Triggering  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .16Applications and Gaming > DMZ   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .17Applications and Gaming > QoS .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .17Administration > Management.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .18Administration > Log .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .19Administration > Diagnostics .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .19Administration > Factory Defaults .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .19Administration > Upgrade Firmware  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .20Administration > Config Management .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .20Status > Router .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .20Status > Local Network .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .21Status > Wireless .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .21Appendix A: Troubleshooting  22Appendix B: Specications  23
 Table of ContentsiiiWireless-G Broadband RouterAppendix C: Warranty and Regulatory Information  24Limited Warranty.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .24Wireless Disclaimer  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .25FCC Statement  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .25Safety Notices.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .25Industry Canada (Canada) .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .25IC Statement   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .25Règlement d’Industry Canada   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .25User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .26
Chapter 1 Product Overview1Wireless-G Broadband RouterChapter 1:  Product OverviewThank you for choosing the Linksys Wireless-G Broadband Router.  The  Router  lets  you  access  the  Internet  via  a  wireless  connection,  broadcast  at  up  to  54 Mbps,  or through one of its four switched ports. You can also use the Router to share resources such as computers, printers and  files.  A  variety  of  security  features  help  to  protect your data and your privacy while online. Security features include WPA2 security, a Stateful Packet Inspection (SPI) firewall  and  NAT  technology.  Configuring  the  Router  is easy using the provided browser-based utilityFront Panel1,  2,  3,  4  (Green)  These  numbered  LEDs, corresponding with the numbered ports on the Router’s back panel, serve two purposes. If the LED is continuously lit, the Router is successfully connected  to  a  device  through  that  port.  A flashing  LED  indicates  network  activity  over that port.Wi-Fi  Protected  Setup  Button  If  you  have client  devices,  such  as  wireless  adapters,  that support  Wi-Fi  Protected  Setup,  then  you  can use  Wi-Fi  Protected  Setup  to  automatically configure  wireless  security  for  your  wireless network(s).To  use  Wi-Fi  Protected  Setup,  run  the  Setup Wizard, or refer to the “Wireless > Basic Wireless Settings”  section  of  “Chapter  3:  Advanced Configuration”.Wi-Fi  Protected  Setup  LED  (Green/Amber)  It  lights  up  green  when  wireless security  is  enabled. The  LED flashes  green  for two  minutes  during  Wi-Fi  Protected  Setup.    The  LED  lights  up  amber  if  there  is  an  error during the Wi-Fi Protected Setup process. Make sure the client device supports Wi-Fi Protected Setup. Wait until the LED is off, and then try again.   The LED flashes amber when a Wi-Fi Protected Setup  session  is  active,  and  a  second  session begins. The  Router  supports  one  session  at  a time. Wait until the LED is off before starting the next Wi-Fi Protected Setup session.Wireless  (Green)  The  Wireless  LED  lights  up when the wireless feature is enabled. If the LED is  flashing,  the  Router  is  actively  sending  or receiving data over the network.Internet  (Green)  The  Internet  LED  lights  up when there is a connection made through the Internet port. A flashing LED indicates network activity over the Internet port.Power  (Green)  The  Power  LED  lights  up and  will  stay  on  while  the  Router  is  powered on.  When  the  Router  goes  through  its  self-diagnostic  mode  during  every  boot-up,  this LED will flash. When the diagnostic is complete, the LED will be solidly lit.Back PanelInternet  The  Internet  port  is  where  you  will connect your cable or DSL Internet connection. 1, 2, 3, 4  These Ethernet ports (1, 2, 3, 4) connect the Router to PCs on your wired network and other Ethernet network devices. Reset  There are two ways to reset the Router’s factory defaults. Either press and hold the Reset Button for approximately five seconds, or restore the  defaults  from  Administration > Factory Defaults in the Router’s web-based utility. Power  The  Power  port  is  where  you  will  connect the power adapter.
Chapter 2 Wireless Security Checklist2Wireless-G Broadband RouterChapter 2:  Wireless Security ChecklistWireless  networks are convenient  and  easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending  information  over  radio  waves,  it  can  be  more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted. Since you cannot physically prevent someone from connecting to your wireless network, you need to take some additional steps to keep your network secure. 1.  Change the default wireless    network name or SSIDWireless  devices  have  a  default  wireless  network  name or  Service  Set  Identifier  (SSID)  set  by  the  factory.  This is  the  name  of  your  wireless  network,  and  can  be  up to  32  characters  in  length.  Linksys  wireless  products use  linksys  as  the  default  wireless  network  name.  You should change the wireless network name to something unique  to distinguish  your wireless  network from  other wireless networks that may exist around you, but do not use  personal  information  (such  as  your  Social  Security number)  because  this  information  may  be  available  for anyone to see when browsing for wireless networks. 2.  Change the default passwordFor wireless products such as access points and routers, you will be asked for a password when you want to change their settings. These devices have a default password set by  the  factory.  The  Linksys  default  password  is  admin. Hackers  know  these  defaults  and  may  try  to  use  them to access your wireless device and change your network settings. To thwart any unauthorized changes, customize the device’s password so it will be hard to guess.3.  Enable MAC address filteringLinksys routers give you the ability to enable Media Access Control  (MAC)  address  filtering.  The  MAC  address  is  a unique  series  of  numbers  and  letters  assigned  to  every networking  device. With MAC  address  filtering  enabled, wireless  network  access  is  provided  solely  for  wireless devices with specific MAC addresses. For example, you can specify the MAC address of each computer in your home so  that  only  those  computers  can  access  your  wireless network. 4.  Enable encryptionEncryption  protects  data  transmitted  over  a  wireless network. Wi-Fi  Protected Access (WPA/WPA2)  and Wired Equivalency Privacy (WEP) offer different levels of security for  wireless  communication.  Currently,  devices  that  are Wi-Fi certified are required to support WPA2, but are not required to support WEP.A  network  encrypted  with  WPA/WPA2  is  more  secure than a network encrypted with WEP, because WPA/WPA2 uses dynamic key encryption. To protect the information as  it  passes  over  the  airwaves,  you  should  enable  the highest  level  of  encryption  supported  by  your  network equipment. WEP  is  an  older  encryption  standard  and  may  be  the only option available on some older devices that do not support WPA.General Network Security GuidelinesWireless  network  security  is  useless  if  the  underlying network is not secure. Password protect  all computers on  the network  and individually password protect sensitive files.Change passwords on a regular basis.Install  anti-virus  software  and  personal  firewall software.Disable file sharing (peer-to-peer). Some applications may  open  file  sharing  without  your  consent  and/or knowledge.Additional Security TipsKeep wireless routers, access points, or gateways away from exterior walls and windows.Turn  wireless  routers,  access  points,  or  gateways off  when  they  are  not  being  used  (at  night,  during vacations).Use strong passphrases that are at least eight characters in length. Combine letters and numbers to avoid using standard words that can be found in the dictionary. WEB:  For  more  information  on  wireless security, visit www.linksys.com/security•••••••
Chapter 3 Advanced Configuration3Wireless-G Broadband RouterChapter 3:  Advanced ConfigurationAfter setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if  you’d  like  to  change  its  advanced  settings,  use  the Router’s  web-based  utility.  This  chapter  describes  each web page of the utility and each page’s key functions. You can access the  utility via  a  web browser on  a computer connected to the Router.The  web-based  utility  has  these  main  tabs:  Setup, Wireless,  Security,  Access  Restrictions,  Applications  & Gaming, Administration, and Status. Additional tabs  will be available after you click one of the main tabs.NOTE:  When  first  installing  the  Router,  you should  use  the  Setup  Wizard  on  the  Setup CD-ROM.  If  you  want  to  configure  advanced settings,  use  this  chapter  to  learn  about  the web-based utility.How to Access the Web-Based UtilityTo access the web-based utility, launch the web browser on your computer, and enter the Router’s default IP address, 192.168.1.1, in the Address field. Then, press Enter.A password request screen will appear. (Non-Windows XP users will see a similar screen.) Leave the User name field blank. The first time you open the Web-based utility, use the default password admin. (You can set a new password from the Administration tab’s Management screen.) Click OK to continue.Password ScreenSetup > Basic SetupThe first screen that appears is the Basic Setup screen. This allows you to change the Router’s general settings. Setup > Basic SetupInternet SetupThe Internet Setup section configures the Router to your Internet  connection.  Most  of  this  information  can  be obtained through your ISP.Internet Connection TypeSelect the type of Internet connection your ISP provides from the drop-down menu. The available types are:Automatic Configuration - DHCPStatic IPPPPoEPPTPL2TPTelstra CableAutomatic Configuration - DHCPBy  default,  the  Router’s  Internet  Connection Type  is  set to  Automatic  Configuration  -  DHCP,  which  should  be kept only if your ISP supports DHCP or you are connecting through a dynamic IP address. (This option usually applies to cable connections.)Internet Connection Type > Automatic Configuration - DHCP••••••
Chapter 3 Advanced Configuration4Wireless-G Broadband RouterStatic IPIf  you  are  required  to  use  a  permanent  IP  address  to connect to the Internet, select Static IP.Internet Connection Type > Static IPInternet IP Address  This is the Router’s IP address, when seen from the Internet. Your ISP will provide you with the IP Address you need to specify here.Subnet Mask  This is the Router’s Subnet Mask, as seen by users on the Internet (including your ISP). Your ISP will provide you with the Subnet Mask.Gateway  Your  ISP  will  provide  you  with  the  Gateway Address, which is the ISP server’s IP address.DNS  Your  ISP  will  provide  you  with  at  least  one  DNS (Domain Name System) Server IP Address.PPPoESome DSL-based ISPs use PPPoE (Point-to-Point Protocol over Ethernet) to establish Internet connections. If you are connected to the Internet through a DSL line, check with your ISP to see if they use PPPoE. If they do, you will have to enable PPPoE.Internet Connection Type > PPPoEUser  Name  and  Password  Enter  the  User  Name  and Password provided by your ISP. Connect on Demand: Max Idle Time  You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time). If your  Internet  connection  has  been  terminated  due  to inactivity,  Connect  on  Demand  enables  the  Router  to automatically re-establish your connection as soon as you attempt to access the Internet again. To use this option, select  Connect  on  Demand.  In  the  Max  Idle  Time  field, enter the number of minutes you want to have elapsed before your  Internet connection  terminates. The default Max Idle Time is 5 minutes.Keep  Alive:  Redial  Period  If  you  select  this  option, the  Router  will  periodically  check  your  Internet connection.  If  you  are  disconnected,  then  the  Router will  automatically  re-establish  your  connection.  To  use this option,  select Keep Alive. In the  Redial Period field, you  specify  how  often  you  want  the  Router  to  check the  Internet  connection.  The  default  Redial  Period  is  30 seconds.PPTPPoint-to-Point Tunneling Protocol (PPTP) is a service that applies to connections in Europe only.Internet Connection Type > PPTPInternet  IP  Address  This  is  the  Router’s  IP  address,  as seen from the Internet. Your ISP will provide you with the IP Address you need to specify here.Subnet Mask  This is the Router’s Subnet Mask, as seen by users on the Internet (including your ISP). Your ISP will provide you with the Subnet Mask.Gateway  Your  ISP  will  provide  you  with  the  Gateway Address.User  Name  and  Password  Enter  the  User  Name  and Password provided by your ISP.Connect on Demand: Max Idle Time  You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time). If your  Internet  connection  has  been  terminated  due  to inactivity,  Connect  on  Demand  enables  the  Router  to automatically re-establish your connection as soon as you attempt to access the Internet again. To use this option, select  Connect  on  Demand.  In  the  Max  Idle  Time  field, enter the number of minutes you want to have elapsed before your  Internet connection  terminates. The default Max Idle Time is 5 minutes.Keep  Alive:  Redial  Period If  you  select  this  option,  the Router will  periodically check  your Internet connection.  If you  are  disconnected,  then  the  Router  will  automatically  re-establish  your  connection.  To  use  this  option,  select Keep Alive. In the Redial Period field, you specify how often you want the Router to check the Internet connection. The default value is 30 seconds.

Navigation menu