LINKSYS WRT54GSV72 Wireless-G Broadband Router With SppedBooster User Manual
LINKSYS LLC Wireless-G Broadband Router With SppedBooster
LINKSYS >
Contents
- 1. Users manual1
- 2. Users manual2
- 3. Users manual3
- 4. Users manual4
Users manual3
Chapter 3 Wireless > Advanced Wireless Settings Advanced Wireless Authentication Type The default is set to Auto, which allows either Open System or Shared Key authentication to be used,With Open System authentication, the sender and the recipient do NOT use a WEP key for authentication. With Shared Key authentication, the senderand recipient use a WEP key for authentication. Basic Rate The Basic Rate setting is not actually one rate of transmission but a series of rates at which the Router can transmit.The Routerwill advertise its Basic Rate to the otherwireless devicesinyournetwork,sotheyknowwhich rates will be used.The Routerwill also advertise that it will automatically select the best rate for transmission. The default setting is Default, when the Router can transmit at all standard wireless rates (1 -2Mbps, 5.5Mbps, 1 1 Mbps, 18Mbps, and 24Mbps). Other options are 1-2Mbps, for use With older wireless technology, and All, when the Router can transmit at all wireless rates. The Basic Rate is not the actual rate of data transmission, If you want to specify the Router’s rate of data transmission, configure the Transmission Rate setting. Transm sion Rate The rate of data transmission should be set depending on the speed of your wireless network. You can select from a range oftransmission speeds, oryou can select Auto to have the Router automatically use the fastest possible data rate and enable the Auto-Fallback feature. Auto—Fallback will negotiate the best possible connection speed between the Router and a wireless client. The default value is Auto. CTS Protection Mode CTS (Clear-To-Send) Protection Mode should remaindisabled unlessyou are having severe problems with your Wireless—G products not being able to transmit to the Router in an environment with heavy 802.11b traffic. This function boosts the Reuters ability to catch all Wireless—G transmissions but will severely decrease performance. Frame Burst Enabling this option should provide your network with greater performance, depending on the Wireless-G Broadband Router with SpeedBoosler Advanced Configuration manufacturer of your wireless products. To turn off the Frame Burst option, select Disable.The default is Enable. Beacon Interval The default value is 100, Enter a value between 1 and 65,535 milliseconds. The Beacon Interval value indicates the frequency interval of the beacon. A beacon is a packet broadcast by the Router to synchronize the wireless network, DTIM Interval This value, between 1 and 255, indicates the interval of the Delivery Traffic Indication Message (DTlM). A DTIM field is a countdown fleld informing clients of the next window for listening to broadcast and multicast messages. When the Router has buffered broadcast or multicast messages for associated clients, it sends the next DTlM with a DTIM Interval value. lts clients hear the beacons and awaken to receive the broadcast and multicast messages. The default value is 1. Fragmentation Threshold This value specifies the maximum size for a packet before data is fragmented into multiple packets. lf you experience a high packet error rate, you may slightly increase the Fragmentation Threshold. Setting the Fragmentation Threshold too low may result in poor network performance. Only minor reduction of the default value is recommended. In most cases, it should remain at its default value of 2346. RTS Threshold Should you encounter inconsistent data flow, only minor reduction of the default value, 2347, is recommended. lf a network packet is smaller than the preset RTS threshold size, the RTS/CTS mechanism Will not be enabled. The Router sends Request to Send (RTS) frames to a particular receiving station and negotiates the sending of a data frame. After receiving an RTS, the wireless station responds with a Clear to Send (CTS) frame to acknowledge the right to begin transmission. The RTS Threshold value should remain at its default value of 2347. AP Isolation This isolates all wireless clients and wireless devices on your network from each other. Wireless devices will be able to communicate with the Router but not with each other, To use this function, select On. AP Isolation is turned Off by default. Secure Easy Setup This feature allows you to enable or disable the SecureEasySetup feature. Select Disable to disable the feature and turn off the button’s light. The feature is enabled by default. Click the Save Settings button to apply your changes, or click the Cancel Changes button to cancel your changes. Security > Firewall The Security > Firewall screen is used to configure a firewall that can filter out various types of unwanted traffic on the Router's local network. 12 Chapter 3 Security > Firewall Firewall Block WAN Requests BIockAnonymous Internet Requests Thisfeature makes it more difficult for outside users to work their way into your networkThis feature is Enabled by default. Deselect the feature to allow anonymous Internet requests. Filter Multicast Multicasting allows for multiple transmissions to specific recipients at the same time. If multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate computers. Select Filter Multicast to filter multicasting, or deselect the feature to disable it. Filter Internet NAT Redirection This feature uses port forwarding to block access to local servers from local networked computers. Select Filter Internet NAT Redirection to filter Internet NAT redirection, or deselect the feature to disable it. Filter IDENT (Port 1 13) This feature keeps port I 13 from being scanned by devices outside of your local network. Select Filter INDENT (Port 113) to filter port 113, or deselect the feature to disable it. Click the Save Settings button to apply your changes, or click the Cancel Changes button to cancel your changes. Security > VPN Passthrough Security >va Passthrough The Security > VPN Passthrough screen allows you to enable VPN tunnels using IPSec, PPTP, or L2TP protocols to pass through the Router's firewall. Wireless-G Broadband Router with Speedlionsler Advanced Configuration VPN Passthrnugh IPSec Passthrough Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. To allow IPSec tunnels to pass through the RoutEr, keep the default, Enable. PPTP Passthrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be tunneled through an IP network. To allow PPTP tunnels to pass through the Router, keep the default, Enable. LZTP Passthrough Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the Internet on the Layer 2 Ievel.To allow LZTP tunnels to pass through the Router, keep the default, Enable. Click the Save Settings button to apply your changes, or click the Cancel Changes button to cancel your changes. Access Restric 'ons > Internet Access The Access Restrictions > InternetAccess screen allows you to block or allow specific kinds of Internet usage and traffic, such as Internet access, designated services, and websites during specific days and times. Access Restrictions > Internet Access Internet Access Internet Access Policy Access can be managed by a policy. Use the settings on this screen to establish an access policy (after the Save Settings button is clicked), Selecting a policy from the drop—down menu will display that policy’s settings. To delete a policy, select that 13 Chapter 3 policy's number and click the Delete button. To View all the policies, click the Summary button. (Policies can be deleted from the Summary screen by selecting the policy or policies and clicking the Delete button.To return to the Internet Access tab, click the Close button.) umrnn ’ollty Summary m M £1 .. - EEE'EEEI was s r EEEEEEI apusyn»-p Internet Policy Summary Status Policies are disabled by default. To enable a policy, select the policy number from the drop—down menu, and select Enable. To create an Internet Access policy: 1. Select a number from the Internet Access Policy drop- down menu. 2. To enable this policy, select Enable. 3. Enter a Policy Name in the field provided. 4. Click the Edit LIst of PCs button to select which PCs will be affected by the policy. The List afPCs screen appears. You can select a PC by MAC Address or IP Address. You can also enter a range of IP Addresses if you want this policy to affect a group of PCs. After making your changes, click the Save Settings button to apply your changes or Cancel Changes to cancel your changesThen click the Close button. munc- MMm—a-xuus—qm mmunnnun unnwnufin wuuunnun “(luau-nu» IKDhuIlllle-ell aqua-uni. nun-nun." “nun-u... (phi—sunk- .»va-i . mm mm - .m-- - In mm . nun-i- nun-i. x_.o~—-..x. 'I—mlH-iv b "qt-am. - 3-9:ng less-sec; List or PCs 5. Select the appropriate option, Deny or Allow, depending on whether you want to block or allow Internet access for the PCs you listed on the List ofPCs screen. Wireless-G Broadband Router with speedaonster Advanced Configuration 6. Decide which days and whattimes you wantthis policy to be enforced. Select the individual days during which the policy will be in effect, or select Everyday. Then enter a range of hours and minutes during which the policy Will be in effect, or select 24 Hours. 7. Select any Blocked Servrces or Website Blocking you wish to use. 8. Click the Save Settings button to save the policy's settings, or click the Cancel Changes button to cancel the policy’s settings. Blocked Services You can filter access to various services accessed over the Internet, such as FTP or telnet, by selecting services from the drop-down menus next to Blocked Services. (You can block up to 20 services.) Then enter the range of ports you want to filter. Ifthe service you want to block is not listed or you want to edit a service's settings, then click the Add/Edit Service button. Then the PortServices screen will appear. Port Services To add a service, enter the service’s name in the Servrce Name field. Select its protocol from the Protocol drop- down menu, and enter its range in the Port Range fields. Then click the Add button. To modify a service, select it from the list on the right. Change its name, protocol setting, or port range. Then click the Modify button. To delete a service, select it from the list on the right.Then click the Delete button. When you arefinished making changes on the PortServices screen, click the Apply button to save the changes. If you want to cancel your changes, click the Cancel button. To close the Port Services screen and return to the Access Restrictions screen, click the Close button. Website Blocking by URL Address If you want to block websites with specific URL addresses, enter each URL in a separate field next to Website Blocking by URL Address. 14 Chapter 3 Website Blocking by Keyword If you want to block websites using specific keywords, enter each keyword in a separate field next to Website Blocking by Keyword. Click the Save Settings button to apply your changes, or click Cancel Changes to cancel your changes. Applications and Gaming > Port Range Forward The Applications & Gaming > Port Range Forward screen allows you to set up publrc services on your network, such as web servers, ftp servers, e-mail servers, or other specialized Internet applications (Specialized Internet applications are anyapplicationsthatuseInternetaccessto performfunctions such as videoconferencing or online gaming. Some Internet applications may not require any forwarding.) fii— r—A— l_l-_ r—r— l_h_ r—r— f_F_ ff r—n— l_l:_ 1771111117- 333315531531! Applications and Gaming > Port Range Forward Port Range Forward To forward a port, enter the information on each line for the criteria required. Application In this field, enter the name you wish to give the applrcation. Each name can be up to 12 characters. Start/End This is the port range. Enter the number that starts the port range in the Start column and the number that ends the range in the End column. Protocol Select the protocol used for this application, either TCP or UDP, or Both. IP Address For each application, enter the IP Address of the PC running the specific application. Enable Select Enable to enable port forwarding for the relevant application. Click the Save Settings button to apply your changes, or click Cancel Changes to cancel your changes. Wireless-G Broadband Router with speednoosrer Advanced Configuration Applications & Gaming > Port Triggering The Applications & Gaming > Port Triggering screen allows the Router to watch outgoing data for specrfic port numbers. The IP address of the computer that sends the matching data is remembered by the Router, so that when the requested data returns through the Router, the data is pulled back to the proper computer by way of IP address and port mapping rules. Appllcatlons and Gamlng > PortTrrggenng Port Triggering Application Enter the application name of the trigger. Triggered Range For each application, list the triggered port number range. Check with the Internet application documentation for the port numberis) needed. Start Port Enterthe starting port numberoftheTriggered Range. End Port Enter the endrng port number of the Triggered Range. Forwarded Range For each application, list the forwarded port number range. Checkwiththe Internetapplicatron documentatron for the port numbeds) needed. Start Port Enter the starting port number of the Forwarded Range, End Port Enterthe endrng port numberofthe Forwarded Range. Enable Select Enable to enable port triggering for the applicable application. Click the Save Settings button to apply your changes, or click Cancel Changes to cancel your changes 15 Chapter 3 Applications and Gaming > DMZ The DMZ feature allows one network computer to be exposed to the Internet for use of a special-purpose service such as Internet gaming or videoconferencing. DMZ hosting forwards all the ports at the same time to one PC. The Port Range Forward feature is more secure because it only opens the ports you want to have opened, while DMZ hosting opens all the ports of one computer, exposing the computer to the Internet. a»: mm“... L. mp4... Applications and Gaming > DMZ DMZ Any PC whose port is being forwarded must have its DHCP client function disabled and should have a new static IP address assigned to it because its IP address may change when using the DHCP function. To expose one PC, select Enable. Then, enter the computer’s IP address in the DMZ Host IPAddress field. Click the Save Settings button to apply your changes, or click Cancel Changes to cancel your changes. Applications and Gaming > 005 Quality of Service (QoS) ensures better service to high-priority types of network traffic, which may involve demanding, real-time applications, such as videoconferencing. There are three types of (205 available: Device Priority, Ethernet Port Priority, and Application Priority. QoS Enable/Disable To enable QoS, select Enable. Otherwise, select Disable. Upstream Bandwidth Select Auto or Manual from the drop-down menu. Manual allows you to specify the maximum outgoing bandwidth that applications can utilize. Wireless-G Broadband Router with speedaonsier Advanced Configuration Applications and Gaming > QoS Device Priority Enterthe name ofyour network device in the Device name field, enter its MAC Address, and then select its priority from the drop-down menu. Ethernet Port Priority Ethernet Port Priority 005 allows you to prioritize performance forthe Router’s four ports, LAN Ports 1—4. For each port, select the priority and flow control setting. Priority Select High or Low in the Priority column. The Router's four ports have been assigned low priority by default. Flow Control If you want the Router to control the transmission of data between network devices, select Enable. To disable this feature, select Disable. Ethernet Port Priority (205 does not require support from your ISP because the prioritized ports LAN ports 14 are in your network. Application Priority Application Priority QoS manages information as it is transmitted and received. Depending on the settings of the 005 screen, this feature will assign information a high or low priority for the applications that you specify. 16 Chapter 3 Opti ze Gaming Applications Select this to automatically allow common game application ports to have a higher priority. These games include, but are not limited to: Counter-Strike, Half-Life, Age of Empires, Everquesr, QuakeZ/Quake3 and Diablo II, etc. The default setting is unselected. Application Name Enter the name you wish to give the application in the Application Name field. Priority Select High or Low to assign priority to the application. Specific Port # Enter the port number for the application, Wireless 005 WMM Support Wi-Fi Multimedia (WMM), formerly known as Wireless Multimedia Extensions (WME), is a Wi-Fi Alliance certified feature, based on the IEEE 802.11e standard. This feature provides 005 to wireless networks. It is especially suitable for voice, music and videoapplications;forexample,Voice over IP (VoIP),video streaming, and interactive gaming. If you have other devices on your wireless network that support WMM, select Enabled. Otherwise, keep the default, Disabled. No Acknowledgement This feature prevents the Router from re-sending data if an error occurs.To use this feature, select Enabled. Otherwise, keep the default setting, Disabled. Click the Save Settings button to apply your changes, or click Cancel Changes to cancel your changes. Administration > Management Th Administration > Management screen allows the network’s administrator to manage specific Router functions for access and security. Administration > Management Wireless-G Broadband Router with speedaonster Advanced Configuration Router Password local Router Access Router Password Enter a new Password for the Router. Re-enter to confirm Enter the Password again to confirm. Web Access Access Server H'I'I'P (HyperText Transport Protocol) is the communications protocol used to connect to servers on the World Wide Web. HTTPS uses SSL (Secured Socket Layer) to encrypt data transmitted for higher security. Select H'I'I'P or HTTPS. Wireless Access Web If you are using the Router in a public domain where you are giving wireless access to your guests, you can disable wireless access to the Router’s web-based utility. You will only be able to access the web-based utility Via a wired connection ifyou disable the setting. Select Enable to enable wireless access to the Router’s web-based utility, or select Disable to disable wireless access to the utility. Remote Router Access Remote Management To access the Router remotely, from outside the network, select Enable. Management Port Enter the port number that will be open to outside access. You will need to enterthe Router's password when accessing the Router this way, as usual. Use HTTPS To require the use ofH'I'I'PS for remote access, select this feature. UPnP UPnP Keep the default, Enable to enable UPnP feature; otherwise, select Disable. Click the Save Settings button to apply your changes, or click Cancel Changes to cancel your changes. Administration > Log The Router can keep logs of all traffic for your Internet connection. Administration > Log 17 Chapter 3 Log Log To disable the Log function, keep the default setting, Disable. To monitor traffic between the network and the Internet, select Enable. When you wish to view the logs, click the Incoming Log or Outgoing Log button, depending on which you wish to view. Click the Save Settings button to apply your changes, or click Cancel Changes to cancel your changes. Administration > Diagnostics The diagnostic tests (Ping and Traceroute) allow you to check the connections of your network components. Adminlsilatlcn > Diagnostlcs Ping Test Ping The Ping test will check the status of a connection. Click the Ping button to open the Ping Test screen. Enter the address of the PC whose connection you wish to test and how many times you wish to test it. Then, click the Ping button.The Ping Test screen will show if the test was successful. To stop the test, click the Stop button. Click the Clear Log button to clear the screen. Click the Close button to return to the Diagnostics screen. .-——...—.m.- LEI ligi lz The Ping Test Wireless-G Broadband Router with Speedlionsler Advanced Configuration Traceroute Test Traceroute To test the performance ofa connection, click the Traceroute button. Enter the address of the PC whose connection you wish to test and click the Traceroute button. The Traceroute Test screen erI show if the test was successful. To stop the test, click the Stop button. Click the Clear Log button to clear the screen. Click the Close button to return to the Diagnostics screen. mun... r... sh"...- mun hab|nmltl¥ iami’n..-’m—.... utmutr.mtmnm--m-w. TheTraceroute Test Administration > Factory Defaults The Administration > Factory Defaults screen allows you to restore the Router’s configuration to its factory default settings. Factory Defaults Restore Factory Defaults To reset the Router's settings to the default values, select Yes, and then click the Save Settings button. Any settings you have saved will be lost when the default settings are restored. Administration > Factory Defaults 1a Chapter 3 Administration > Firmware Upgrade The Administration > Firmware Upgrade screen allows you to upgrade the Router's firmware. Do not upgrade the firmware unless you are experiencing problems with the Router or the new firmware has a feature you want to use. Administration > Firmware Upgrade Before upgrading the firmware' download the Router’s firmware upgrade file from the Linksys website, www. Iinksyscom, Then extract the file, Upgrade Firmware Please select a file to upgrade Click the Browse button and select the extracted firmware upgrade file. Then click the Upgrade button and follow the onscreen instructions. Administration > Config Management This screen is used to back up or restore the Router’s configuration file. Administration > Config Management Backup Configuration To back up the Router's configuration file, clickthe Backup button.Then follow the on—screen instructions. Wireless-G Broadband Router with Speedflonsler Advanced Configuration Restore Configuration Please select a file to restore Click the Browse button and select the configuration file Then click the Restore button. Status > Router The Status > Router screen displays the Router‘s current SCHRLISV Administration > Factory Defaults Router Information Firmware Version This is the Router’s current firmware. Current Time This shows the time, as you set on the Setuptab. MAC Address This is the Router's MAC Address, as seen by your ISP. Router Name This is the specific name for the Router, which you set on the Setup tab. Host Name If required by your ISP, this would have been entered on the Setup tab. Domain Name If required by your ISP, this would have been entered on the Setup tab. Internet Configuration Type This section shows the current network information stored in the Router. The information varies depending on the Internet connection type selected on the Setup > Basic Setup screen. Click the Refresh button to update the on-screen information. 19 Chapter 3 Status > Local Network The Status > Local Network screen displays the status of your network. Status > Local Network Local Network MAC Address This is the Router’s MAC Address, as seen on your local, Ethernet network. IP Address This shows the Router’s IP Address, as it appears on your local, Ethernet network. Subnet Mask This shows the current subnet mask being configured for your local network. DHCP Server Ifyou are using the Routeras a DHCP server, that will be displayed here. Start IP Address For the range of IP Addresses used by devices on your local, Ethernet network, the beginning of that range is shown here. End IP Address For the range of IP Addresses used by devices on your local, Ethernet network, the end of that range is shown here. DHCP Clients Table Clicking this button will open a screen to show you which PCs are utilizing the Router as a DHCP server. You can delete PCs from that list, and sever their connections, by checking a Delete box and clicking the Delete button. __ —_. _-_ ‘E'u - t: — n DHCP Clients Table Wireless-G Broadband Router with speedaonsier Advanced Configuration Click the Refresh button to update the on-screen information. Status > Wireless The Status > Wireless screen displays the status of your wireless network. Status > Wireless Wireless MAC Address This is the Router's MAC Address, as seen on your local, wireless network. Mode As selected from the Wireless > Basic Wireless Settings screen, this displays the wireless mode (Mixed, G- Only, or Disabled) used by the network. SSID As entered on the Wireless > Basic Wireless Settings screen, this displays the wireless network name or SSID. DHCP Server The status of the DHCP server function is displayed here. Channel As entered on the Wireless > Basic Wireless Settings screen, this displays the channel on which your wireless network is broadcasting. Encryption Function As selected on the Wireless > Wireless Security screen, this displays the status of the Router’s wireless security. Click the Refresh button to update the on-screen information. 20 Appendix A Appendix A: Troubleshooting Your computer cannot connect to the Internet. Follow these instruct|ons until your computer can connect to the Internet: 0 Make sure that the Router is powered on. The Power LED should be green and not flashing. 0 If the Power LED is flashing, then power off all of your network devices, including the modem, Router, and computers. Then power on each device in the following order: 1. Cable or DSL modem 2. Router 3. Computer - Check the cable connections. The computer should be connected to one of the ports numbered 1-4 on the Router, and the modem must be connected to the Internet port on the Router. The modem does not have an Ethernet port. The modem is a dial-up modem for traditional dial-up service. To use the Router, you need a cable/DSL modem and h|gh-speed Internet connection. You cannot use the DSL service to connect manually to the In ternet. After you have installed the Router, it will automatically connect to your Internet Service Prov-der (ISP), so you no longer need to connect manually. The DSL telephone line does not fit into the Router’s Internetport. The Router does not replace your modem. You still need your DSL modem in order to use the Router. Connect the telephone line to the DSL modem, insert the setup CD into your computer, and then follow the on—screen instructions. Wireless-G Broadband Router with speedaonsrer Troubleshooting When you double-click the web browser, you are prompted for a username and password. If you want to get rid of the prompt, follow these instructions. Launch the web browser and perform the following steps (these steps are specific to Internet Explorer but are similar for other browsers): 1. Select Tools > Internet Options. 2. Click the Connections tab. 3. Select Never dial a connection. 4. Cllck 0K. The Router does not have a coaxial port for the cable connection. The Router does not replace your modem. You still need your cable modem in order to use the Router. Connect your cable connection to the cable modem, insert the setup CD into your computer, and then follow the on—screen instructions. The computer cannot connect wirelessly to the network. Make sure the wireless network name or SSID is the same on both the computerand the Router. Ifyou have enabled Wireless security, then make sure the same security method and key are used by both the computer and the Router. You need to modify the settings on the Router. Open the web browser (for example, Internet Explorer or Firefox), and enter the Router’s IP address in the address field (the default IP address is 192.168.1.1). When prompted, leave the User name field blank and enter the password to the Router (the default is admin). Click the appropriate tab to change the settings. WEB: Ifyour questions are not addressed here, refer to the Linksys website, www.linksys.com. 21
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.5 Linearized : No Page Count : 10 XMP Toolkit : XMP toolkit 2.9.1-13, framework 1.6 About : uuid:467ab85d-3ae1-4c5b-be06-6ac290af2063 Modify Date : 2007:11:01 20:55:22+08:00 Create Date : 2007:11:01 20:55:13+08:00 Metadata Date : 2007:11:01 20:55:22+08:00 Document ID : uuid:32c8a61c-f826-4ec1-b3c0-4e64676db435 Format : application/pdf Title : untitled Producer : Acrobat Distiller 6.0 (Windows)EXIF Metadata provided by EXIF.tools