® A Division of Cisco Systems, Inc. 2.4 GHz Wireless-G 802.11g Broadband Router WIRELESS Model No.
Wireless-G Broadband Router Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2005 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
Wireless-G Broadband Router Table of Contents Chapter 1: Introduction Welcome What’s in this User Guide? Chapter 2: Planning Your Wireless Network Network Topology Ad-Hoc versus Infrastructure Mode Network Layout Chapter 3: Getting to Know the Wireless-G Broadband Router The Back Panel The Front Panel Chapter 4: Connecting the Wireless-G Broadband Router Overview Hardware Installation for Connection to Your Broadband Modem Hardware Installation for Connection to Another Router 1 1 2 4 4 4 4 6 6 7 8
Wireless-G Broadband Router The Administration Tab - Log The Administration Tab - Diagnostics The Administration Tab - Factory Defaults The Administration Tab - Firmware Upgrade The Administration Tab - Config Management The Status Tab - Router The Status Tab - Local Network The Status Tab - Wireless Appendix A: Troubleshooting Common Problems and Solutions Frequently Asked Questions Appendix B: Wireless Security Security Precautions Security Threats Facing Wireless Networks 35 36 37 37 37 38 39 39 40
Wireless-G Broadband Router List of Figures Figure 3-1: The Router’s Back Panel Figure 3-2: The Router’s Front Panel Figure 4-1: Connecting Your Internet Connection Figure 4-2: Connecting Your Network Devices Figure 4-3: Connecting the Power Figure 4-4: Diagram for Connection to Another Router Figure 4-5: Connecting Another Router Figure 4-6: Connecting Your Network Devices Figure 4-7: Connecting the Power Figure 5-1: Password Screen Figure 5-2: Setup Tab - Basic Setup Figure 5-3: DHCP Connection Type Figu
Wireless-G Broadband Router Figure 5-23: Wireless Tab - Wireless Security (RADIUS) Figure 5-24: Wireless Tab - Wireless Security (WEP) Figure 5-25: Wireless Tab - Wireless MAC Filter Figure 5-26: MAC Address Filter List Figure 5-27: Wireless Tab - Advanced Wireless Settings Figure 5-28: Security Tab - Firewall Figure 5-29: Security Tab - VPN Passthrough Figure 5-30: Access Restrictions Tab - Internet Access Figure 5-31: Internet Policy Summary Figure 5-32: List of PCs Figure 5-33: Port Services Figure 5-34
Wireless-G Broadband Router Chapter 1: Introduction Welcome Thank you for choosing the Linksys Wireless-G Broadband Router. The Wireless-G Broadband Router will allow you to network wirelessly better than ever, sharing Internet access, files and fun, easily and securely. How does the Wireless-G Broadband Router do all of this? A router is a device that allows access to an Internet connection over a network.
Wireless-G Broadband Router What’s in this User Guide? This user guide covers the steps for setting up and using the Wireless-G Broadband Router. • Chapter 1: Introduction This chapter describes the Router’s applications and this User Guide. • Chapter 2: Planning Your Wireless Network This chapter describes the basics of wireless networking. • Chapter 3: Getting to Know the Wireless-G Broadband Router This chapter describes the physical features of the Router.
Wireless-G Broadband Router • Appendix G: Specifications This appendix provides the technical specifications for the Router. • Appendix H: Warranty Information This appendix supplies the warranty information for the Router. • Appendix I: Regulatory Information This appendix supplies the regulatory information regarding the Router. • Appendix J: Contact Information This appendix provides contact information for a variety of Linksys resources, including Technical Support.
Wireless-G Broadband Router Chapter 2: Planning Your Wireless Network Network Topology A wireless local area network (WLAN) is exactly like a regular local area network (LAN), except that each computer in the WLAN uses a wireless device to connect to the network. Computers in a WLAN share the same frequency channel and SSID, which is an identification name shared by the wireless devices belonging to the same wireless network. ssid (service set identifier): your wireless network’s name.
Wireless-G Broadband Router The Wireless-G Broadband Router is compatible with all 802.11b and 802.11g adapters, such as the Notebook Adapters (WPC54G, WPC11) for your laptop computers, PCI Adapter (WMP54G, WMP11) for your desktop PC, and USB Adapter (WUSB54G, WUSB11) when you want to enjoy USB connectivity. The Broadband Router will also communicate with the Wireless PrintServer (WPS54G) and Wireless Ethernet Bridges (WET54G, WET11).
Wireless-G Broadband Router Chapter 3: Getting to Know the Wireless-G Broadband Router The Back Panel The Router's ports, where the cables are connected, are located on the back panel. Figure 3-1: The Router’s Back Panel Reset Button There are two ways to reset the Router's factory defaults. Either press the Reset Button, for approximately five seconds, or restore the defaults from the Administration tab - Factory Defaults in the Router's Web-based Utility.
Wireless-G Broadband Router The Front Panel The Router’s SecureEasySetup button (the Cisco logo) and LEDs are located on the front panel. Figure 3-2: The Router’s Front Panel Power Green. The Power LED lights up and will stay on while the Router is powered on. When the Router goes through its self-diagnostic mode during every boot-up, this LED will flash. When the diagnostic is complete, the LED will be solidly lit. DMZ Green. The DMZ LED indicates when the DMZ function is being used.
Wireless-G Broadband Router Chapter 4: Connecting the Wireless-G Broadband Router Overview This chapter includes two sets of instructions. If the Wireless-G Broadband Router will be the only router in your network, follow the instructions in “Hardware Installation for Connection to Your Broadband Modem.” If you want to install the Wireless-G Broadband Router behind another router in your network, then follow the instructions in “Hardware Installation for Connection to Another Router.
Wireless-G Broadband Router 5. Connect your network PCs or Ethernet devices to the Router’s numbered ports using standard Ethernet network cabling. Figure 4-2: Connecting Your Network Devices 6. Connect the AC power adapter to the Router's Power port and the other end into an electrical outlet. Only use the power adapter supplied with the Router. Use of a different adapter may result in product damage. IMPORTANT: Make sure you use the power adapter that is supplied with the Router.
Wireless-G Broadband Router Hardware Installation for Connection to Another Router NOTE: Steps 1-4 are instructions for a typical Linksys router; however, if you are using a non-Linksys router, refer to the other router’s documentation for instructions on how to change its local IP address to 192.168.2.1. Before you install the Router, you must change the default IP address of the other router. This is mandatory because both routers may be set to the same IP address by default.
Wireless-G Broadband Router 9. Decide which network computers or Ethernet devices you want to connect to the Router. Disconnect the selected computers or devices from the other router, and then connect them to the Router’s numbered ports using standard Ethernet network cabling. Figure 4-6: Connecting Your Network Devices 10. Connect the AC power adapter to the Router's Power port and the other end into an electrical outlet. Only use the power adapter supplied with the Router.
Wireless-G Broadband Router Chapter 5: Configuring the Wireless-G Broadband Router Overview Linksys recommends using the Setup CD-ROM for first-time installation of the Router. If you do not wish to run the Setup Wizard on the Setup CD-ROM, then you can use the Web-based Utility to configure the Router. For advanced users, you may configure the Router’s advanced settings through the Web-based Utility. This chapter will describe each web page in the Utility and each page’s key functions.
Wireless-G Broadband Router The Setup Tab - Basic Setup The first screen that appears displays the Setup tab. This allows you to change the Router's general settings. Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes. Internet Setup The Internet Setup section configures the Router to your Internet connection. Most of this information can be obtained through your ISP.
Wireless-G Broadband Router • PPPoE. Some DSL-based ISPs use PPPoE (Point-to-Point Protocol over Ethernet) to establish Internet connections. If you are connected to the Internet through a DSL line, check with your ISP to see if they use PPPoE. If they do, you will have to enable PPPoE. User Name and Password. Enter the User Name and Password provided by your ISP. Connect on Demand: Max Idle Time.
Wireless-G Broadband Router • L2TP. Layer 2 Tunneling Protocol (L2TP) is a service that applies to connections in Europe only. User Name. Enter the User Name provided by your ISP. Password. Enter the Password provided by your ISP. L2TP Server. Enter the IP address of the L2TP server you are using; this should be provided by your ISP. Connect on Demand.
Wireless-G Broadband Router Optional Settings Some of these settings may be required by your ISP. Verify with your ISP before making any changes. Router Name. In this field, you can type a name of up to 39 characters to represent the Router. Host Name/Domain Name. These fields allow you to supply a host and domain name for the Router. Some ISPs, usually cable ISPs, require these names as identification.
Wireless-G Broadband Router Network Address Server Settings (DHCP) The settings allow you to configure the Router’s Dynamic Host Configuration Protocol (DHCP) server function. The Router can be used as a DHCP server for your network. A DHCP server automatically assigns an IP address to each computer on your network.
Wireless-G Broadband Router The Setup Tab - DDNS The Router offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address. It is useful when you are hosting your own website, FTP server, or other server behind the Router. Before you can use this feature, you need to sign up for DDNS service with a DDNS service provider, www.dyndns.org or www.TZO.com. Select your DDNS service, DynDNS or TZO, from the DDNS Service pull-down menu.
Wireless-G Broadband Router The Setup Tab - MAC Address Clone A MAC address is a 12-digit code assigned to a unique piece of hardware for identification. Some ISPs will require you to register a MAC address in order to access the Internet. If you do not wish to re-register the MAC address with your ISP, you may assign the MAC address you have currently registered with your ISP to the Router with the MAC Address Clone feature. Enable/Disable.
Wireless-G Broadband Router The Setup Tab - Advanced Routing This tab is used to set up the Router’s advanced functions. Operating Mode allows you to select the type(s) of advanced functions you use. Dynamic Routing will automatically adjust how packets travel on your network. Static Routing sets up a fixed route to another network destination. Operating Mode. Select the mode in which this Router will function. If this Router is hosting your network’s connection to the Internet, select Gateway.
Wireless-G Broadband Router The Wireless Tab - Basic Wireless Settings The basic settings for wireless networking are set on this screen. Wireless Network Mode. From this drop-down menu, you can select the wireless standards running on your network. If you have both 802.11g and 802.11b devices in your network, keep the default setting, Mixed. If you have only 802.11g devices, select G-Only. If you have only 802.11b devices, select B-Only. If you do not have any 802.11g and 802.
Wireless-G Broadband Router The Wireless Tab - Wireless Security The Wireless Security settings configure the security of your wireless network. There are four wireless security mode options supported by the Router: WPA Personal, WPA Enterprise, WPA2 Personal, WPA2 Enterprise, RADIUS, and WEP. (WEP stands for Wired Equivalent Privacy, WPA stands for Wi-Fi Protected Access, which is a security standard stronger than WEP encryption. WPA2 is stronger than WPA.
Wireless-G Broadband Router WPA2 Personal. WPA2 gives you two encryption methods, TKIP and AES, with dynamic encryption keys. Select the type of algorithm, AES, or TKIP + AES. Enter a WPA Shared Key of 8-63 characters. Then enter a Group Key Renewal period, which instructs the Router how often it should change the encryption keys. Figure 5-21: Wireless Tab - Wireless Security (WPA2 Personal) WPA2 Enterprise. This option features WPA2 used in coordination with a RADIUS server.
Wireless-G Broadband Router RADIUS. This option features WEP used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) First, enter the RADIUS server’s IP Address and port number, along with a key shared between the Router and the server. Then, select a Default Transmit Key (choose which Key to use), and a level of WEP encryption, 64 bits 10 hex digits or 128 bits 26 hex digits.
Wireless-G Broadband Router The Wireless Tab - Wireless MAC Filter Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network’s radius. Wireless MAC Filter. To filter wireless users by MAC Address, either permitting or blocking access, click Enable. If you do not wish to filter users by MAC Address, select Disable. Prevent. Clicking this button will block wireless access by MAC Address. Permit Only.
Wireless-G Broadband Router The Wireless Tab - Advanced Wireless Settings This tab is used to set up the Router’s advanced wireless functions. These settings should only be adjusted by an expert administrator as incorrect settings can reduce wireless performance. Transmission Rate. The rate of data transmission should be set depending on the speed of your wireless network.
Wireless-G Broadband Router The Security Tab - Firewall Block WAN Requests. Enable the Block WAN Request feature by checking the box beside Block Anonymous Internet Requests and you can prevent your network from being “pinged,” or detected, by other Internet users. The Block WAN Request feature also reinforces your network security by hiding your network ports. Both functions of the Block WAN Request feature make it more difficult for outside users to work their way into your network.
Wireless-G Broadband Router The Access Restrictions Tab - Internet Access The Internet Access screen allows you to block or allow specific kinds of Internet usage and traffic, such as Internet access, designated services, websites, and inbound traffic during specific days and times. Internet Access Policy. Access can be managed by a policy. Use the settings on this screen to establish an access policy (after the Save Settings button is clicked).
Wireless-G Broadband Router Then, enter the range of ports you want to filter. If the service you want to block is not listed or you want to edit a service’s settings, then click the Add/Edit Service button. Then the Port Services screen will appear. To add a service, enter the service’s name in the Service Name field. Select its protocol from the Protocol drop-down menu, and enter its range in the Port Range fields. Then click the Add button. To modify a service, select it from the list on the right.
Wireless-G Broadband Router The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized Internet applications. (Specialized Internet applications are any applications that use Internet access to perform functions such as videoconferencing or online gaming. Some Internet applications may not require any forwarding.
Wireless-G Broadband Router The Applications & Gaming Tab - Port Triggering The Port Triggering screen allows the Router to watch outgoing data for specific port numbers. The IP address of the computer that sends the matching data is remembered by the Router, so that when the requested data returns through the Router, the data is pulled back to the proper computer by way of IP address and port mapping rules. Port Triggering Application. Enter the application name of the trigger.
Wireless-G Broadband Router The Applications and Gaming Tab - DMZ The DMZ feature allows one network user to be exposed to the Internet for use of a special-purpose service such as Internet gaming or videoconferencing. DMZ hosting forwards all the ports at the same time to one PC. The Port Range Forward feature is more secure because it only opens the ports you want to have opened, while DMZ hosting opens all the ports of one computer, exposing the computer to the Internet.
Wireless-G Broadband Router Category. From this drop-down menu, you can select the Category for which you will set bandwidth priority. These Categories include applications, ethernet ports, MAC addresses, and online games. Application. With this option you can select None, Add a New Application, Online Game, or select from the list of applications you want to set. To create a new entry, select Add a New Application, and refer to the Add a New Application section. Priority.
Wireless-G Broadband Router Summary. This section will display a summary of all the categories of applications with QoS assigned. Priority This displays the bandwidth allocation priority of High, Medium, Normal, or Low, that you set for the application. Name This displays the application name or the entries you entered to be allocated. Information This displays the Port Range or MAC Address entered when you added a new application.