USER GUIDE Wireless-G Broadband Router with SpeedBooster Model No: WRT54GS
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
Table of Contents Chapter 1: Product Overview 1 Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines . . . . . . . . . . . . . . . .
Table of Contents Appendix C: Warranty and Regulatory Information 23 Limited Warranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Wireless Disclaimer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys Wireless-G Broadband Router with SpeedBooster. The Router lets you access the Internet via a wireless connection, broadcast at up to 54 Mbps, or through one of its four switched ports. You can also use the Router to share resources such as computers, printers and files. A variety of security features help to protect your data and your privacy while online.
Wireless Security Checklist Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted.
Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with EasyLink Advisor or the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you’d like to change its advanced settings, use the Router’s web-based utility. This chapter describes each web page of the utility and each page’s key functions. You can access the utility via a web browser on a computer connected to the Router.
Advanced Configuration Chapter 3 Static IP If you are required to use a permanent IP address to connect to the Internet, select Static IP. Keep Alive: Redial Period If you select this option, the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re-establish your connection. To use this option, select Keep Alive. In the Redial Period field, you specify how often you want the Router to check the Internet connection.
Advanced Configuration Chapter 3 Telstra Cable Telstra Cable is a service that applies to connections in Australia only. Internet Connection Type > Telstra Cable User Name and Password Enter the User Name and Password provided by your ISP. Heart Beat Server This is the IP address of the Heartbeat Server. Your ISP will provide you with the IP Address you need to specify here.
Advanced Configuration Chapter 3 Network Setup The Network Setup section changes the settings on the network connected to the Router’s Ethernet ports. Wireless Setup is performed through the Wireless tab. Router IP This presents both the Router’s IP Address and Subnet Mask as seen by your network. Router IP Address Network Address Server Settings (DHCP) The settings allow you to configure the Router’s Dynamic Host Configuration Protocol (DHCP) server function.
Advanced Configuration Chapter 3 Setup > MAC Address Clone DynDNS.org A MAC address is a 12-digit code assigned to a unique piece of hardware for identification. Some ISPs will require you to register a MAC address in order to access the Internet. If you do not wish to re-register the MAC address with your ISP, you may assign the MAC address you have currently registered with your ISP to the Router with the MAC Address Clone feature.
Advanced Configuration Chapter 3 • Default Gateway This is the IP address of the gateway device that allows for contact between the Router and the remote network or host. • Interface This interface tells you whether the Destination IP Address is on the LAN & Wireless (Ethernet and wireless networks) or the WAN (Internet). Click the Show Routing Table button to view the Static Routes you have already set up.
Advanced Configuration Chapter 3 wireless network. For added security, you should change the default SSID (linksys) to a unique name. Wireless Channel Select the appropriate channel from the list provided to correspond with your network settings. All devices in your wireless network must use the same channel in order to communicate. Wireless SSID Broadcast When wireless clients survey the local area for wireless networks to associate with, they will detect the SSID broadcast by the Router.
Advanced Configuration Chapter 3 RADIUS Port Enter the port number of the RADIUS server. WPA2 Personal Shared Key Enter the key shared between the Router and the server. Key Renewal Timeout Enter a Key Renewal Timeout period, which instructs the Router how often it should change the encryption keys. The default Key Renewal Timeout period is 3600 seconds. RADIUS Security Mode > WPA2 Personal WPA Algorithm WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys.
Advanced Configuration Chapter 3 WEP WEP is a basic encryption method, which is not as secure as WPA. Prevent Clicking this button will block wireless access by MAC Address. This button is selected by default. Permit Only Clicking this button will allow wireless access by MAC Address. Edit MAC Address Filter List Clicking this button will open the MAC Address Filter List. On this screen, you can list users, by MAC Address, to whom you wish to provide or block access.
Advanced Configuration Chapter 3 manufacturer of your wireless products. To turn off the Frame Burst option, select Disable. The default is Enable. Beacon Interval The default value is 100. Enter a value between 1 and 65,535 milliseconds. The Beacon Interval value indicates the frequency interval of the beacon. A beacon is a packet broadcast by the Router to synchronize the wireless network.
Advanced Configuration Chapter 3 VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, keep the default, Enable. PPTP Passthrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be tunneled through an IP network. To allow PPTP tunnels to pass through the Router, keep the default, Enable.
Advanced Configuration Chapter 3 policy’s number and click the Delete button. To view all the policies, click the Summary button. (Policies can be deleted from the Summary screen by selecting the policy or policies and clicking the Delete button. To return to the Internet Access tab, click the Close button.) 6. Decide which days and what times you want this policy to be enforced. Select the individual days during which the policy will be in effect, or select Everyday.
Advanced Configuration Chapter 3 Website Blocking by Keyword Applications & Gaming > Port Triggering If you want to block websites using specific keywords, enter each keyword in a separate field next to Website Blocking by Keyword. The Applications & Gaming > Port Triggering screen allows the Router to watch outgoing data for specific port numbers.
Advanced Configuration Chapter 3 Applications and Gaming > DMZ The DMZ feature allows one network computer to be exposed to the Internet for use of a special-purpose service such as Internet gaming or videoconferencing. DMZ hosting forwards all the ports at the same time to one PC. The Port Range Forward feature is more secure because it only opens the ports you want to have opened, while DMZ hosting opens all the ports of one computer, exposing the computer to the Internet.
Advanced Configuration Chapter 3 Optimize Gaming Applications Select this to automatically allow common game application ports to have a higher priority. These games include, but are not limited to: Counter-Strike, Half-Life, Age of Empires, Everquest, Quake2/Quake3 and Diablo II, etc. The default setting is unselected. Application Name Enter the name you wish to give the application in the Application Name field. Priority Select High or Low to assign priority to the application.
Advanced Configuration Chapter 3 Log Traceroute Test Log To disable the Log function, keep the default setting, Disable. To monitor traffic between the network and the Internet, select Enable. Traceroute To test the performance of a connection, click the Traceroute button. Enter the address of the PC whose connection you wish to test and click the Traceroute button. The Traceroute Test screen will show if the test was successful. To stop the test, click the Stop button.
Advanced Configuration Chapter 3 Administration > Firmware Upgrade Restore Configuration The Administration > Firmware Upgrade screen allows you to upgrade the Router’s firmware. Do not upgrade the firmware unless you are experiencing problems with the Router or the new firmware has a feature you want to use. Please select a file to restore Click the Browse button and select the configuration file. Then click the Restore button.
Advanced Configuration Chapter 3 Status > Local Network The Status > Local Network screen displays the status of your network. Click the Refresh button to update the on-screen information. Status > Wireless The Status > Wireless screen displays the status of your wireless network. Status > Local Network Status > Wireless Local Network MAC Address This is the Router’s MAC Address, as seen on your local, Ethernet network.
Troubleshooting Appendix A Appendix A: Troubleshooting Your computer cannot connect to the Internet. When you double-click the web browser, you are prompted for a username and password. If you want to get rid of the prompt, follow these instructions. Launch the web browser and perform the following steps (these steps are specific to Internet Explorer but are similar for other browsers): Follow these instructions until your computer can connect to the Internet: 1. Select Tools > Internet Options.
Specifications Appendix B Appendix B: Specifications Model WRT54GS Standards IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.
Appendix C Appendix C: Warranty and Regulatory Information Limited Warranty Linksys warrants to You that, for a period of one year (the "Warranty Period"), your Linksys Product will be substantially free of defects in materials and workmanship under normal use. Your exclusive remedy and Linksys’ entire liability under this warranty will be for Linksys at its option to repair or replace the Product or refund Your purchase price less any rebates. This limited warranty extends only to the original purchaser.
Appendix C Warranty and Regulatory Information Wireless Disclaimer Industry Canada (Canada) The maximum performance for wireless is derived from IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, data throughput rate, range and coverage.
Appendix C User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix C Warranty and Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix C Warranty and Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix C Warranty and Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenčina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.