USER GUIDE ADSL2 Gateway with 4-Port Switch Model: AG241 (EU)
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
Table of Contents Chapter 1: Product Overview 1 Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 2: Configuration 2 How to Access the Web-Based Utility . . . . . . . . . . . . . . . . . . . . . . .
Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys ADSL2 Gateway with 4-Port Switch, the all-in-one solution for Internet connectivity in your home. The internal ADSL modem function gives you an Internet connection that is far faster than a dial-up and does not tie up your phone line. Connect your computers to the Gateway via the built-in 4-port 10/100 Ethernet Switch to jump start your home network.
Configuration Chapter 2 Chapter 2: Configuration Follow the steps in this chapter to use the Gateway’s web-based utility to configure the Gateway. This chapter describes each web page in the Utility and each page’s key functions. The utility can be accessed via a web browser from a computer connected to the Gateway.
Configuration Chapter 2 email; or VBR, Variable Bite Rate for Bursty traffic and bandwidth sharing with other application. •• Pcr Rate Peak Cell Rate, divide the DSL line rate by 424 to find the PCR to get the maximum rate the sender can send cells. Enter the rate in the field (if required by your service provider). IP Settings Select Obtain an IP Address Automatically if your ISP says you are connecting through a dynamic IP address.
Configuration Chapter 2 •• IP Address This is the Gateway’s IP address, when seen from the Internet. Your ISP will provide you with the IP Address you need to specify here. RFC 2364 PPPoA •• Subnet Mask This is the Gateway’s Subnet Mask. Your ISP will provide you with the Subnet Mask. •• Default Gateway Your ISP will provide you with the Default Gateway Address, which is the ISP server’s IP address.
Configuration Chapter 2 Optional Settings Network Address Server Settings (DHCP) Some of these settings may be required by your ISP. Verify with your ISP before making any changes. A Dynamic Host Configuration Protocol (DHCP) server automatically assigns an IP address to each computer on your network for you. Unless you already have one, it is highly recommended that you leave the Gateway enabled as a DHCP server.
Configuration Chapter 2 The Setup Tab > DDNS The Gateway offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address. It is useful when you are hosting your own website, FTP server, or other server behind the Gateway. Before you can use this feature, you need to sign up for DDNS service at DynDNS.org or TZO.com. DDNS DDNS Service If your DDNS service is provided by DynDNS.org, then select DynDNS.org from the dropdown menu.
Configuration Chapter 2 DDNS Service Transmit RIP Version. To transmit RIP messages, select the protocol you want: RIP1, RIP1Compatible, or RIP2. Receive RIP Version To receive RIP messages, select the protocol you want: RIP1 or RIP2. The Security Tab > Firewall The Firewall screen contains filters and an option to block WAN requests. Filters block specific Internet data types and block anonymous Internet requests.
Configuration Chapter 2 The Security Tab > VPN Virtual Private Networking (VPN) is a security measure that creates a secure connection between two remote locations. The Security > VPN screen allows you to configure your VPN settings to make your network more secure. To establish this tunnel, select the tunnel you wish to create in the Select Tunnel Entry drop-down box. It is possible to create up to five simultaneous tunnels. Then click Enabled to enable the IPSec VPN tunnel.
Configuration Chapter 2 Key Management Advanced VPN Tunnel Setup Select Auto (IKE) or Manual from the drop-down menu. The two methods are described below. From the Advanced IPSec VPN Tunnel Setup screen you can adjust the settings for specific VPN tunnels. Auto (IKE) Select Auto (IKE) and enter a series of numbers or letters in the Pre-shared Key field.
Configuration Chapter 2 Key Life Time In the Key Lifetime field, you may optionally select to have the key expire at the end of a time period of your choosing. Enter the number of seconds you’d like the key to be used until a re-key negotiation between each endpoint is completed. Phase 2 Encryption The encryption method selected in Phase 1 will be displayed. Authentication The authentication method selected in Phase 1 will be displayed. PFS The status of PFS will be displayed.
Configuration Chapter 2 To create a new Internet Access policy: 1. Select a number from the Internet Access Policy dropdown menu. 2. Enter a Policy Name in the Enter Policy Name field. 3. To enable this policy, click Enable. 4. Click Edit List of PCs to select which PCs will be affected by the policy. The List of PCs screen will appear. You can select a PC by MAC address or IP address. You can also enter a range of IP addresses if you want this policy to affect a group of PCs.
Chapter 2 Configuration Enter the application’s IP address in the IP Address field. Then click Enabled to enable forwarding for the chosen application. When you have finished making changes, click Save Settings to save the changes, or click Cancel Changes to undo your changes. When finished making your changes, click Save Settings to save the changes, or click Cancel Changes to undo your changes.
Configuration Chapter 2 The Applications & Gaming Tab > DMZ Application-based QoS The DMZ screen allows one local user to be exposed to the Internet for use of a special-purpose service such as Internet gaming and videoconferencing through DMZ Hosting. DMZ hosting forwards all the ports for one computer at the same time, which differs from Port Range Forwarding, which can only forward a maximum of 10 ranges of ports. Application-based QoS manages information as it is transmitted and received.
Configuration Chapter 2 The Administration Tab > Management When you click the Administration tab, you will see the Management screen. This screen allows you to change the Gateway’s access settings as well as configure the SNMP (Simple Network Management Protocol) and UPnP (Universal Plug and Play) features. Remote Username, Remote Password, and Re-enter to confirm Complete these fields to specify the account that will be used for remote management.
Configuration Chapter 2 Denial of Service Thresholds Enter the thresholds of events you want to receive. SMTP Mail Server Enter the IP address of the SMTP server. E-Mail Address for Alert Logs Enter the e-mail address for alert logs. Return E-Mail address Enter the address for the return e-mail. To view the logs, click View Logs to display the System Log screen. Ping Timeout Enter the time in milliseconds. Ping Result The results of the ping test will be shown here.
Configuration Chapter 2 The Administration Tab > Firmware Upgrade The Firmware Upgrade screen allows you to upgrade the Gateway’s firmware. Do not upgrade the firmware unless you are experiencing problems with the Gateway or the new firmware has a feature you want to use. The Status Tab > Gateway The Router screen displays information about your Gateway and its WAN (Internet) Connections.
Configuration Chapter 2 The Status Tab > Local Network The Local Network screen displays information about the local network. ARP/RARP Table Click ARP/RARP Table to show the current ARP/RARP Table. This table displays the MAC address and IP address of the network clients using ARP/ RARP. Click Refresh to refresh the screen. Click Close to close the screen. ARP/RARP Table Click Refresh to refresh the Local Network screen.
Appendix A Troubleshooting Appendix A: Troubleshooting I can’t connect to the Internet. 1. Verify the proper LEDs are lit on the Gateway. •• Make sure the Power LED has a steady green light and is not flashing. •• Verify the Ethernet LED has a fairly steady green light. It will flash occasionally, indicating activity. •• Verify the Signal Strength LEDs are lit. 2.
Specifications Appendix B Appendix B: Specifications Model AG241 Standards IEEE 802.3u, IEEE 802.3, G.992.1 (G.dmt), G.992.2 (G.lite), ITU G.992.3, ITU G.992.5, ANSI T1.
Appendix C Appendix C: Warranty Information Limited Warranty Linksys warrants that this Linksys hardware product will be substantially free of defects in materials and workmanship arising under normal use during the Warranty Period, which begins on the date of purchase by the original enduser purchaser and lasts for the period specified below: •• Two (2) years for new product •• Ninety (90) days for refurbished product This limited warranty is non-transferable and extends only to the original end-user pur
Appendix C Warranty Information and a copy of your dated proof of original purchase when returning your product. Products received without a RMA number and dated proof of original purchase will be rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge.
Regulatory Information Appendix D Appendix D: Regulatory Information FCC Statement This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Appendix D User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix D Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix D Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix D Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenščina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Appendix E Appendix E: Software License Agreement Software in Linksys Products This product from Cisco-Linksys LLC or from one of its affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or CiscoLinksys K.K. (“Linksys”) contains software (including firmware) originating from Linksys and its suppliers and may also contain software from the open source community. Any software originating from Linksys and its suppliers is licensed under the Linksys Software License Agreement contained at Schedule 1 below.
Software License Agreement Appendix E your Linksys product and/or the Software is being used in accordance with the terms of this Agreement; (iii) to provide improvements to the way Linksys delivers technology to you and to other Linksys customers; (iv) to enable Linksys to comply with the terms of any agreements it has with any third parties regarding your Linksys product and/or Software and/or (v) to enable Linksys to comply with all applicable laws and/or regulations, or the requirements of any regulat
Appendix E GNU General Public License is intended to guarantee your freedom to share and change free software–to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too.
Appendix E c. If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License.
Software License Agreement Appendix E 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
Appendix E GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.
Appendix E freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a “work based on the library” and a “work that uses the library”. The former contains code derived from the library, whereas the latter must be combined with the library in order to run.
Appendix E Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library. In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3.
Appendix E Software License Agreement b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user’s computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with. 8.
Software License Agreement Appendix E software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 12.
Appendix E Software License Agreement OpenSSL License Original SSLeay License Copyright © 1998-2007 The OpenSSL Project. All rights reserved. Copyright © 1995-1998 Eric Young (eay@cryptsoft.com)All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). 1.
Appendix E Software License Agreement DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.