USER GUIDE Wireless-G Broadband Router Model: WRT54G2
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
Table of Contents Chapter 1: Product Overview 1 Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Placement Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents Appendix D: Regulatory Information 28 FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 FCC Radiation Exposure Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Safety Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys by Cisco Wireless-G Broadband Router. The Router lets you access the Internet via a wireless connection, broadcast at up to 54 Mbps, or through one of its four switched ports. You can also use the Router to share resources such as computers, printers and files. A variety of security features help to protect your data and your privacy while online.
Product Overview Chapter 1 Wall-Mounting Placement Follow these instructions: The Router has two wall-mount slots on its bottom panel. The distance between the slots is 152 mm (6 inches). 1. Determine where you want to mount the Router. Make sure that the wall you use is smooth, flat, dry, and sturdy. Also make sure the location is within reach of an electrical outlet. Two screws are needed to mount the Router. 2. Drill two holes into the wall. Make sure the holes are 152 mm (6 inches) apart.
Wireless Security Checklist Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted.
Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration Setup > Basic Setup The first screen that appears is the Basic Setup screen. This allows you to change the Router’s general settings. After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. If you’d like to change its advanced settings, use the Router’s webbased utility. This chapter describes each web page of the utility and each page’s key functions.
Advanced Configuration Chapter 3 Static IP If you are required to use a permanent IP address to connect to the Internet, select Static IP. you are disconnected, then the Router will automatically re-establish your connection. To use this option, select Keep Alive. In the Redial Period field, specify how often the Router should check the Internet connection. The default is 30 seconds. PPTP Point-to-Point Tunneling Protocol (PPTP) is a service that applies to connections in Europe only.
Advanced Configuration Chapter 3 Keep Alive: Redial Period If you select this option, the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re‑establish your connection. To use this option, select Keep Alive. In the Redial Period field, specify how often the Router should check the Internet connection. The default is 30 seconds. L2TP L2TP is a service that applies to connections in Israel only.
Advanced Configuration Chapter 3 MTU MTU is the Maximum Transmission Unit. It specifies the largest packet size permitted for Internet transmission. Select Manual if you want to manually enter the largest packet size that is transmitted. To have the Router select the best MTU for your Internet connection, keep the default, Auto. Size When Manual is selected in the MTU field, this option is enabled. Leave this value in the 1200 to 1500 range.
Advanced Configuration Chapter 3 DDNS TZO.com The Router offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address. It is useful when you are hosting your own website, FTP server, or other server behind the Router. Before you can use this feature, you need to sign up for DDNS service at one of two DDNS service providers, DynDNS.org or TZO.com. If you do not want to use this feature, keep the default, Disable.
Advanced Configuration Chapter 3 User Defined Entry Enter the MAC Address registered with your ISP here. Router is chosen, Dynamic Routing will be available as an option. Clone Your PC’s MAC Clicking this button will clone the MAC address of the computer you are using. Dynamic Routing Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Setup > Advanced Routing This screen is used to set up the Router’s advanced routing functions.
Chapter 3 Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Wireless > Basic Wireless Settings The basic settings for wireless networking are set on this screen. There are two ways to configure the Router’s wireless network(s), manual and Wi-Fi Protected Setup. Wi-Fi Protected Setup is a feature that makes it easy to set up your wireless network.
Advanced Configuration Chapter 3 Method #1 Wireless Security Use this method if your client device has a Wi-Fi Protected Setup button. Wireless security is strongly recommended, and WPA2 is the strongest method available. Use WPA2 if it is supported by all of your wireless devices. 1. Click or press the Wi-Fi Protected Setup button on the client device. 2. Click the Wi‑Fi Protected Setup button on this screen. 3. After the client device has been configured, click OK.
Advanced Configuration Chapter 3 RADIUS Server Address Enter the IP Address of the RADIUS server. WPA Personal NOTE: If you are using WPA2 or WPA, each device in your wireless network MUST use the same WPA method and shared key, or else the network will not function properly. RADIUS Port Enter the port number of the RADIUS server. The default is 1812. Shared Key Enter the key shared between the Router and the server.
Advanced Configuration Chapter 3 RADIUS This option features WEP used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) Security Mode > RADIUS IMPORTANT: If you are using WEP encryption, each device in your wireless network MUST use the same WEP encryption method and encryption key, or else your wireless network will not function properly. RADIUS Server Address Enter the IP Address of the RADIUS server.
Advanced Configuration Chapter 3 Wireless MAC Filter Wireless MAC Filter To filter wireless users by MAC Address, either permitting or blocking access, click Enable. If you do not wish to filter users by MAC Address, keep the default, Disable. Prevent Select this to block wireless access by MAC Address. This button is selected by default. Permit Only Select this to allow wireless access by MAC Address. This button is not selected by default.
Advanced Configuration Chapter 3 manufacturer of your wireless products. To turn on the Frame Burst option, select Enable. The default is Disable. Beacon Interval A beacon is a packet broadcast by the Router to synchronize the wireless network. The default is 100. Enter a value between 1 and 65,535 milliseconds. The Beacon Interval value indicates the frequency interval of the beacon. DTIM Interval This value, between 1 and 255, indicates the interval of the Delivery Traffic Indication Message (DTIM).
Advanced Configuration Chapter 3 Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, keep the default, Enable. PPTP Passthrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be tunneled through an IP network. To allow PPTP tunnels to pass through the Router, keep the default, Enable.
Advanced Configuration Chapter 3 select a PC by MAC Address or IP Address. You can also enter a range of IP Addresses if you want this policy to affect a group of PCs. After making your changes, click Save Settings to apply your changes or Cancel Changes to clear your changes. Then click Close. To modify a service, select it from the list on the right. Change its name, protocol setting, or port range. Then click Modify. To delete a service, select it from the list on the right. Then click Delete.
Advanced Configuration Chapter 3 Port Range Forward To forward a port, enter the information on each line for the criteria required. Application In this field, enter the name you wish to give the application. Each name can be up to 12 characters. Start Port Enter the starting port number of the Triggered Range. End Port Enter the ending port number of the Triggered Range. Forwarded Range Start/End This is the port range.
Advanced Configuration Chapter 3 Applications and Gaming > QoS Quality of Service (QoS) ensures better service to high-priority types of network traffic, which may involve demanding, real-time applications, such as videoconferencing. There are three types of QoS available: Device Priority, Ethernet Port Priority, and Application Priority. QoS Enable/Disable To enable QoS, select Enable. Otherwise, select Disable. QoS is disabled by default.
Advanced Configuration Chapter 3 Administration > Log The Router can keep logs of all traffic for your Internet connection. Administration > Log Administration > Management Router Password Local Router Access Router Password Enter a new Password for the Router. Log Log To disable the Log function, keep the default setting, Disable. To monitor traffic between the network and the Internet, select Enable. Re-enter to confirm Enter the Password again to confirm.
Advanced Configuration Chapter 3 Administration > Upgrade Firmware The Administration > Upgrade Firmware screen allows you to upgrade the Router’s firmware. Do not upgrade the firmware unless you are experiencing problems with the Router or the new firmware has a feature you want to use. Ping Test Traceroute Test Traceroute To test the performance of a connection, click Traceroute to open the Traceroute Test screen. Enter the address of the PC whose connection you wish to test and click Traceroute.
Advanced Configuration Chapter 3 Restore Configuration Status > Local Network Please select a file to restore Click Browse and select the configuration file. Then click Restore. The Status > Local Network screen displays the status of your network. Status > Router The Status > Router screen displays the Router’s current status. Status > Local Network Local Network MAC Address The MAC address of the Router’s local, wired interface is displayed.
Advanced Configuration Chapter 3 DHCP Client Table The DHCP Client Table lists computers and other devices that have been assigned IP addresses by the Router. The list can be sorted by IP Address, MAC Address, Interface, and Client Name. To remove a DHCP client, select the Delete check box, and then click Delete. To update the on-screen information, click Refresh. To exit this screen and return to the Local Network screen, click Close.
Troubleshooting Appendix A Appendix A: Troubleshooting Your computer cannot connect to the Internet. When you double-click the web browser, you are prompted for a username and password. If you want to get rid of the prompt, follow these instructions. Launch the web browser and perform the following steps (these steps are specific to Internet Explorer but are similar for other browsers): Follow these instructions until your computer can connect to the Internet: 1. Select Tools > Internet Options.
Specifications Appendix B Appendix B: Specifications Model WRT54G2 Standards IEEE 802.3, IEEE 802.3u, IEEE 802.11g, IEEE 802.
Appendix C Appendix C: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which begins on the date of purchase by the original end-user purchaser and lasts for the period specified below: •• One (1) year for new product •• Ninety (90) days for refurbished product Your exclusive remedy and Linksys’ entire liability under this limited warranty will be for Linksys, at its option, to (a) re
Appendix C Warranty Information DATED PROOF OF ORIGINAL PURCHASE IS REQUIRED TO PROCESS WARRANTY CLAIMS. If you are requested to return your product, you will be given a Return Materials Authorization (RMA) number. You are responsible for properly packaging and shipping your product to Linksys at your cost and risk. You must include the RMA number and a copy of your dated proof of original purchase when returning your product.
Regulatory Information Appendix D Appendix D: Regulatory Information FCC Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules.
Appendix D Regulatory Information Avis d’Industrie Canada Wireless Disclaimer Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. The maximum performance for wireless is derived from IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, data throughput rate, range and coverage.
Appendix D User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix D Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix D Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix D Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenščina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Appendix E Appendix E: Software End User License Agreement Cisco Products This product from Cisco Systems, Inc. or its subsidiary licensing the Software instead of Cisco Systems, Inc. (“Cisco”) contains software (including firmware) originating from Cisco and its suppliers and may also contain software from the open source community. Any software originating from Cisco and its suppliers is licensed under the Cisco Software License Agreement contained at Schedule 1 below.
Appendix E License Restrictions.
Appendix E Software can enable any other computer (on the same primary network) to generate reports. When a computer is enabled, that computer shows a notification that it is being monitored. As long as that computer is enabled, each time the Software is started the user of that particular computer will see a notification that it is being monitored by the reports feature. Any computer on the network with the Software installed can enable or disable any other computer from the reports feature.
Appendix E Software End User License Agreement Disclaimer of Liabilities.
Appendix E send you Service related email messages as long as you are a subscriber to the Service. If you wish to opt-out of receiving Service related email messages, you may cancel the Service by providing written notice via www. networkmagic.com/support to Cisco of such cancellation and uninstalling the Software and discontinuing your use of the Service.
Appendix E 1. You may copy and distribute verbatim copies of the Program’s source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program.
Appendix E 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5.
Appendix E 12.
Appendix E Public License permits more lax criteria for linking other code with the library. We call this license the “Lesser” General Public License because it does Less to protect the user’s freedom than the ordinary General Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries.
Appendix E Software End User License Agreement (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.
Appendix E a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable “work that uses the Library”, as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library.
Appendix E 11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
Appendix E Schedule 3-C OPENSSL LICENSE If this Cisco product contains open source software licensed under the OpenSSL license: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/). This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Appendix E Software End User License Agreement 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes cryptographic software written by Eric Young (eay@cryptsoft.