LINKSYS Q87-WRT54G2V1 Wireless-GBroadband Router User Manual

Add to My manuals
8 Pages

advertisement

LINKSYS Q87-WRT54G2V1 Wireless-GBroadband Router User Manual | Manualzz

Model No: WRT54G2 V1

USER GUIDE

Wireless-G

Broadband Router

About Ths Gude

Icon Descriptions

While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons:

NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product.

WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.

WEB: This globe icon indicates a noteworthy website address or e-mail address.

Online Resources

Most web browsers allow you to enter the web address without adding the http:// in front of the address. This

User Guide will refer to websites without including http:// in front of the address. Some older web browsers may require you to add it.

Resource

Linksys

Webste www.linksys.com

Linksys International www.linksys.com/international

Glossary

Network Security www.linksys.com/glossary www.linksys.com/security

Copyright and Trademarks

Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/ or its affiliates in the U.S. and certain other countries. Copyright © 2008

Cisco Systems, Inc. All rights reserved.

Other brands and product names are trademarks or registered trademarks of their respective holders.

Wreless-G Broadband Router

About This Guide

Table of Contents

Chapter 1: Product Overview 1

Front Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Chapter 2: Wireless Security Checklist 2

General Network Security Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

Additional Security Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

Chapter 3: Advanced Configuration 3

Setup > Basic Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Setup > DDNS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

Setup > MAC Address Clone. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

Setup > Advanced Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

Wireless > Basic Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

Wireless > Wireless Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10

Wireless > Wireless MAC Filter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

Wireless > Advanced Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

Security > Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14

Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14

Security > VPN Passthrough . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14

Access Restrictions > Internet Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14

Applications and Gaming > Port Range Forward. . . . . . . . . . . . . . . . . . . . . . . . . .16

Applications & Gaming > Port Triggering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16

Applications and Gaming > DMZ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17

Applications and Gaming > QoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17

Administration > Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18

Administration > Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19

Administration > Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19

Administration > Factory Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19

Administration > Upgrade Firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20

Administration > Config Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20

Status > Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20

Status > Local Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

Status > Wireless . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

Appendix A: Troubleshooting 22

Appendix B: Specifications 23

Wreless-G Broadband Router

Table of Contents

Appendix C: Warranty and Regulatory Information 24

Limited Warranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24

Wireless Disclaimer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25

FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25

Safety Notices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25

Industry Canada (Canada) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25

IC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25

Règlement d’Industry Canada . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25

User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste

Electric and Electronic Equipment (WEEE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26

Wreless-G Broadband Router

Chapter1

Chapter :

Product Overvew

Thank you for choosing the Linksys Wireless-G Broadband

Router. The Router lets you access the Internet via a wireless connection, broadcast at up to 54 Mbps, or through one of its four switched ports. You can also use the Router to share resources such as computers, printers and files. A variety of security features help to protect your data and your privacy while online. Security features include WPA2 security, a Stateful Packet Inspection (SPI) firewall and NAT technology. Configuring the Router is easy using the provided browser-based utility

Front Panel

Product Overview

Wreless (Green) The Wireless LED lights up when the wireless feature is enabled. If the LED is flashing, the Router is actively sending or receiving data over the network.

Internet (Green) The Internet LED lights up when there is a connection made through the

Internet port. A flashing LED indicates network activity over the Internet port.

Power (Green) The Power LED lights up and will stay on while the Router is powered on. When the Router goes through its selfdiagnostic mode during every boot-up, this

LED will flash. When the diagnostic is complete, the LED will be solidly lit.

Back Panel

, 2, 3, 4 (Green) These numbered LEDs, corresponding with the numbered ports on the

Router’s back panel, serve two purposes. If the

LED is continuously lit, the Router is successfully connected to a device through that port. A flashing LED indicates network activity over that port.

W-F Protected Setup Button If you have client devices, such as wireless adapters, that support Wi-Fi Protected Setup, then you can use Wi-Fi Protected Setup to automatically configure wireless security for your wireless network(s).

To use Wi-Fi Protected Setup, run the Setup

Wizard, or refer to the “Wireless > Basic Wireless

Settings” section of “Chapter 3: Advanced

Configuration”.

W-F Protected Setup LED (Green/

Amber) It lights up green when wireless security is enabled. The LED flashes green for two minutes during Wi-Fi Protected Setup.

The LED lights up amber if there is an error during the Wi-Fi Protected Setup process. Make sure the client device supports Wi-Fi Protected

Setup. Wait until the LED is off, and then try again.

The LED flashes amber when a Wi-Fi Protected

Setup session is active, and a second session begins. The Router supports one session at a time. Wait until the LED is off before starting the next Wi-Fi Protected Setup session.

Wreless-G Broadband Router

Internet The Internet port is where you will connect your cable or DSL Internet connection.

, 2, 3, 4 These Ethernet ports (1, 2, 3, 4) connect the Router to PCs on your wired network and other Ethernet network devices.

Reset There are two ways to reset the Router’s factory defaults. Either press and hold the Reset

Button for approximately five seconds, or restore the defaults from Administration > Factory

Defaults in the Router’s web-based utility.

Power The Power port is where you will connect the power adapter.

Chapter2

Chapter 2:

Wreless Securty Checklst

Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network.

Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted. Since you cannot physically prevent someone from connecting to your wireless network, you need to take some additional steps to keep your network secure.

. Change the default wreless

network name or SSID

Wireless devices have a default wireless network name or Service Set Identifier (SSID) set by the factory. This is the name of your wireless network, and can be up to 32 characters in length. Linksys wireless products use lnksys as the default wireless network name. You should change the wireless network name to something unique to distinguish your wireless network from other wireless networks that may exist around you, but do not use personal information (such as your Social Security number) because this information may be available for anyone to see when browsing for wireless networks.

2. Change the default password

For wireless products such as access points and routers, you will be asked for a password when you want to change their settings. These devices have a default password set by the factory. The Linksys default password is admn .

Hackers know these defaults and may try to use them to access your wireless device and change your network settings. To thwart any unauthorized changes, customize the device’s password so it will be hard to guess.

3. Enable MAC address flterng

Linksys routers give you the ability to enable Media Access

Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device. With MAC address filtering enabled, wireless network access is provided solely for wireless devices with specific MAC addresses. For example, you can specify the MAC address of each computer in your home so that only those computers can access your wireless network.

Wreless-G Broadband Router

Wireless Security Checklist

4. Enable encrypton

Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired

Equivalency Privacy (WEP) offer different levels of security for wireless communication. Currently, devices that are

Wi-Fi certified are required to support WPA2, but are not required to support WEP.

A network encrypted with WPA/WPA2 is more secure than a network encrypted with WEP, because WPA/WPA2 uses dynamic key encryption. To protect the information as it passes over the airwaves, you should enable the highest level of encryption supported by your network equipment.

WEP is an older encryption standard and may be the only option available on some older devices that do not support WPA.

General Network Security Guidelines

Wireless network security is useless if the underlying network is not secure.

Password protect all computers on the network and individually password protect sensitive files.

Change passwords on a regular basis.

Install anti-virus software and personal firewall software.

Disable file sharing (peer-to-peer). Some applications may open file sharing without your consent and/or knowledge.

Additional Security Tips

Keep wireless routers, access points, or gateways away from exterior walls and windows.

Turn wireless routers, access points, or gateways off when they are not being used (at night, during vacations).

Use strong passphrases that are at least eight characters in length. Combine letters and numbers to avoid using standard words that can be found in the dictionary.

WEB: For more information on wireless security, visit www.lnksys.com/securty

2

Chapter3

Chapter 3:

Advanced Confguraton

After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you’d like to change its advanced settings, use the

Router’s web-based utility. This chapter describes each web page of the utility and each page’s key functions. You can access the utility via a web browser on a computer connected to the Router.

The web-based utility has these main tabs: Setup,

Wireless, Security, Access Restrictions, Applications &

Gaming, Administration, and Status. Additional tabs will be available after you click one of the main tabs.

NOTE: When first installing the Router, you should use the Setup Wizard on the Setup

CD-ROM. If you want to configure advanced settings, use this chapter to learn about the web-based utility.

How to Access the Web-Based Utility

To access the web-based utility, launch the web browser on your computer, and enter the Router’s default IP address,

92.68..

, in the Address field. Then, press Enter .

A password request screen will appear. (Non-Windows XP users will see a similar screen.) Leave the User name field blank. The first time you open the Web-based utility, use the default password admn . (You can set a new password from the Administration tab’s Management screen.) Click

OK to continue.

Password Screen

Wreless-G Broadband Router

Advanced Configuration

Setup > Basic Setup

The first screen that appears is the Basic Setup screen. This allows you to change the Router’s general settings.

Setup > Basic Setup

Internet Setup

The Internet Setup section configures the Router to your

Internet connection. Most of this information can be obtained through your ISP.

Internet Connection Type

Select the type of Internet connection your ISP provides from the drop-down menu. The available types are:

• Automatic Configuration - DHCP

• Static IP

• PPPoE

• PPTP

• L2TP

• Telstra Cable

Automatic Configuration - DHCP

By default, the Router’s Internet Connection Type is set to Automatc Confguraton - DHCP , which should be kept only if your ISP supports DHCP or you are connecting through a dynamic IP address. (This option usually applies to cable connections.)

Internet Connection Type > Automatic Configuration - DHCP

3

Chapter3

Static IP

If you are required to use a permanent IP address to connect to the Internet, select Statc IP .

Advanced Configuration

will automatically re-establish your connection. To use this option, select Keep Alve . In the Redial Period field, you specify how often you want the Router to check the Internet connection. The default Redial Period is

30 seconds.

PPTP

Point-to-Point Tunneling Protocol (PPTP) is a service that applies to connections in Europe only.

Internet IP Address This is the Router’s IP address, when seen from the Internet. Your ISP will provide you with the

IP Address you need to specify here.

Subnet Mask This is the Router’s Subnet Mask, as seen by users on the Internet (including your ISP). Your ISP will provide you with the Subnet Mask.

Gateway Your ISP will provide you with the Gateway

Address, which is the ISP server’s IP address.

DNS Your ISP will provide you with at least one DNS

(Domain Name System) Server IP Address.

PPPoE

Internet Connection Type > Static IP

Some DSL-based ISPs use PPPoE (Point-to-Point Protocol over Ethernet) to establish Internet connections. If you are connected to the Internet through a DSL line, check with your ISP to see if they use PPPoE. If they do, you will have to enable PPPoE .

Internet Connection Type > PPPoE

User Name and Password Enter the User Name and

Password provided by your ISP.

Connect on Demand: Max Idle Tme You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time). If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again. To use this option, select Connect on Demand . In the Max Idle Time field, enter the number of minutes you want to have elapsed before your Internet connection terminates. The default

Max Idle Time is 5 minutes.

Keep Alve: Redal Perod If you select this option, the Router will periodically check your Internet connection. If you are disconnected, then the Router

Wreless-G Broadband Router

Internet Connection Type > PPTP

Internet IP Address This is the Router’s IP address, as seen from the Internet. Your ISP will provide you with the

IP Address you need to specify here.

Subnet Mask This is the Router’s Subnet Mask, as seen by users on the Internet (including your ISP). Your ISP will provide you with the Subnet Mask.

Gateway Your ISP will provide you with the Gateway

Address.

User Name and Password Enter the User Name and

Password provided by your ISP.

Connect on Demand: Max Idle Tme You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time). If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again. To use this option, select Connect on Demand . In the Max Idle Time field, enter the number of minutes you want to have elapsed before your Internet connection terminates. The default

Max Idle Time is 5 minutes.

Keep Alve: Redal Perod If you select this option, the

Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re-establish your connection. To use this option, select

Keep Alve . In the Redial Period field, you specify how often you want the Router to check the Internet connection. The default value is 30 seconds.

4

advertisement

Related manuals

Download PDF

advertisement