background image

Appendix C

Warranty Information

26

Wireless-G Broadband Router with SpeedBooster

Appendix C:  

Warranty Information

Limited Warranty

Linksys  warrants  this  Linksys  hardware  product  against 

defects  in  materials  and  workmanship  under  normal 

use for the Warranty Period, which begins on the date of 

purchase by the original end-user purchaser and lasts for 

the period specified below:

One (1) year for new product

 

Ninety (90) days for refurbished product

 

This limited warranty is non-transferable and extends only 

to the original end-user purchaser. Your exclusive remedy 

and  Linksys’  entire  liability  under  this  limited  warranty 

will be for Linksys, at its option, to (a) repair the product 

with  new  or  refurbished  parts,  (b)  replace  the  product 

with a reasonably available equivalent new or refurbished 

Linksys  product,  or  (c)  refund  the  purchase  price  of  the 

product  less  any  rebates.  Any  repaired  or  replacement 

products  will  be  warranted  for  the  remainder  of  the 

original Warranty Period or thirty (30) days, whichever is 

longer. All products and parts that are replaced become 

the property of Linksys.

Exclusions and Limitations

This  limited  warranty  does  not  apply  if:  (a)  the  product 

assembly  seal  has  been  removed  or  damaged,  (b)  the 

product has been altered or modified, except by Linksys, (c) 

the product damage was caused by use with non-Linksys 

products, (d) the product has not been installed, operated, 

repaired,  or  maintained  in  accordance  with  instructions 

supplied by Linksys, (e) the product has been subjected to 

abnormal physical or electrical stress, misuse, negligence, 

or accident, (f) the serial number on the Product has been 

altered, defaced, or removed, or (g) the product is supplied 

or licensed for beta, evaluation, testing or demonstration 

purposes  for  which  Linksys  does  not  charge  a  purchase 

price or license fee.
ALL  SOFTWARE  PROVIDED  BY  LINKSYS  WITH  THE 

PRODUCT,  WHETHER  FACTORY  LOADED  ON  THE 

PRODUCT  OR  CONTAINED  ON  MEDIA  ACCOMPANYING 

THE PRODUCT, IS PROVIDED “AS IS” WITHOUT WARRANTY 

OF ANY KIND. Without limiting the foregoing, Linksys does 

not warrant that the operation of the product or software 

will  be  uninterrupted  or  error  free.  Also,  due  to  the 

continual development of new techniques for intruding 

upon  and  attacking  networks,  Linksys  does  not  warrant 

that the product, software or any equipment, system or 

network on which the product or software is used will be 

free  of  vulnerability  to  intrusion  or  attack.  The  product 

may include or be bundled with third party software or 

service offerings. This limited warranty shall not apply to 

such third party software or service offerings. This limited 

warranty  does  not  guarantee  any  continued  availability 

of  a  third  party’s  service  for  which  this  product’s  use  or 

operation may require. 
TO THE  EXTENT  NOT  PROHIBITED  BY  LAW,  ALL  IMPLIED 

WARRANTIES  AND  CONDITIONS  OF  MERCHANTABILITY, 

SATISFACTORY QUALITY OR FITNESS FOR A PARTICULAR 

PURPOSE  ARE  LIMITED  TO  THE  DURATION  OF  THE 

WARRANTY  PERIOD.  ALL  OTHER  EXPRESS  OR  IMPLIED 

CONDITIONS,  REPRESENTATIONS  AND  WARRANTIES, 

INCLUDING,  BUT  NOT  LIMITED  TO,  ANY  IMPLIED 

WARRANTY  OF  NON-INFRINGEMENT,  ARE  DISCLAIMED. 

Some jurisdictions do not allow limitations on how long 

an implied warranty lasts, so the above limitation may not 

apply to you. This limited warranty gives you specific legal 

rights, and you may also have other rights which vary by 

jurisdiction.
TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT 

WILL LINKSYS BE LIABLE FOR ANY LOST DATA, REVENUE 

OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, 

INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF THE 

THEORY OF LIABILITY (INCLUDING NEGLIGENCE), ARISING 

OUT  OF  OR  RELATED  TO  THE  USE  OF  OR  INABILITY  TO 

USE  THE  PRODUCT  (INCLUDING  ANY  SOFTWARE),  EVEN 

IF  LINKSYS  HAS  BEEN  ADVISED  OF  THE  POSSIBILITY  OF 

SUCH  DAMAGES.  IN  NO  EVENT  WILL  LINKSYS’  LIABILITY 

EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT. 

The foregoing limitations will apply even if any warranty 

or  remedy  provided  under  this  limited  warranty  fails  of 

its  essential  purpose.  Some  jurisdictions  do  not  allow 

the exclusion or limitation of incidental or consequential 

damages,  so  the  above  limitation  or  exclusion  may  not 

apply to you.

Obtaining Warranty Service

If you have a question about your product or experience a 

problem with it, please go to 

www.linksys.com/support 

where you will find a variety of online support tools and 

information to assist you with your product. If the product 

proves  defective  during  the  Warranty  Period,  contact 

Linksys  Technical  Support  for  instructions  on  how  to 

obtain warranty service. The telephone number for Linksys 

Technical Support in your area can be found in the product 

User Guide and at 

www.linksys.com

. Have your product 

serial number and proof of purchase on hand when calling. 

A  DATED  PROOF  OF  ORIGINAL  PURCHASE  IS  REQUIRED 

TO PROCESS WARRANTY CLAIMS. If you are requested to 

return your product, you will be given a Return Materials 

Authorization  (RMA)  number.  You  are  responsible  for 

properly packaging and shipping your product to Linksys 

at your cost and risk. You must include the RMA number 

and a copy of your dated proof of original purchase when 

returning your product. Products received without a RMA 

number  and  dated  proof  of  original  purchase  will  be 

Summary of Contents for Linksys WRT54GS2

Page 1: ...USER GUIDE Wireless G Broadband Router with SpeedBooster Model WRT54GS2 ...

Page 2: ...ebsite address or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com international Glossary www linksys com glossary Net...

Page 3: ...Wireless MAC Filter 13 Wireless Advanced Wireless Settings 14 Security Firewall 15 Security VPN 15 Access Restrictions Internet Access 16 Applications and Gaming Port Range Forward 17 Applications Gaming Port Triggering 18 Applications and Gaming DMZ 18 Applications and Gaming QoS 18 Administration Management 19 Administration Log 20 Administration Diagnostics 20 Administration Factory Defaults 21...

Page 4: ...ices 28 Industry Canada Statement 28 Avis d Industrie Canada 29 Wireless Disclaimer 29 Avis de non responsabilité concernant les appareils sans fil 29 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 30 Appendix E Software License Agreement 34 Software in Linksys Products 34 Software Licenses 34 ...

Page 5: ...device supports Wi Fi Protected Setup WaituntiltheLEDisoff andthentryagain The LED flashes amber when a Wi Fi Protected Setup session is active and a second session begins The Router supports one session at a time Wait until the LED is off before starting the next Wi Fi Protected Setup session Wireless Green The Wireless LED lights up when the wireless feature is enabled If the LED is flashing the...

Page 6: ...ctions Determine where you want to mount the Router Make 1 sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical outlet Drill two holes into the wall Make sure the holes are 2 152 mm 6 inches apart Insert a screw into each hole and leave 3 mm 3 0 12 inches of its head exposed Maneuver the Router so the wall mount slots line up 4 with ...

Page 7: ...ive you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless network access is provided solely for wireless devices with specific MAC addresses For example you can specify the MAC address of each computer in your home so that only those computers can...

Page 8: ...92 168 1 1 in the Address field Then press Enter A password request screen appears Non Windows XP users will see a similar screen Leave the User name field blank The first time you open the web based utility enter the password you created during the Setup Wizard If you did not create a new password use the default password admin You can set a new password from the Administration tab s Management s...

Page 9: ...nutes you want to have elapsed before your Internet connection terminates The default Max Idle Time is 5 minutes Keep Alive Redial Period If you select this option the Router will periodically check your Internet connection If you are disconnected then the Router will automatically re establish your connection To use this option select Keep Alive In the Redial Period field you specify how often yo...

Page 10: ... you specify how often you want the Router to check the Internet connection The default Redial Period is 30 seconds Telstra Cable Telstra Cable is a service that applies to connections in Australia only If your ISP uses HeartBeat Signal HBS then select Telstra Internet Connection Type Telstra Cable User Name and Password Enter the User Name and Password provided by your ISP Heart Beat Server This ...

Page 11: ...imum Number of DHCP Users Enter the maximum number of computers that you want the DHCP server to assign IP addresses to This number cannot be greater than 253 The default is 50 Client Lease Time The Client Lease Time is the amount of time a network user will be allowed connection to the Router with their current dynamic IP address Enter the amount of time in minutes that the user will be leased th...

Page 12: ...isplayed here Because it is dynamic it will change Status The status of the DDNS service connection is displayed here Click Save Settings to apply your changes or click Cancel Changes to cancel your changes TZO com Setup DDNS TZO E mail Address TZO Key and Domain Name Enter the settings of the account you set up with TZO Internet IP Address The Router s Internet IP address is displayed here Becaus...

Page 13: ... wireless networks You can also select WAN Internet which performs dynamic routing with data coming from the Internet Finally selecting Both enables dynamic routing for both networks as well as data from the Internet Select set number To set up a static route between the Router and another network select a number from the Static Routing drop down list A static route is a pre determinedpathwaythatn...

Page 14: ... devices in your network select Disabled Wireless Network Name SSID The SSID is the network name shared among all points in a wireless network The SSID must be identical for all devices in the wireless network It is case sensitive and must not exceed 32 characters use any of the characters on the keyboard Make sure this setting is the same for all points in your wireless network For added security...

Page 15: ...reless Wireless Security The Wireless Security settings configure the security of your wireless network There are six wireless security mode options supported by the Router WPA Personal WPA Enterprise WPA2 Personal WPA2 Enterprise RADIUS and WEP WPA stands for Wi Fi Protected Access which is a security standard stronger than WEP encryption WPA2 is a more advanced more secure version of WPA WEP sta...

Page 16: ...eout Enter a Key Renewal Timeout period which instructs the Router how often it should change the encryption keys The default Key Renewal Timeout period is 3600 seconds WPA2 Enterprise This option features WPA2 used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router Security Mode WPA2 Enterprise WPA Algorithm WPA2 supports two encryption m...

Page 17: ...Then click Generate Key 1 If you did not enter a Passphrase enter the WEP key manually Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Wireless Wireless MAC Filter Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network s radius Wireless Wireless MAC Filter Wireless MAC Filter WirelessMACFilter Tof...

Page 18: ...tiate the best possible connection speed between the Router and a wireless client The default value is Auto CTS Protection Mode CTS Clear To Send Protection Modeshouldremaindisabledunlessyouarehavingsevere problems with your Wireless G products not being able to transmit to the Router in an environment with heavy 802 11b traffic This function boosts the Router s ability to catch all Wireless G tra...

Page 19: ...ted by default Deselect this feature to disable it Filter Internet NAT Redirection This feature uses port forwarding to block access to local servers from local networked computers Select Filter Internet NAT Redirection to filter Internet NAT redirection This feature is not selected by default Filter IDENT Port 113 This feature keeps port 113 from being scanned by devices outside of your local net...

Page 20: ...k 4 Edit List of PCs to select which computers will be affectedbythepolicy The ListofPCsscreenappears You can select a computer by MAC Address or IP Address You can also enter a range of IP Addresses if you want this policy to affect a group of computers After making yourchanges clickSaveSettingstoapplyyourchanges or Cancel Changes to cancel your changes Then click Close List of PCs Select the app...

Page 21: ...gs to apply your changes or click Cancel Changes to cancel your changes Applications and Gaming Port Range Forward The Applications Gaming Port Range Forward screen allows you to set up public services on your network such as web servers ftp servers e mail servers or other specialized Internet applications Specialized Internet applications are anyapplicationsthatuseInternetaccesstoperformfunctions...

Page 22: ...ncel your changes Applications and Gaming DMZ The DMZ feature allows one network computer to be exposed to the Internet for use of a special purpose service such as Internet gaming or videoconferencing DMZ hosting forwards all the ports at the same time to one computer The Port Range Forward feature is more secure because it only opens the ports you want to have opened while DMZ hosting opens all ...

Page 23: ...low common game application ports to have a higher priority These games include but are not limited to Counter Strike Half Life Age of Empires EverQuest Quake2 Quake3 and Diablo II The default setting is unselected Application Name Enter the name you wish to give the application in the Application Name field Priority Select Highest High Medium or Low to assign priority to the application The defau...

Page 24: ...emote access select this feature UPnP UPnP Keep the default Enable to enable the UPnP feature otherwise select Disable Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Administration Log The Router can keep logs of all traffic for your Internet connection Administration Log Log Log To disable the Log function keep the default setting Disable To monitor traff...

Page 25: ...ade Firmware screen allows you to upgrade the Router s firmware Do not upgrade the firmware unless you are experiencing problems with the Router or the new firmware has a feature you want to use Administration Upgrade Firmware Before upgrading the firmware download the Router s firmware upgrade file from the Linksys website www linksys com Then extract the file Upgrade Firmware Please select a fil...

Page 26: ...creen Click Refresh to update the on screen information Status Local Network The Status Local Network screen displays the status of your network Status Local Network Local Network MAC Address The Router s MAC Address as seen on your local Ethernet network is displayed IP Address The Router s IP Address as it appears on your local Ethernet network is displayed Subnet Mask The current subnet mask co...

Page 27: ... mode Mixed G Only B Only or Disabled used by the network is displayed SSID As entered on the Wireless Basic Wireless Settings screen the wireless network name or SSID is displayed DHCP Server The status of the DHCP server function is displayed Channel As entered on the Wireless Basic Wireless Settings screen The channel on which your wireless network is broadcasting is displayed Encryption Functi...

Page 28: ...SL modem insert the setup CD into your computer and then follow the on screen instructions When you double click the web browser you are prompted for a username and password If you want to get rid of the prompt follow these instructions Launch the web browser and perform the following steps these steps are specific to Internet Explorer but are similar for other browsers Select 1 Tools Internet Opt...

Page 29: ... Antennas Detachable y n No RF Power Output 18 dBm UPnP able cert Able Security Features Stateful Packet Inspection SPI Firewall Internet Policy Wireless Security Wi Fi Protected Access 2 WPA2 WEP Wireless MAC Filtering Security Key Bits 128 Bits Environmental Dimensions 7 99 x 1 38 x 6 30 203 x 35 x 160 mm Weight 9 88 oz 280 g Power External 12V DC 0 5A Certifications FCC UL ICES 003 RSS210 CE Wi...

Page 30: ...gs This limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product s use or operation may require TO THE EXTENT NOT PROHIBITED BY LAW ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY SATISFACTORY QUALITY OR FITNESS FOR A PARTICULAR PURPOSE ARE LIMITE...

Page 31: ...es custom duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies including any fees for support services can be found at www l...

Page 32: ...ontrolled environment This equipment should be installed and operated with minimum distance 20cm between the radiator and your body This transmitter must not be co located or operating in conjunction with any other antenna or transmitter IEEE 802 11b or 802 11g operation of this product in the USA is firmware limited to channels 1 through 11 Safety Notices Caution To reduce the risk of fire use on...

Page 33: ...allé et utilisé à une distance d au moins 20 cm entre l antenne et le corps de l utilisateur L émetteur ne doit pas être placé près d une autre antenne ou d un autre émetteur ou fonctionner avec une autre antenne ou un autre émetteur Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802 11 specifications Actual performance can vary including lower wireless netw...

Page 34: ...opská směrnice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místní...

Page 35: ...από το οποίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets d...

Page 36: ...lavult berendezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking ni...

Page 37: ...ácia pomôže zabrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenčina Slovene Okoljske informacije za stranke v Evropski uniji Evropska direktiva 2002 96 EC prepoveduje o...

Page 38: ...LINKSYS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IFYOU DO NOT AGREETO ALL OFTHESE TERMS THENYOU MAY NOT DOWNLOAD INSTALL OR USE THE SOFTWARE YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFTWARE IS SUPPLIED AS PART ...

Page 39: ...sys if You fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer of Liabilities IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA REVENUE OR PROFIT OR FOR SPECIAL INDIRECT CONSEQUENTIAL INCIDENTAL OR PUNITIVE DAMAGES REGARDLESS OF CAUSE...

Page 40: ...prietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION This License applies to any program or other work 0 which contains a notice placed by the copyright holder saying it may be dist...

Page 41: ...he terms of Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a ...

Page 42: ...o time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version publis...

Page 43: ...warranty for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company can...

Page 44: ...rary does You may copy and distribute verbatim copies of the 1 Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the L...

Page 45: ...of the Library because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code is...

Page 46: ...y not copy modify sublicense link with or 8 distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights underthisLicense However partieswhohavereceived copies or rights from you under this License will not have their licenses terminated so long as such...

Page 47: ...oftware generally NO WARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE 15 THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNES...

Page 48: ...cludes cryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright 1995 1998 Eric Young eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written so as to conform with Netscape s SSL This library is free...

Page 49: ...TION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenseanddistributiontermsforanypubliclyavailable version or derivative of this code cannot be changed i e this code cannot simply be copied and put under another distr...

Reviews: