background image

A Division of Cisco Systems, Inc.

®

Model No.

Broadband Router

Wireless-

G

WRT54G

User Guide

GHz

2.4

54Mbps

WIRELESS

Summary of Contents for WRT54GV2

Page 1: ...A Division of Cisco Systems Inc Model No Broadband Router Wireless G WRT54G User Guide GHz 2 454Mbps WIRELESS...

Page 2: ...de In addition to these symbols there are definitions for technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and descripti...

Page 3: ...8 and Millennium PCs 10 Configuring Windows 2000 PCs 11 Configuring Windows XP PCs 12 Chapter 6 Configuring the Wireless G Broadband Router 14 Overview 14 The Setup Tab Basic Setup 15 The Setup Tab DD...

Page 4: ...Solutions 38 Frequently Asked Questions 45 Appendix B Wireless Security 52 A Brief Overview 52 What Are The Risks 52 Maximizing Wireless Security 54 Appendix C Upgrading Firmware 60 Appendix D Windows...

Page 5: ...dress 13 Figure 6 1 Password Screen 14 Figure 6 2 Setup Tab Basic Setup 15 Figure 6 3 DHCP Connection Type 15 Figure 6 4 Static IP Connection Type 15 Figure 6 5 PPPoE Connection Type 16 Figure 6 6 PPT...

Page 6: ...d 30 Figure 6 29 Applications and Gaming DMZ 31 Figure 6 30 Administration Tab Management 32 Figure 6 31 Administration Tab Log 32 Figure 6 32 Administration Tab Diagnostics 33 Figure 6 33 The Ping Te...

Page 7: ...e B 13 802 11b WEP Key Setting 59 Figure C 1 Upgrade Firmware 60 Figure E 1 IP Configuration Screen 62 Figure E 2 MAC Address Adapter Address 62 Figure E 3 MAC Address Physical Address 63 Figure E 4 M...

Page 8: ...r computer s hard drive Networks are even used for playing multiplayer video games So networks are not only useful in homes and offices they can also be fun PCs on a wired network create a LAN or Loca...

Page 9: ...ireless G Broadband Router Appendix A Troubleshooting This appendix describes some problems and solutions as well as frequently asked questions regarding installation and use of the Wireless G Broadba...

Page 10: ...for the Router Appendix H Warranty Information This appendix supplies the warranty information for the Router Appendix I Regulatory Information This appendix supplies the regulatory information regard...

Page 11: ...er PC to a wired LAN and doubles the effective wireless transmission range for two Linksys wireless adapter PCs Since the Wireless G Broadband Router is able to forward data within its BSS the effecti...

Page 12: ...d WMP54G for your desktop PC and USB Adapter WUSB11 for when you want to enjoy USB connectivity The Access Point will also communicate with the wireless PrintServer WPS11 and bridges WET11 WET54G When...

Page 13: ...e defaults from the Password tab in the Broadband Router s Web Based Utility Internet The Internet port is where you will connect your broadband Internet connection 1 2 3 4 These ports 1 2 3 4 connect...

Page 14: ...ction is being utilized This LED will remain on as long as DMZ is enabled WLAN Green The WLAN LED lights whenever there is a successful wireless connection If the LED is flickering the Broadband Route...

Page 15: ...etwork with line of sight to all of your mobile stations 2 Fix the direction of the antenna Try to place it in a position that will best cover your wireless network Normally the higher you place the a...

Page 16: ...et and the other end into an electrical outlet Only use the power adapter supplied with the Broadband Router Use of a different adapter may result in product damage Now that the hardware installation...

Page 17: ...10 Chapter 4 Connecting the Wireless G Broadband Router Hardware Installation Wireless G Broadband Router...

Page 18: ...operating system you are using Make sure that an Ethernet or wireless adapter also known as a network adapter has been successfully installed in each PC you will configure Once you ve configured your...

Page 19: ...the Router s Web Based Utility Configuring Windows 2000 PCs 1 Click the Start button Select Settings and click the Control Panel icon Double click the Network and Dial up Connections icon 2 Select th...

Page 20: ...Then click the Network Connections icon 2 Select the Local Area Connection icon for the applicable Ethernet adapter usually it is the first Local Area Connection listed Double click the Local Area Co...

Page 21: ...13 Chapter 5 Configuring the PCs Configuring Windows XP PCs Wireless G Broadband Router Figure 5 8 IP Address...

Page 22: ...from its default There are seven main tabs Setup Wireless Security Access Restrictions Applications Gaming Administration and Status Additional tabs will be available after you click one of the main...

Page 23: ...ion Type is set to Automatic Configuration DHCP which should be kept only if your ISP supports DHCP or you are connecting through a dynamic IP address Static IP If you are required to use a permanent...

Page 24: ...that applies to connections in Europe only Specify Internet IP Address This is the Router s IP address as seen from the Internet Your ISP will provide you with the IP Address you need to specify here...

Page 25: ...less tab Router IP This presents both the Router s IP Address and Subnet Mask as seen by your network Network Address Server Settings DHCP The settings allow you to configure the Router s Dynamic Host...

Page 26: ...IP address The default is 0 minutes which means one day Static DNS 1 3 The Domain Name System DNS is how the Internet translates domain or website names into Internet addresses or URLs Your ISP will p...

Page 27: ...service at www dyndns org or www TZO com DDNS service providers DDNS Service From this pull down menu enter the DDNS service with which you have membership User Name Enter the User Name for your DDNS...

Page 28: ...he MAC address with your ISP you may assign the MAC address you have currently registered with your ISP to the Router with the MAC Address Clone feature Enable Disable To have the MAC Address cloned c...

Page 29: ...ynamic routing with both methods described Static Routing To set up a static route between the Router and another network select a number from the Static Routing drop down list A static route is a pre...

Page 30: ...the wireless network It is case sensitive and must not exceed 32 characters use any of the characters on the keyboard Make sure this setting is the same for all points in your wireless network For ad...

Page 31: ...Address select Disable Prevent Clicking this button will Prevent users access by MAC Address Permit Only Clicking this button will Permit users access by MAC Address Edit MAC Address Filter List Click...

Page 32: ...n select from a range of transmission speeds or you can select Auto to have the Router automatically use the fastest possible data rate and enable the Auto Fallback feature Auto Fallback will negotiat...

Page 33: ...in at its default value of 2346 RTS Threshold Should you encounter inconsistent data flow only minor reduction of the default value 2346 is recommended If a network packet is smaller than the preset R...

Page 34: ...cancel your changes The Security Tab VPN Passthrough Use the settings on this tab to allow VPN tunnels in either IPSec or PPTP protocols to pass through the Router s firewall IPSec Pass through Intern...

Page 35: ...ith dynamic encryption keys Select the type of algorithm TKIP or AES enter a Pre Shared key of 8 32 characters and enter a Group Key Renewal period which instructs the Router how often it should chang...

Page 36: ...ther generate a WEP key through the Passphrase or enter the WEP key manually WEP WEP is a basic encryption method not as secure as WPA To use WEP select a WEP key and a level of WEP encryption and eit...

Page 37: ...remember what it s for PCs Click the Edit List of PCs button to select which PCs will be affected by the policy You can enter the PC by MAC Address or IP Address You can also enter a range of IP Addre...

Page 38: ...tion on each line for the criteria required Descriptions of each criteria are described here Application In this field enter the name you wish to give the application Each name can be up to 12 charact...

Page 39: ...use it only opens the ports you want to have opened while DMZ hosting opens all the ports of one computer exposing the computer to the Internet Any PC whose port is being forwarded must have its DHCP...

Page 40: ...word when accessing the Router this way as usual UPnP When using UPnP features select Enable As allowing this may present a risk to security this feature is disabled by default Change these settings a...

Page 41: ...To stop the test click the Stop button Click the Clear Log button to clear the screen Click the Close button to return to the Diagnostics screen Traceroute Test To test the performance of a connect c...

Page 42: ...ost when the default settings are restored This feature is disabled by default The Administration Tab Firmware Upgrade Firmware can be upgraded by clicking the Upgrade button after browsing for the fi...

Page 43: ...e Router s MAC Address as seen by your ISP Router Name This is the specific name for the Router which you set on the Setup Tab Host Name If required by your ISP this would have been entered on the Set...

Page 44: ...sk it is shown here DHCP Server If you are using the Router as a DHCP server that will be displayed here Start IP Address For the range of IP Addresses used by points on your local Ethernet network th...

Page 45: ...ss tab this will display the wireless mode Mixed G Only or Disabled used by the network SSID As entered on the Wireless tab this will display the wireless network name or SSID DHCP Server If you are u...

Page 46: ...the network connected to the Router Make sure that each IP address is unique for each PC or network device 4 Click the Gateway tab and in the New Gateway prompt enter 192 168 1 1 which is the default...

Page 47: ...IP address that is not used by any other computer on the network connected to the Router 6 Enter the Subnet Mask 255 255 255 0 7 Enter the Default Gateway 192 168 1 1 Router s default IP address 8 Tow...

Page 48: ...ress for Your Ethernet Adapter If you need to clone the MAC address of your Ethernet adapter onto the Router see the System section of Chapter 6 The Router s Web based Utility for details 2 Make sure...

Page 49: ...and IP Address for Your Ethernet Adapter for details on getting an IP address 6 Check the Enable option for the port services you want to use Consider the example below Customized External Port TCP UD...

Page 50: ...you disable all the forwarding entries if you want to successfully use DMZ hosting since forwarding has priority over DMZ hosting In other words data that enters the Router will be checked first by t...

Page 51: ...r dial a connection This will remove any dial up pop ups for PPPoE users For Netscape 4 7 or higher 1 Start Netscape Navigator and click Edit Preferences Advanced and Proxies 2 Make sure you have Dire...

Page 52: ...he option Keep Alive and set the Redial Period option at 20 seconds 4 Click the Save Settings button 5 Click the Status tab and click the Connect button 6 You may see the login status display as Conne...

Page 53: ...s working correctly You can remove the Router to verify a direct connection Manually configure the TCP IP settings with a DNS address provided by your ISP Make sure that your browser is set to connect...

Page 54: ...ing fix click ICQ menu preference connections tab and check I am behind a firewall or proxy Then set the firewall time out to 80 seconds in the firewall setting The Internet user can then send a file...

Page 55: ...are upgrades All Linksys firmware upgrades are posted on the Linksys website at www linksys com where they can be downloaded for free To upgrade the Router s firmware use the System tab of the Router...

Page 56: ...What are the advanced features of the Router The Router s advanced features include Advanced Wireless settings Filters Port Forwarding Routing and DDNS How do I get mIRC to work with the Router Under...

Page 57: ...transmitting data Achieving these functions simultaneously requires a dynamic RF networking technology that links access points and nodes In such a system the user s end node undertakes a search for...

Page 58: ...a chip or chipping code The longer the chip the greater the probability that the original data can be recovered Even if one or more bits in the chip are damaged during transmission statistical techni...

Page 59: ...away in small increments to determine the maximum range in your environment You may also try using different channels as this may eliminate interference affecting only one channel I have excellent si...

Page 60: ...ceive those transmission Wireless networks are easy to find Hackers know that in order to join a wireless network your wireless PC will typically first listen for beacon messages These are identifying...

Page 61: ...addresses usernames passwords instant message conversations emails account information and any data transmitted wirelessly can easily be seen by someone outside of your network because it is often br...

Page 62: ...ng about a day s worth of network traffic mostly in the case of business networks Over time the hacker can build up a table of network data and be able to decrypt all of your wireless transmissions Th...

Page 63: ...that network radius Remember that access points transmit indiscriminately in a radius placing an access point at the edge of the physical network area reduces network performance and leaves an opening...

Page 64: ...networks they fall short with regards to security Hackers can usually find them quite easily 6 MAC addresses Enable MAC address filtering if your wireless products allow it MAC address filtering will...

Page 65: ...ally changing WEP keys SSID etc There are several ways that WEP can be maximized a Use the highest level of encryption possible b Use multiple WEP keys c Change your WEP key regularly Current encrypti...

Page 66: ...the key into the appropriate Key field on the left The WEP key must consist of the letters A through F and the numbers 0 through 9 and should be 10 characters in length for 64 bit encryption or 26 ch...

Page 67: ...d to the Router First select the type of WPA algorithm TKIP or AES Enter the RADIUS server s IP Address and port number along with a key shared between the Router and the server Last enter a Group Key...

Page 68: ...nstructions 1 Download the firmware from Linksys s website at www linksys com 2 Click Upgrade Firmware from the Web Utility s Administration tab and the Upgrade Firmware screen shown in Figure C 1 wil...

Page 69: ...rotocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help prov...

Page 70: ...OK button 2 When the IP Configuration screen appears select the Ethernet adapter you have connected to the Router via a CAT 5 Ethernet network cable See Figure C 1 3 Write down the Adapter Address as...

Page 71: ...example in Figure C 3 shows the Ethernet adapter s IP address as 192 168 1 100 Your computer may show something different For the Router s Web based Utility For MAC filtering enter the 12 digit MAC ad...

Page 72: ...Adapter This is a device that adds network functionality to your PC Ad hoc A group of wireless devices communicating directly with each other peer to peer without the use of an access point Backbone T...

Page 73: ...domain name Default Gateway A device that forwards Internet traffic from your local area network DHCP Dynamic Host Configuration Protocol A protocol that lets one device on a local network known as a...

Page 74: ...File Transfer Protocol A standard protocol for sending files between computers over a TCP IP network and the Internet Full Duplex The ability of a networking device to receive and transmit data simul...

Page 75: ...computers or devices connected for the purpose of data sharing storage and or transmission between users NNTP Network News Transfer Protocol The protocol used to connect to Usenet groups on the Intern...

Page 76: ...CTS Clear To Send message before sending data Server Any computer whose function in a network is to provide user access to files printing communications and other services SMTP Simple Mail Transfer P...

Page 77: ...twork protocol for transmitting data that does not require acknowledgement from the recipient of the data that is sent Upgrade To replace existing software or firmware with a newer version Upload To t...

Page 78: ...LAN Ports One Power Port One Reset Button Cabling Type UTP CAT 5 or better Data Rate Up to 54Mbps Transmit Power 15dBm LEDs Power DMZ WLAN LAN 1 4 Internet Dimensions 7 31 x 1 89 x 7 87 L x W x H 186...

Page 79: ...71 Appendix G Specifications Wireless G Broadband Router...

Page 80: ...and handling charges ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE ARE LIMITED TO THE DURATION OF THE WARRANTY PERIOD ALL OTHER EXPRESS OR IMPLIED CONDI...

Page 81: ...ed to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment or device Connect the equipment...

Page 82: ...a directive 1999 5 EC la directive 89 336 EEC et la directive 73 23 EEC Belgique B L utilisation en ext rieur est autoris sur le canal 11 2462 MHz 12 2467 MHz et 13 2472 MHz Dans le cas d une utilisat...

Page 83: ...ocedura da seguire L uso per installazione in esterni non e permessa Italy I License required for indoor use Use with outdoor installations not allowed the Netherlands NL License required for outdoor...

Page 84: ...king with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 261 8868 If you experience problems with any Linksys product you can call us at 800 326 711...

Page 85: ...installed and operated with a minimum distance of 20 centimeters between the radiator and your body This Transmitter must not be co located or operating in conjunction with any other antenna or trans...

Reviews: