background image

USER GUIDE

Wireless-G Broadband Router 

with SpeedBooster

Model:

 WRT54GS2

Summary of Contents for Linksys WRT54GS2

Page 1: ...USER GUIDE Wireless G Broadband Router with SpeedBooster Model WRT54GS2 ...

Page 2: ...ebsite address or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com international Glossary www linksys com glossary Net...

Page 3: ...Wireless MAC Filter 13 Wireless Advanced Wireless Settings 14 Security Firewall 15 Security VPN 15 Access Restrictions Internet Access 16 Applications and Gaming Port Range Forward 17 Applications Gaming Port Triggering 18 Applications and Gaming DMZ 18 Applications and Gaming QoS 18 Administration Management 19 Administration Log 20 Administration Diagnostics 20 Administration Factory Defaults 21...

Page 4: ...ices 28 Industry Canada Statement 28 Avis d Industrie Canada 29 Wireless Disclaimer 29 Avis de non responsabilité concernant les appareils sans fil 29 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 30 Appendix E Software License Agreement 34 Software in Linksys Products 34 Software Licenses 34 ...

Page 5: ...device supports Wi Fi Protected Setup WaituntiltheLEDisoff andthentryagain The LED flashes amber when a Wi Fi Protected Setup session is active and a second session begins The Router supports one session at a time Wait until the LED is off before starting the next Wi Fi Protected Setup session Wireless Green The Wireless LED lights up when the wireless feature is enabled If the LED is flashing the...

Page 6: ...ctions Determine where you want to mount the Router Make 1 sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical outlet Drill two holes into the wall Make sure the holes are 2 152 mm 6 inches apart Insert a screw into each hole and leave 3 mm 3 0 12 inches of its head exposed Maneuver the Router so the wall mount slots line up 4 with ...

Page 7: ...ive you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless network access is provided solely for wireless devices with specific MAC addresses For example you can specify the MAC address of each computer in your home so that only those computers can...

Page 8: ...92 168 1 1 in the Address field Then press Enter A password request screen appears Non Windows XP users will see a similar screen Leave the User name field blank The first time you open the web based utility enter the password you created during the Setup Wizard If you did not create a new password use the default password admin You can set a new password from the Administration tab s Management s...

Page 9: ...nutes you want to have elapsed before your Internet connection terminates The default Max Idle Time is 5 minutes Keep Alive Redial Period If you select this option the Router will periodically check your Internet connection If you are disconnected then the Router will automatically re establish your connection To use this option select Keep Alive In the Redial Period field you specify how often yo...

Page 10: ... you specify how often you want the Router to check the Internet connection The default Redial Period is 30 seconds Telstra Cable Telstra Cable is a service that applies to connections in Australia only If your ISP uses HeartBeat Signal HBS then select Telstra Internet Connection Type Telstra Cable User Name and Password Enter the User Name and Password provided by your ISP Heart Beat Server This ...

Page 11: ...imum Number of DHCP Users Enter the maximum number of computers that you want the DHCP server to assign IP addresses to This number cannot be greater than 253 The default is 50 Client Lease Time The Client Lease Time is the amount of time a network user will be allowed connection to the Router with their current dynamic IP address Enter the amount of time in minutes that the user will be leased th...

Page 12: ...isplayed here Because it is dynamic it will change Status The status of the DDNS service connection is displayed here Click Save Settings to apply your changes or click Cancel Changes to cancel your changes TZO com Setup DDNS TZO E mail Address TZO Key and Domain Name Enter the settings of the account you set up with TZO Internet IP Address The Router s Internet IP address is displayed here Becaus...

Page 13: ... wireless networks You can also select WAN Internet which performs dynamic routing with data coming from the Internet Finally selecting Both enables dynamic routing for both networks as well as data from the Internet Select set number To set up a static route between the Router and another network select a number from the Static Routing drop down list A static route is a pre determinedpathwaythatn...

Page 14: ... devices in your network select Disabled Wireless Network Name SSID The SSID is the network name shared among all points in a wireless network The SSID must be identical for all devices in the wireless network It is case sensitive and must not exceed 32 characters use any of the characters on the keyboard Make sure this setting is the same for all points in your wireless network For added security...

Page 15: ...reless Wireless Security The Wireless Security settings configure the security of your wireless network There are six wireless security mode options supported by the Router WPA Personal WPA Enterprise WPA2 Personal WPA2 Enterprise RADIUS and WEP WPA stands for Wi Fi Protected Access which is a security standard stronger than WEP encryption WPA2 is a more advanced more secure version of WPA WEP sta...

Page 16: ...eout Enter a Key Renewal Timeout period which instructs the Router how often it should change the encryption keys The default Key Renewal Timeout period is 3600 seconds WPA2 Enterprise This option features WPA2 used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router Security Mode WPA2 Enterprise WPA Algorithm WPA2 supports two encryption m...

Page 17: ...Then click Generate Key 1 If you did not enter a Passphrase enter the WEP key manually Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Wireless Wireless MAC Filter Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network s radius Wireless Wireless MAC Filter Wireless MAC Filter WirelessMACFilter Tof...

Page 18: ...tiate the best possible connection speed between the Router and a wireless client The default value is Auto CTS Protection Mode CTS Clear To Send Protection Modeshouldremaindisabledunlessyouarehavingsevere problems with your Wireless G products not being able to transmit to the Router in an environment with heavy 802 11b traffic This function boosts the Router s ability to catch all Wireless G tra...

Page 19: ...ted by default Deselect this feature to disable it Filter Internet NAT Redirection This feature uses port forwarding to block access to local servers from local networked computers Select Filter Internet NAT Redirection to filter Internet NAT redirection This feature is not selected by default Filter IDENT Port 113 This feature keeps port 113 from being scanned by devices outside of your local net...

Page 20: ...k 4 Edit List of PCs to select which computers will be affectedbythepolicy The ListofPCsscreenappears You can select a computer by MAC Address or IP Address You can also enter a range of IP Addresses if you want this policy to affect a group of computers After making yourchanges clickSaveSettingstoapplyyourchanges or Cancel Changes to cancel your changes Then click Close List of PCs Select the app...

Page 21: ...gs to apply your changes or click Cancel Changes to cancel your changes Applications and Gaming Port Range Forward The Applications Gaming Port Range Forward screen allows you to set up public services on your network such as web servers ftp servers e mail servers or other specialized Internet applications Specialized Internet applications are anyapplicationsthatuseInternetaccesstoperformfunctions...

Page 22: ...ncel your changes Applications and Gaming DMZ The DMZ feature allows one network computer to be exposed to the Internet for use of a special purpose service such as Internet gaming or videoconferencing DMZ hosting forwards all the ports at the same time to one computer The Port Range Forward feature is more secure because it only opens the ports you want to have opened while DMZ hosting opens all ...

Page 23: ...low common game application ports to have a higher priority These games include but are not limited to Counter Strike Half Life Age of Empires EverQuest Quake2 Quake3 and Diablo II The default setting is unselected Application Name Enter the name you wish to give the application in the Application Name field Priority Select Highest High Medium or Low to assign priority to the application The defau...

Page 24: ...emote access select this feature UPnP UPnP Keep the default Enable to enable the UPnP feature otherwise select Disable Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Administration Log The Router can keep logs of all traffic for your Internet connection Administration Log Log Log To disable the Log function keep the default setting Disable To monitor traff...

Page 25: ...ade Firmware screen allows you to upgrade the Router s firmware Do not upgrade the firmware unless you are experiencing problems with the Router or the new firmware has a feature you want to use Administration Upgrade Firmware Before upgrading the firmware download the Router s firmware upgrade file from the Linksys website www linksys com Then extract the file Upgrade Firmware Please select a fil...

Page 26: ...creen Click Refresh to update the on screen information Status Local Network The Status Local Network screen displays the status of your network Status Local Network Local Network MAC Address The Router s MAC Address as seen on your local Ethernet network is displayed IP Address The Router s IP Address as it appears on your local Ethernet network is displayed Subnet Mask The current subnet mask co...

Page 27: ... mode Mixed G Only B Only or Disabled used by the network is displayed SSID As entered on the Wireless Basic Wireless Settings screen the wireless network name or SSID is displayed DHCP Server The status of the DHCP server function is displayed Channel As entered on the Wireless Basic Wireless Settings screen The channel on which your wireless network is broadcasting is displayed Encryption Functi...

Page 28: ...SL modem insert the setup CD into your computer and then follow the on screen instructions When you double click the web browser you are prompted for a username and password If you want to get rid of the prompt follow these instructions Launch the web browser and perform the following steps these steps are specific to Internet Explorer but are similar for other browsers Select 1 Tools Internet Opt...

Page 29: ... Antennas Detachable y n No RF Power Output 18 dBm UPnP able cert Able Security Features Stateful Packet Inspection SPI Firewall Internet Policy Wireless Security Wi Fi Protected Access 2 WPA2 WEP Wireless MAC Filtering Security Key Bits 128 Bits Environmental Dimensions 7 99 x 1 38 x 6 30 203 x 35 x 160 mm Weight 9 88 oz 280 g Power External 12V DC 0 5A Certifications FCC UL ICES 003 RSS210 CE Wi...

Page 30: ...gs This limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product s use or operation may require TO THE EXTENT NOT PROHIBITED BY LAW ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY SATISFACTORY QUALITY OR FITNESS FOR A PARTICULAR PURPOSE ARE LIMITE...

Page 31: ...es custom duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies including any fees for support services can be found at www l...

Page 32: ...ontrolled environment This equipment should be installed and operated with minimum distance 20cm between the radiator and your body This transmitter must not be co located or operating in conjunction with any other antenna or transmitter IEEE 802 11b or 802 11g operation of this product in the USA is firmware limited to channels 1 through 11 Safety Notices Caution To reduce the risk of fire use on...

Page 33: ...allé et utilisé à une distance d au moins 20 cm entre l antenne et le corps de l utilisateur L émetteur ne doit pas être placé près d une autre antenne ou d un autre émetteur ou fonctionner avec une autre antenne ou un autre émetteur Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802 11 specifications Actual performance can vary including lower wireless netw...

Page 34: ...opská směrnice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místní...

Page 35: ...από το οποίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets d...

Page 36: ...lavult berendezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking ni...

Page 37: ...ácia pomôže zabrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenčina Slovene Okoljske informacije za stranke v Evropski uniji Evropska direktiva 2002 96 EC prepoveduje o...

Page 38: ...LINKSYS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IFYOU DO NOT AGREETO ALL OFTHESE TERMS THENYOU MAY NOT DOWNLOAD INSTALL OR USE THE SOFTWARE YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFTWARE IS SUPPLIED AS PART ...

Page 39: ...sys if You fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer of Liabilities IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA REVENUE OR PROFIT OR FOR SPECIAL INDIRECT CONSEQUENTIAL INCIDENTAL OR PUNITIVE DAMAGES REGARDLESS OF CAUSE...

Page 40: ...prietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION This License applies to any program or other work 0 which contains a notice placed by the copyright holder saying it may be dist...

Page 41: ...he terms of Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a ...

Page 42: ...o time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version publis...

Page 43: ...warranty for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company can...

Page 44: ...rary does You may copy and distribute verbatim copies of the 1 Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the L...

Page 45: ...of the Library because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code is...

Page 46: ...y not copy modify sublicense link with or 8 distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights underthisLicense However partieswhohavereceived copies or rights from you under this License will not have their licenses terminated so long as such...

Page 47: ...oftware generally NO WARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE 15 THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNES...

Page 48: ...cludes cryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright 1995 1998 Eric Young eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written so as to conform with Netscape s SSL This library is free...

Page 49: ...TION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenseanddistributiontermsforanypubliclyavailable version or derivative of this code cannot be changed i e this code cannot simply be copied and put under another distr...

Reviews: