manualshive.com logo in svg
background image

A Division of Cisco Systems, Inc.

®

Model No.

Broadband Router

Wireless-

G

WRT54G

User Guide

GHz

2.4

54Mbps

WIRELESS

Содержание WRT54GV2

Страница 1: ...A Division of Cisco Systems Inc Model No Broadband Router Wireless G WRT54G User Guide GHz 2 454Mbps WIRELESS...

Страница 2: ...de In addition to these symbols there are definitions for technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and descripti...

Страница 3: ...8 and Millennium PCs 10 Configuring Windows 2000 PCs 11 Configuring Windows XP PCs 12 Chapter 6 Configuring the Wireless G Broadband Router 14 Overview 14 The Setup Tab Basic Setup 15 The Setup Tab DD...

Страница 4: ...Solutions 38 Frequently Asked Questions 45 Appendix B Wireless Security 52 A Brief Overview 52 What Are The Risks 52 Maximizing Wireless Security 54 Appendix C Upgrading Firmware 60 Appendix D Windows...

Страница 5: ...dress 13 Figure 6 1 Password Screen 14 Figure 6 2 Setup Tab Basic Setup 15 Figure 6 3 DHCP Connection Type 15 Figure 6 4 Static IP Connection Type 15 Figure 6 5 PPPoE Connection Type 16 Figure 6 6 PPT...

Страница 6: ...d 30 Figure 6 29 Applications and Gaming DMZ 31 Figure 6 30 Administration Tab Management 32 Figure 6 31 Administration Tab Log 32 Figure 6 32 Administration Tab Diagnostics 33 Figure 6 33 The Ping Te...

Страница 7: ...e B 13 802 11b WEP Key Setting 59 Figure C 1 Upgrade Firmware 60 Figure E 1 IP Configuration Screen 62 Figure E 2 MAC Address Adapter Address 62 Figure E 3 MAC Address Physical Address 63 Figure E 4 M...

Страница 8: ...r computer s hard drive Networks are even used for playing multiplayer video games So networks are not only useful in homes and offices they can also be fun PCs on a wired network create a LAN or Loca...

Страница 9: ...ireless G Broadband Router Appendix A Troubleshooting This appendix describes some problems and solutions as well as frequently asked questions regarding installation and use of the Wireless G Broadba...

Страница 10: ...for the Router Appendix H Warranty Information This appendix supplies the warranty information for the Router Appendix I Regulatory Information This appendix supplies the regulatory information regard...

Страница 11: ...er PC to a wired LAN and doubles the effective wireless transmission range for two Linksys wireless adapter PCs Since the Wireless G Broadband Router is able to forward data within its BSS the effecti...

Страница 12: ...d WMP54G for your desktop PC and USB Adapter WUSB11 for when you want to enjoy USB connectivity The Access Point will also communicate with the wireless PrintServer WPS11 and bridges WET11 WET54G When...

Страница 13: ...e defaults from the Password tab in the Broadband Router s Web Based Utility Internet The Internet port is where you will connect your broadband Internet connection 1 2 3 4 These ports 1 2 3 4 connect...

Страница 14: ...ction is being utilized This LED will remain on as long as DMZ is enabled WLAN Green The WLAN LED lights whenever there is a successful wireless connection If the LED is flickering the Broadband Route...

Страница 15: ...etwork with line of sight to all of your mobile stations 2 Fix the direction of the antenna Try to place it in a position that will best cover your wireless network Normally the higher you place the a...

Страница 16: ...et and the other end into an electrical outlet Only use the power adapter supplied with the Broadband Router Use of a different adapter may result in product damage Now that the hardware installation...

Страница 17: ...10 Chapter 4 Connecting the Wireless G Broadband Router Hardware Installation Wireless G Broadband Router...

Страница 18: ...operating system you are using Make sure that an Ethernet or wireless adapter also known as a network adapter has been successfully installed in each PC you will configure Once you ve configured your...

Страница 19: ...the Router s Web Based Utility Configuring Windows 2000 PCs 1 Click the Start button Select Settings and click the Control Panel icon Double click the Network and Dial up Connections icon 2 Select th...

Страница 20: ...Then click the Network Connections icon 2 Select the Local Area Connection icon for the applicable Ethernet adapter usually it is the first Local Area Connection listed Double click the Local Area Co...

Страница 21: ...13 Chapter 5 Configuring the PCs Configuring Windows XP PCs Wireless G Broadband Router Figure 5 8 IP Address...

Страница 22: ...from its default There are seven main tabs Setup Wireless Security Access Restrictions Applications Gaming Administration and Status Additional tabs will be available after you click one of the main...

Страница 23: ...ion Type is set to Automatic Configuration DHCP which should be kept only if your ISP supports DHCP or you are connecting through a dynamic IP address Static IP If you are required to use a permanent...

Страница 24: ...that applies to connections in Europe only Specify Internet IP Address This is the Router s IP address as seen from the Internet Your ISP will provide you with the IP Address you need to specify here...

Страница 25: ...less tab Router IP This presents both the Router s IP Address and Subnet Mask as seen by your network Network Address Server Settings DHCP The settings allow you to configure the Router s Dynamic Host...

Страница 26: ...IP address The default is 0 minutes which means one day Static DNS 1 3 The Domain Name System DNS is how the Internet translates domain or website names into Internet addresses or URLs Your ISP will p...

Страница 27: ...service at www dyndns org or www TZO com DDNS service providers DDNS Service From this pull down menu enter the DDNS service with which you have membership User Name Enter the User Name for your DDNS...

Страница 28: ...he MAC address with your ISP you may assign the MAC address you have currently registered with your ISP to the Router with the MAC Address Clone feature Enable Disable To have the MAC Address cloned c...

Страница 29: ...ynamic routing with both methods described Static Routing To set up a static route between the Router and another network select a number from the Static Routing drop down list A static route is a pre...

Страница 30: ...the wireless network It is case sensitive and must not exceed 32 characters use any of the characters on the keyboard Make sure this setting is the same for all points in your wireless network For ad...

Страница 31: ...Address select Disable Prevent Clicking this button will Prevent users access by MAC Address Permit Only Clicking this button will Permit users access by MAC Address Edit MAC Address Filter List Click...

Страница 32: ...n select from a range of transmission speeds or you can select Auto to have the Router automatically use the fastest possible data rate and enable the Auto Fallback feature Auto Fallback will negotiat...

Страница 33: ...in at its default value of 2346 RTS Threshold Should you encounter inconsistent data flow only minor reduction of the default value 2346 is recommended If a network packet is smaller than the preset R...

Страница 34: ...cancel your changes The Security Tab VPN Passthrough Use the settings on this tab to allow VPN tunnels in either IPSec or PPTP protocols to pass through the Router s firewall IPSec Pass through Intern...

Страница 35: ...ith dynamic encryption keys Select the type of algorithm TKIP or AES enter a Pre Shared key of 8 32 characters and enter a Group Key Renewal period which instructs the Router how often it should chang...

Страница 36: ...ther generate a WEP key through the Passphrase or enter the WEP key manually WEP WEP is a basic encryption method not as secure as WPA To use WEP select a WEP key and a level of WEP encryption and eit...

Страница 37: ...remember what it s for PCs Click the Edit List of PCs button to select which PCs will be affected by the policy You can enter the PC by MAC Address or IP Address You can also enter a range of IP Addre...

Страница 38: ...tion on each line for the criteria required Descriptions of each criteria are described here Application In this field enter the name you wish to give the application Each name can be up to 12 charact...

Страница 39: ...use it only opens the ports you want to have opened while DMZ hosting opens all the ports of one computer exposing the computer to the Internet Any PC whose port is being forwarded must have its DHCP...

Страница 40: ...word when accessing the Router this way as usual UPnP When using UPnP features select Enable As allowing this may present a risk to security this feature is disabled by default Change these settings a...

Страница 41: ...To stop the test click the Stop button Click the Clear Log button to clear the screen Click the Close button to return to the Diagnostics screen Traceroute Test To test the performance of a connect c...

Страница 42: ...ost when the default settings are restored This feature is disabled by default The Administration Tab Firmware Upgrade Firmware can be upgraded by clicking the Upgrade button after browsing for the fi...

Страница 43: ...e Router s MAC Address as seen by your ISP Router Name This is the specific name for the Router which you set on the Setup Tab Host Name If required by your ISP this would have been entered on the Set...

Страница 44: ...sk it is shown here DHCP Server If you are using the Router as a DHCP server that will be displayed here Start IP Address For the range of IP Addresses used by points on your local Ethernet network th...

Страница 45: ...ss tab this will display the wireless mode Mixed G Only or Disabled used by the network SSID As entered on the Wireless tab this will display the wireless network name or SSID DHCP Server If you are u...

Страница 46: ...the network connected to the Router Make sure that each IP address is unique for each PC or network device 4 Click the Gateway tab and in the New Gateway prompt enter 192 168 1 1 which is the default...

Страница 47: ...IP address that is not used by any other computer on the network connected to the Router 6 Enter the Subnet Mask 255 255 255 0 7 Enter the Default Gateway 192 168 1 1 Router s default IP address 8 Tow...

Страница 48: ...ress for Your Ethernet Adapter If you need to clone the MAC address of your Ethernet adapter onto the Router see the System section of Chapter 6 The Router s Web based Utility for details 2 Make sure...

Страница 49: ...and IP Address for Your Ethernet Adapter for details on getting an IP address 6 Check the Enable option for the port services you want to use Consider the example below Customized External Port TCP UD...

Страница 50: ...you disable all the forwarding entries if you want to successfully use DMZ hosting since forwarding has priority over DMZ hosting In other words data that enters the Router will be checked first by t...

Страница 51: ...r dial a connection This will remove any dial up pop ups for PPPoE users For Netscape 4 7 or higher 1 Start Netscape Navigator and click Edit Preferences Advanced and Proxies 2 Make sure you have Dire...

Страница 52: ...he option Keep Alive and set the Redial Period option at 20 seconds 4 Click the Save Settings button 5 Click the Status tab and click the Connect button 6 You may see the login status display as Conne...

Страница 53: ...s working correctly You can remove the Router to verify a direct connection Manually configure the TCP IP settings with a DNS address provided by your ISP Make sure that your browser is set to connect...

Страница 54: ...ing fix click ICQ menu preference connections tab and check I am behind a firewall or proxy Then set the firewall time out to 80 seconds in the firewall setting The Internet user can then send a file...

Страница 55: ...are upgrades All Linksys firmware upgrades are posted on the Linksys website at www linksys com where they can be downloaded for free To upgrade the Router s firmware use the System tab of the Router...

Страница 56: ...What are the advanced features of the Router The Router s advanced features include Advanced Wireless settings Filters Port Forwarding Routing and DDNS How do I get mIRC to work with the Router Under...

Страница 57: ...transmitting data Achieving these functions simultaneously requires a dynamic RF networking technology that links access points and nodes In such a system the user s end node undertakes a search for...

Страница 58: ...a chip or chipping code The longer the chip the greater the probability that the original data can be recovered Even if one or more bits in the chip are damaged during transmission statistical techni...

Страница 59: ...away in small increments to determine the maximum range in your environment You may also try using different channels as this may eliminate interference affecting only one channel I have excellent si...

Страница 60: ...ceive those transmission Wireless networks are easy to find Hackers know that in order to join a wireless network your wireless PC will typically first listen for beacon messages These are identifying...

Страница 61: ...addresses usernames passwords instant message conversations emails account information and any data transmitted wirelessly can easily be seen by someone outside of your network because it is often br...

Страница 62: ...ng about a day s worth of network traffic mostly in the case of business networks Over time the hacker can build up a table of network data and be able to decrypt all of your wireless transmissions Th...

Страница 63: ...that network radius Remember that access points transmit indiscriminately in a radius placing an access point at the edge of the physical network area reduces network performance and leaves an opening...

Страница 64: ...networks they fall short with regards to security Hackers can usually find them quite easily 6 MAC addresses Enable MAC address filtering if your wireless products allow it MAC address filtering will...

Страница 65: ...ally changing WEP keys SSID etc There are several ways that WEP can be maximized a Use the highest level of encryption possible b Use multiple WEP keys c Change your WEP key regularly Current encrypti...

Страница 66: ...the key into the appropriate Key field on the left The WEP key must consist of the letters A through F and the numbers 0 through 9 and should be 10 characters in length for 64 bit encryption or 26 ch...

Страница 67: ...d to the Router First select the type of WPA algorithm TKIP or AES Enter the RADIUS server s IP Address and port number along with a key shared between the Router and the server Last enter a Group Key...

Страница 68: ...nstructions 1 Download the firmware from Linksys s website at www linksys com 2 Click Upgrade Firmware from the Web Utility s Administration tab and the Upgrade Firmware screen shown in Figure C 1 wil...

Страница 69: ...rotocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help prov...

Страница 70: ...OK button 2 When the IP Configuration screen appears select the Ethernet adapter you have connected to the Router via a CAT 5 Ethernet network cable See Figure C 1 3 Write down the Adapter Address as...

Страница 71: ...example in Figure C 3 shows the Ethernet adapter s IP address as 192 168 1 100 Your computer may show something different For the Router s Web based Utility For MAC filtering enter the 12 digit MAC ad...

Страница 72: ...Adapter This is a device that adds network functionality to your PC Ad hoc A group of wireless devices communicating directly with each other peer to peer without the use of an access point Backbone T...

Страница 73: ...domain name Default Gateway A device that forwards Internet traffic from your local area network DHCP Dynamic Host Configuration Protocol A protocol that lets one device on a local network known as a...

Страница 74: ...File Transfer Protocol A standard protocol for sending files between computers over a TCP IP network and the Internet Full Duplex The ability of a networking device to receive and transmit data simul...

Страница 75: ...computers or devices connected for the purpose of data sharing storage and or transmission between users NNTP Network News Transfer Protocol The protocol used to connect to Usenet groups on the Intern...

Страница 76: ...CTS Clear To Send message before sending data Server Any computer whose function in a network is to provide user access to files printing communications and other services SMTP Simple Mail Transfer P...

Страница 77: ...twork protocol for transmitting data that does not require acknowledgement from the recipient of the data that is sent Upgrade To replace existing software or firmware with a newer version Upload To t...

Страница 78: ...LAN Ports One Power Port One Reset Button Cabling Type UTP CAT 5 or better Data Rate Up to 54Mbps Transmit Power 15dBm LEDs Power DMZ WLAN LAN 1 4 Internet Dimensions 7 31 x 1 89 x 7 87 L x W x H 186...

Страница 79: ...71 Appendix G Specifications Wireless G Broadband Router...

Страница 80: ...and handling charges ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE ARE LIMITED TO THE DURATION OF THE WARRANTY PERIOD ALL OTHER EXPRESS OR IMPLIED CONDI...

Страница 81: ...ed to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment or device Connect the equipment...

Страница 82: ...a directive 1999 5 EC la directive 89 336 EEC et la directive 73 23 EEC Belgique B L utilisation en ext rieur est autoris sur le canal 11 2462 MHz 12 2467 MHz et 13 2472 MHz Dans le cas d une utilisat...

Страница 83: ...ocedura da seguire L uso per installazione in esterni non e permessa Italy I License required for indoor use Use with outdoor installations not allowed the Netherlands NL License required for outdoor...

Страница 84: ...king with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 261 8868 If you experience problems with any Linksys product you can call us at 800 326 711...

Страница 85: ...installed and operated with a minimum distance of 20 centimeters between the radiator and your body This Transmitter must not be co located or operating in conjunction with any other antenna or trans...

Отзывы: