WRT54G Use this guide to install: Broadband Wireless-G

Instant Wireless

® Series User Guide COPYRIGHT & TRADEMARKS FCC Caution: Any change or modification to the product not expressly approved by Specifications are subject to change without notice. Copyright © 2002 Linksys, All Rights Linksys could void the user's authority to operate the device. Reserved. Instant Wireless, Linksys, and the Linksys logo are registered trademarks of Linksys Group, Inc. , Windows, and the Windows logo are registered trade- FCC RF Radiation Exposure Statement marks of Microsoft Corporation. All other trademarks and brand names are the proper- To comply with the FCC and ANSI C95.1 RF exposure limits, the antenna(s) for this ty of their respective proprietors. device must comply with the following: • Access points with 2.4 GHz integrated antenna must operate with a separation dis- LIMITED WARRANTY tance of at least 20 cm from all persons using the cable provided and must not be Linksys guarantees that every Instant Wireless Wireless-G Broadband Router will be free co-located or operating in conjunction with any other antenna or transmitter. from physical defects in material and workmanship for one year from the date of pur- End-users must be provided with specific operations for satisfying RF exposure compli- chase, when used within the limits set forth in the Specifications section of this User ance. Guide. Note: Dual antennas used for diversity operation are not considered co-located.

If the product proves defective during this warranty period, go to the Linksys website at Canadian Department of Communications Industry Canada (IC) Notice www.linksys.com for complete RMA (Return Merchandise Authorization) assistance. You This Class B digital apparatus complies with Canadian ICES-003 and RSS-210. can also call Linksys Technical Support in order to obtain a RMA Number. BE SURE TO Cet appareil numérique de la classe B est conforme à la norme NMB-003 et CNR-210 HAVE YOUR PROOF OF PURCHASE AND A BARCODE FROM THE PRODUCT’S PACK- du Canada. AGING ON HAND WHEN CALLING. RETURN REQUESTS CANNOT BE PROCESSED "To prevent radio interference to the licensed service, this device is intended to be oper- WITHOUT PROOF OF PURCHASE. When returning a product, mark the RMA Number ated indoors and away from windows to provide maximum shielding. Equipment (or its clearly on the outside of the package and include a copy of your original proof of pur- transmit antenna) that is installed outdoors is subject to licensing." chase. All customers located outside of the United States of America and Canada shall " Pour empêcher que cet appareil cause du brouillage au service faisant l'objet d'une be held responsible for shipping and handling charges. licence, il doit être utilisé à l'intérieur et devrait être placé loin des fenêtres afin de fournir un écran de blindage maximal. Si le matériel (ou son antenne d'émission) est installé à IN NO EVENT SHALL LINKSYS'S LIABILITY EXCEED THE PRICE PAID FOR THE PROD- l'extérieur, il doit faire l'objet d'une licence. " UCT FROM DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAM- AGES RESULTING FROM THE USE OF THE PRODUCT, ITS ACCOMPANYING SOFT- EC DECLARATION OF CONFORMITY (EUROPE) WARE, OR ITS DOCUMENTATION. LINKSYS OFFERS NO REFUNDS FOR ITS PROD- Linksys Group declares that the Instant Wireless® Series products included in the Instant UCTS. Linksys makes no warranty or representation, expressed, implied, or statutory, Wireless® Series conform to the specifications listed below, following the provisions of with respect to its products or the contents or use of this documentation and all accom- the European R&TTE directive 1999/5/EC, EMC directive 89/336/EEC, and Low Voltage panying software, and specifically disclaims its quality, performance, merchantability, or directive 73/23/EEC: fitness for any particular purpose. Linksys reserves the right to revise or update its prod- ucts, software, or documentation without obligation to notify any individual or entity. For 11Mbps, 2.4 GHz access points with 100 mW radios, the following standards were Please direct all inquiries to: applied: • EMC: EN 301 489-1, EN 301.89-17 Linksys P.O. Box 18558, Irvine, CA 92623. • Safety: EN 60950 • Radio: ETS 300-328-2 Technical requirements for Radio equipment. SAFETY AND REGULATORY NOTICES Caution: This equipment is intended to be used in all EU and EFTA countries. Outdoor FCC STATEMENT use may be restricted to certain frequencies and/or may require a license for operation. The Instant Wireless® Wireless-G Broadband Router has been tested and found to com- Contact local Authority for procedure to follow. ply with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules. Operation is subject to the following two conditions: Note: Combinations of power levels and antennas resulting in a radiated power level of above 100 mW equivalent isotropic radiated power (EIRP) are considered as not com- (1) This device may not cause harmful interference, and pliant with the above mentioned directive and are not allowed for use within the European (2) This device must accept any interference received, including interference that may community and countries that have adopted the European R&TTE directive 1999/5/EC cause undesired operation. and/or the CEPT recommendation Rec 70.03.

These limits are designed to provide reasonable protection against harmful interference For more details on legal combinations of power levels and antennas, contact Linksys in a residential installation. This equipment generates, uses, and can radiate radio fre- Corporate Compliance. quency energy and, if not installed and used according to the instructions, may cause harmful interference to radio communications. However, there is no guarantee that inter- ference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which is found by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:

• Reorient or relocate the receiving antenna • Increase the separation between the equipment or devices • Connect the equipment to an outlet other than the receiver's • Consult a dealer or an experienced radio/TV technician for assistance Instant Wireless® Series Wireless-G Broadband Router

• Linksys Group vakuuttaa täten Instant Wireless® Wireless-G Broadband Router tyyppinen laite on direktiivin 1999/5/EY, direktiivin 89/336/EEC ja direktiivin 73/23/EEC oleellisten vaatimusten ja sitä koskevien näiden direktiivien muiden ehto- Table of Contents jen mukainen. • Linksys Group déclare que la Instant Wireless® Wireless-G Broadband Router est Chapter 1:Introduction 1 conforme aux conditions essentielles et aux dispositions relatives à la directive 1999/5/EC, la directive 89/336/EEC, et à la directive 73/23/EEC. The Wireless-G Broadband Router 1 • Belgique B L'utilisation en extérieur est autorisé sur le canal 11 (2462 MHz), 12 (2467 Features 2 MHz), et 13 (2472 MHz). Dans le cas d'une utilisation privée, à l'extérieur d'un bâti- The Router’s Functions 2 ment, au-dessus d'un espace public, aucun enregistrement n'est nécessaire pour une distance de moins de 300m. Pour une distance supérieure à 300m un enreg- IPAddresses 3 istrement auprès de l'IBPT est requise. Pour une utilisation publique à l'extérieur de Router Setup Overview 4 bâtiments, une licence de l'IBPT est requise. Pour les enregistrements et licences, veuillez contacter l'IBPT. • France F: Chapter 2:Getting to Know the Wireless-G 2.4 GHz Bande : les canaux 10, 11, 12, 13 (2457, 2462, 2467, et 2472 MHz respec- Broadband Router 6 tivement) sont complétement libres d'utilisation en France (en utilisation intérieur). The Router’s Back Panel 6 Pour ce qui est des autres canaux, ils peuvent être soumis à autorisation selon le départment. L'utilisation en extérieur est soumis à autorisation préalable et très The Router’s Front Panel LEDs 7 restreint. Vous pouvez contacter l'Autorité de Régulation des Télécommunications Chapter 3:Connect theRouter 10 (http://www.art-telecom.fr) pour de plus amples renseignements. 2.4 GHz Band: only channels 10, 11, 12, 13 (2457, 2462, 2467, and 2472 MHz Overview 10 respectively) may be used freely in France for indoor use. License required for out- Wired Connection to a PC 10 door installations. Please contact ART (http://www.art-telecom.fr) for procedure to follow. Wireless Connection to a PC 12 • Deutschland D: Anmeldung im Outdoor-Bereich notwending, aber nicht genehmi- gungspflichtig. Bitte mit Händler die Vorgehensweise abstimmen. Chapter 4: Configure the PCs 13 • Germany D: License required for outdoor installations. Check with reseller for proce- dure to follow. Overview 13 • Italia I: E' necessaria la concessione ministeriale anche per l'uso interno. Verificare Configuring Windows 98 and Millennium PCs 14 con i rivenditori la procedura da seguire. L'uso per installazione in esterni non e' per- Configuring Windows 2000 PCs 16 messa. • Italy I: License required for indoor use. Use with outdoor installations not allowed. Configuring Windows XP PCs 18 • The Netherlands NL License required for outdoor installations. Check with reseller for procedure to follow. Chapter 5:Configure the Router’s Basic Settings20 • Nederlands NL Licentie verplicht voor gebruik met buitenantennes. Neem contact op met verkoper voor juiste procedure. Chapter 6: The Router’s Web-based Utility 25 Overview 25 How to Access the Web-based Utility 25 Setup 26 Security 35 System 37 DHCP 42 Status 44 Help 47 Advanced Tabs 48 Advanced Wireless 49 Filters 53 Port Forwarding 57 Routing 60 DDNS 63 UG-WRT54G-122402A JL pedxH otc nomto 113 93 110 112 84 Contact Information Appendix H: Warranty Information 90 Appendix G: Appendix F: Specifications Appendix E: Glossary 87 Address for Your Adapter Ethernet 65 Address and IP Finding the MAC Appendix D: Configuring Wireless Security Appendix C: Web Addresses How to Ping Your ISP’s E-mail & Appendix B: Appendix A: Troubleshooting

rqetyAkdQetos76 Environmental 111 65 FrequentlyQuestions Asked Common Problems and Solutions

Instant Wireless

® Series

The Wireless-G Broadband Router and multi-player games with the flexibility, speed, and security you need! printers, network,office youconnection, files, can share a high-speed Internet With the Linksys Wireless-G Broadband Router at the center of your home or is a snap with the web browser-basedutility.Configuration configuration access to the Internet. users’ internal to filter and can be configured supports technology intruders, VPN pass-through, to protect against Internet all wireless transmissions. as a DHCP Server,The Router can serve has NAT To protect your data and privacy, the Wireless-G Broadband Router can encrypt network share a high-speed cableconnection. or DSL Internet as you need. Finally, the Router function ties it all together and lets your whole directly, or daisy-chain out to more hubs and switches to create as big a network 10/100 Switch to connect yourdevices. wired-Ethernet Connect four PCs Wireless-B devices to the network. There’s full-duplex also a built-in 4-port First, there’s the Wireless Access Point, which lets you connect Wireless-G or The Linksys Wireless-G Broadband Router is really three devices in one box. dard as your needs grow. to the new and migrate screaming fast 802.11b infrastructure, Wireless-G stan- Since both standards are built in, you can protect your investment in existing also interoperate with existing 11Mbps Wireless-B equipment. since they share the same 2.4GHz radio band,try—but Wireless-G devices can ucts found in homes, businesses, and public wireless hotspots around the coun- than the widely times faster deployedalmost five Wireless-B (802.11b) prod- Wireless-G is the upcoming 54Mbps wireless networking standard that’s Broadband Router Wireless-G s EtherFast Chapter 1: ® Cable/DSL Router Introduction 1 2 Features Internet ports transmit data at 10/100Mbps. ports Internet connects to the Internet. to the LAN, port The LAN and and the Internet Remember that the Router’s connect to two ports sides. connect The LAN ports appropriate PC on the LAN side. applications, and,or other Internet if allowed, it will forward the packet to the work. like the web services port server,The Router inspects Internet ftp server, before delivery port to the appropriate PC on your through the Internet net- The Router protects your network by inspecting every packet coming in side cannot “see” your Internet PCs. This is how your network remains private. The Router’s NAT feature protects your network of PCs so users on the public, regulates the data that travels between these two networks. to the Internet. of PCs in yourThe Router processes and group home or office, In this instance, the Router connects your Local Area Network (LAN), or the Simply put, a router is network device that connects two networks together. • • • • • • • • • • • The Router’s Functions

1-Year Limited Warranty Free Technical Hours a Day, Support—24 7 Days a Week, Calls Toll-Free US Crossover Cables Ports All Ethernet Support Auto-Crossover (MDI/MDI-X)—No Need for Addresses Automatically Capability to Server Assign IP DHCP Web-based from Any Utility for Easy Configuration Web Browser Dynamic Routing (RIP1 and 2), DMZ Hosting Static and Service, Dynamic Domain Name System (DDNS) Supports Pass-Through Networking IPSec and PPTP (VPN)—Supports Access Your Network Corporate Remotely through Virtual Private Technology Address Filtering; and NAT Filtering; Wireless MAC Address Filtering; Port and MAC Time Schedules, Website Blocking, IP Enhanced Security Management Functions: Internet Access Policies with Encryption Wireless Security with up to 128-bit WEP Setup Wizard for Easy Installation Compatibility with Draft 802.11g (2.4GHz) and 802.11b Standards

Instant Wireless

® Series

PAddresses IP get that information from your get that information ISP. the Router.If so, you will need that static IP address when configuring You can address to your account. out if they haveyour ISP to find assigned a static IP connection, contact Internet If you use the Router to share your cable or DSL print servers. unique and are commonly used with network devices PCs or such as server have that same IP address until you change it. Static IP addresses must be disable it, static IP addressing ensures that the device assigned it will always other device on the network. Since a static IP address remains valid until you IP address that you assign manuallyA static IP address is a fixed to a PC or Addresses Static IP addresses dynamically. addresses or use the Router to assign IP assign static IP There are two ways of assigning an IP address to your network devices. You can address, on the network. and LAN connections. This applies to both the Internet and routers, requires an IP address to identify its “location,”PCs, print servers, or device Protocol. Every IP stands for Internet on an IP-based network, including What’s an IP Address? Broadband Router Wireless-G Web-based Utility.” The Router’sWAN Requests description under Filters in “Chapter 6: Router and network seem invisible the Block to the Internet—see However, even IP address can be blocked, this Internet so that the address. for your seen from the Internet network is the Router’s IP Internet Since the Router uses NAT address that can be technology, the only IP the “LAN IP address.” this User Guide, you’ll IP address” and see references to the “Internet needs two IP addresses—one for the LAN, In and one for the Internet. Note: Since the Router is a device that connects two networks, it 3 4 Router Setup Overview • Broadband Router,” most users will only need to use the following chapters: Figure 1-1). After going through “Chapter 2: Getting to Know the Wireless-G This User Guide covers the steps for setting up a network with the Router (see Router’s Web-basedUtility.” To disable DHCP on the Router, see the DHCP section in “Chapter 6: The network, you will experience network such as conflicting IP addresses. errors, one of the two on your If youmore than one DHCP server DHCP servers. run If you already have on your running network, a DHCP server you tion is enabled. work device, such as the Router. the Router’s By default, func- DHCP Server can either be a designated PC on the networkA DHCP server or another net- addresses manually every time a new user is added to your network. address is called the DHCP client. frees you from having to assign IP IP address by a DHCP server. The PC or network device obtaining an IP PCs and other network devices using dynamic IP addressing are assigned a new Servers DHCP (Dynamic Host Configuration Protocol) matically assign it a new dynamic IP address. and its dynamic IP address has expired,Internet) will auto- the DHCP server time period, they expire and may change. If a PC logs onto the network (or the because they are only such as PCs and print servers. These IP addresses are called “dynamic” A dynamic IP address is automatically assigned to a device on the network, Addresses Dynamic IP Router and connect your PC(s) to the Router. you This chapter instructs on how to connect a cable or DSL modem to the Connect the Router Chapter 3: or this User Guide. Router, you may follow in the Quick Installation guide the instructions the access. If you Router for Internet wish to manually configure Note: You should always the the Setup CD-ROM run to configure temporarily

assigned to the PC or device. After a certain Instant Wireless

must ®

disable

Series Catr6 The Router’s Web-based“Chapter 6: Utility”). can adjust security features and other settings to enable online gaming (see Internet. You can also modify the Router’s for example, you settings further; When you’re with these basic steps, you will be ready to connect the finished • • Broadband Router Wireless-G access using the settings provided by your ISP. and the Router’s web-based utility. You the Router for Internet will configure the Router using yourThis chapter explains howweb browser to configure the Router’sChapter 5: Configure Basic Settings addresses on your PCs. if you have previously set static IP youyour This chapter instructs on howPCs to be DHCP clients, to configure the PCs Chapter 4: Configure al rDLModem Cable or DSL Figure 1-1 Router Wireless-G Adapter Notebook with Adapter Ethernet PC with Wireless 802.11b Adapter Notebook with 5 6 The Router’s Back Panel Power Ports 1-4 Internet The Router’s are located on the Router’s ports back panel. Broadband Router Wireless-G Getting to Know the Chapter 2: adapter. power The Power is where port you will connect the to other network as an uplink port serve devices. for an uplink port. Any can one of the four ports crossover cable is plugged into it, so there no need will auto-detect whether ports a straight-through or and network attached storage (NAS). Each of the nect to network devices, such as PCs, print servers, These four LAN (Local Area Network) con- ports other port. Your modem connection will not work from any networkDSL modem through an Ethernet cable. is where port you The Internet connect your cable or

Figure 2-1

Instant Wireless

® Series

The Router’s Front Panel LEDs Power The Router’s LEDs display about the Router’s information status. Broadband Router Wireless-G DMZ Diag .Restore the Router’s and clear all of its settings, including a defaults factory 2. Reboot the Router while keeping all of its settings. 1. The The Reset Button 10 seconds. other troubleshooting measures, press the If you are experiencing extreme problems with the Router and have tried all new password or wireless settings. to reboot it. jammed connections, and is similar to pressing the button for just a moment with paper clip or pencil tip. This clears up any If the Router is having problemspress the connecting to the Internet, Reset button can be used in one of two ways: Green Green Red ture is being used. :Troubleshooting.” A: stays on for one minute or longer, see “Appendix If this LED upon successful completion of the diagnosis. its self-diagnosis mode during everyoff boot-up. It will turn . The hsLDlights up when the Router is powered on. . This LED . The Diag DMZ LED lights up when the Router goes through Figure 2-2 LED lights up when the DMZ hosting fea- Reset Button and hold it down for Reset button on your PC Reset 7 8 100 Full/Col Link/Act Indicators The LAN Link Act Indicators The WLAN 10Mbps. If this LED does not light up, then your connection speed is port. connection is made through the corresponding Orange normal. PCs send data at the same time). Infrequent collisions are flickers, the connection is experiencing collisions (when two in full duplex mode. If the LED is running sponding port is lit up solidly, the connection made through corre- LED Green port. ing, the Router is actively sending or receiving data over that is flicker- If the LED port. device through the corresponding is continuously lit, the Router is successfully connected to a Green network is available. Green active. Green . The . The the . When . When the . When . The Link/Act Full/Col 100 LED lights up when a successful 100Mbps Link Act LED also serves twoLED also serves If this purposes. LED serves twoLED serves If the LED purposes. E flickers, the wireless network is LED

E is continuously lit, the wireless LED

Instant Wireless

®

Series Link/Act Indicators The Internet Broadband Router Wireless-G 100 Full/Col rce o“hpe :Connect the Router.” Proceed to “Chapter 3: 10Mbps. If this LED does not light up, then your connection speed is port. connection is made through the corresponding Green Orange send data at the same time). Infrequent collisions are normal. the connection is experiencing collisions (when two PCs flickers, in full duplex mode. If the LED is running ding port is lit up solidly, the connection made through correspon- Green Router is sending or receiving data over the modem (the Internet). modem (the Internet). The nection is made between the Router and your cable or DSL . The . The . The Link/Act Full/Col 100 LED lights up when a successful 100Mbps LED serves twoLED serves If this LED purposes. E lights up when a successful con- LED Link/Act E flickers when the LED Internet port. 9 10 Wired Connection to a PC Overview 2. Connect one end of an Ethernet net- Connect one end of an Ethernet 2. Before you begin, make sure that all of 1. the Router, go to “Wirelessto configure Connection to a PC and Boot-Up.” “Wired Connection to a PC.” If you want to use a PC with wireless adapter the Router,If you go to want adapter to configure to use a PC with an Ethernet Router. connection, you can begin installation and setup of the Once you have type of Internet you the setup information need for your specific not, you can call your ISP to request that data. tion for your modem with you after installing your broadband connection. If The installation technician from your ISP should have left the setup informa- Router with setting(s) provided by Provider yourService Internet (ISP). the Router assigns them (if applicable), and you the will also have to configure You your will have networked to configure PCs to accept the IP addresses that The Router’s setup consists of more than simply plugging hardware together. the Router Chapter 3:Connect the Router. Repeat this step to connect more PCs, a switch, or other network devices to on a PC. port Ethernet Router, and the other end to an (labeled 1-4) on the back of work cable to one of the LAN ports modem. cable or DSL off, including the Router, PCs, and your network’s hardware is powered

Figure 3-1

Instant Wireless

®

Series .Power on one of your PCs. 6. • • Connect the power adapter to the 5. modem. Power on the cable or DSL 4. Connect a different network Ethernet 3. Broadband Router Wireless-G Apni :Troubleshooting.” “Appendix A: stays on for one minute or longer, see self-test is complete. If this LED The adapter is connected properly. The power adapter into a power outlet. Router’s Power and then plug the port, work for your modem connection. panel. This is the only that will port on the Router’s port to the Internet rear cable from your cable or DSL modem Power Diag tection. a power strip with surge pro- the Router’s power adapter into Note: port on the Router.port ered on properly. Verify that the modem is plugged into Internet cables are securely plugged in, and that all of your hardware is pow- If all of your nections and the Have you Have LED will light up red for a few seconds. It will turn off will turn when the LED will light up red for a few seconds. It LED on the front panel will light up green as soon the powerLED on the front panel will light up green You should always plug checked that the Link Link LEDs are not lighting up, make sure that all your LED for yourconnection light up? Internet Link/Act LEDs for all your LAN con- Figure 3-3 Figure 3-2 11 12 Wireless Connection to a PC • Connect the power adapter to the Power and then plug the power port, 4. modem. Power on the cable or DSL 3. network Connect an Ethernet cable 2. Before you begin, make sure that all of 1. instructions: If you want to use a wireless connection access the Router, follow these .For initial access to the Router through a wireless connection, make sure the 5. Power on one of the PCs your wireless network(s). 4. • :Troubleshooting.” A: stays on for one minute or longer, see “Appendix test is complete. If this LED The The adapter into a power outlet. work for your modem connection. panel. This is the only that will port on the Router’s port Internet rear from your cable or DSL modem to the modem. cable or DSL off, including the Router, PCs, and your network’s hardware is powered the your usual network settings. Router, you can change the Router and this PC’s adapter settings to match PC’s wireless adapter has its SSID set to adapter is connected properly. ting), and its is WEP encryption Diag Power and enable WEP encryption. Note: strip with surge protection. Note: The Router’s hardware installation is now complete. LED will light up red for a few off seconds and turn when the self- LED on the front panel will light up green as soon the powerLED on the front panel will light up green You should always plug the Router’s power adapter into a power You should always change the SSID from its default, G o to “Chapter 4: Configure the PCs.” Configure o to “Chapter 4: disabled linksys . After you have accessed the (the Router’s set- default

Figure 3-4 Instant Wireless

linksys

® Series ,

Overview can find out by clicking the can find out which First,Windows find your computer is running. You across a network, such as the Internet. Computers use IP addresses to communicate with the Router and each other TCP/IP) address automatically, so your PC can function as a DHCP client. To your PC’s do this, you need to configure network settings to obtain an IP (or ers to be able to communicate with the Router. each of your comput- in this chapter will help you The instructions configure Chapter 4: Configure the PCs Broadband Router Wireless-G Settings.” the Router’s Configure Basic your computers, continue to “Chapter 5: Once you’vesuccessfully installed in each PC you will configure. configured or wireless adapter (also knownthat an Ethernet as a network adapter) has been tings based on the type of Windows operating system you are using. Make sure The next few pages tell you, step by your step, hownetwork to configure set- You may need to do this for each computer you are connecting to the Router. out which operating system your PC is running. to find Help If your PC does not have TCP/IP installed, click TCP/IP installed and set to obtain an IP address automatically. Important: tions to install TCP/IP. . Search for the keyword By default By default Windows 98, 2000, Me, and XP has Start button. Read the side panel of the Start menu button. Read the side panel of Start TCP/IP . Then follow the instruc- Start and then 13 14 Configuring Windows 98 and Millennium PCs 2. On the Configuration tab, select the On the Configuration 2. 1. Click the DUN, PPPoE, VPN, or AOL. If the word adapter.Ethernet Do not choose a whose TCP/IP entry name mentions Double-click the that line. Click the Start button. Select Network Properties icon. Figure 4-1 Settings button. and click the TCP/IP TCP/IP line for the applicable

appears by itself, select Instant Wireless

Control Panel

® Series

icon. . Windows may ask youyour to restart PC. Click the 6. 3. Click the Broadband Router Wireless-G 5. Click the Now click the 4. does not ask you to restart, restart your does not ask yourestart computer anyway. to restart, etc. (if “D” is the letter of your CD-ROM drive). location, e.g., D:\win98, D:\win9x, ROM drive file and check the correct c:\windows\options\cabs, your or insert Windows CD-ROM into your CD- at Check for the files installation disk or additional files. blank. Click the Go to “Chapter 5: Configure the Router’s Configure Basic Settings.” Go to “Chapter 5: OK IP Address button again. Windows may ask you for the original Windows Gateway OK button. tab. Select tab, and verify that the Figure 4-2 Obtain an IP address automatically Installed Gateway es Ye button. If Windows field is field . 15 16 Configuring Windows 2000 PCs 2. Select the 1. Click the Local Area Connection Local Area Local (usuallyArea Connection listed). Double-click it is the first the Double-click the Start Local Area Connection Local Area button. Select Network and Dial-up Connections . Click . the Figure 4-3 Settings icon for the applicableadapter Ethernet Properties and click the

button. Instant Wireless Control Panel

icon.

® Series

icon. 4. Select Broadband Router Wireless-G 5. Restart your Restart computer. 5. Make sure the box next to 3. appears, click the PC configuration. Internet Protocol (TCP/IP) Go to “Chapter 5: Configure the Router’s Configure Basic Settings.” Go to “Chapter 5: Obtain an IP address automatically OK button. Click the Internet Protocol (TCP/IP) , and click the Figure 4-5 Figure 4-4 OK Properties button again to complete the . Once the new window is checked. Highlight button. 17 18 Configuring Windows XP PCs 2. Select the 1. Click the Windows 2000. menus look like previous Windows versions), please follow for the instructions If you interface. (wheredefault are using the Classic interface the icons and The following assume you instructions are running Windows XP with the Local Area Connection Local Area Local (usuallyArea Connection listed). Double-click it is the first the icon. and Internet Connections Start Local Area Connection Local Area button and then the . Click the icon. Then click the Figure 4-6 Control Panel icon for the applicableadapter Ethernet Properties button. icon. Click the

Network Connections Instant Wireless

Network

®

Series 4. Select Broadband Router Wireless-G . Make sure the box next to 3. appears, click the PC configuration. Internet Protocol (TCP/IP) Go to “Chapter 5: Configure the Router’s Configure Basic Settings.” Go to “Chapter 5: Obtain an IP address automatically OK button. Click the Internet Protocol (TCP/IP) , and click the Figure 4-8 Figure 4-7 OK Properties button again to complete the . Once the new window is checked. Highlight button. 19 20 .An 2. Open your web browser. Enter 1. computer you set up. instead of your PC. You the Router once using first only need to configure the Router several computers, youto configure will use the setup information access. Because you are now access among using the Router to share Internet from your The instructions ISP tell you how to set up your PC for Internet The Router’s Web-based“Chapter 6: Utility.” (ISP). Detailed description of the Router’s web-based utility can be found in network Provider through yourService and gain access to the Internet This chapter will show youthe Router to function in your how to configure Router’s Basic Settings the Configure Chapter 5: the default password).the default Then, click the empty, and enter (Windows XP users will see a similar screen.) Leave the address) in the web browser’s Enter Network Password the Note: Security For added security, you should change the password through admin screen of the web-based utility. in lowercase letters in the Address Figure 5-2 Figure 5-1 window, shown in Figure 5-2, will appear. http://192.168.1.1 OK field. Press the field. button. Password

(the Router’s IP default Instant Wireless Enter User Name field ( field key.

admin

® Series field

is .The web-based utility will appear with the 3. Broadband Router Wireless-G 5. The Router supports four connection types: Automatic Configuration - four connection types: The Router supports Automatic Configuration 5. from your Based on the setup instructions ISP, you may need to provide the 4. tion type you are using, and then continue to step 6. of connection type youfor the connec- select. Proceed to the instructions Each types are listed in the drop-downType menu for the Configuration setting. DHCP (obtain an IP automatically), Static IP, PPPoE, and PPTP. These and 255.255.255.0 for the Subnet Mask. on the Address and Subnet Mask are shown The values for the Router’s LAN IP and are usually left blank. allow you fields to provide a host name and domain for the Router Host Name and Domain (usually cable ISPs require them). These light saving changes leave the checkmark in box next to time zone for your location. If your location experiences daylight savings, IMPORTANT: • If youNetscape Navigator, are running click Wingate, ICS, and Sygate. To disable yoursoftware: Internet-sharing softwareSome examplesLanBridge, of Internet-sharing are Internet proxy server software • If you are running Internet Explorer 5.x or higher,• If youInternet are running click ZoneAlarm and ZoneAlarm Watchdog) on all of your PCs. Winpoet 300) and any or Enternet You must also disable any Setup Setup Settings Advanced OK LAN Settings screen and available features will differ depending on what kind button to continue. cen h eal ausae121811frteI Address screen. valuesThe default are 192.168.1.1 for the IP , Control Panel , and . If you have previously enabled any . Remove checkmarks from all three boxes. Click the Proxies on any of your PCs, you must disable it now. . Click Internet log-on software , Internet Options Direct Connection to the Internet Automatically adjust clock for day- Setup firewall software tab selected. Select the , Edit Connections Internet-sharing (such as Ivasion , Preferences (such as Tools , and , , . 21 22 .Click the B. Keep setting, the default A. ISP, these steps: perform address from your or a dynamic IP If you are connecting through DHCP Automatic - DHCP Configuration .Enter the B. Select A. your ISP, these steps: perform IP address from static or fixed If you are connecting through a Address Static (or Fixed) IP .Click the F. Enter the E. Enter the D. Enter the C. setting, or click the Type. DHCP Automatic - Configuration Configuration Type.Configuration step 6. When you are finished, proceed to over.clear the setting and start address. enter at least one DNS and/or 3 fields. You need to Address the settings and start over.the settings and start , as the Configuration Static IP . Apply Apply Default Gateway Subnet Mask DNS nentIP Internet button to save save to button button to save the in the 1, 2, Cancel as the . When you are finished, proceed to step 6. button to . the settings, or c lick the Figure 5-4

Figure 5-3 Instant Wireless Cancel

button to clear

®

Series .Select A. these steps: perform password to access the Internet), PPPoE (you use a user name and you are connecting through If your DSL provider says that PPPoE Broadband Router Wireless-G .Enter the B. ished, proceed to step 6. over.and start Cancel click the to save the settings, or information, information, After you have entered your setup setup information. the necessary nection, check with your ISP for only. If you are using a PPTP con- used in Europe PPTP is a service PPTP .Click the D. Enter the C. Configuration Type.Configuration ished, p over.start button to clear the settings and click the the settings, or button to clear the settings roceed to step 6. applications already installed on any of your PCs. Important: Apply click the PPPoE User Name Password When you are fin- When you are fin- utnto save button Apply . as the If you enable PPPoE, remember to remove any PPPoE . Cancel button Figure 5-5 Figure 5-6 23 24 .If you have Wireless-G and 802.11b devices in your network, then keep the A. To the Router for your wireless network(s), these steps: configure perform 6. .If you haven’t already done so, click the 7. Customize the B. 8. Restart your Restart computers so that they can obtain the Router’s new settings. 8. .To enable (recommended), click the WEP encryption C. rce o“hpe :The Router’s Web-basedProceed to Utility” for“Chapter 6: more details default default based Utility.” The Router’s Web-settings. For refer to “Chapter 6: more information, G-Only i nti eto rrfrt Apni :Troubleshooting.”did in this section or refer to “Appendix A: If you are unable to reach our website, you may want to review what you Congratulations! You’ve the Router. successfully configured site at The Router’s Web-based web-“Chapter 6: Utility” or the Linksys support If you need more details or advanced please refer to setting information, ing Test the setup by opening your web browser from any computer and enter- settings. Close the web browser. WEP encryption settings as needed. Click the WEP encryption the ( you SSID should change the default Catr6 The Router’s Web-based“Chapter 6: Utility.” next to http://www.linksys.com/registration Apply support.linksys.com WEP Mode . If you want to disable wireless networking, select button to save your changes. For refer to more information, . Then click the setting, SSID and advanced settings information. and Mixed Channel . Edit WEP Settings Edit WEP . If you have only Wireless-G devices, select Figure 5-7 settings as needed. For added security, linksys . Apply ) to a unique name. Then click Apply

button to save your Setup

button, and customize the Instant Wireless Enable button to save your Disable

radio button

®

. Series

How to Access the Web-based Utility Overview Address address, Navigator, and enter the Router’s IP default To access the web-based utility, Explorer or Netscape launch Internet Broadband Router Wireless-G (the default password)(the default in the will see a similar screen.) Leave the A password request page, shown in Figure 6-2 will pop up. (Windows XP users The Router. accessed via your web browser through use of a computer connected to the each web page in the Utility and each page’s key functions. The utility can be Use the Router’s web-based utility to administer it. This chapter will describe Web-based Utility Chapter 6: screens: basic setup. For advanced setup, click the Setup field. Then press Then field. Advanced Wireless , Security , System Enter The Router’s , , Filters DHCP Password . Figure 6-2 Figure 6-1 , , Port Forwarding User Name Status field. Then click the field. , and Advanced Help field blank, and enter field , screens are available for Routing 192.168.1.1 tab to access these OK , and button. DDNS , in the admin . 25 26 Setup select. available features will differ depending on what kind of connection type you - DHCP,Configuration Static IP, PPPoE, and PPTP. Each Type Configuration blank will work.In most cases, leaving these fields with a host and domain name. has been configured service broadband Internet names as identification. You to see if your may have to check with your ISP domain name for the Router. Some ISPs, usually cable ISPs, require these Host Name Address MAC Internet The To save your changes on any page, click the download on the Linksys website at using. Future versions of the Router’s will be posted and available firmware for Firmware Version all of the screen’sseen this screen and properly configured values. utility. If you have already installed and set up the Router, you have already unsaved changes on any page, click the mation about any screen’s features, click the clock for daylight saving changes daylight savings, leave the checkmark in box next to Time Zone Setup rect by successfully connecting to the Internet. Note: through the Note: screen is the first screen you see when you screen is the first access web-based Select the time zone for your location. If your location experiences and You settings are cor- configuration can verify that the Internet For added security, you should always change the password The MAC Address of the Internet interface is displayed interface Address of the Internet here. The MAC Domain Name This showsyou are the version and date of the firmware Security The Router supports four connection types: The Router supports Automatic screen of the web-based utility. . These fields allow you These fields to supply a host and www.linksys.com Cancel Help button. To get additional infor- Apply button.

. Instant Wireless button. To cancel any Automatically adjust Setup

screen and

®

Series ieesGBroadband Router Wireless-G unsaved changes on this page, click the mation about the features, click To save your changes on this page, click the address. DHCP or you are connecting through a dynamic IP supports - DHCP,Configuration and it should be kept only if your ISP the Router’sBy default, Type Configuration is set to Automatic Automatic - DHCP Configuration Figure 6-3 Help Cancel button. Apply utn To get more infor- button. button. To cancel any 27 28 Subnet Mask. (including your on the Internet ISP). Your ISP will provide you with the Subnet Mask need to specify here. WAN, or the Internet. Your ISP will provide you with the IP Address you nentI Address IP Internet then select address to connect the Internet, If youIP are required to use a permanent Static IP Static IP This is the Router’s Subnet Mask, as seen by users external . hsi h otrsI address, when seen from the This is the Router’s IP

Figure 6-4

Instant Wireless

®

Series ieesGBroadband Router Wireless-G unsaved changes on this page, click the mation about the features, click do, you will have to enable PPPoE. through a DSL line, check with your ISP to see if they use PPPoE. If they to establishconnections. If you Internet are connected to the (Point-to-Point Protocol over Ethernet) Some DSL-based ISPs use PPPoE PPPoE To save your changes on this page, click the Address. IP Server at least one DNS (Domain Name System) (Optional) (Required) and DNS 2-3 DNS 1 address. Address, which is the ISP server’s IP Default Gateway Your ISP will provide you Gateway with the Default Figure 6-5 Help Cancel button. Your ISP will provide you with Apply utn To get more infor- button. button. To cancel any 29 30 unsaved changes on this page, click the mation about the features, click option, click the radio button next to the Router will automatically re-establish your connection. To use this periodically check yourconnection. If you Internet are disconnected, then Redial Period Keep Alive Option: elapsed before yourconnection terminates. Internet To save your changes on this page, click the Redial PeriodThe default is 30 seconds. you specify how often you want connection. the Router to check Internet User Name and Password Address. Default Gateway Subnet Mask. (including your on the Internet ISP). Your ISP will provide you with the Subnet Mask fy here. Internet. Your ISP will provide you with the IP Address you need to speci- Address Internet IP nections in Europe only (see Figure 6-8). Point to Point Tunneling that applies to con- Protocol (PPTP) is a service PPTP User Name and Password by your ISP. the again. If you wish to activate Connect on Demand, click the radio button. In establish your connection as soon you attempt to access the Internet to inactivity, Connect on Demand enables the Router to automatically re- time (Max Idle Time). due If yourconnection has been terminated Internet period of connection after it has been inactivethe Internet for a specified Max Idle Time Connect on Demand: by your ISP. Max Idle Time This is the Router’s Subnet Mask, as seen by users external Your ISP will provide you Gateway with the Default field, enter the number of minutes you want to have hsi h otrsI address, when seen from the This is the Router’s IP Enter the Enter the If you select this option, the Router will Help Keep Alive User Name User Name You the Router to cut can configure Cancel button. Apply . In the utn To get more infor- button.

and and Instant Wireless button. To cancel any Password Password Redial Period

provided provided

® Series

field, ieesGBroadband Router Wireless-G elapsed before yourconnection terminates. Internet the again. If you wish to activate Connect on Demand, click the radio button. In establish your connection as soon you attempt to access the Internet to inactivity, Connect on Demand enables the Router to automatically re- time (Max Idle Time). due If yourconnection has been terminated Internet period of connection after it has been inactivethe Internet for a specified Max Idle Time Connect on Demand: Max Idle Time your PCs. remove any PPPoE applications that are already installed on any of Important: field, enter the number of minutes you want to have For ADSL users, if you enable PPPoE, remember to Figure 6-6 You the Router to cut can configure 31 32 want to broadcast the Router's SSID, then select broadcast the Router's SSID, keepsetting, the default works to associate with, they will detect the SSID broadcast by the Router. To SSID Broadcast SSID ( change the default your wireless network. For added security, Linksys recommends that you be any keyboard character. Make sure this setting is the same for all devices in is case-sensitive and must not exceed 32 alphanumeric characters, which may network. The SSID must be identical for all devices in the wireless network. It SSID If you want to disable wireless networking, select setting, the default Mode Address MAC Wireless-G 54g, Wireless 2.4GHz, Address and 255.255.255.0 for the Subnet Mask. and Subnet Mask are shown here. valuesThe default are 192.168.1.1 for the IP Subnet Mask IP Address and LAN Address MAC LAN unsaved changes on this page, click the mation about the features, click the radio button next to option, click the radio button next to the Router will automatically re-establish your connection. To use this periodically check yourconnection. If you Internet are disconnected, then Redial Period Keep Alive Option: To save your changes on this page, click the Redial Period is 30 seconds. how often you want connection. the Router to check Internet The default The SSID is the network name shared among all devices in a wireless If you have Wireless-G and 802.11b devices in your network, then keep The MAC Address of the wireless interface is displayed Address of the wireless interface here. The MAC is displayed interface here. Address of the LAN The MAC When wireless clients survey the local area for wireless net- Mixed . If you have only Wireless-G devices, select linksys Keep Alive ) to a unique name of your choice. If you select this option, the Router will . In the The values for the Router’s IP Address Help Keep Alive Cancel button. Redial Period Disable Apply Disable utn To get more infor- button.

. To use this option, click Instant Wireless Enable . button. To cancel any . field, you specify . If you do not

G-Only

® Series

. about the features, click unsaved changes on this page, click the To save your changes on this page, click the Broadband Router Wireless-G To enable click the WEP encryption, they maythe encryption, decrease network performance. levelsencryption offer higher levels of security, but due to the complexity of Wireless-G and 802.11b-in a network must use an identical WEP key. Higher for every data transmission. To decode data transmissions, all devices- 128-bit keys to provide access control to your network security and encryption method used to protect your wireless data communications. WEP uses 64-bit or WEP rectly. in your wireless network must use the same channel in order to function cor- with your network settings, between 1 and 11 (in North America). All devices Channel tion, keepsetting, the default WEP Settings The Wireless-G (WEP) 54g, 2.4GHz, security of your wireless network. WEP settings. should alwaysWEP encryption be enabled to increase the An acronym for Wired Equivalent Privacy, WEP is an encryption 2.4GHz, 54g, Wireless-G (WEP) Select the appropriate channel from list provided to correspond button to configure the WEP settings. button to configure To disable WEP encryp- Help Disable Figure 6-7 button. Enable . Cancel screen allowsyour you to configure radio button. Then click the utn To get more information button. Apply button. To cancel any Edit 33 34 Check all the values, and click the hexadecimal characters are “0”-“9” and “A”-“F”. then the key must be exactly 26 hexadecimal characters in length. Valid hexadecimal characters in length. If you are using 128-bit WEP encryption, If you are using 64-bit then the keyWEP encryption, must be exactly 10 These are not valid key values.) a set of values. (Do not leave blank, and do not enter all zeroes. a key field LAN transmissions. If you are not using a Passphrase, then manually enter Keys 1-4 enter the Passphrase, click the the WEP key manually on the non-Linksys wireless products.) After you only. If you want to communicate with non-Linksys wireless products, enter (This Passphrase function is compatible with Linksys wireless products is case-sensitive and should not be longer than 16 alphanumeric characters. Passphrase. This Passphrase is used to generate one or more WEP keys. It Passphrase may decrease network performance. higher levels of security, they but due to the complexity of the encryption, To about the features, click get more information To cancel any changes you’ve entered on this page, click the bit 10 hex digits Encryption WEP Router sends data. Make sure the receiving device is using the same key. Default TransmitKey the same Passphrase or WEP key. Note: WEP keys enable youscheme for wireless to create an encryption All Wireless-G and 802.11b devices in your network must use Instead of manually entering WEP keys, you can enter a or Select the level of you WEP encryption wish to use, 128-bit 26 hex digits Select which WEP key (1-4) will be used when the Generate Apply utnt raeWPkeys. button to create WEP button to save your WEP settings.

. Higher encryption levels. Higher encryption offer Instant Wireless Help button.

Cancel ®

button. Series

64- Security Broadband Router Wireless-G The Through and PPTP Pass-Through. work-related networking. For IPSec Pass- VPN tunnels, the Router supports Pass-Through VPN it. confirm and must not include any spaces. Enter the new Password to in the second field Router Password Setup Wizard will be prompted for the Router’s password. soon as possible. All users whoto access the Router’s try web-based utility or password, default should change the factory which is To disable IPSec Pass-Through, uncheck the box next to nels to pass through the Router, IPSec Pass-Through is enabled by default. layer. Toimplement secure exchange allow of packets at the IP IPSec tun- IPSec Security - Internet Protocol Security (IPSec) is a suite of protocols used to - Internet screen allows you to change the Router’s security settings. You The new Password must not exceed 32 characters in length Virtual Private Networking (VPN) is typically used for Figure 6-8 admin IPSec , to your own as . 35 36 3. Click the Enter the computer's IP address in 2. ic filtering methods. ic filtering Web Filters . To expose one PC, select 1. address may change when using the DHCP function. abled and should have a new static IP address assigned to it because its Any PC whoseis being forwarded port must have its DHCP client function dis- can see it. exposing the computer so Internet want to have opened, whileof one computer, DMZ hosting opens all the ports The Port Forwarding feature is more secure because it only you opens the ports conferencing. DMZ hosting forwards at the same time to one PC. all the ports gaming or video- such as Internet service for use of a special-purpose Internet DMZ enable proxy filtering, click the enable proxy filtering, security. Denying Proxy will disable access to any WAN proxy servers. To Block Proxy PPTP Pass-Through, uncheck the box next to through the Router, PPTP Pass-Through is enabled by default. To disable sessions to a Windows NT 4.0 or 2000 server. To allow PPTP tunnels to pass PPTP Block Cookies sites when you interact with them. To click the enable cookie filtering, Block Cookies Block ActiveX ed using this programming language. To enable click the ActiveX filtering, deny ActiveX, youthe risk of not having sites creat- run access to Internet Block ActiveX gramming language. gramming To enable Javaclick the filtering, you the risk of not having sites created using this pro- run access to Internet Block Java The DMZ hosting feature allows one local user to be exposed to the - Point-to-Point Tunneling Protocol is the method used to enable VPN Apply Using the Web Filters feature, you may enable up to four specif- - Java is a programming language for websites. If you deny Java, - Use of WAN proxy may servers compromise the Router's - ActiveX is a programming language for websites. If you box. - A cookie is data stored on your PC and used by Internet box. button. Enable Block Proxy . DMZ Host IP Address

box. PPTP . Instant Wireless Block Java

field.

box. ®

Series System Broadband Router Wireless-G This feature is enabled by Select default. for outside users to workmake it more difficult their way into your network. ing your network Both functions of the Block ports. WAN Request feature The Block WAN Request feature also reinforces your network security by hid- prevent your network from being “pinged,” or detected, by users. other Internet Request Block WAN disabled by default. have saved will be lost when settings are restored. the default This feature is values,tings to their default and then click the Restore Factory Defaults to enabling defaults its remote management capability.from restoring factory The about the features, click unsaved changes on this page, click the To save your changes on this page, click the System screen lets you control a variety of the Router’s general features, By enabling the Block WAN Request feature, you can Click the Help Figure 6-9 button. Yes Cancel Disable button to reset all configuration set- button to reset all configuration utn To get more information button. Apply Apply to disable this feature. button. Any settings you button. To cancel any 37 38 3. On the 2. Click the from file upgrade Download the firmware 1. To the Router’s upgrade firmware: visit ture that you want to use. (To with new about any learn features, new firmware need to download a newer version, unless that version has a new firmware fea- and can be downloaded for free. If the Router already works well, there’s no Upgrade Firmware 5. Click the you extracted. file upgrade firmware Double-click the 4. the file using a file archive utility such as using a file WinZip. the file ton to find the firmware upgrade file you extracted. file upgrade the firmware ton to find www.linksys.com tings before youits firmware. upgrade settings, so make sure you write downconfiguration the Router’s set- Note: the Router, and do NOT press the Reset button. Important: Upgrade Firmware Upgrade Upgrade By upgrading the Router’sBy upgrading you may firmware, lose the Router’s When you are upgrading the firmware, do NOT off turn When youthe firmware, are upgrading .) New firmware versions are posted at New firmware button. button, and follow the on-screen instructions. screen (see Figure 6-10), click the Browse but- Figure 6-10

www.linksys.com Instant Wireless www.linksys.com

, and extract

®

Series . At the command prompt, enter 3. Broadband Router Wireless-G 2. Enter Enter your adapter’s MAC address in the 2. Select 1. is registered with the ISP, follow these instructions: ing installation. To avoid calling your ISP and changing the MAC address that PC’s network adapter, which was connected to your cable or DSL modem dur- Some ISPs require that you register the MACidentification. address of your address is a 12-digit code assigned to unique piece of hardware for A MAC onto the Router. Cloning MAC or select already. A unique password will increase security. passwordchange the Router's default to one of your own, if you haven’t is (default ting, remote location, via the Internet. To disable this feature, keepset- the default Remote Management Write down your adapter’s physical address; this is the adapter’s MAC4. 1. Click the If you address, follow do not know these instructions: your adapter’s MAC To disable MAC address cloning, keepsetting, the default .To save your new settings, click the 3. appropriate computers. Keep setting, the default Through feature, the Router allows IP multicast packets to be forwarded to the sion is sent to multiple recipients at the same time. Using Multicast Pass- Multicast Pass-Through address. the click the Disable Help Disable command Enable 8080 . To enable this feature, select Cancel button. Start You can clone the MAC address of your PC’s network adapter ) on your PC to remotely manage the Router. You must also to disable it. . button, and select in the field provided,in the field and press the utn To about the features, click get more information button. This feature allows you to manage your Router from a IP Multicasting occurs when a single data transmis- ipconfig /all ipconfig Run Apply . Enable A Address MAC button. To cancel your changes, Enable . Then press the , and use the specified port , and use the specified , to support the feature, , to support OK Disable field. button. Enter . key. 39 40 Click the for each activity (see Figure 6-11). Click the displaying the Source IP address and Destination Port Number of the Router The Incoming Access Log gives you a log traffic, of all the incoming Internet or Temporary logs can be accessed by clicking either the between the network select and the Internet, disable the Log function, keepsetting, the default Log should leave this value in the 1200 to 1500 range. MTU size, select have the Router select best MTU for yourconnection. Internet To specify a transmission. Keep setting, for Internet the default et size permitted MTU the Router’s web-based utility. password. After successfully entering the password, you will be able to access in your port) web browser’s IP address, and 8080 represents the specified represent the Router's Internet To remotely manage the Router, enter Outgoing Access Log Outgoing Access The Router can keepfor yourconnection. logs Internet of all traffic To MTU is the Maximum the largest pack- Transmission Unit. It specifies alter the Router’s settings. knows the Router’s IP address and password Internet will be able to Note: Close If the Remote Management feature is enabled, anyone who button to return to the button to return Manual button. , and enter the value is desired (default Address Figure 6-11 field. field. You will be asked for the Router’s System http://xxx.xxx.xxx.xxx:8080 Refresh Enable screen. Disable .

button to update the logs. Instant Wireless Incoming Access Log Incoming Access . To monitor traffic 1400

Auto (the x’s ®

). You). Series

, to unsaved changes on this page, click the To save your changes on this page, click the to the button to return (see Figure 6-12). Click the site accessed,address of the Internet as well as the Service/Port Number used address, the Destination URL or IP IP each activity, it displays the LAN The Outgoing Access Log gives For you a log traffic. of all outgoing Internet Broadband Router Wireless-G about the features, click System Refresh Help screen. Figure 6-12 button. button to update the logs. Click the Cancel utn To get more information button. Apply button. To cancel any Close 41 42 DHCP 9.6..5.TedfutSatn PAddress is 192.168.1.253. IP Starting The default Address must be 192.168.1.2 or greater, but smaller than IP the Starting address is issuing IP addresses. Because the Router’s IP default IP Starting Address Disable server, then click the on yourDHCP server network, or you don’t want a DHCP DHCP Server on yourthere is no other DHCP server network. (the Router), and make server sure of your network PCs to connect a DHCP all option, you server must configure If you choose to enable the Router’s DHCP address to each computer on your network. for your server network. automaticallyA DHCP server assigns an IP a DHCP function. Protocol (DHCP) server The Router can be used as Host Configuration The DHCP radio button (no other DHCP features will be available). screen allows you to configure the settings for Router’sscreen allows you to configure Dynamic DHCP is enabled If you default. by already have factory a Enter a valuewith when to start for the DHCP server Figure 6-13

192.168.1.100 Instant Wireless .

192.168.1.1

® Series

, assigned a new dynamic IP address. is The default address. After the time is up, user will be automatically dynamic IP address. Enter the amount of time, in minutes, that user will be “leased” this user will be allowed dynamic IP connection to the Router with their current Client Lease Time than 253. greater is The default you want to assign IP addresses to. the DHCP server This number cannot be Number of DHCP Users Broadband Router Wireless-G about the features, click unsaved changes on this page, click the To save your changes on this page, click the Refresh MAC Address, and the amount of DHCP client lease time left. Click Address, Figure 6-14). For each PC, the list shows the Client Hostname, IP addresses by the Router (see button to view the list of PCs that are given IP Table Clients DHCP Currently Assigned: Address here. Otherwise, leave this blank. If you interaction with the Internet. use a WINS server, enter that server’s IP WINS servers. tioning DNS Addresses here. The Router will use these for quicker access to func- IP Server Address in one of these fields. You can type up to three DNS er, type that IP Address. If you wish to use anoth- IP Server provide you with at least one DNS lates domain or website addresses or URLs. names into Internet Your ISP will Static DNS 1-3 day. The Windows (WINS) manages each PC’s Naming Service Internet button to display the most current information. button to display information. the most current The Domain Name System (DNS) is how trans- the Internet The Client Lease Time is the amount of time a network (Optional) Enter the maximum number of PCs that Help 50 Figure 6-14 button. . Cancel Click the utn To get more information button. Apply 0 minutes, which means one button. To cancel any HPClients Table DHCP 43 44 Status information is read-only.information The Status depending on the Router’s settings. Note: screen displays the Router’s All status and configuration. current The information providedThe information and buttons available may vary

Figure 6-15

Instant Wireless

®

Series Encryption Function Channel SSID Mode here. Broadband Router Wireless-G Configuration Type Configuration Address MAC Internet Address MAC Wireless-G 54g, Wireless 2.4GHz, Server DHCP here. the Router, as seen by users on your local area network (LAN), are displayed Address and Subnet Mask IP Address MAC LAN for some ISPs. is necessary entry Domain Name for some ISPs. Host Name Current Time displayed here. Firmware Version The SSID of the wireless network is displayed here. The Mode of the wireless network is displayed here. The Channel of the wireless network is displayed here. The Host Name is the name of Router. is necessary This entry The current date and time are displayedThe current here. The status of the Router's DHCP server function is displayedThe status of the Router's DHCP server The MAC Address of the wireless interface is displayed Address of the wireless interface here. The MAC The MAC Address of the Internet interface is displayed interface Address of the Internet here. The MAC is displayed interface here. Address of the LAN The MAC The Domain Name is the name of Router's domain. This The version number of the firmware currently installed is currently The version number of the firmware The type of Internet connection is displayedThe type of Internet here. The status of the is displayedWEP encryption here. The current IP The current Address and Subnet Mask of 45 46 HPRenew DHCP address. IP Internet HPRelease DHCP availablethe first is used. DNS entry settings are common. In most cases, IP Router are shown here. Multiple DNS DNS are displayedInternet, here. GatewaySubnet Mask, and Default Address, as seen by users on the external and Default Gateway Subnet Mask, Address, IP more information about the features, click more information To update the Router’s click the status information, address for the Router. The DNS (Domain Name System) IP Addresses currently used by Addresses currently the IP (Domain Name System) The DNS Click the Click the HPRelease DHCP HPRenew DHCP button to delete the Router’s current button to get a new IP Internet Help button. h otrsI Address, The Router’s IP

Refresh Instant Wireless

button. Toget

® Series

Help click the the Adobe Acrobat Reader to view it. If you do not have the Acrobat Reader, Guide is in Adobe Acrobat Portable Document Fileso you (.pdf) format, need User Guide in PDF format and Adobe Website Format Online User Guide in PDF www.linksys.com Linksys Website the lefthand side of mation about each screen of the web-based utility, click the appropriate link on the Router’sand the application that upgrades For additional infor- firmware. The Broadband Router Wireless-G Help Adobe website screen offers links to all of the Router’s resources technical support , provided you are connected to the Internet. Clicking this link will take you to Linksys’s website, Help link to download it. screen. link opens the Router’s User Guide. The User Figure 6-16 Clicking the Online 47 48 Advanced Tabs If you need to access the basic configuration tabs, click the If you need to access the basic configuration address. IP domain name can be assigned to a dynamic Internet feature, so a fixed DDNS Router. Routing ftp server, mail server, or web server. Port Forwarding usage. Internet Filters your wireless network. Advanced Wireless able to set up these features. additional tabs available.There are five require special configuration. When you click the require special configuration. The following are for advanced instructions users or whose setup needs - Allows you to enable the Dynamic Domain Name System (DDNS) - Enables you to set up filters that blockkinds of - Enablesor allow you to set up filters specific - Enables you to configure the routing mode and settings of - Enables you to configure - Lets you set up publicon your services network, such as an - Allows you to customize data transmission settings for

Advanced Instant Wireless Setup tab, you will be

tab.

®

Series The Broadband Router Wireless-G Shared Key authentication. If you want to use only Shared Key authentication, then select For Shared Key authentication, the sender and recipient use a WEP key for tion, the sender and recipient do NOT use a WEP key for authentication. System or Shared Key authentication to be used. For Open System authentica- Authentication Type values.remain at their default tings. In most cases, the advanced wireless settings on this screen should Advanced Wireless Advanced Wireless . The default is set to The default screen allows you to customize data transmission set- Figure 6-17 Auto , which allows either Open 49 50 and follow these instructions: Filters feature, keepsetting, the default Router-depending on their MAC addresses. To disable the Wireless MAC trol which wireless-equipped PCs may or may not communicate with the Filters Wireless MAC en to receive the broadcast and multicast messages. next DTIM with a Interval value. Its clients hear the beacons and awak- buffered broadcast or multicast messages for associated clients, it sends the dow for listening to broadcast and multicast messages. When the Router has clients of the next win- informing is a countdown(DTIM). field A DTIM field liseconds, indicates the interval of the Delivery Traffic Indication Message Interval DTIM of this value are recommended. Only minor modifications the Fragmentation Threshold too low may result in poor network performance. rate, you mayet error slightly increase the Fragmentation Threshold. Setting before data is fragmented into multiple packets. If you experience a high pack- 2346 Fragmentation Threshold transmission. responds with a Clear to Send (CTS) frame acknowledge the right to begin tiates the sending of a data frame. After receiving an RTS, the wireless station sends Request to Send (RTS) receiving frames to a particular station and nego- RTS threshold size, the RTS/CTS mechanism will not be enabled. The Router are recommended. If a network packet is smaller than the preset modifications range is 0-2347 bytes. Should you encounter inconsistent data flow, only minor RTS Threshold less network. beacon. A beacon is a packet broadcast by the Router to synchronize wire- milliseconds. The Beacon Interval value indicates the frequency interval of the Beacon Interval client. negotiate the best possible connection speed between the Router and a wireless possible data rate and enable the Auto-Fallback feature. Auto-Fallback will keep setting, the default Auto, to have the Router automatically use the fastest your wireless network. You can select from a range of transmission speeds, or 54Mbps. The rate of data transmission should be set depending on the speed Transmission Rate . the maximum size for a packet The range is 256-2346 bytes. It specifies The default valueThe default is This value setting of should remain at its default The default valueThe default is The default setting is The default The Wireless MAC Filters feature allows you to con- This value setting of should remain at its default 100 3 Disable . This value, between 1 and 255 mil- . Enter a value between 1 and 65,535 Auto . To click set up a filter,

. The range is from 1 to Instant Wireless 2347

Enable

® Series . The

, 2. Click the Broadband Router Wireless-G . If you wireless-equipped PCs from communicating want to block specific 1. 3. Click the 4. On the next to equipped PCs to communicate with the Router, then click the radio button accessing the wireless network with the Router, then keepsetting, the default addresses into the ing changes. screen without sav- Advanced Wireless to the return Close changes. Click the cancel your unsaved Cancel changes. Click the ton to save your click the Filter List Figure 6-19). equipped PCs (see of the wireless- button to view a list Client MAC List Note: MAC address). xxxxxxxxxxxx (the x's represent the actual characters of format: Permit only PCs listed to access the wireless network A Address MAC button to Apply button to Edit MAC Filter List For each Wireless screen, but- MAC MAC fields (see Figure 6-18). fields field, the MAC address should be entered in this . If you want wireless- to allow specific button. Enter the appropriate MAC Figure 6-18 Prevent PCs listed from . 51 52 .On the 6. about the features, click unsaved changes on this page, click the To save your changes on this page, click the 5. Click the Address, MAC Address, and For each PC, the list shows—in real time—the Client Host Name, IP List. Wireless your unsaved changes. Click the return to the return Filter PC, uncheck its disable for a specific the MAC address filter PC, click its for a specific MAC address filter changes to the MAC Address Filter List. Click the eunt h A Address Filter List screen. Click the to the MAC return Update Filter List box. MAC Address Filter List screen without saving your changes to the MAC Address Filter Refresh MAC Address Filter List button to display the most current information. Click the button to display information. the most current button to update the MAC Address Filter List and Help Figure 6-19 button. Enable MAC Filter screen, click the Close Cancel screen without saving any changes. button to return to the button to return utn To get more information button. Apply Enable MAC Filter Apply

Cancel Instant Wireless button. To cancel any option. To enable the button to save your Close button to cancel Enable MAC Advanced

button to

®

box. To

Series using network numbers. port You by PCs and set up filters access policies for specific can set up Internet The Broadband Router Wireless-G Filters Filters screen allows youusage. to blockkinds of Internet or allow specific Figure 6-20 53 54 4. On the 3. Click the Enter a name in the 2. Select the policy’s number (1-10) in the drop-down menu. 1. To create or edit a policy, follow these instructions: • • • time specified, the Router can do one or more of following: or MAC addresses. For each policy’s designated PCs, during the daysIP and ferent Internet byAccess Policies their PCs, which for particular are identified Internet Schedule Profile Then follow these instructions: lc eststa s pcfckyod nterULaddresses. keywordsblock websites that use specific in their URL addresses URL block websites with specific block or allow access Internet IP addresses to filter, complete the appropriate addresses to filter, IP addresses into the Enter the appropriate IP prpit A addresses into the appropriate MAC List of PCs Edit List of PCs Enter Profile Name cen pcf C yI drs rMCaddress. address or MAC screen, specify PCs by IP This feature allows you to customize up ten dif- button. Figure 6-21 MAC field. fields. fields. IP fields. If you havefields. a range of

PRange IP Instant Wireless

fields. Enter the fields.

®

Series 10. Set the time when access will be filtered. Select Set the time when access will be filtered. 10. Broadband Router Wireless-G 9. Set the days when access will be filtered. Select Set the days when access will be filtered. 9. If you want keywords to block websites of their that use specific as part 8. 11. Click the click the Delete 12. To create or edit additional policies, repeat steps 1-11. . If you want URL addresses, enter each to block websites with specific 7. 5. Click the . If you want to blockaccess during the desig- the listed PCs from Internet 6. ate days of the week. field. field. You can enter up to six keywords. addresses, enter each keyword in a URL addresses. four URL Click the period. next to address in a cancel your unsaved changes. Click the Enable Internet Access for Listed PCs during the designated days and time, then click the radio button next to for Listed PCs nated days and time, then keepsetting, the default screen. To delete an Internet Access Policy, select the policy’s number, and Delete From Cancel Save Policy Apply button. est lcigb R Address Website Blocking by URL and use the drop-down time boxes to designate a specific . If you want to allow the listed PCs to have access Internet button to save your changes. Click the button to cancel your unsaved changes. button to save your changes and activate the Policy. . Close Website Blocking by Keyword button to return to the button to return 24 Hours Everyday field. field. You can enter up to Disable Internet Access , or check the box Cancel or the appropri- button to Filters 55 56 Summary about the features, click unsaved changes on this page, click the To save your changes on this page, click the here. To disableselect a filter, nected to the Router will no longer be able to access any number listed port PCs con- number fields. into the port numbers you enter the port want to filter Both Filtered Internet Port Range the Name, Days, and Time of Day. To delete a policy, click its box, and then click The Delete Internet Policy Summary , TCP button. Click the , or To of all the policies, click see a summary UDP , depending on which protocols you want to filter. Then Help Close Disable screen will show each policy’s Number, Policy To users by network number, filter port select Figure 6-22 button. button to return to the button to return . Cancel utn To get more information button.

Apply Instant Wireless button. To cancel any Filters Summary

screen. ®

button.

Series The Broadband Router Wireless-G using the DHCP function. a new static IP address assigned to it because its may change when is being forwarded must have its DHCP client function disabled and must have Router will forward those requests to the appropriate PC. Any PC whose port When users send this type of request to your network the via the Internet, applications mayInternet not require any forwarding.) functions such as videoconferencing or online gaming. Some access to perform applications are anytions. (Specialized Internet applications that use Internet web applica- or other specialized Internet e-mail servers, ftp servers, servers, Port Forwarding Port Port Forwarding Note: the MAC address). xx:xx:xx:xx:xx:xx (the x's represent the actual characters of format: For each screen sets up publicon your services network, such as MAC field, the MAC address should be entered in this Figure 6-23 57 Instant Wireless® Series Wireless-G Broadband Router

The following table shows the typical port forwarding settings for common Port TriggeringPort Triggering is used for special Internet applications whose Internet applications. outgoing ports differ from the incoming ports. For this feature, the Router will watch outgoing data for specific port numbers. The Router will remember the Application External Port TCP UDP IP address of the computer that sends a transmission requesting data, so that when the requested data returns through the Router, the data is pulled back to FTP 21 • the proper computer by way of IP address and port mapping rules. Click the Telnet 23 • Port Triggeringbutton to set up triggered ports, and follow these instructions: SMTP 25 • 1. Enter the Application Name of the trigger (see Figure 6-24). DNS 53 • TFTP 69 • Finger 79 • HTTP 80 • POP3 110 • NNTP 119 • SNMP 116 •

Customized ApplicationsIn the field provided, enter the name you wish to give each application.

External PortFor each application, enter the number of the External Ports (the port numbers seen by users on the Internet) in the appropriate fields. (To find out the port range, check your application's documentation.) If there is only one External Port, enter its number in both External Port fields. Figure 6-24 TCP ProtocolClick this checkbox if you want to forward the data transmis- sions that use the TCP protocol. 2. Enter the Outgoing Port Range used by the application. Check with the Internet application for the port number(s) needed. UDP Protocol Click this checkbox if you want to forward the data transmis- sions that use the UDP protocol. 3.Enter the Incoming Port Range used by the application. Check with the Internet application for the port number(s) needed. IP AddressFor each application, enter the IP Address of the PC running the specific application. 4.Click the Applybutton to save your changes. Click the Cancelbutton to cancel your unsaved changes. Click the Closebutton to return to the Port EnableClick the Enable checkbox to enable port forwarding for the relevant Forwardingscreen. application. To save your changes on this page, click the Applybutton. To cancel any unsaved changes on this page, click the Cancelbutton.To get more information about the features, click the Helpbutton. 58 59 60 Routing this feature for the LAN and wireless side, select enable the Dynamic Routing feature for WAN side, select based on the fewest number of hops between the source and destination. To route tables with other routers. the networkThe Router determines packets’ cally adjust to physical changes in the network’s layout and exchange routing Dynamic Routing (RIP) with other routers. (recommended for most users). Select Gateway Operating Mode mode is recommended for most users. On the Routing on which mode you select. Note: , if the Router is hosting your network’s connection to the Internet The screen, you can set the routing mode of Router. Gateway Choose the correct workingChoose the correct mode. Keep setting, the default Routing Dynamic Routing enables the Router to automati- screen and available features will vary depending Figure 6-25 Router if the Router exists on a network

A Wireless LAN & Instant Wireless AN WA

. Toenable . Toenable

®

Series . To save a deletion, click the 3. 2. Click the To save your changes, click the 4. Address is located, select Depending on where the Destination IP 3. Enter the following data: 2. Broadband Router Wireless-G setting, disable the Dynamic Routing feature for all data transmissions, keep the default the feature for both WAN and LAN (including wireless), select . Select a number from the 1. between the Router and another network, follow these instructions: host or network.mation must travel to reach a specific To set up a static route Static Routing 1. From the Entry Delete This For additional static routes, repeat steps 1-4. 5. click the ic route. click the Wireless • • • Disable contact between the Router and network or host. Gateway - is the host portion. address is the network and which portion, portion Destination LAN IP Subnet Mask - the network or host to which you want to assign a static route. Destination IP Address - Cancel Cancel Static Routing or Delete This Entry Delete This . (This feature is not available in Gateway mode.) A static route is a pre-determined pathwayA static route is a pre-determined that network infor- AN WA hsi h Paddress of the gateway device that allows for This is the IP To delete a static route entry, follow these instructions: button. button. from the The Subnet Mask determines whichof a The Subnet Mask determines portion drop-down number of the stat- list, select the entry Static Routing Interface Apply button. h etnto PAdesis the address of The Destination IP Address Apply button. To cancel an unsaved deletion, drop-down menu. drop-down list. button. To cancel your changes, Both LAN & . To 61 62 Show Routing Table about the features, click unsaved changes on this page, click the To save your changes on this page, click the the each entry. Click the address, Subnet Mask, Gateway, are displayed information and Interface for IP valid dynamic and static route entries in use (see Figure 6-26). The Destination Close • • • • acts like a network-necessarysoftware for certain programs). Subnet Mask the network or host to which the static route is assigned. Destination IP Address AN WA is on the Interface contact between the Router and network or host. Gateway is the host portion. address is the network and which portion, portion Destination LAN IP button to return to the button to return (Internet), or (Internet), LAN & Wireless hsi h Paddress of the gateway device that allows for - This is the IP - tells youThis interface whether the Destination IP Address Refresh Click the - whichof a The Subnet Mask determines portion Help Loopback button to display the most up-to-date data. Click Show Routing Table Routing Figure 6-26 h etnto PAdesis the address of - The Destination IP Address button. (internal wired and wireless networks),(internal the Cancel (a dummy network in which one PC screen. utn To get more information button. Apply

button to view all of the Instant Wireless

button. To cancel any

® Series

DDNS 1. Sign up for DDNS service at Sign up for DDNS service 1. enable follow DDNS Service, these instructions: DDNS Service at DDNS service er behind the Router. Before you can use this feature, you need to sign up for It is useful when you are hosting your own website, FTP server, or other serv- IP address. host and domain name to a dynamic Internet lets you assign a fixed The Router offers a Dynamic Domain Name System (DDNS) feature. DDNS Broadband Router Wireless-G . To save your new settings, click the 4. 3. Complete the 2. On the Name, Password, and Host Name information. click the DDNS Cancel To disablekeepsetting, the default DDNS Service, www.dyndns.org User Name screen, select button. , Password Enable Figure 6-27 www.dyndns.org , a DDNS service provider., a DDNS service Apply . , and Host Name button. To cancel your changes, , and write down your User fields. Disable . To 63 64 about the features, click unsaved changes on this page, click the To save your changes on this page, click the Status here. Address Internet IP The status of the DDNS service connection is displayedThe status of the DDNS service here. h otrscretItre PAddress is displayed The Router’s IP Internet current Help button. Cancel utn To get more information button.

Apply Instant Wireless

button. To cancel any

® Series

Common Problems and Solutions G. Restart the computer when Restart asked. G. Click the F. Broadband Router Wireless-G .Click the E. check the Linksys website at tions below to help you solve your problems. If you an answer can’t here, find may occur during the installation and operation of Router. Read the descrip- “Frequently Asked Questions.” Provided are possible solutions to problems that “Common Problems and Solutions” This appendix consists of two parts: Appendix A: .Click the D. Click A. For Windows 98 and Me: You can assign a static IP address to PC by the following performing steps: address on a PC. 1. I need to set a static IP .In B. .In the C. the to its website for the information. provided the DNS IP address, contact youror go ISP to get that information the entry. Enter the Domain). Enter the network device. to 192.168.1.254. Make sure that each IP address is unique for PC or address in the ranges 192.168.1.2 to 192.168.1.99 and 192.168.1.151 an IP other computer on the network connected to the Router. You can only use which IP address of the Router. is the default Click the Specify an IP address adapter. Highlight it and click the installed, you will only see one TCP/IP line with no association to an Ethernet associated with youradapter. Ethernet If you only have adapter one Ethernet The following network components are installed OK Start TCP/IP properties button for the Network window. Gateway OK DNS Host , Settings button in the tab, and make sure the and tab, and in the DNS entry , and Domain . Enter a unique Troubleshooting www.linksys.com Control Panel window, select the TCP/IP properties names (e.g., John for Host and home provided by your ISP. If your ISP has not Properties New Gateway IP address DNS Enabled . Double-click . button. IP address window, and click prompt, enter box, select the that is not used by any Add option is selected. Network button to accept tab, and select 192.168.1.1 TCP/IP-> . Close or , 65 66 .In the C. .Enter the Subnet Mask, E. Enter a unique D. .Toward the bottom of window, select G. Gateway, Enter the Default F. .Right-click the B. Click A. For2000: Windows .Click the H. .Click the B. Click A. For Windows NT 4.0: the computer if asked. Restart I. .Select D. When the window appears, make sure you have selected the correct C. I. Restart the computer if asked. Restart I. Click the H. .Enter the Subnet Mask, E. .Click the G. Gateway, Enter the Default F. ranges 192.168.1.2 to 192.168.1.99 and 192.168.1.151 192.168.1.254. network connected to the Router. address in the You can only use an IP the following IP address Internet Protocol (TCP/IP) addresses adapter you are using, and select the Dial-Up Connections the information. server and click the the the Add Search Order,Host and home for Domain). Under DNS Service click the Adapter ISP. 192.168.1.151 to 192.168.1.254. address in the ranges 192.168.1.2 to 192.168.1.99 and can only use an IP used by any other computer on the network connected to the Router. You Close Add button. Enter the Start Start Specify an IP address (provided by your ISP). Contact your ISP or go on its website to find Components checked are used by this connection utn eetti cinfralDSI addresses given by your button. Repeat this action for all DNS IP for youradapter. Ethernet OK Protocol OK DNS , and enter the button in the , , Settings OK Settings button in the button in the Local Area Connection Local Area tab, and enter the IP address button in the tab, and double-click , and . , and DNS IP address Network 255.255.255.0 255.255.255.0 option. Control Panel Preferred DNS server Internet Protocol (TCP/IP) Properties 192.168.1.1 192.168.1.1 TCP/IP Protocol Properties that is not used by any other computer on the , and click the Control Panel , and enter a unique Local Area Connection Properties window. Host Properties . . and (Router’s IP address). default (Router’s IP address). default that is associated with the Ethernet in the TCP/IP Protocol . Double-click the Use the following DNS server Domain . Double-click Properties DNS Server

option. and Instant Wireless IP address names (e.g., John for button. Select window, and click Alternative DNS . field, and click Network box, highlight Network and that is not

window.

window,

® Series icon.

Use .Enter a unique E. In the D. Broadband Router Wireless-G .Toward the bottom of window, select H. Gateway, Enter the Default G. Enter the Subnet Mask, F. .Click the I. .Right-click the C. .Check your TCP/IP settings. A. 2. I want connection. to test my Internet .Click the B. .Click A. Windows 2000. menus look like previous Windows versions), please follow for the instructions If you interface. (wheredefault are using the Classic interface the icons and The following assume you instructions are running Windows XP with the ForXP: Windows Protocol (TCP/IP) 192.168.1.2 to 192.168.1.99 and 192.168.1.151 192.168.1.254. work connected to the Router. address in the ranges You can only use an IP Click the the information. server addresses Connections adapter you are using, and select the For Windows NT 4.0 address automatically the PCs” for details. Make sure Refer to “Chapter 4: Configure and XP 2000, Me, For Windows 98, • Click the • Restart the computer if asked. • Restart • When the window appears, make sure you have selected the correct • Click • Click the icon. click the from a DHCP server Adapter Start (provided by your ISP). Contact your ISP or go on its website to find This connection uses the following items Start OK Network and Internet Connections OK , and enter the Close for youradapter and set it Ethernet and Protocol OK icon. button in the button in the , IP address Local Area Connection Local Area Settings Control Panel button in the button in the . Click the : tab, and double-click on is selected in the settings. 255.255.255.0 . , and that is not used by any other computer on the net- Preferred DNS server Local Area Connection Properties 192.168.1.1 Internet Protocol (TCP/IP) Properties Properties Control Panel . Network TCP/IP Protocol Properties Properties : . (Router’s IP address). default that is associated with the Ethernet window. button. Use the following DNS server . Double-click the TCP/IP Protocol icon and then the option. box, highlight Obtain an IP address and Alternative DNS window. window, and Obtain IP . Network Network Internet window. 67 68 .In the command prompt, type D. .Open a command prompt. B. .Make sure youconnection settings. Contact your are using the right Internet C. If you need to register the MAC address of youradapter with Ethernet B. Refer to “Problem #2, I want to test my connection” to verify that Internet A. connection. with my Internet address on the Internet 3. I am not getting an IP In the command prompt, type E. .In the command prompt, type C. and press the if youror Internet WAN IP address is 1.2.3.4, you would enter found on the address connection settings. The Router’s Web-basedtion of “Chapter 6: Utility” for details on Internet PPPoE (commonly used by DSL consumers). Please refer to the Setup sec- Address, or ISP to see if yourconnection type is DHCP, Internet Static IP Router’s Web-based Utility” for details. The adapter onto the Router,Ethernet see the System section of “Chapter 6: Your address of your Ethernet Adapter.” If you need to clone the MAC ISP, please see “Appendix D: Finding the MAC address and IP Address for you have connectivity. key. • For • If you do NOT get a reply, there may be a problem with the connection. • If you get a reply, If you the computer is connected to Internet. can- • If you do NOT get a reply, the ping command from a different try com- • If you get a reply, the computer is connected to Router. • If you do NOT get a reply, please check the cable, and make sure • If you get a reply, the computer is communicating with Router. • For Ethernet adapter.Ethernet an IP address automatically inal computer is not the cause of problem. Try the ping command from a different computer to verify that your orig- verify that your original computer is not the cause of problem. not open a webpage, the ping command from a different try computer to puter to verify that your original computer is not the cause of problem. Open field, type type in Windows 98 idw T 2000, Windows NT, and press the command Status Enter cmd and screen of the Router’s web-based utility. For example, . Press the key. Enter . Press the Me , please click key. or The Internet WAN IP Address can be and ping 192.168.1.1 ping www.yahoo.com Enter ping is selected in the TCP/IP settings for your XP Enter , please click olwdb orItre rWNIP followed by your Internet or WAN key or click the Start key or click the and and press the

Run Start Instant Wireless OK and press the . In the and OK button. Enter Run button. ping 1.2.3.4

Open

. In the ®

Obtain Enter Series key.

field, hudsletepolm hneteRue’ Paddress through the should solve the problem. Change the Router’s IP the right location. If you change the Router’s IP address to 192.168.2.1, that to address), the Router will have routing information difficulties the VPN IP and your local LAN IP address is 192.168.1.X (X the same number used in assigns an IP address 192.168.1.X (X is a number from 1 to 254) VPN server between the VPN IP address and your local IP address. For example, if your Change the IP address for Router to another subnet avoid a conflict patibility with the NAT standard. are incompatible with the Router. AH has limitations due to occasional incom- VPNs that use IPSec and AH (Authentication Header known as protocol 51) of your depending on the specifics VPNs. through the Router; however, simultaneous IPSec sessions protocol 50) authentication will workAt least one IPSec session will work fine. VPNs that use IPSec with the ESP (Encapsulation Security Payload known as pass-through and/or PPTP enabled. address Access the Router’s web by interface going to 5. I can’t get my Virtual Private Network (VPN) working through the Router. Refer to “Problem #10: I need to remove the proxy settings or the dial-up D. Set a static IP address on your system; refer to “Problem #1: I need to set a C. Refer to “Appendix D: Finding the MAC Address and IP address for Your B. Refer to “Problem #2, I want to test my connection” to verify that Internet A. 4. I am not able to access the Setup page of Router’s web-based utility. Broadband Router Wireless-G .Tr f h optr otr n al/S modem. Wait Turn 30 seconds, off the computer, Router, and cable/DSL F. Make sure the cable connecting from your cable or DSL modem is con- E. Make sure you have the right cable.column has Check to see if the Internet D. o-pwno frPPEusers).” pop-up window (for PPPoE address.” static IP Mask, Gateway, and DNS. Ethernet Adapter” to verify that your computer has an IP Address, Subnet your computer is properly connected to the Router. Status on the Router,and then turn cable/DSL modem, and computer. Check the Router’s web-based utility shows a valid IP address from your ISP. nected to the Router’s port. Internet Verify that the Status page of a solidly lit Link/Act LED. of the Router, and go to the a fteRue’ e-ae tlt osei o e nI address. tab of the Router’s web-based utility to see if you get an IP Security tab. Make sure you have IPsec http://192.168.1.1 may be possible, or the Setup tab IP 69 70 .Enter the E. Check the D. Enter the C. Enter any B. T evr2 o2 9.6..0 X X X 192.168.1.101 X 192.168.1.102 192.168.1.102 192.168.1.100 X X X Enable X X X X IP Address When you click the have completed the configuration, UDP 110 to 21 to POP3 (incoming) 25 to 80 to TCP SMTP (outgoing) FTP server Port External Web server Application Customized Check the F. .Access the Router’s web-based utility by going to A. will be setting up web, ftp, and mail servers. forwardingthese steps to set up port through the Router’s web-based utility. We by viewing the documentation provided you with the server installed. Follow (POP3 incoming) are used for the mail server. You can get more information 21 (FTP) is used for FTP,port 110 25 (SMTP outgoing) and port and port numbers they are using. Forport 80 (HTTP) is used for web; example, port To like use a server a web, ftp, or mail server, you need to know the respective behind my Router and make it available6. I need to set up a server to the public. Check the Linksys website at for more information applications” for details. game hosting or use other Internet is connecting to the IPSec server. Refer to “Problem #7, I need to set up online Your VPN may 500/UDP packets to be passed the computer that require port must be unique within the network. address 192.168.2.Y (Y being any number from 1 to 254). Note that each IP work device on the network, you need to change its IP address accordingly to of the web If you interface. assigned a static IP address to any computer or net- if you have a web server, you would enter the range 80 to 80. example below: address. Adapter” for details on getting an IP Address for Your Finding the MAC Address and IP Ethernet “Appendix D: is 192.168.1.100, youprovided. would Check enter 100 in the field to go to. Forserver example, if the web server’s adapter IP address Ethernet IP address External Port range IP address name Enable protocol of the Router. Go to the you want to use for the Customized Application. option for the port services you services wantoption for the port to use. Consider the you will be using, TCP and/or UDP. of the PC or network device that you want the port of the service you of the service are using. For example, Advanced => Port Forwarding www.linksys.com http://192.168.1.1

Apply Instant Wireless button.

.

® Series or the

tab. P PE 0 o50X1218110X 192.168.1.100 X X X 192.168.1.100 192.168.1.102 X 192.168.1.105 X Enable X X X IP Address X When you click the have completed the configuration, 7777 to 27900 500 to 27015 to UDP 5631 to VPN IPSEC TCP PC Anywhere Halflife Port External UT Application Customized Check the F. Enter the E. Enter the C. Broadband Router Wireless-G .Check the D. .Access the Router’s web by interface going to A. application: Internet game hosting or use a certain online game or application you want to use. Follow these steps to set up online to use is go the website on whatservices of the get the information port er. applications you This also applies to the Internet are using. The best way to comput- to set up the Router deliver incoming packets or data to a specific you want application. to host an online game or Internet This would require you without doing any forwarding port or DMZ hosting. There may be cases when If you want to play applications, most will work online games or use Internet applications. 7. I need to set up online game hosting or use other Internet .Enter any B. example below: address. Adapter” for details on getting an IP Address for Your Finding the MAC Address and IP Ethernet “Appendix D: is 192.168.1.100, youprovided. would Check enter 100 in the field to go to. Forserver example, if the web server’s adapter IP address Ethernet 7777 to 27900. if you want to host Unreal Tournament (UT), you would enter the range address of the Router. Go to the External Port range IP address name Enable protocol you want to use for the Customized Application. option for the port services you services wantoption for the port to use. Consider the you will be using, TCP and/or UDP. of the PC or network device that you want the port of the service you of the service are using. For example, Advanced => Port Forwarding http://192.168.1.1 Apply button. or the tab. IP 71 72 .Select D. .Click the C. Enter a B. Go to the C. Disable or remove the entries you have entered for forwarding. Keep this B. .Access the Router’s web-based utility by going to A. you set for DMZ hosting.) Follow these steps to set DMZ hosting: warding, then the Router will send data to whichever PC or network device number that the data enters from does not havesettings. If the port for- port byother words, the forwarding data that enters the Router will be checked first fully use DMZ hosting, since forwarding has priority over DMZ hosting. (In use. Make sure you disable all the forwarding entries if you want to success- tion requires too many or when ports youto are not sure whichservices port DeMilitarized Zone (DMZ) hosting. This option is available when an applica- to function properly, using consider exposing one PC to the Internet If you are havinggetting any game, server, Internet difficulties or application or application to work. server, game, 8. I can’t get the Internet .Access the Router’s web-based utility by going to A. the followinging settings, then perform steps: and then releasing it. If you are still getting prompted for a password when sav- by default pressing the Reset the Router to factory ing settings to the Router. or the password prompt always appears when I am sav- 9. I forgot my password, click the Once completed with the configuration, same password in the second field to confirm the password. same passwordto confirm in the second field Security in case you information want to use it at a later time. IP address IP address details on getting an IP address. Address for Your Address and IP Ethernet Adapter” for Finding the MAC the NAT technology for that computer. Please refer to “Appendix D: address Enable different password of the computer you want exposed to the Internet. This will bypass tab. Apply Setup => Security of the Router. Go to the of the Router. password Enter the default next to button. DMZ . In the in the tab. M otI Address Host IP DMZ Advanced => Port Forwarding Router Password Apply Reset

http://192.168.1.1 http://192.168.1.1 Instant Wireless button for 10 seconds button. admin field, and enter the field, enter the

, and click the

® Series or the or the tab.

IP A. Start Start A. Netscape 4.7 or higher For Broadband Router Wireless-G .Make sure you have B. Linksys website at and download the latest firmware with the latest features, you need to go the the firmware In order to upgrade 12. I need to upgrade the firmware. ration. settings. In other words, configu- the Router will revert to its original factory password, default forwarding, and other settings on the Router to factory Hold the default. I need to set the Router factory 11. To start over, Close all the windows to finish. C. .Click the option E. Click the D. Click the C. Click the B. .Go to the Linksys website at A. these steps: .To follow the steps in System section found the firmware, upgrade B. .Click A. For Microsoft Internet Explorer 5.0 or higher is set to connect directly to the LAN. to verify that you do not have any proxy settings and that the browser you use does not need any proxy settings to gain access. Please follow these directions Because the Router is gateway connection, the computer for the Internet If you have proxy settings, you need to disable these on your computer. up window. and I need to remove the proxy settings or dial-up pop- 10. I am a PPPoE user, pop-ups for PPPoE users. Proxies screen. Catr6 The Router’s Web-based“Chapter 6: Utility.” latest firmware. Netscape Navigator Reset Start . OK LAN settings Connections , button for 10 seconds and then release it. the This will return Settings button to go back the previous screen. Never dial a connection , and Direct connection to the Internet tab. button and remove anything that is checked. : Control Panel , and click http://www.linksys.com Edit . Double-click . This will remove any dial-up , : Preferences www.linksys.com Internet Options and download the , selected on this Advanced . Follow , and . 73 74 A. If the firmware upgrade failed, upgrade use the If the firmware A. and/or make the Diag LED stop flashing: the firmware upgrade could haveThe upgrade for a number of reasons. Follow failed these steps to and/or the Diag LED is flashing. 13. The firmware upgrade failed, .Click the E. Click the D. On the C. .Enter the B. .To connect to the Router, go to the web browser, and enter A. tion periodically. nection. This may not always work, so you may need to re-establish connec- up connection to the Internet. There is a setup option to “keep alive” the con- after a period of inactivity,disconnect the service phone dial- just like a normal PPPoE is not actually a dedicated or always-on connection. The DSL ISP can 14. My DSL service’s PPPoE is always disconnecting. Performusing the the upgrade TFTP program or the Router’s web-based C. Set a B. .You may see the login status display as F. If the connection is lost again, follow steps E to G re-establish connection. Click the G. Period http://192.168.1.1 utility through its are using: address.” Use the following IP address settings for the computer you ic IP and TFTP program, firmware and follow the pdf’s instructions. Open the pdf that was downloadedalong with the firmware). along with the refresh the screen, until you see the login status display as Gateway: 192.168.1.1 Subnet Mask: 255.255.255.0 192.168.1.50 IP Address: static IP address option at Setup password Status Apply Apply screen, select the option button. button to continue. tab, and click the 20 System or the , if asked.password (The default is (seconds). on the PC; refer to “Problem #1, I need to set a stat- Paddress IP tab. Connect of the Router. TFTP Connecting Keep Alive button.

program (it was downloaded Instant Wireless . Press the , and set the admin Connected .)

F5 ® Redial

key to Series

. 16. The Diag LED stays lit continuously. values, one value at a time, in this order, until your problem is solved: continue, change the Size to differentIf your values. difficulties Try this list of Broadband Router Wireless-G 7 hnIetraULo Pades I get a time-out error or am prompted to retry. 17. When I enter a URL or IP address, Click the E. .Look for the MTU option, and select D. .Click the C. Enter the password, if asked.password (The default is B. .To connect to the Router, go to the web browser, and enter A. lowing steps: mended to use MTU 1492. If youthe fol- are havingperform some difficulties, the MTU is set at 1500. Fordefault, most DSL users, it is strongly recom- The Maximum Transmission Unit (MTU) setting may need to be adjusted. By Internet. or I am getting corrupted data from the or VPN, web, 15. I can’t access my e-mail, http://192.168.1.1 • If the Router is configured correctly,• If the Router is configured check yourconnection Internet correctly,• If the PCs are configured but still not working, check the • Check if other PCs work. If they do, ensure that your workstation’s IP set- • poweredThe Diag LED lights up when the device is first up. Meantime, 255.255.255.0. Address: 192.168.1.50 and Subnet Mask: following settings, IP address to the computer,Try the firmware. using the and then upgrade working properly. by assigning a static IP Try to flash the firmware If the LED remains lit after this time, deviceis working is not fine. offishing the checking procedure, LED turns to show that the system the system will boot up itself and check for proper operation. After fin- the Router to verify a direct connection. (DSL/cable modem, etc.) to see if it is working correctly. You can remove connections.) check its settings. (If you cannot connect to it, check the LAN and power Router. Ensure that it is connected and powered on. Connect to it and the computer that is havingRestart a problem. (IP tings are correct Gateway,Address, Subnet Mask, Default and DNS). 1300 1362 1400 1462 Apply System button to continue. tab. or the Paddress IP Manual of the Router. . In the Size admin field, enter .) 1492 . 75 76 Frequently Asked Questions Router. over the auto-sensing Fast 10/100 switch Ethernet on the LAN side of the speed of your broadband connection. 100Mbps The Router also supports however, port; Internet connection speed will vary depending on the Internet The Router’s on its hardware up to 100Mbps Ethernet design supports current connection of the Router support 100Mbps Ethernet? Does the Internet to a LAN. LAN to connections, but those protocols cannot connect from the Internet munications protocol used on Apple and Macintosh networks, can be used for used only to route messages from one node another, and AppleTalk, a com- global standard for communications. IPX, a NetWare communications protocol No. TCP/IP is the only and has become the protocol standard for the Internet Does the Router support IPX or AppleTalk? and the LAN. Plug the Router into cable/DSL modem’s port. Ethernet In a typical environment, the Router is installed between the cable/DSL modem Where is the Router installed on network? Yes, it is a built-in feature that the Router automatically enables. Is IPSec Pass-Through supported by the Router? up to 253 IP addresses. The Router will support What is the maximum number of IP addresses that the Router will support? 18. The Full/Col LED keeps flickering continuously. • Make sure that your browser is set to connect directly and that any dial- address provided by the • ManuallyTCP/IP settings with a DNS configure • There may be interference with other network devices. Try removing network 5 Ethernet • Check the Category cable and its RJ-45 connectors. each network device the cause. one at a time to determine other PCs or network devices to see if the problem persists. Eliminate Direct connection to the Internet Advanced dial a connection then the up is disabled. For Explorer, Internet click your ISP. Connection , and Proxy . For Netscape Navigator, click tab. Explorer is set to Make sure that Internet . Make sure that Netscape Navigator is set to . Tools

, Instant Wireless Internet Options Edit ,

Preferences ®

Never Series , and

, tab-> Yes, click with the following fix: Does the Router support ICQ send file? or troubleshooting of any non-Windowsfiguration operating systems. Yes, but Linksys does not, at this time, provide for setup, con- technical support or Windows XP? Windows NT, Windows 2000, Windows Millennium, 98, Windows Does the Router support any operating system other than Windows 95, addresses behind this single address provided by the ISP. TCP/IP address is provided by the ISP. The user may have many private with low accounts, such as DSL or cable cost Internet modems, when only one NAT Furthermore, transmitted on the Internet. allows the Router to be used of security since the address a PC connected to private LAN is never vate LAN to one public address that is sent out to the Internet. This adds a level Network Address Translation (NAT) translates multiple IP addresses on the pri- Broadband Router Wireless-G How do I get For example, Unreal Tournament multi-login supports with one public IP. It depends on which network game or what you kind of game server are using. with just one public IP address? and play simultaneously Can multiple gamers on the LAN get one game server above) to the IP assigned Router from your and ServerName ISP. set the ListenPortof the server.ini to 8080 (to match the mapped port file, admin. You may have to disable this.) Then in the [UWeb.WebServer] section forward (Port another port. 8080 usually works well but is used for remote forwarding range of 7777 ~ 27900. If you want to use the UT Server Admin, 7780, 7781, and 27900 to the IP address of server. You can also use a port a static IP for each of the LAN computers and forward 7777, 7778, 7779, ports If you have a dedicated Unreal Tournament you running, need to create server I need to do? but others on the LAN cannot join. What do I set up an Unreal Tournament Server, to a user behind the Router. out to server. x would be 6, 7, 8, and on up. This lets multiple computers connect to the same need to have command line; the 2700x” added to the HL shortcut “+clientport for Half-Life is 27005. client port The default The computers on your LAN What is , and check 80 One problem: Network Address Translation

seconds in the firewall setting. seconds in the firewall user can then send a file The Internet afLf:Team Fortress Half-Life: I am behind a firewall or proxy Version 1.0.1.6 won’t let multiple computers with the ICQ menu -> preference -> connections to work with the Router? and what is it used for? . time- Then set the firewall 77 78 on the Linksys website, release that is readily availablethen on. Obtain and flash the latest firmware on and off.turns Reset your cable or DSL modem by powering the unit off and Reset the Router by holding down the reset button until Diag LED fully what can I do? If all else fails in the installation, Check our website at tab.)Properties Make sure that your proxy setting is disabled in the browser. (Please look at the Network Control Panel in youradapter’s Ethernet Advanced “Auto-negotiate” measure. feature of youradapter as a temporary Ethernet Force off youradapter to 10Mbps or half duplex mode, and turn Ethernet the being displayed on the screen. What do I need to do? or nothing but junk characters are The web page hangs; downloads are corrupt, using another FTP program. client, try when youwith your downloadFTP files If you a file are experiencing corrupted How can I block corrupted FTP downloads? puter. com- in the DMZ. Just forward 27015 to the local IP address of server port lem with 1.0.1.3). does not need to be as hosting games, the HL server As far same CD key connect at the same time, even if on the same LAN (not a prob- Router’s use the firmware, www.linksys.com are posted on the Linksys website upgrades at All Linksys firmware How will I be notified of new Router firmware upgrades? your browser. Check with your browser documentation, and make sure that Netscape Navigator Explorer. or Internet Or remove the dial-up settings on You may have to remove the proxy settings on yourbrowser, Internet e.g., I am not able to get the web configuration screen for the Router. What can I do? 4.0 or Netscape Navigator 4.0 or higher for Macintosh. Yes, but the Router’s setup pages are accessible only Explorer through Internet Will the Router function in a Macintosh environment? connection stability. your rupt current will not enhance the quality or speed of yourconnection, and may Internet dis- would like to use. Downloading version of Router firmware a more current newer version, unless that version contains new firmware features that you Router’s connection is working Internet well, there is no need to download a , where they can be downloaded for free. To the upgrade www.linksys.com www.linksys.com System tab of the Router’s web-based utility. If the for more information.

.

Instant Wireless

®

Series possible, depending on the specifics of your possible, depending on the specifics VPNs. Broadband Router Wireless-G will work through the Router; however, simultaneous IPSec sessions The maximum number depends on many factors. At least one IPSec session What is the maximum number of VPN sessions allowed by the Router? Port Forwarding, Routing, and DDNS. The Router’s advanced features include Advanced Wireless settings, Filters, What are the advanced features of the Router? Ethernet. The Router is compatible with virtually any cable or DSL modem that supports Which modems are compatible with the Router? No, the Router must work in conjunction with a cable or DSL modem. Does the Router replace a modem? Is there a cable or DSL modem in the Router? can only forward 10 ranges of ports. Theoretically, the Router can establish 520 sessions at the same time, but you How many ports can be simultaneously forwarded? and Ethernet Any that supports TCP/IP is compatible platform with the Router. compatible? Is the Router cross-platform The Router allows PPTP packets to pass through. Does the Router pass PPTP packets or actively route PPTP sessions? No. does the exposed user share the public IP with Router? If DMZ Hosting is used, Address for Your Address and IP Ethernet Adapter.” Finding the MAC address, see “Appendix D: IP DMZ Hosting. To get the LAN recommended that you set your computer with a static IP if you want to use Some applications require multiple the Internet. to be open. It is TCP/IP ports Demilitarized Zone (DMZ) allows one IP address (computer) to be exposed to What is DMZ Hosting? sure that Netscape Navigator is set to Netscape Navigator, click tab. Explorer is set to Make sure that Internet For Explorer, Internet click sure that your browser is set to connect directly and that any dial-up is disabled. your browser is set to connect directly and that any dial-up is disabled. Make Edit Tools , , Preferences Internet Options Direct connection to the Internet , Never dial a connection Advanced , and then the , and Proxy Connection may . Make . . For be 79 80 point. to communicate with a wired network through a wireless access configured When a wireless network mode, the wireless network is set to infrastructure is What is infrastructure mode? wireless network will not communicate with any wired network. to communicate directly with each other.puters are configured The ad-hoc When a wireless network is set to ad-hoc mode, the wireless-equipped com- What is ad-hoc mode? Power Management • Fragmentation • RTS/CTS feature • Automatic Rate Selection • Multi-Channel Roaming • CSMA/CA plus Acknowledge protocol • the followingThe product supports IEEE 802.11b functions: What IEEE 802.11b features are supported? ating frequency of 2.4GHz. 802.11b standard states a maximum data transfer rate of 11Mbps and an oper- nicate, provided that the hardware complies with the 802.11b standard. The allows wireless from different to commu- manufacturers It is one of the IEEE standards for wireless networks. The 802.11b standard What is the IEEE 802.11b standard? operation over a network. a network. Consult the application’s if it supports documentation to determine This will depend on whether or not the application is designed to be used over Can I run an application from a remote computer over the wireless network? Yes. softwareThe Router has DHCP server built-in. server? Can the Router act as my DHCP you are using mIRC. Under the How do I get mIRC to work with the Router? Consult your ISP to obtain this information. How can I check whether I have static or DHCP IP Addresses? Port Forwarding

tab, set port forwardingtab, set port to 113 for the PC on which

Instant Wireless

®

Series parameters of the spread-spectrum signal being broadcast. If a receiverparameters of the spread-spectrum is not effect, louder and thus easier to detect, provided that the receiver knows the case of narrowband transmission, but the trade-off produces a signal that is, in integrity, and security. In other words, more bandwidth is consumed than in the tions systems. It is designed to trade off for reliability, bandwidth efficiency oped by for use in reliable, the military secure, mission-critical communica- technologySpread Spectrum is a wideband radio frequency technique devel- What is Spread Spectrum? high-speed wireless capabilities in the hands of users around globe. worldwide. This presents a truly revolutionary to place convenient opportunity in the vicinity of 2.4 GHz, particular, Spectrum is being made available and Medical) band. for unlicensed use in the ISM (Industrial, Scientific outside of the U.S.The FCC and their counterparts have set aside bandwidth What is ISM band? access point, it then re-registers, and the communication process continues. a new a newfrom its original access point, it undertakes search. Upon finding it should seek a new one. When a node no longer receives acknowledgment whether tem to determine it is in touch with the original access point or whether As the user moves on, the end node’s RF transmitter regularly checks the sys- host computer can then be transmitted up and down the backbone. access point and registers its address. Communications between end node and the node next selects the right wired backbone. Based on that information, by each access point and the distance of to being carried as signal strength and quality,factors as well as the message load currently takes a search for the best possible access to the system. First, it evaluates such that links access points and nodes. In such a system, the user’s end node under- these functions simultaneously requires a dynamic RF networking technology with the wireless network even when not actually transmitting data. Achieving always acknowledge receipt of each message. Each node must maintain contact number of different functions. Each node and access point, for example, must To achieve seamless connectivity, true a the wireless LAN must incorporate erage area. sure that it is the same channel number with access point of dedicated cov- gle access point. Before using the roaming function, workstation must make ously while moving freely than that covered throughout an area greater by a sin- Roaming is the ability of a portable computer user to communicate continu- What is roaming? Broadband Router Wireless-G 81 82

Router and each Access Point. different channels (frequencies); in other words, assign a unique channel to the erated. To avoid interference, be sure to set the Router and all Access Points to to one another, and they are set on the same channel, interference will be gen- If you are using the Router and one or more Access Points in close proximity How do I avoid interference? device stays for the network. the same, making it a valuable identifier change every time a computer logs onto the network, the MAC address of a addresses, which can poses, this number is usually Unlike IP permanent. that allows the network to identify it at the hardware level. For all practical pur- to any networkingmanufacturer Ethernet device, such as a network adapter, The Media Access Control (MAC) address is a unique number assigned by the Address? What is a MAC as described in the IEEE 802.11 standard. or 128-bit shared key algorithm, WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 64-bit What is WEP? (WEP) to enhance security and access control. ture of scrambling. On the software side, WLAN offers function the encryption technology,Direct Sequence Spread Spectrum it has the inherent security fea- WLAN features two-fold protection in security. On the hardware side, as with be intercepted while it is being transmittedWill the information through the air? rowband receivers. appears as low power wideband noise and is rejected (ignored) by most nar- data without the need for retransmission. To an unintended receiver, DSSS mission, statistical techniques embedded in the radio can recover the original be recovered. Even if one or more bits in the chip are damaged during trans- code). the probability that original data can The longer the chip, greater for each bit to be transmitted. is called a chip (or chipping This bit pattern (DSSS) generates a redundant bit pattern Direct-Sequence Spread-Spectrum an unintended receiver, impulse noise. FHSS appears to be short-duration Properly synchronized, the net effect is to maintain a single logical channel. To that is knownchanges frequency in a pattern to both transmitter and receiver. that Frequency-Hopping (FHSS) uses a narrowband carrier Spread-Spectrum What is DSSS? What is FHSS? And what are their differences? (DSSS) and Frequency (FHSS). Hopping Spread Spectrum noise. There are two main alternatives, Direct Sequence Spread Spectrum tuned to the right frequency, signal looks like background a spread-spectrum

Instant Wireless

®

Series Press the reset the Router? How do I Broadband Router Wireless-G There are eleven available channels, ranging from 1 to 11 (in North America). How many channels/frequencies are available with the Router? used on all nodes of your wireless network. vice versa). Verify that the same WEP keys and levels (64 or 128) are being WEP is probably enabled on the Router, but not on your wireless adapter (or but I cannot see my network. I have excellent signal strength, affecting only one channel. You may using different also try channels, as this may eliminate interference range in your environment. same room and move it away the maximum in small increments to determine with the Router and your signal and reduce range. Start wireless PC in the signal loss. Lead glass, metal, concrete floors, water and walls will inhibit the obstacle placed betweening. Every the Router and a wireless PC will create There is no way to know the exact range of your wireless network without test- How do I resolve issues with signal loss? settings. the Router to its default fyu usin r o drse ee refer to the Linksys website, If your questions are not addressed here, Reset button on the back panel for about ten seconds. This will reset www.linksys.com . 83 84 www.linksys.com with wordsVirtually or characters (e.g., addresses are configured all Internet ISP’s E-mail & Appendix B: Internet. ForInternet. example, addresses, whichaddresses on the are the true addresses are assigned to IP pnig them. “pinging” words. addresses of your ISP’sYou by servers the IP and web can determine web the true addresses behind yourThe solution is to determine ISPs code to accept their abbreviated addresses. server by yourInternet. ISP This happens because the Router has not been configured Router may have problems sending or receiving mail and accessing the home with single wordsmail and web ( addresses are configured server web If your browserISP’s or e-mail configurations. e- or codes on their users’ addresses to single words their server ISPs will shorten Because of this, certain IP and web addresses, however, can sometimes be long and hard to remember. address; this is called the Domain Name System (DNS). home page every time. that translate the URL to an IP There are servers change). Type it into your web browser and you will wind up at the Linksys , pop3 t. ahrta hl nentadesso Paddresses, the , etc.) rather than wholeaddresses or IP Internet steps addresses, you Important , prior www.yahoo.com If you don’t have your ISP’s: web and e-mail IP www.yahoo.com ocnetn h Router to your network. to connecting the must How to Ping Your either get them from your ISP or follow these Web Addresses , etc.) In actuality, however, these Internet

is 66.218.71.87 (this IP address may Instant Wireless www

, ®

e-mail Series

, 2. Click Power on the computer and cable or DSL modem, and restore the net- 1. address. ping its IP your step to determining ISP’sThe first web address is to and e-mail server Address Pinging an IP Step One: Broadband Router Wireless-G . Write down by the IP address returned the ping command (in example 4. Approximate round trip times in milli-seconds: Ping statistics for 24.53.32.4: Reply from 24.53.32.4: bytes=32 time<10ms TTL=128 Reply from 24.53.32.4: bytes=32 time<10ms TTL=128 Reply from 24.53.32.4: bytes=32 time<10ms TTL=128 Reply from 24.53.32.4: bytes=32 time<10ms TTL=128 Pinging mail [24.53.32.4] with 32 bytes of data: C:\>ping mail . At the DOS command prompt, type 3. work configuration set bywork your ISP if you configuration have since changed it. mail address of the server address is the actual IP 24.53.32.4.). This IP above: loss), Microsoft Network’s e-mail server, will be displayed. the for which you’re trying to find an IP address is configured as address is configured for which you’re an IP to find trying bring up the DOS window. Minimum = 0ms, Maximum Average 0ms Packets: Sent = 4, Received Lost 0 (0% Enter , or any other word or value you have pinged. Start key. such as the following Information data, taken from a ping of and then Run . Type Figure B-1 command ping mail in the (assuming that the location Open field. This will This field. mail ). Press 85 86 application. the Router should have no problemthrough that Internet accessing the Internet Once you have address, server address with the true replaced the brief server Replace your ISP’s abbreviated address with this extended server web 3. Write down the web by address returned the ping command. (In exam- 2. Approximate round trip times in milli-seconds: Ping statistics for 24.53.32.4: Reply from 24.53.32.4: bytes=32 time<10ms TTL=127 Reply from 24.53.32.4: bytes=32 time<10ms TTL=127 Reply from 24.53.32.4: bytes=32 time<10ms TTL=127 Reply from 24.53.32.4: bytes=32 time<10ms TTL=127 Pinging mail.msnv3.occa.home.com [24.53.32.4] with C:\>ping -a 24.53.32.4 command prompt, type At the DOS 1. just pinged. address you the web below address assigned to the IP the instructions to find your system with web addresses rather than IP addresses. Followconfiguring ever, usually don’t. Because of this, you’re likely to have fewer problems by addresses change all the time. Web addresses, how- it may IP not be permanent. above address returned would work as your address, e-mail server While the IP a Web Address for Pinging Step Two: application, etc.). application (web Internet browser,address in the corresponding e-mail web address will not. address of While the IP address you just pinged. web address is the web address assigned to the IP ple in Figure C-2, loss), 32 bytes of data: will be displayed. address yousuch as the following just pinged. Information data is the IP Minimum = 0ms, Maximum Average 0ms Packets: Sent = 4, Received Lost 0 (0% mail.msnv3.occa.home.com mail could conceivably change, it is likely that this Figure B-2 ping -a 24.53.32.4

stewbades)This is the web address.) Instant Wireless

, where 24.53.32.4

®

Series Router’s WEP settings, follow these instructions: adapter, refer to your wireless adapter’s documentation. To the configure For the on howWEP settings of your instructions PC’s to configure wireless • • • • implementations: In addition to enabling WEP, Linksys also recommends the following security WEP encryption. Make sure your wireless network is functioning before attempting to configure 64-bit port WEP. encryption. All wireless devices compliant with the 802.11b standard will sup- to this level when referring of “64-bit” use either name. Linksys uses the term 24 = 64). Wireless vendors mayalong with a 24-bit Initialization Vector (40 + has been called 40-bit because it uses a secret key encryption of WEP encryption. This level encryption. This is simply for 64-bit another term WEP used in conjunction with YouWEP may also have “40-bit” heard the term decreased network performance. levels of security, they but due to the complexity may of the encryption, mean use an identical 64-bit or 128-bit key. levels Higher encryption mean higher data transmission. To decode a data transmission, each point in network must to provide access control to your network security for every and encryption uses 64-bit or 128-bit keys to protect your wireless data communications. WEP An acronym for method used Wired is an encryption Equivalent Privacy, WEP Wireless Security Appendix C: Broadband Router Wireless-G of “Chapter 6: The Router’s Web-Based Utility”) Enable (see the “Advanced wireless MAC address filtering Wireless” section key regularly Change the WEP Change the SSID on a regular basis “linksys” Change the SSID from default of WEP encryption. essential for router operation; however, Linksys recommends the use Note: WEP encryption is an additional data security measure and not encryption WEP Configuring 87 88 .You will see the 2. On the 1. .Instead of manually entering WEP keys, you can enter a Passphrase in the 4. For the 3. to button next to After you enter the Passphrase, click the ucts, enter the WEP key manually on the non-Linksys wireless products.) products only. If you want to communicate with non-Linksys wireless prod- characters. (This Passphrase function is compatible with Linksys wireless keys. It is case-sensitive and should not be longer than 16 alphanumeric Passphrase they mayof the encryption, decrease network performance. levelsencryption offer higher levels of security, but due to the complexity tion you wish to use, Router sends data. Make sure the receiving device is using the same key. keys. Default TransmitKey the same Passphrase or WEP key. Note: Setup E Encryption WEP All Wireless-G and 802.11b devices in your network must use field. This Passphrasefield. is used to generate one or more WEP tab of the Router’s web-based utility, click the WEP 2.4GHz, 54g, Wireless-G (WEP) . Then click the 64-bit 10 hex digits , select which WEP key (1-4) will be used when the drop-down box, select the level of WEP encryp- Figure C-1 Edit WEP Settings Edit WEP Generate or 128-bit 26 hex digits

screen (Figure C-1). Next Instant Wireless button to create WEP button. Enable

. Higher

® Series

radio .Check all the values, and click the 6. Broadband Router Wireless-G .WEP keys enable youscheme for wireless LAN to create an encryption 5. hexadecimal characters are “0”-“9” and “A”-“F”. then the key must be exactly 26 hexadecimal characters in length. Valid hexadecimal characters in length. If you are using 128-bit WEP encryption, If you are using 64-bit then the keyWEP encryption, must be exactly 10 all zeroes. These are not valid key values.) page, click the to the and return of values in each transmissions. If you are not using a Passphrase, then manually enter a set click the Help Cancel button. Setup Key field. (Do not leave blank, and do not enter a keyfield. field cen To cancel any changes you’vescreen. entered on this utn To about the features, get more information button. Apply button to save your WEP settings 89 90 2. When the IP Configuration window adapter appears, select the Ethernet When the IP Configuration 2. 1. Click on and Me: 98, For Windows 95, 95, 98, Me, NT, 2000, and XP. address for your adapter in Windows the MAC address or IP appendix to find forwarding, and DMZ. FollowIP address is used for filtering, the steps in this ISP. You the IP address of your computer’s can also find adapter. Ethernet The or MACto do either MAC address cloning for the Router and address filtering the MACThis section describes how address for youradapter to find Ethernet Ethernet Adapter Address and IP Finding the MAC Appendix D: cable. networkyou 5 Ethernet are using to connect the Router via a Category Enter key or the Start and OK Run button. . In the Open field, enter Figure D-2 Figure D-1 Address for Your

winipcfg Instant Wireless

. Then press the

®

Series 1. Click and XP: For 2000, Windows NT, Write down the Adapter Address as shown on your computer screen (see 3. Broadband Router Wireless-G 192.168.1.100. Your computer may show something different. ple in Figure E-3 shows the IP address of youradapter as Ethernet Address as shown on your computer screen. The exam- Write down the IP cloning or MAC filtering. address/Adapter Address is what you will use for MAC address The MAC be shown as a series of numbers and letters. Figure E-3). This is the MAC address for youradapter and will Ethernet click the Start Start OK Address. Note and button. h A address is also called the Adapter The MAC : Run . In the Open Figure D-4 Figure D-3 field, enter cmd . Press the Enter key or 91 92 . In the command prompt, enter 2. . Write down the Physical Address as shown on your computer screen; it is 3. 192.168.1.100. Your computer may show something different. ple in Figure E-5 shows the IP address of youradapter as Ethernet Address as shown on your computer screen. The exam- Write down the IP cloning or MAC filtering. address/Physical Address is what you will use for MAC address The MAC letters and numbers. the MAC address for youradapter. Ethernet This will appear as a series of Address. Note h A address is also called the Physical The MAC : Figure D-5 ipconfig /all ipconfig

. Then press the Instant Wireless

Enter

®

key.

Series MDI/MDIX capability eliminates the need for crossover cables. automatically senses if it needs to act as a MDI or MDIX port. The auto- Auto-MDI/MDIX signal strength and quality.undermine transfer rate when interference increases, distance and other factors ically shift between various data transfer rates. It works by decreasing the data increase connection reliability. enablesAutomatic fall-back a device to dynam- Automatic Fall-back scale or SOHO operation. mode, and is useful at a departmental Set (IBSS) or as peer-to-peer to as an Independent Basic Service referred with each other without the use of an access point. Ad-hoc mode is also wireless computers operate on a peer-to-peer basis, communicating directly wireless adapter, connected as an independent 802.11 wireless LAN. Ad-hoc Ad-hoc Network intranet and/or Internet. (NIC) is the typical adapter that allows to connect the the PC or server connectivity to a PC. In networked environment, a network card interface Broadband Router Wireless-G Adapter - IEEE 802.11b devices, and for security.WEP encryption modulation, an operating frequency of 2.4GHz, backward compatibility with by Linksys specify a maximum data transfer rate of 54Mbps using OFDM dard for wireless networking hardware. used The draft 802.11g specifications 802.1g to as Wi-Fi networks. 2.4GHz, and for security.WEP encryption 802.11b networks are also referred a maximum data transfer rate of 11Mbps, an operating frequency of specifies even if they by are manufactured different companies. The 802.11b standard IEEE standard will work with each other,Products that adhere to a specific 802.11b 5 UTP or STP wire. Category 100BaseTX 10BaseT Appendix E: Glossary - A proposed, extension of the IEEE 802.11 stan- but as yet unratified - One of the IEEE standards for wireless networking hardware. - standard that uses twisted wire pairs. An Ethernet Printed circuit board that plugs into a PC to add capabilities or - IEEE physical for 100 Mbps over layer specification two pairs of - An ad-hoc network of computers, each with a is a group - On a network hub or switch, an auto-MDI/MDIX port - A feature provided by some wireless products to 93 94 devices or program processes that operate at different speeds or with different Buffer that let youinterfaces online. browse text files “browser” seems to have originated prior to the Web for user as a generic term on the and interact with all the information World Wide Web or PC. The word Browser deliver dozens of channels over one cable. signals over a single medium. Cable television uses broadband techniques to bandwidth of a medium. This allows the transmission of voice, data, and video Broadband Bridge node, at once. to access a single node, often server Bottleneck control to it. on startup. search for the operating system, load it, and pass These instructions in a ROMers contain built-in instructions chip that are automatically executed Boot of data. Also, the smallest form Bit Traffic Indicator Maps, and the Traffic Indicator Message (TIM). the AP address, the Broadcast destination addresses, a time stamp, Delivery the network synchronized. area, A beacon includes the wireless LAN service Beacon Interval per second (bps). amount of time; expressed in bits can transmit in a fixed much data the facility Bandwidth works together and handles the most data. Backbone they are connected to and adjust their transmission rate accordingly. 10/100 cards, hubs, and switchesthe highest speed of node can determine often used with communications and networking. For example, Ethernet Auto-negotiate – digit. A binary The value—0 numbering system. or 1—used in the binary – To executing cause the computer to start Personal instructions. comput- - A device that interconnects different networks together. - A buffer area used by is a shared or assigned memory hardware - A browser is an application program that provides a way to look at – of a networkThe part that connects most of the systems and net- – slowdownA traffic that results when too many network nodes try - The transmission capacity of a given facility, of how in terms - A data-transmission scheme in which multiple signals share the - To settings. automatically is the correct The term determine

- A beacon is a packet broadcast by the Access Point to keep

Instant Wireless

®

Series Data Packet tents can easily be accessed, managed, and updated. Database transmitting station that indicates it is ready to accept data. CTS time before retrying. collision is detected, they both back off and each waits a random amount of devices access the line at exactly the same time, their signals collide. When the waits If the network a random amount of time before retrying. is quiet and two work, it checks to see if the network If it is not, is quiet (senses the carrier). access method used in Ethernet. When a device wants to gain access the net- Broadband Router Wireless-G addressed to a station within the local subnet. Default Gateway packet can be from 64 to 1518 bytesan Ethernet in length. cations is based on dividing the transmitted message into packets. For example, CSMA/CD called the “processor,” it is made up of the control unit and ALU. CPU is usually utilized for 100BaseTX networks. that they can sustain. CAT 5 cable has a maximum throughput of 100 Mbps and cabling of the data rates systems (wires, junctions, and connectors) in terms “categories” to as “CAT”) (the singular is commonly referred of twisted pair Industries Association) Standard 568 is one of several standards that specify CAT 5 the Internet). the computer), and from 200 Kbps to 2 Mbps upstream (from computer asymmetric transfer rates: around 36 Mbps downstream to (from the Internet users have Cable a continuous connection to the Internet. modems feature work, Once connected, whichconnects to the Internet. in turn cable modem Cable Modem the coordination of separate activities.support ing place” but exists not so much to accelerate the speed of an activity as to considered by the buffer designer. Like a cache, buffer is a “midpoint hold- buffer and the algorithms for moving data into and out of the buffer need to be being held up by the other. In order for a buffer to be effective, the size of sets of priorities. The buffer allows each device or process to operate without ( ( C C lear entral - ANSI/EIA (American National Standards Institute/Electronic - A database is a collection of data that organized so that its con- T ( C - One frame in a packet-switched message. Most data communi- o arrier arrier P - A device that connects a computer to the cable television net- S rocessing end) - An RS-232 signal sent from the receiving station to the - The routing device that is not used to forward all traffic S ense U M nit) - of the computer.The computing part Also ultiple A ccess/ C ollision D etection) - The LAN 95 96 formance and security.formance control of one security database. Dividing LANs into domains improves per- Domain address. domain name is a meaningful and easy-to-remember “handle” for an Internet Protocol (IP) addresses. names are located and translated into Internet A DNS you want to use DMZ Hosting. open. It is recommended that you set your computer with a static IP address if Some applications require multiple exposed to the Internet. to be TCP/IP ports DMZ IP address. need a permanent static addresses for computers containing DHCP supports Web that servers in which there are more computers than available IP addresses. quently. networks leases, DHCP can dynamically short Using very reconfigure cially useful in education and other environments where users change fre- location. It’suser is likely connection at a particular to require the Internet espe- will be valid for a computer. The lease time can vary depending on how long a DHCP uses the concept of a “lease” or amount time that given IP address address when a computer is plugged into different place in the network. tribute IP addresses from a central point and automatically sends a new IP address must be entered. DHCP lets a network and dis- administrator supervise if computers move of the network, to another location in part a new IP Without DHCP, the IP address must be entered manually at each computer and, an IP address must be assigned to each machine. nection to the Internet, unique IP address. When an organization sets up its computer users with a con- needs a protocol (TCP/IP), each machine that can connect to the Internet Protocol (IP) addresses in an organization's network. Using the Internet’s set of administrators centrally manage and automate the assignment of Internet DHCP providerregistering with a DDNS service on the Internet. site no matter how IP address changes. Using DDNS requires often the Internet website, FTP server, your behind a router, or other server so people can find myhostname.mydomainname.com IP address to havedynamic Internet host and domain name, such as a fixed DDNS - The Domain Name System (DNS) is the way domain that Internet - ( ( ( D D - A subnetwork under the of clients and servers comprised of a group D ynamic ynamic e M ilitarized H D ost omain C Z onfiguration onfiguration one) allows one IP address (or computer) to be N ame . It is useful when you are hosting your own S ystem) - Allows a network device with a P

rotocol) - A protocol that lets network

Instant Wireless

®

Series DSSS initial installation of a network-compatible operating system. client or server NIC, and is installed during the in the computer; it is designed for a specific between a network card and the upper-layer interface protocol software running Driver session, download means receive, and upload means transmit. Download Broadband Router Wireless-G DTIM is inherently rejected (ignored). point), the DSSS signal is recognized as the only valid signal, and interference receivers. However, to an intended receiver (i.e. another wireless LAN end- as low power wideband noise and is rejected (ignored) by most narrowband without the need for retransmission. To an unintended receiver, DSSS appears statistical techniques embedded in the receiver can recover the original data code). Even if one or more bits in the chip are damaged during transmission, for all transmitted data. pattern is called a chip (or chipping This bit pattern protocols, including TCP/IP and XNS. 10 Mbps. Forms the underlying vehicle used by transport several upper-level on and retrieved from a common transmission medium. Has transfer rate of Ethernet information. order to alter the data’s appearance and prevent other devices from reading the Encryption forwardingthan static routing, which path. uses a fixed it can adjust for overloaded lines and is much more flexible or failing traffic conditions of the communications circuits. Forbased on the current example, Dynamic Routing addresses. and printers, are usually multiple users, such as servers serve assigned static IP station in a TCP/IP network, typically by a DHCP server. Network devices that Address Dynamic IP messages. Clients hear the beacons and awaken to receive the broadcast and multicast associated clients, it sends the next DTIM with a Interval value. AP ticast messages. When the AP has buffered broadcast or multicast messages for clients of the next window informing for listening to broadcast and mul- field ( ( D - A workstation software or server module that provides an interface D irect- elivery - IEEE standard network protocol that specifies how- IEEE standard network data is placed protocol that specifies - To transmitted over receive a file network. In a communications - A security method that applies a specific algorithm to data in - A security method that applies a specific S equence T - The ability for a router to forward data via a different route raffic raffic - An IP address that is automatically assigned to a client S I pread ndication S pectrum) - DSSS generates a redundant bit pectrum) M essage) - A DTIM field is a countdownessage) - A DTIM field 97 98 overhead of encoding and decoding the data. “attached,” directly and does not add the files FTP is designed to handle binary haveUnlike e-mail programsto be in whichand program files graphics with ftp://. can also be initiated from within a Web browser by entering the URL preceded such as interface Windows. under a graphical FTP utility running FTP transfers byations can be performed typing commands at a command prompt or via an It can also convert between the ASCII and EBCDIC character codes. FTP oper- FTP includes functions to log onto the network, list directories, and copy files. er using FTP. for a website on a local machine, they are typically uploaded to the Web serv- network UNIX, etc.). For (Internet, example, after developing the HTML pages FTP a network the original size of packet. medium that cannot support Fragmentation ROM or PROM, it is retained even when the device off. is turned mable has been written onto the read-only (PROM). memory Once firmware Firmware whetherpacket to determine forward it toward its destination. Basically, working a firewall, closely with a router, examines each network have access. resources and for controlling what outside resources to which its own users to preventinstalls a firewall outsiders from accessing its own private data with an intranet that allowsenterprise its workers access to the wider Internet also implies the security policy that is used with the programs.) (The term An server, that protects the resources of a network from users other networks. Firewall of FHSS is extremely difficult. used, and only the transmitter and receiver know interception the hop patterns, frequency is not according to a pseudo-random set of channels. Because fixed frequency of a conventional(hops) the carrier several carrier times per second FHSS CSMA/CD network access method. Fast Ethernet ( F ( ile F - is a set of related programs, located at a networkA firewall gateway requency T - Code that is written onto read-only (ROM) memory or program- ransfer - A 100 Mbps technology based on the 10Base-T Ethernet - Breaking a packet into smaller units when transmitting over H P opping rotocol) - A protocol used to transfer files overrotocol) - A protocol used to transfer files a TCP/IP S pread S

pectrum) - FHSS continuouslypectrum) changes

Instant Wireless

®

Series referred to as an Extended Service Set (ESS). Infrastructure mode is useful at Set (ESS). Infrastructure to as an Extended Service referred Set (BSS). Basic Service A set of two or more BSS in a single network is wireless networkstructure connected to a wired network to as a is referred other and to a wired network going through an access point. byAn infra- first LAN. mode, the wireless devices In infrastructure communicate with each or other devices, each with a wireless adapter, connected as an 802.11 wireless Infrastructure Network IEEE Computer Society. many local chapters, and has several large societies in special areas, such as the standards. international The organization publisheshas a number of journals, The IEEE fosters the development of standards that often become national and being of our members.” of humanity,for the benefit the advancement of the profession, and well- ing the development and application of electrotechnology and allied sciences describes itself as “the world's largest technical professional society—promot- IEEE browser. lish a connection with Web and transmit HTML pages to the client server on the to connect servers World Wide Web. function is to estab- Its primary Broadband Router Wireless-G HTTP cable that connects to a workstation. active, where the hubs are used like repeaters to provide an extension of the workstations. Can be passive,of the signals; or where there is no amplification Hub known as the software. from the program you put in it to make it do things. The program came to be tinguish the “box”and components of a computer and the electronic circuitry technologytions, and other information devices. arose as a wayThe term to dis- Hardware line, but only one direction at a time. Half Duplex communications protocols. Gateway both directions. Full Duplex - The device as the central location for attaching wires from that serves - The Institute of Electrical and Electronics Engineers. The IEEE ( H – A device that interconnects networks with different, incompatible yper - Hardware is the physical aspect of computers, telecommunica- - The ability of a device or line to transmit data simultaneously in - Data transmission that can occur in two directions over a single T ext T ransport ransport - networkAn infrastructure of computers is a group P rotocol) - The communications protocol used 99 100 devices that share a common communications line and typically share the LAN hosting. building and virtual such as website and other related services and companies access to the Internet ISP venient high-speed wireless capabilities in the hands of users around globe. able worldwide. This presents a truly revolutionary to place con- opportunity in the vicinity of 2.4 GHz, particular, band. Spectrum is being made avail- and Medical) bandwidth for unlicensed use in the ISM (Industrial, Scientific ISM band Except for PCI devices, two devices cannot use the same line. lines used to signal the CPU that a peripheral event or terminated. has started IRQ in VPNs (Virtual Private Networks). ter and receiver and must share a public key. Tunnel mode is widely deployed on both transmit- load and is therefore more secure. IPSec must be supported the header untouched, while Tunnel both the header and pay- mode encrypts Transport and Tunnel. the payloadTransport encrypts of each packet, leaving secure exchange of packets at the IP layer. two IPSec supports basic modes: IPSec networks with static IP addresses. 2000, for configuring addresses within a network. A commonly used utility, under Windows NT and IPCONFIG by sending another message using the IP address it received. the IP address of Web page requestor or the e-mail sender and can respond e-mail address you're sending a note to. At the other end, the recipient can see Resource Locator you up the domain name in Uniform requested or than one is required) and sends it to the IP address that obtained by looking includes your IP address in the message (actually, in each of the packets if more of Protocol part request an HTML page or send e-mail, the Internet TCP/IP receiver that is sent in packets across the Internet. of information When you today, each sender or digit number that identifies an IP address is a 32-binary Address IP networks. scale, or whento connect the wired and wireless it is necessary a corporation - provider) service An ISP (Internet is a company that provides individuals ( - A local area network of computers and associated (LAN) is a group I ( nterrupt nterrupt I nternet nternet - The FCC and their counterparts outside of the U.S.- The FCC and their counterparts have set aside - In the most widely installed level Protocol (IP) of the Internet - and managing IP A utility that provides defining for querying, R P e rotocol Q uest) - on a PC. A hardware interrupt There are 16 IRQ Sec

urity) - A suite of protocols used to implement

Instant Wireless

®

Series NetBEUI, TCP/IP, and IPX/SPX protocols. suite that was over later separated. NetBIOS sessions can be transported NetBIOS. NetBIOS and NetBEUI were originally of a single protocol part NetBEUI and the other is outside. known within another network. One network is designated the inside network Protocol address (IP address) used within one network to a different IP address NAT Multicasting contains the computer’s and components. basic circuitry Motherboard and listing, joining, leavingging onto IRC servers channels. mIRC to another hub or switch, a MDIX port use crossover cable. connects to a computer using straight-through cable. a MDIX port To connect Broadband Router Wireless-G MDI ment. dynamic methods. MD5 authentication does not support WEP key manage- authentication is not as secure the EAP-TLS or EAP/TTLS MD5 ment for data transmission. MDIX cable. straight-through cable. To to a computer, connect a MDI port use a crossover also knownport, connects to another hub or switch as an uplink port, using a Mbps network adapter, that allows the network to identify it at the hardware level. ber assigned by to any networking the manufacturer Ethernet device, such as a Address MAC the last bit is forwarded. Latency building). example, within an office within a small geographic resources of a single processor or server area (for ( - NAT (Network Address Translation) is the translation of an Internet - A type of one-way authentication method that uses passwords. MD5 M ( - mIRC runs under - mIRC runs Windows and provides for log- interface a graphical ( M M edium - The time delay bit of a packet between is received when and the first ega edium ( NetB B - Sending data to a group of nodes instead a single destination. - Sending data to a group - A motherboard is the physicalin a computer that arrangement its - The MAC (Media Access Control) address is a unique num- D IOS D ependent P ependent er S E econd) - One million bits per second; unit of measure- xtended I nterface) - On a networknterface) hub or switch, a MDI I nterface Crossed) - On a networknterface hub or switch, U ser I nterface) - nterface) layerThe transport for 101 102 rates and more reliable transmissions-than previous technologies, such as Multiplexing (OFDM) technology offers data superior performance-increased OFDM ness. puter, typically weighs pounds and is three inches or less in thick- less than five and at meetings. offices, A notebook computer, sometimes called a laptop com- in libraries, at temporary niently spaces such as on airplanes, used in temporary er generally smaller than a briefcase that can easily and conve- be transported Notebook (PC) station. Node computer system. Also called an adapter. ally a PC, to provide network communication capabilities to and from that NIC Network Mask data between users. Network tion until broken. It guarantees delivery of messages up to 64KB long. is lost. ing for messages, the datagram The Session mode establishes a connec- receive name, usually limited to 512 bytes. If the recipient device is not listen- does not guarantee delivery. It uses a self-contained packet with send and There are two NetBIOS modes. mode, but mode is the fastest The Datagram or a WINS server.tion in an LMHOSTS file networks, into IP addresses via manual configura- NetBIOS names are turned over the network so that Network Neighborhood can catalog them. For TCP/IP Windows machines (NetBIOS machines) periodically broadcast their names by a unique 15-character name, and NetBIOS computers are identified cols. which is not routable, or over TCP/IP and IPX/SPX, which are routable proto- sion layer (layer 5). NetBIOS can ride over NetBEUI, its native transport, NetBIOS today provides for applications at the ses- a programming interface Although originally layer combined with its transport protocol (NetBEUI), NetBIOS ( N - A network junction or connection point, typically a computer or work etwork - Developed for wireless applications, Orthogonal Frequency Division - A system that transmits any combination of voice, video, and/or - The native networking protocol in DOS and Windows networks. I nterface nterface - Also known as the “Subnet Mask.” - A notebook computer is a battery-powered personal comput- C

ard) - A board installed in a computer system, usu-

Instant Wireless

®

Series only machine, there cannot be insufficient IRQs, as all can be shared. only machine, there cannot be insufficient devices were given their required IRQs, all PCI devices could share it. In a PCI- available on a PC. For example, if there were only one IRQ left over after ISA PCI allows IRQs to be shared, which helps to solve the problem of limited IRQs use by ISA cards. PCI takes care of the rest. erally which required is to indicate in the CMOS memory IRQs are already cards at startup. When PCI is used with the ISA bus, only thing that is gen- PCI provides “plug-and-play” capability, the PCI automatically configuring bus was known as a “local bus.” generally a mix of PCI and ISA slots or EISA slots. Early on, the PCI typically three or four PCI slots on the motherboard. In a Pentium PC, there is between the CPU and peripheral devices (video, disk, network, etc.). There are appeared on PCs in late 1993. PCI provides a high-speed data path first in PCs, Macintoshes and workstations. It was designed primarily by Intel and Broadband Router Wireless-G PCI or a hard disk. PC Card Linksys products. process byencryption automatically generating the keysWEP encryption for Passphrase Partitioning transfer, etc.). ing address or range of addresses its type (e-mail, file Packet Filtering Packet cations, including powerline networking. narrower frequency bands or sub-channels. OFDM is also used for other appli- transmission by dividing a wide frequency band or channel into a number of stream is used to modulate a subcarrier. Essentially, this creates a multi-carrier speed data streams, which are then transmitted in parallel. Each lower speed OFDM works by breaking one high-speed data stream into a number of lower- a single signal for transmission on the medium. are combined to form DSSS. OFDM is a scheme in which numerous signals of different frequencies ( P eripheral - A unit of data routed between an origin and a destination in network. - A credit-card sized removable module that contains memory, I/O, - Used much like a password, the WEP a passphrase simplifies - To divide a resource or application into smaller pieces. C - Discarding unwanted network based on its originat- traffic omponent I nterconnect) - A peripheral bus commonly used 103 104 not specify any changes to the PPP protocol but rather describes a “tunneling Point to Point Protocol (PPP) to be tunneled through an IP network. PPTP does PPTP residing on a modem or router. client firmware session can be initiated by either a client application residing on PC, or by and password)authentication (username in addition to data transport. A PPPoE over One reason PPPoE by the Internet. ISPs is because it provides is preferred encapsulation of PPP packets over frames from the user to ISP Ethernet PPPoE if necessary. can be managed locally Port or remotely. mirroring enables the administrator to keep close track of switchand alter it performance diagnostic tool or debugging feature, especially when fending off an attack. It the packet can be studied. as a A network mirroring administrator uses port of a networkand outgoing packet from one port switchwhere to another port method of monitoring network that forwards a copy traffic of each incoming Port Mirroring printers. socketsputer are external for plugging in communications lines, modems, and switch or router. For on a personal com- example, the serial and parallel ports Port SMTP messaging protocol. messages and attachments are downloaded at the same time. POP3 uses on and download it. POP3 is a simple system with little selectivity. All pending It providesInternet. a message store that holds incoming e-mail until users log POP3 the system during installation. boards and other devices automatically off without requiring the user to turn Plug-and-Play ing out a packet and waiting for a response. IP address is online. It used to test and debug a networka particular by send- Ping usually a notebook or laptop computer. or I/O device into a personal computer,credit card-size memory that would fit organized in 1989 to promote standards for a group Association) is an industry PCMCIA - A pathway into and out of the computer or a network device such as a ( P ( ( P acket P ( P ost oint-to- oint to - The PCMCIA (Personal Card International Computer Memory O IN ffice ffice - The ability of a computer system to configure expansion- The ability of a computer system to configure ternet ternet P - Port mirroring, also known- Port mirroring, as a roving analysis is a port, P oint oint P rotocol G T P roper) - whether utility used to determine An Internet unneling rotocol 3 ) - commonlyA standard mail server used on the o ver P rotocol) - A protocol which allows the E

thernet) - PPPoEthernet) is a method for the

Instant Wireless

®

Series sage transfer agent (MTA), which stores and forwards the mail. and the mes- the message format It is a Internet. TCP/IP protocol that defines SMTP printing, communications, and other services. to files, Server to the receiving to transmit. station requesting permission RTS rates than bridges. works; they introduce longer delays and typically have much lower throughput Routers are useful in breaking down large a very network into smaller subnet- Router to another and easily maintain connectivity. with multiple access points, where users can physically relocate from one area to network connectivity.interruption A typical scenario would be a location and ideallyreauthentication should occur without user intervention without reassociate and reauthenticate to the new access point. This reassociation and ity to move out of one access point's range and into another transparently Roaming devices.wires, used for connecting Ethernet RJ-45 The RJ-11 is the common connector used to plug a telephone into wall. Broadband Router Wireless-G RJ-11 ly to its neighboring routers. broadcasts routing information between source and destination. RIP is a distance vector protocol that routine- the a route based on the smallest hop count TCP/IP protocol suite. It determines RIP applications. environmentscorporate and may also be used for personal (i.e., non-business) that traverses However, the Internet. are not restricted to tunneling services intranet via a work corporate to a headquarters Virtual Private Network (VPN) net- is secure access from a remote small office example of a tunneling service by tunneling protocols such as PPTP, L2F, L2TP, and IPSEC tunnel mode). One is any PPP (a tunneling service network enabled service for carrying service” ( ( R R ( - A connector similar to a telephone that holds up eight outing ( - Any computer whose function in a network is to provide user access R equest S - Protocol-dependent device that connects subnetworks together. egistered imple - In an infrastructure mode wireless network,- In an infrastructure this refers to the abil- I T nformation nformation M o ail S J end) - An RS-232 signal sent from the transmitting station ack- T ransfer 11 P ) - A telephone connector that holds up to six wires. rotocol) - of A simple routing protocol that is part P rotocol) - The standard e-mail protocol on the 105 106 sheath to eliminate external interference. sheath to eliminate external STP Storage cannot adjust to changing line conditions as can dynamic routing. Static Routing TCP/IP network. Address Static IP (DSSS) and Frequency (FHSS). Spread Spectrum Hopping Spread Spectrum noise. like background There are two main alternatives, Direct Sequence If a receiver is not tuned to the right frequency, signal looks a spread-spectrum receiver knows signal being broadcast. the parameters of spread-spectrum a signal that is, in effect, louder and thus easier to detect, provided that the sumed than in the case of narrowband transmission, but the trade off produces for reliability, integrity, and security. In other words, more bandwidth is con- ical communications systems. It is designed to trade off bandwidth efficiency cy technique developed by for use in reliable, the military secure, mission-crit- Spread Spectrum work at home or in small offices. SOHO hardware how to process the data. A common misconception is that software is data. It not. Software tells the user. tem (DBMS). Application software is any program that processes data for the control programs such as the operating system and database management sys- “system software” and “application software.” System software is made up of task is called a “program.”a particular The two major categories of software are Software from the device and whatoff, can be controlled (turned on, etc.). what is obtainable Base), whichthat defines Information is a data structure work. contained in a MIB (Management information The agents return (hub, router, bridge, etc.) to the workstation console used to oversee the net- hardware and/or software activity processes reporting in each network device monitoring and control protocol. Data is passed from SNMP agents, which are SNMP ( S hielded ( ( - holding place for digital data. or permanent The semi-permanent S S - Instructions for the computer.- Instructions that performs A series of instructions mall imple O - Forwarding data in a network path. Static routing via a fixed T N ffice/ wisted etwork - Spread Spectrum technology- Spread Spectrum is a wideband radio frequen- - IP address that is assigned to a node in A permanent H ome P M air) - Telephone wire that is wrapped in a metal anagement O ffice) - Market segment of professionals whoffice) P

rotocol) - A widely used network

Instant Wireless

®

Series connections. tant of which include edge connections, backbone and wide-area Most large networks contain several levels of interconnection, the most impor- most common network devices include hubs, switches, routers, and gateways. devices on the network are connected and the distances between them. The Topology er in a given time period. Throughput or passwordthat has no directory capability. Broadband Router Wireless-G TFTP a remote device a program. and run TCP/IP-based networks. It allows or computer to log a user at terminal onto Telnet protocols and not only TCP and IP. of a suite or group (developed for the Internet). TCP/IP defines specifically munication language or set of protocols for communications over a network TCP/IP receipt to the sender of packet resulting in transmission control. tocol due to requiring the receiver an acknowledgment of a packet to return of cient delivery over the network. TCP is known as a “connection oriented” pro- individual units of data (called packets) that a message is divided into for effi- the actual delivery of the data (routing), TCP takes care of keeping track of the between network devices over a LAN or WAN. While IP takes care of handling of message units (datagram) Protocol) to send data in the form the IP (Internet TCP cuit. device for making, breaking, or changing the connections in an electrical cir- allowing a large number of devices 2. to share a limited number of ports. A Switch restoring it back to the original when required. Swapping for subnets. into a field of the host ID address field part address to turn or subnets. that is matched up with the IP groups, pattern The mask is a binary Subnet Mask ( T ( - emulation protocol commonly and A terminal used on the Internet T ransmission – 1. A data switch connects computing devices to host computers, ( rivial T - A network’s topology is a logical characterization of how the - Replacing one segmentwith another and of a program in memory ransmission - The amount of data moved successfully from one place to anoth- - The method used for splitting IP networks into a series of sub- F ile T C ransfer ontrol C ontrol P P rotocol) - A version of the TCP/IP FTP protocol rotocol) - A method (protocol) used along with P rotocol/ I nternet nternet P rotocol) - The basic com- 107 108 WAN Protocol Security). Tunneling Protocol), L2TP (Layer 2 Tunneling Protocol), and IPSec (Internet Examples of (such as the Internet). VPN technology are: PPTP (Point to Point for WAN communications through secure use of a publicly available WAN single large “virtually private” LAN. This removes the need to use leased lines nication subchannels (tunnels). Effectively, these LANs can use a WAN as a be extended over public communication channels by creating private commu- VPN cable. twisted pair is sometimes installed in two or more pairs, all within a single Since some telephone sets or desktop locations require multiple connections, twisted around each other. Each signal on twisted pair requires both wires. magnetic induction between pairs of wires, two insulated copper wires are business computers to the telephone company. To reduce crosstalk or electro- wiring. Twisted copper wire that connects home and many pair is the ordinary UTP vide the hypertext links to other pages. access Web pages, and URLs are embedded within the pages themselves to pro- on the Web or any facility. other Internet URLs are typed into the browser to munication over the WAN is often through public networks such as the tively large geographic area, consisting of two or more LANs. Broadband com- URL sion, upload means transmit, and download means receive. Upload Upgrade receipt to the sender of packet (as opposed to TCP). due to NOT requiring the receiver an acknowledgment of a packet to return of cient delivery over the network. UDP is known as a “connection-less” protocol individual units of data (called packets) that a message is divided into for effi- the actual delivery of the data (routing), UDP takes care of keeping track of the between network devices over a LAN or WAN. While IP takes care of handling of message units (datagram) Protocol) to send data in the form (Internet UDP TX Rate ( - Unshielded twisted pair is the most common kind of copper telephone ( ( V ( U U W irtual irtual ser - To transmitted over send a file network. In a communications ses- niform niform – Transmission Rate. – Transmission ide - To with a newer replace existing software or firmware version. D A atagram atagram P rea rivate R esource N etwork) - A communications network that covers a rela- N P etwork) - A technique that allows two or more LANs to rotocol) - A method (protocol) used along with the IP L

ocator) - The address that defines the route to a file ocator) - The address that defines

Instant Wireless

®

Series Workgroup ed devices that communicate with each other wirelessly. Broadband Router Wireless-G WLAN networks with static IP addresses. ity for configuring and managing IP addresses within a network. defining, A commonly used util- WINIPCFG bit or 128-bi shared key algorithm, as described in the IEEE 802.11 standard. WEP could be considered a the Internet WAN.most basic definition, telephone (DSL) or cable systems, or through leased lines satellites. In its ( W ( W ired ireless - Two and databases. or more individuals that share files - Configuration utility based on the Win32- Configuration API for querying, E quivalent L ocal A P rea rivacy) - A data privacy mechanism based on a 64- N etwork) - of computers and associat- A group 109 110 LED Indicators Net w Modulation Transmit Power Cabling Type Button Ports Standards Appendix F: WLAN: Internet: LAN: draft 802.11g: LAN: 802.11b: Internet: ork Protocol s ikAt ulCl 100 Full/Col, Link/Act, 100 Full/Col, Link/Act, Link Act, Diag DMZ, Power, TCP/I P OFDM DBPSK DQPSK, CCK, 15 dBm Network Cabling or better 5 Ethernet Category One Reset Button One Power Port Four 10/100 RJ-45 Switched Ports Modem One 10/100 RJ-45 Port for Cable/DSL Draft 802.11g IEEE 802.11b, IEEE 802.3u, IEEE 802.3, Specifications ,

NetBEUI

Instant Wireless

® Series

Environmental Storage Humidity Operating Humidity Storage Temp. Operating Temp. Certifications Power Unit Weight Dimensions Broadband Router Wireless-G %t 0,Non-Condensing 5% to 90%, Non-Condensing 10% to 85%, -20°C to 70°C (-4°F 158°F) 0°C to 40°C (32°F 104°F) CE Mark FCC Class B, 2.5 A 5V DC, External, 17 oz. (0.482 kg) (186 mm x 175 48 mm) 7.32" x 6.89" 1.89" 111 112 CALL LINKSYS FOR MORE DETAILS. PLEASE RESPONSIBLE FOR SHIPPING AND HANDLING CHARGES. THE UNITED STATES OF AMERICA AND CANADA SHALL BE HELD FOR UPS GROUND ONLY. ALL CUSTOMERS LOCATED OUTSIDE OF CESSING AND RECEIVING YOUR REPLACEMENT. LINKSYS PAYS LINKSYS OFFERS CROSS SHIPMENTS, A FASTER PROCESS FOR PRO- PRODUCT. DOCUMENTATION. LINKSYS DOES NOT OFFER REFUNDS FOR ANY USE OF THE PRODUCT, ITS ACCOMPANYING SOFTWARE, OR ITS DENTAL, OR CONSEQUENTIAL DAMAGES RESULTING FROM THE PAID FOR THE PRODUCT FROM DIRECT, INDIRECT, SPECIAL, INCI- IN NO EVENT SHALL LINKSYS’S LIABILITY EXCEED THE PRICE PURCHASE. RETURN REQUESTS CANNOT BE PROCESSED WITHOUT PROOF OF FROM THE PRODUCT'S PACKAGING ON HAND WHEN CALLING. BE SURE TO HAVE YOUR PROOF OF PURCHASE AND A BARCODE Information Appendix G:

Warranty

Instant Wireless

®

Series FTP site Web site E-mail Fax Authorization) Issues RMA (Return Merchandise Technical Support Sales Information addresses below. contact Linksys Technical at one of the phone numbers or Internet Support Broadband Router, For help with the installation or operation of Wireless-G Information Contact Appendix H: Broadband Router Wireless-G ftp://ftp.linksys.com http://www.linksys.com [email protected] 949-265-6655 www.linksys.com (or call 949-271-5461) 800-326-7114 800-546-5797 (1-800-LINKSYS) 113 www.linksys.com

© Copyright 2002 Linksys, All Rights Reserved.