Você está na página 1de 33

USER GUIDE

Wireless-G
Broadband Router

Model No: WRT54G2


 About This Guide

About This Guide


Icon Descriptions
While reading through the User Guide you may see
various icons that call attention to specific items. Below is
a description of these icons:

NOTE: This check mark indicates that there is


a note of interest and is something that you
should pay special attention to while using the
product.

WARNING: This exclamation point indicates


that there is a caution or warning and it is
something that could damage your property or
product.

WEB: This globe icon indicates a noteworthy


website address or e-mail address.

Online Resources
Most web browsers allow you to enter the web address
without adding the http:// in front of the address. This
User Guide will refer to websites without including http://
in front of the address. Some older web browsers may
require you to add it.

Resource Website

Linksys www.linksys.com

Linksys International www.linksys.com/international

Glossary www.linksys.com/glossary

Network Security www.linksys.com/security

Copyright and Trademarks


Linksys is a registered trademark or
trademark of Cisco Systems, Inc. and/
or its affiliates in the U.S. and certain
other countries. Copyright 2008
Cisco Systems, Inc. All rights reserved.
Other brands and product names are
trademarks or registered trademarks
of their respective holders.

Wireless-G Broadband Router 


 Table of Contents

Chapter 1: Product Overview 1


Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Chapter 2: Wireless Security Checklist 2


General Network Security Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Additional Security Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

Chapter 3: Advanced Configuration 3


Setup > Basic Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Setup > DDNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Setup > MAC Address Clone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Setup > Advanced Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Wireless > Basic Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Wireless > Wireless Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Wireless > Wireless MAC Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Wireless > Advanced Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Security > Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Security > VPN Passthrough . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Access Restrictions > Internet Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Applications and Gaming > Port Range Forward . . . . . . . . . . . . . . . . . . . . . . . . . 16
Applications & Gaming > Port Triggering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Applications and Gaming > DMZ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Applications and Gaming > QoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Administration > Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Administration > Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Administration > Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Administration > Factory Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Administration > Upgrade Firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Administration > Config Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Status > Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Status > Local Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Status > Wireless . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Appendix A: Troubleshooting 22
Appendix B: Specifications 23

Wireless-G Broadband Router ii


 Table of Contents

Appendix C: Warranty and Regulatory Information 24


Limited Warranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Wireless Disclaimer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Safety Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Industry Canada (Canada) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
IC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Rglement dIndustry Canada . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste
Electric and Electronic Equipment (WEEE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

Wireless-G Broadband Router iii


Chapter 1 Product Overview

Chapter 1: Wireless (Green) The Wireless LED lights up


when the wireless feature is enabled. If the LED
Product Overview is flashing, the Router is actively sending or
receiving data over the network.
Thank you for choosing the Linksys Wireless-G Broadband Internet (Green) The Internet LED lights up
Router. The Router lets you access the Internet via a when there is a connection made through the
wireless connection, broadcast at up to 54Mbps, or Internet port. A flashing LED indicates network
through one of its four switched ports. You can also use activity over the Internet port.
the Router to share resources such as computers, printers
and files. A variety of security features help to protect Power (Green) The Power LED lights up
your data and your privacy while online. Security features and will stay on while the Router is powered
include WPA2 security, a Stateful Packet Inspection (SPI) on. When the Router goes through its self-
firewall and NAT technology. Configuring the Router is diagnostic mode during every boot-up, this
easy using the provided browser-based utility LED will flash. When the diagnostic is complete,
the LED will be solidly lit.
Front Panel
Back Panel

1, 2, 3, 4 (Green) These numbered LEDs,


corresponding with the numbered ports on the Internet The Internet port is where you will
Routers back panel, serve two purposes. If the connect your cable or DSL Internet connection.
LED is continuously lit, the Router is successfully
connected to a device through that port. A 1, 2, 3, 4 These Ethernet ports (1, 2, 3, 4) connect
flashing LED indicates network activity over the Router to PCs on your wired network and
that port. other Ethernet network devices.
Wi-Fi Protected Setup Button If you have Reset There are two ways to reset the Routers
client devices, such as wireless adapters, that factory defaults. Either press and hold the Reset
support Wi-Fi Protected Setup, then you can Button for approximately five seconds, or restore
use Wi-Fi Protected Setup to automatically the defaults from Administration>Factory
configure wireless security for your wireless Defaults in the Routers web-based utility.
network(s). Power The Power port is where you will
To use Wi-Fi Protected Setup, run the Setup connect the power adapter.
Wizard, or refer to the Wireless > Basic Wireless
Settings section of Chapter 3: Advanced
Configuration.
Wi-Fi Protected Setup LED (Green/
Amber) It lights up green when wireless
security is enabled. The LED flashes green for
two minutes during Wi-Fi Protected Setup.

The LED lights up amber if there is an error


during the WiFi Protected Setup process. Make
sure the client device supports WiFi Protected
Setup. Wait until the LED is off, and then try again.

The LED flashes amber when a WiFi Protected


Setup session is active, and a second session
begins. The Router supports one session at a
time. Wait until the LED is off before starting the
next Wi-Fi Protected Setup session.

Wireless-G Broadband Router 


Chapter 2 Wireless Security Checklist

Chapter 2: 4. Enable encryption


Wireless Security Checklist Encryption protects data transmitted over a wireless
Wireless networks are convenient and easy to install, so network. Wi-Fi Protected Access (WPA/WPA2) and Wired
homes with high-speed Internet access are adopting them Equivalency Privacy (WEP) offer different levels of security
at a rapid pace. Because wireless networking operates by for wireless communication. Currently, devices that are
sending information over radio waves, it can be more Wi-Fi certified are required to support WPA2, but are not
vulnerable to intruders than a traditional wired network. required to support WEP.
Like signals from your cellular or cordless phones, signals A network encrypted with WPA/WPA2 is more secure
from your wireless network can also be intercepted. Since than a network encrypted with WEP, because WPA/WPA2
you cannot physically prevent someone from connecting uses dynamic key encryption. To protect the information
to your wireless network, you need to take some additional as it passes over the airwaves, you should enable the
steps to keep your network secure. highest level of encryption supported by your network
equipment.

1. Change the default wireless WEP is an older encryption standard and may be the
network name or SSID only option available on some older devices that do not
support WPA.
Wireless devices have a default wireless network name
or Service Set Identifier (SSID) set by the factory. This General Network Security Guidelines
is the name of your wireless network, and can be up
to 32 characters in length. Linksys wireless products Wireless network security is useless if the underlying
use linksys as the default wireless network name. You network is not secure.
should change the wireless network name to something Password protect all computers on the network and
unique to distinguish your wireless network from other individually password protect sensitive files.
wireless networks that may exist around you, but do not
use personal information (such as your Social Security Change passwords on a regular basis.
number) because this information may be available for Install anti-virus software and personal firewall
anyone to see when browsing for wireless networks. software.
Disable file sharing (peer-to-peer). Some applications
2. Change the default password may open file sharing without your consent and/or
knowledge.
For wireless products such as access points and routers,
you will be asked for a password when you want to change Additional Security Tips
their settings. These devices have a default password set
Keep wireless routers, access points, or gateways away
by the factory. The Linksys default password is admin.
from exterior walls and windows.
Hackers know these defaults and may try to use them
to access your wireless device and change your network Turn wireless routers, access points, or gateways
settings. To thwart any unauthorized changes, customize off when they are not being used (at night, during
the devices password so it will be hard to guess. vacations).
Use strong passphrases that are at least eight characters
in length. Combine letters and numbers to avoid using
3. Enable MAC address filtering standard words that can be found in the dictionary.
Linksys routers give you the ability to enable Media Access
Control (MAC) address filtering. The MAC address is a WEB: For more information on wireless
unique series of numbers and letters assigned to every security, visit www.linksys.com/security
networking device. With MAC address filtering enabled,
wireless network access is provided solely for wireless
devices with specific MAC addresses. For example, you can
specify the MAC address of each computer in your home
so that only those computers can access your wireless
network.

Wireless-G Broadband Router 


Chapter 3 Advanced Configuration

Chapter 3: Setup > Basic Setup


Advanced Configuration The first screen that appears is the Basic Setup screen. This
allows you to change the Routers general settings.

After setting up the Router with the Setup Wizard (located


on the CD-ROM), the Router will be ready for use. However,
if youd like to change its advanced settings, use the
Routers web-based utility. This chapter describes each
web page of the utility and each pages key functions. You
can access the utility via a web browser on a computer
connected to the Router.
The web-based utility has these main tabs: Setup,
Wireless, Security, Access Restrictions, Applications &
Gaming, Administration, and Status. Additional tabs will
be available after you click one of the main tabs.

NOTE: When first installing the Router, you


should use the Setup Wizard on the Setup
CD-ROM. If you want to configure advanced
settings, use this chapter to learn about the
web-based utility.

How to Access the Web-Based Utility


Setup > Basic Setup
To access the web-based utility, launch the web browser on
your computer, and enter the Routers default IP address,
192.168.1.1, in the Address field. Then, press Enter. Internet Setup
A password request screen will appear. (Non-Windows XP The Internet Setup section configures the Router to your
users will see a similar screen.) Leave the User name field Internet connection. Most of this information can be
blank. The first time you open the Web-based utility, use obtained through your ISP.
the default password admin. (You can set a new password
from the Administration tabs Management screen.) Click Internet Connection Type
OK to continue.
Select the type of Internet connection your ISP provides
from the drop-down menu. The available types are:
Automatic Configuration - DHCP
Static IP
PPPoE
PPTP
L2TP
Telstra Cable

Automatic Configuration - DHCP


Password Screen
By default, the Routers Internet Connection Type is set
to Automatic Configuration - DHCP, which should be
kept only if your ISP supports DHCP or you are connecting
through a dynamic IP address. (This option usually applies
to cable connections.)

Internet Connection Type > Automatic Configuration - DHCP

Wireless-G Broadband Router 


Chapter 3 Advanced Configuration

Static IP will automatically re-establish your connection. To use


this option, select Keep Alive. In the Redial Period field,
If you are required to use a permanent IP address to you specify how often you want the Router to check
connect to the Internet, select Static IP. the Internet connection. The default Redial Period is
30 seconds.

PPTP
Point-to-Point Tunneling Protocol (PPTP) is a service that
applies to connections in Europe only.

Internet Connection Type > Static IP

Internet IP Address This is the Routers IP address, when


seen from the Internet. Your ISP will provide you with the
IP Address you need to specify here.
Subnet Mask This is the Routers Subnet Mask, as seen
by users on the Internet (including your ISP). Your ISP will Internet Connection Type > PPTP
provide you with the Subnet Mask.
Internet IP Address This is the Routers IP address, as
Gateway Your ISP will provide you with the Gateway
seen from the Internet. Your ISP will provide you with the
Address, which is the ISP servers IP address.
IP Address you need to specify here.
DNS Your ISP will provide you with at least one DNS
Subnet Mask This is the Routers Subnet Mask, as seen
(Domain Name System) Server IP Address.
by users on the Internet (including your ISP). Your ISP will
PPPoE provide you with the Subnet Mask.
Gateway Your ISP will provide you with the Gateway
Some DSL-based ISPs use PPPoE (Point-to-Point Protocol
Address.
over Ethernet) to establish Internet connections. If you are
connected to the Internet through a DSL line, check with User Name and Password Enter the User Name and
your ISP to see if they use PPPoE. If they do, you will have Password provided by your ISP.
to enable PPPoE.
Connect on Demand: Max Idle Time You can configure
the Router to cut the Internet connection after it has been
inactive for a specified period of time (Max Idle Time). If
your Internet connection has been terminated due to
inactivity, Connect on Demand enables the Router to
automatically re-establish your connection as soon as you
Internet Connection Type > PPPoE attempt to access the Internet again. To use this option,
select Connect on Demand. In the Max Idle Time field,
User Name and Password Enter the User Name and enter the number of minutes you want to have elapsed
Password provided by your ISP. before your Internet connection terminates. The default
Connect on Demand: Max Idle Time You can configure Max Idle Time is 5 minutes.
the Router to cut the Internet connection after it has been Keep Alive: Redial Period If you select this option, the
inactive for a specified period of time (Max Idle Time). If Router will periodically check your Internet connection. If
your Internet connection has been terminated due to you are disconnected, then the Router will automatically
inactivity, Connect on Demand enables the Router to re-establish your connection. To use this option, select
automatically re-establish your connection as soon as you Keep Alive. In the Redial Period field, you specify how often
attempt to access the Internet again. To use this option, you want the Router to check the Internet connection. The
select Connect on Demand. In the Max Idle Time field, default value is 30 seconds.
enter the number of minutes you want to have elapsed
before your Internet connection terminates. The default
Max Idle Time is 5 minutes.
Keep Alive: Redial Period If you select this option,
the Router will periodically check your Internet
connection. If you are disconnected, then the Router

Wireless-G Broadband Router 


Chapter 3 Advanced Configuration

L2TP Connect on Demand: Max Idle Time You can configure


the Router to cut the Internet connection after it has been
L2TP is a service that applies to connections in Israel only. inactive for a specified period of time (Max Idle Time). If
your Internet connection has been terminated due to
inactivity, Connect on Demand enables the Router to
automatically re-establish your connection as soon as you
attempt to access the Internet again. To use this option,
select Connect on Demand. In the Max Idle Time field,
enter the number of minutes you want to have elapsed
before your Internet connection terminates. The default
Internet Connection Type > L2TP Max Idle Time is 5 minutes

User Name and Password Enter the User Name and Keep Alive: Redial Period If you select this option,
Password provided by your ISP. the Router will periodically check your Internet
connection. If you are disconnected, then the Router
L2TP Server This is the IP address of the L2TP Server. will automatically re-establish your connection. To use
Your ISP will provide you with the IP Address you need to this option, select Keep Alive. In the Redial Period field,
specify here. you specify how often you want the Router to check
Connect on Demand: Max Idle Time You can configure the Internet connection. The default Redial Period is
the Router to cut the Internet connection after it has been 30 seconds.
inactive for a specified period of time (Max Idle Time). If
your Internet connection has been terminated due to
Optional Settings
inactivity, Connect on Demand enables the Router to Some of these settings may be required by your ISP. Verify
automatically re-establish your connection as soon as you with your ISP before making any changes.
attempt to access the Internet again. To use this option,
select Connect on Demand. In the Max Idle Time field,
enter the number of minutes you want to have elapsed
before your Internet connection terminates. The default
Max Idle Time is 5 minutes
Keep Alive: Redial Period If you select this option,
Optional Settings
the Router will periodically check your Internet
connection. If you are disconnected, then the Router Router Name In this field, you can enter a name of up to
will automatically re-establish your connection. To use 39 characters to represent the Router.
this option, select Keep Alive. In the Redial Period field,
you specify how often you want the Router to check Host Name/Domain Name These fields allow you to
the Internet connection. The default Redial Period is supply a host and domain name for the Router. Some ISPs,
30 seconds. usually cable ISPs, require these names as identification.
You may have to check with your ISP to see if your
Telstra Cable broadband Internet service has been configured with a
host and domain name. In most cases, leaving these fields
Telstra Cable is a service that applies to connections in
blank will work.
Australia only. If your ISP uses HeartBeat Signal (HBS), then
select Telstra. MTU MTU is the Maximum Transmission Unit. It specifies
the largest packet size permitted for Internet transmission.
Select Manual if you want to manually enter the largest
packet size that is transmitted. To have the Router select
the best MTU for your Internet connection, keep the
default setting, Auto.
Size When Manual is selected in the MTU field, this option
Internet Connection Type > Telstra Cable is enabled. Leave this value in the 1200 to 1500 range. The
default size depends on the Internet Connection Type:
User Name and Password Enter the User Name and
Password provided by your ISP. DHCP, Static IP, or Telstra: 1500

Heart Beat Server This is the IP address of the Heartbeat PPPoE: 1492
Server. Your ISP will provide you with the IP Address you PPTP or L2TP: 1460
need to specify here.

Wireless-G Broadband Router 


Chapter 3 Advanced Configuration

Network Setup Static DNS (1-3) The Domain Name System (DNS) is how
the Internet translates domain or website names into
The Network Setup section changes the settings on the Internet addresses or URLs. Your ISP will provide you with at
network connected to the Routers Ethernet ports. Wireless least one DNS Server IP Address. If you wish to use another,
Setup is performed through the Wireless tab. enter that IP Address in one of these fields. You can enter up
to three DNS Server IP Addresses here. The Router will use
Router IP these for quicker access to functioning DNS servers.
This presents both the Routers IP Address and Subnet WINS The Windows Internet Naming Service (WINS)
Mask as seen by your network. manages each PCs interaction with the Internet. If you
use a WINS server, enter that servers IP Address here.
Otherwise, leave this blank.

Time Setting
Router IP Address
Select the time zone in which your network functions
Network Address Server Settings (DHCP) from this drop-down menu. (You can even automatically
adjust for daylight saving time.)
The settings allow you to configure the Routers Dynamic
Host Configuration Protocol (DHCP) server function. The
Router can be used as a DHCP server for your network. A
DHCP server automatically assigns an IP address to each
computer on your network. If you choose to enable the
Time Setting
Routers DHCP server option, make sure there is no other
DHCP server on your network. Click Save Settings to apply your changes, or click Cancel
Changes to cancel your changes.

Setup > DDNS


The Router offers a Dynamic Domain Name System (DDNS)
feature. DDNS lets you assign a fixed host and domain
name to a dynamic Internet IP address. It is useful when
you are hosting your own website, FTP server, or other
server behind the Router.
Before you can use this feature, you need to sign
Network Address Server Settings (DHCP)
up for DDNS service with a DDNS service provider,
DHCP Server DHCP is enabled by factory default. If you www.dyndns.org or www.TZO.com. If you do not want to
already have a DHCP server on your network, or you dont use this feature, keep the default setting, Disable.
want a DHCP server, then select Disable (no other DHCP
features will be available). DDNS
Starting IP Address Enter a value for the DHCP server to The Router offers a Dynamic Domain Name System (DDNS)
start with when issuing IP addresses. Because the Routers feature. DDNS lets you assign a fixed host and domain
default IP address is 192.168.1.1, the Starting IP Address must name to a dynamic Internet IP address. It is useful when
be 192.168.1.2 or greater, but smaller than 192.168.1.253. you are hosting your own website, FTP server, or other
The default Starting IP Address is 192.168.1.100. server behind the Router.

Maximum Number of DHCP Users Enter the maximum Before you can use this feature, you need to sign up for
number of PCs that you want the DHCP server to assign DDNS service at one of two DDNS service providers,
IP addresses to. This number cannot be greater than 253. DynDNS.org or TZO.com. If you do not want to use this
The default is 50. feature, keep the default setting, Disable.

Client Lease Time The Client Lease Time is the amount DDNS Service
of time a network user will be allowed connection to the
Router with their current dynamic IP address. Enter the If your DDNS service is provided by DynDNS.org, then
amount of time, in minutes, that the user will be leased select DynDNS.org from the drop-down menu. If your
this dynamic IP address. After the time is up, the user will DDNS service is provided by TZO, then select TZO.com.
be automatically assigned a new dynamic IP address. The The features available on the DDNS screen will vary,
default is 0 minutes, which means one day. depending on which DDNS service provider you use.

Wireless-G Broadband Router 


Chapter 3 Advanced Configuration

DynDNS.org
Setup > MAC Address Clone
A MAC address is a 12-digit code assigned to a unique
piece of hardware for identification. Some ISPs will require
you to register a MAC address in order to access the
Internet. If you do not wish to re-register the MAC address
with your ISP, you may assign the MAC address you have
currently registered with your ISP to the Router with the
MAC Address Clone feature.

Setup > DDNS > DynDNS

User Name Enter the User Name for your DDNS account.
Password Enter the Password for your DDNS account.
Host Name The is the DDNS URL assigned by the DDNS
service.
Internet IP Address The Routers Internet IP address is Setup > MAC Address Clone
displayed here. Because it is dynamic, it will change.
Status The status of the DDNS service connection is
MAC Address Clone
displayed here. Enable/Disable To have the MAC Address cloned, select
Click Save Settings to apply your changes, or click Cancel Enable.
Changes to cancel your changes. User Defined Entry Enter the MAC Address registered
with your ISP here.
TZO.com
Clone Your PCs MAC Clicking this button will clone the
MAC address of the computer you are using.
Click Save Settings to apply your changes, or click Cancel
Changes to cancel your changes.

Setup > Advanced Routing


This screen is used to set up the Routers advanced routing
functions. NAT routes the host Routers network connection
to the Internet. Dynamic Routing automatically adjusts
how packets travel on your network. Static Routing sets
up a fixed route to another network destination.

Setup > DDNS > TZ O

E-mail Address, TZO Key, and Domain Name Enter the


settings of the account you set up with TZO.
Internet IP Address The Routers Internet IP address is
displayed here. Because it is dynamic, it will change.
Status The status of the DDNS service connection is
displayed here.

Click Save Settings to apply your changes, or click Cancel


Setup > Advanced Routing (Gateway)
Changes to cancel your changes.

Wireless-G Broadband Router 


Chapter 3 Advanced Configuration

Subnet Mask The Subnet Mask determines which


portion of a Destination LAN IP address is the network
portion, and which portion is the host portion.
Default Gateway This is the IP address of the gateway
device that allows for contact between the Router and the
remote network or host.
Interface This interface tells you whether the Destination
IP Address is on the LAN & Wireless (Ethernet and wireless
networks) or the WAN (Internet).
Delete This Entry To delete a route, select its number
from the drop-down menu, and click this button.
Show Routing Table Click Show Routing Table to open
a screen displaying how data is routed through your local
network. For each route, the Destination LAN IP address,
Setup > Advanced Routing (Router )
Subnet Mask, Gateway, and Interface are displayed. Click
Refresh to update the information. Click Close to exit this
screen.
Advanced Routing
Operating Mode Select the mode in which this Router
will function. If this Router is hosting your networks
connection to the Internet, select Gateway. If another
Router exists on your network, select Router. When
Router is chosen, Dynamic Routing will be available as
an option. Routing Table

Dynamic Routing Click Save Settings to apply your changes, or click Cancel
Changes to cancel your changes.
RIP This feature enables the Router to automatically
adjust to physical changes in the networks layout and
exchange routing tables with the other router(s). The
Wireless > Basic Wireless Settings
Router determines the network packets route based on The basic settings for wireless networking are set on this
the fewest number of hops between the source and the screen.
destination. This feature is Disabled by default. From the
There are two ways to configure the Routers wireless
drop-down menu, you can also select LAN & Wireless,
network(s), manual and Wi-Fi Protected Setup.
which performs dynamic routing over your Ethernet and
wireless networks. You can also select WAN (Internet), Wi-Fi Protected Setup is a feature that makes it easy to set
which performs dynamic routing with data coming from up your wireless network. If you have client devices, such
the Internet. Finally, selecting Both enables dynamic as wireless adapters, that support Wi-Fi Protected Setup,
routing for both networks, as well as data from the then you can use Wi-Fi Protected Setup.
Internet.
Wireless Configuration To manually configure your
Select set number To set up a static route between the wireless network, select Manual. Proceed to the Basic
Router and another network, select a number from the Wireless Settings section. To use Wi-Fi Protected Setup,
Static Routing drop-down list. (A static route is a pre- select Wi-Fi Protected Setup. Proceed to the Wi-Fi
determined pathway that network information must travel Protected Setup section.
to reach a specific host or network.) Enter the information
described below to set up a new static route. (Click the
Delete This Entry button to delete a static route.)
Enter Route Name Enter a name for the Route here,
using a maximum of 25 alphanumeric characters.
Destination LAN IP The Destination LAN IP is the address
of the remote network or host to which you want to assign
a static route.

Wireless-G Broadband Router 


Chapter 3 Advanced Configuration

Basic Wireless Settings Wi-Fi Protected Setup


There are three methods available. Use the method that
applies to the client device you are configuring.

Wireless > Basic Wireless Settings (Manual Setup)

Wireless Network Mode From this drop-down menu,


you can select the wireless standards running on your
network. If you have Wireless-N, Wireless-G, and Wireless-B
devices in your network, keep the default setting, Mixed.
If you have only Wireless-G and Wireless-B devices in your
network, select BG-Mixed. If you have only Wireless-N
devices, select Wireless-N Only. If you have only Wireless-G Wireless > Basic Wireless Settings (Wi-Fi Protected Setup)
devices, select Wireless-G Only. If you have only Wireless-
B devices, select Wireless-B Only. If you do not have any
wireless devices in your network, select Disabled.
Wireless Network Name (SSID) The SSID is the network
name shared among all points in a wireless network.
The SSID must be identical for all devices in the wireless
network. It is case-sensitive and must not exceed
32 characters (use any of the characters on the keyboard).
Make sure this setting is the same for all points in your
wireless network. For added security, you should change
the default SSID (linksys) to a unique name.
Wireless Channel Select the channel from the list
provided to correspond with your network settings. All
devices in your wireless network must be broadcast on
the same channel in order to function correctly.
Wireless SSID Broadcast When wireless clients survey
the local area for wireless networks to associate with, they Wi-Fi Protected Setup > Congratulations
will detect the SSID broadcast by the Router. To broadcast
the Routers SSID, keep the default setting, Enabled. If you NOTE: Wi-Fi Protected Setup configures one
do not want to broadcast the Routers SSID, then select client device at a time. Repeat the instructions
Disabled. for each client device that supports Wi-Fi
Click Save Settings to apply your changes, or click Cancel Protected Setup.
Changes to cancel your changes.
Method #1
Use this method if your client device has a Wi-Fi Protected
Setup button.
1. Click or press the Wi-Fi Protected Setup button on
the client device.
2. Click the WiFi Protected Setup button on this
screen.

Wireless-G Broadband Router 


Chapter 3 Advanced Configuration

3. After the client device has been configured, click WPA Personal
OK. Then refer back to your client device or its
documentation for further instructions. NOTE: If you are using WPA, always remember
Method #2 that each device in your wireless network MUST
use the same WPA method and shared key, or
Use this method if your client device has a Wi-Fi Protected else the network will not function properly.
Setup PIN number.
1. Enter the PIN number in the field on this screen.
2. Click Register.
3. After the client device has been configured, click
OK. Then refer back to your client device or its
documentation for further instructions.
Method #3
Use this method if your client device asks for the Routers
PIN number.
1. Enter the PIN number listed on this screen. (It is also
listed on the label on the bottom of the Router.) Security Mode > WPA Personal
2. After the client device has been configured, click
WPA Algorithm WPA supports two encryption methods,
OK. Then refer back to your client device or its
TKIP and AES, with dynamic encryption keys. Select
documentation for further instructions.
the type of algorithm, TKIP or AES. (AES is a stronger
The Wi-Fi Protected Setup Status, Network Name (SSID), encryption method than TKIP.)
Security, Encryption, and Passphrase are displayed at the
bottom of the screen. WPA Shared Key Enter the key shared by the Router and
your other network devices. It must have 8-63 characters.
NOTE: If you have client devices that do not Group Key Renewal Enter a Key Renewal period, which
support Wi-Fi Protected Setup, note the wireless tells the Router how often it should change the encryption
settings, and then manually configure those keys. The default Group Key Renewal period is 3600
client devices. seconds.

WPA Enterprise
Wireless > Wireless Security This option features WPA used in coordination with a
The Wireless Security settings configure the security of RADIUS server. (This should only be used when a RADIUS
your wireless network. There are six wireless security server is connected to the Router.)
mode options supported by the Router: WPA Personal,
WPA Enterprise, WPA2 Personal, WPA2 Enterprise, RADIUS,
and WEP. (WPA stands for Wi-Fi Protected Access, which is
a security standard stronger than WEP encryption. WPA2
is a more advanced, more secure version of WPA. WEP
stands for Wired Equivalent Privacy, and RADIUS stands
for Remote Authentication Dial-In User Service.) These
six are briefly discussed here. For detailed instructions
on configuring wireless security for the Router, refer to
Chapter 2: Wireless Security.

Wireless Security
Security Mode > WPA Enterprise
Security Mode
WPA Algorithm WPA supports two encryption m ethods,
Select the security method for your wireless network. If TKIP and AES, with dynamic encryption keys. Select
you do not want to use wireless security, keep the default, the type of algorithm, TKIP or AES. (AES is a stronger
Disabled. encryption method than TKIP.)

Wireless-G Broadband Router 10


Chapter 3 Advanced Configuration

RADIUS Server Address Enter the IP Address of the WPA Algorithm WPA2 supports two encryption
RADIUS server. methods, TKIP and AES, with dynamic encryption keys.
Select the type of algorithm, AES, or TKIP+AES. The
RADIUS Port Enter the port number of the RADIUS
default selection is AES
server. The default value is 1812.
RADIUS Server Address Enter the IP Address of the
Shared Key Enter the key shared between the Router
RADIUS server.
and the server.
RADIUS Port Enter the port number of the RADIUS
Key Renewal Timeout Enter a Key Renewal Timeout
server. The default value is 1812.
period, which instructs the Router how often it should
change the encryption keys. The default Key Renewal Shared Key Enter the key shared between the Router
Timeout period is 3600 seconds. and the server.

WPA2 Personal Key Renewal Timeout Enter a Key Renewal Timeout


period, which instructs the Router how often it should
change the encryption keys. The default Key Renewal
Timeout period is 3600 seconds.

RADIUS
This option features WEP used in coordination with a
RADIUS server. (This should only be used when a RADIUS
server is connected to the Router.)

Security Mode > WPA2 Personal

WPA Algorithm WPA2 supports two encryption


methods, TKIP and AES, with dynamic encryption keys.
Select the type of algorithm, AES, or TKIP+AES. The
default selection is AES.
WPA Shared Key Enter a WPA Shared Key of 8-63
characters.
Group Key Renewal Enter a Group Key Renewal period,
which instructs the Router how often it should change the
encryption keys. The default Group Key Renewal period is
3600 seconds. Security Mode > RADIUS

WPA2 Enterprise
IMPORTANT: If you are using WEP encryption,
This option features WPA2 used in coordination with a always remember that each device in your
RADIUS server. (This should only be used when a RADIUS wireless network MUST use the same WEP
server is connected to the Router. encryption method and encryption key, or else
your wireless network will not function properly.

RADIUS Server Address Enter the IP Address of the


RADIUS server.
RADIUS Port Enter the port number of the RADIUS
server. The default value is 1812.
Shared Key Enter the key shared between the Router
and the server.
Default Transmit Key Select a Default Transmit Key
(choose which Key to use). The default is 1.
WEP Encryption Select a level of WEP encryption,
Security Mode > WPA2 Enterprise 64 bits 10 hex digits or 128 bits 26 hex digits. The
default is 64 bits 10 hex digits.
Wireless-G Broadband Router 11
Chapter 3 Advanced Configuration

Passphrase Enter a Passphrase to automatically generate Wireless MAC Filter


WEP keys. Then click Generate.
Wireless MAC Filter To filter wireless users by MAC Address,
Key 1-4 If you did not enter a Passphrase, enter the WEP either permitting or blocking access, click Enable. If you do
key(s) manually. not wish to filter users by MAC Address, keep the default
WEP setting, Disable.
Prevent Select this to block wireless access by MAC
WEP is a basic encryption method, which is not as secure
Address. This button is selected by default.
as WPA.
Permit Only Select this to allow wireless access by MAC
Address. This button is not selected by default.
Edit MAC Filter List Click this to open the MAC Address
Filter List screen. On this screen, you can list users, by MAC
Address, to whom you wish to provide or block access. For
easy reference, click Wireless Client MAC List to display a list
of network users by MAC Address.

Security Mode > WEP

Default Transmit Key Select a Default Transmit Key


(choose which Key to use). The default is 1.
WEP Encryption Select a level of WEP encryption, 64bits
10 hex digits or 128 bits 26 hex digits. The default is
64bits 10 hex digits.
Passphrase Enter a Passphrase to automatically generate
WEP keys. Then click Generate.
Key 1-4 If you did not enter a Passphrase, enter the WEP
key(s) manually.
Click Save Settings to apply your changes, or click Cancel MAC Address Filter List
Changes to cancel your changes.
Click Save Settings to apply your changes, or click Cancel
Wireless > Wireless MAC Filter Changes to cancel your changes.

Wireless access can be filtered by using the MAC addresses


of the wireless devices transmitting within your networks
Wireless > Advanced Wireless Settings
radius. This Wireless > Advanced Wireless Settings screen is used
to set up the Routers advanced wireless functions. These
settings should only be adjusted by an expert administrator
as incorrect settings can reduce wireless performance.

Wireless > Wireless MAC Filter

Wireless-G Broadband Router 12


Chapter 3 Advanced Configuration

manufacturer of your wireless products. To turn on the


Frame Burst option, select Enable. The default is Disable.
Beacon Interval The default value is 100. Enter a value
between 1 and 65,535 milliseconds. The Beacon Interval
value indicates the frequency interval of the beacon. A
beacon is a packet broadcast by the Router to synchronize
the wireless network.
DTIM Interval This value, between 1 and 255, indicates
the interval of the Delivery Traffic Indication Message
(DTIM). A DTIM field is a countdown field informing
clients of the next window for listening to broadcast
and multicast messages. When the Router has buffered
broadcast or multicast messages for associated clients, it
Wireless > Advanced Wireless Settings sends the next DTIM with a DTIM Interval value. Its clients
hear the beacons and awaken to receive the broadcast
Advanced Wireless and multicast messages. The default value is 1.

Authentication Type The default is set to Auto, which Fragmentation Threshold This value specifies the
allows either Open System or Shared Key authentication maximum size for a packet before data is fragmented
to be used. With Open System authentication, the sender into multiple packets. If you experience a high packet
and the recipient do NOT use a WEP key for authentication. error rate, you may slightly increase the Fragmentation
With Shared Key authentication, the sender and recipient Threshold. Setting the Fragmentation Threshold too low
use a WEP key for authentication. may result in poor network performance. Only minor
reduction of the default value is recommended. In most
Basic Rate The Basic Rate setting is not actually one rate cases, it should remain at its default value of 2346.
of transmission but a series of rates at which the Router
can transmit. The Router will advertise its Basic Rate to the RTS Threshold Should you encounter inconsistent data
other wireless devices in your network, so they know which flow, only minor reduction of the default value, 2347, is
rates will be used. The Router will also advertise that it will recommended. If a network packet is smaller than the
automatically select the best rate for transmission. The preset RTS threshold size, the RTS/CTS mechanism will
default setting is Default, when the Router can transmit not be enabled. The Router sends Request to Send (RTS)
at all standard wireless rates (1-2Mbps, 5.5Mbps, 11Mbps, frames to a particular receiving station and negotiates
18Mbps, and 24Mbps). Other options are 1-2Mbps, for the sending of a data frame. After receiving an RTS, the
use with older wireless technology, and All, when the wireless station responds with a Clear to Send (CTS) frame
Router can transmit at all wireless rates. The Basic Rate to acknowledge the right to begin transmission. The RTS
is not the actual rate of data transmission. If you want to Threshold value should remain at its default value of
specify the Routers rate of data transmission, configure 2347.
the Transmission Rate setting. AP Isolation This isolates all wireless clients and wireless
Transmission Rate The rate of data transmission should devices on your network from each other. Wireless devices
be set depending on the speed of your wireless network. will be able to communicate with the Router but not with
You can select from a range of transmission speeds, or you each other. To use this function, select On. AP Isolation is
can select Auto to have the Router automatically use the turned Off by default.
fastest possible data rate and enable the Auto-Fallback SecureEasySetup This feature allows you to enable or
feature. Auto-Fallback will negotiate the best possible disable the SecureEasySetup feature. Select Disabled to
connection speed between the Router and a wireless disable the feature and turn off the buttons light. The
client. The default value is Auto. feature is Enabled by default.
CTS Protection Mode CTS (Clear-To-Send) Protection Click Save Settings to apply your changes, or click Cancel
Mode should remain disabled unless you are having severe Changes to cancel your changes.
problems with your Wireless-G products not being able
to transmit to the Router in an environment with heavy
802.11b traffic. This function boosts the Routers ability
to catch all Wireless-G transmissions but will severely
decrease performance.
Frame Burst Enabling this option should provide your
network with greater performance, depending on the

Wireless-G Broadband Router 13


Chapter 3 Advanced Configuration

Security > Firewall Security > VPN Passthrough


The Security > Firewall screen is used to configure a firewall The Security > VPN Passthrough screen allows you to enable
that can filter out various types of unwanted traffic on the VPN tunnels using IPSec, PPTP, or L2TP protocols to pass
Routers local network. through the Routers firewall.

Security > VPN Passthrough


Security > Firewall

VPN Passthrough
Firewall IPSec Passthrough Internet Protocol Security (IPSec) is
Firewall Protection To use firewall protection, keep the a suite of protocols used to implement secure exchange
default selection, Enable. To turn off firewall protection, of packets at the IP layer. To allow IPSec tunnels to pass
select Disable. through the Router, keep the default, Enable.
PPTP Passthrough Point-to-Point Tunneling Protocol
Block WAN Requests
(PPTP) allows the Point-to-Point Protocol (PPP) to be
Block Anonymous Internet Requests This feature tunneled through an IP network. To allow PPTP tunnels to
makes it more difficult for outside users to work their pass through the Router, keep the default, Enable.
way into your network. This feature is selected by default. L2TP Passthrough Layer 2 Tunneling Protocol is the
Deselect the feature to allow anonymous Internet method used to enable Point-to-Point sessions via the
requests. Internet on the Layer 2 level. To allow L2TP tunnels to pass
Filter Multicast Multicasting allows for multiple through the Router, keep the default, Enable.
transmissions to specific recipients at the same time. If Click Save Settings to apply your changes, or click Cancel
multicasting is permitted, then the Router will allow IP Changes to cancel your changes.
multicast packets to be forwarded to the appropriate
computers. This feature is selected by default. Deselect
this feature to disable it.
Access Restrictions > Internet Access
Filter Internet NAT Redirection This feature uses The Access Restrictions > Internet Access screen allows you
port forwarding to block access to local servers from to block or allow specific kinds of Internet usage and
local networked computers. Select Filter Internet NAT traffic, such as Internet access, designated services, and
Redirection to filter Internet NAT redirection. This feature websites during specific days and times.
is not selected by default.
Filter IDENT (Port 113) This feature keeps port 113 from
being scanned by devices outside of your local network.
This feature is selected by default. Deselect this feature to
disable it.
Click Save Settings to apply your changes, or click Cancel
Changes to cancel your changes.

Wireless-G Broadband Router 14


Chapter 3 Advanced Configuration

select a PC by MAC Address or IP Address. You can also


enter a range of IP Addresses if you want this policy
to affect a group of PCs. After making your changes,
click Save Settings to apply your changes or Cancel
Changes to cancel your changes. Then click Close.

List of PCs

5. Select the appropriate option, Deny or Allow,


depending on whether you want to block or allow
Internet access for the PCs you listed on the List of PCs
Access Restrictions > Internet Access
screen.
6. Decide which days and what times you want this policy
Internet Access to be enforced. Select the individual days during which
the policy will be in effect, or select Everyday. Then
Internet Access Policy Access can be managed by a enter a range of hours and minutes during which the
policy. Use the settings on this screen to establish an policy will be in effect, or select 24 Hours.
access policy (after Save Settings is clicked). Selecting a 7. Select any Blocked Services or Website Blocking you
policy from the drop-down menu will display that policys wish to use.
settings. To delete a policy, select that policys number
and click Delete. To view all the policies, click Summary. 8. Click Save Settings to save the policys settings, or
(Policies can be deleted from the Summary screen by click Cancel Changes to cancel the policys settings.
selecting the policy or policies and clicking Delete. To Blocked Services
return to the Internet Access tab, click Close.)
You can filter access to various services accessed over the
Internet, such as FTP or telnet, by selecting services from
the drop-down menus next to Blocked Services. (You can
block up to 20 services.) Then enter the range of ports you
want to filter.
If the service you want to block is not listed or you want to
edit a services settings, then click Add/Edit Service. Then
Internet Policy Summary
the Port Services screen will appear.

Status Policies are disabled by default. To enable a policy,


select the policy number from the drop-down menu, and
select Enable.

To create an Internet Access policy:


1. Select a number from the Internet Access Policy drop-
down menu.
Port Services
2. To enable this policy, select Enable.
3. Enter a Policy Name in the field provided. To add a service, enter the services name in the Service
Name field. Select its protocol from the Protocol drop-
4. Click Edit List of PCs to select which PCs will be affected
down menu, and enter its range in the Port Range fields.
by the policy. The List of PCs screen appears. You can
Then click Add.
Wireless-G Broadband Router 15
Chapter 3 Advanced Configuration

To modify a service, select it from the list on the right. Application In this field, enter the name you wish to give
Change its name, protocol setting, or port range. Then the application. Each name can be up to 12 characters.
click Modify.
Start/End This is the port range. Enter the number that
To delete a service, select it from the list on the right. Then starts the port range in the Start column and the number
click Delete. that ends the range in the End column.
When you are finished making changes on the Port Protocol Select the protocol used for this application,
Services screen, click Apply to save the changes. If you either TCP or UDP, or Both.
want to cancel your changes, click Cancel. To close the
IP Address For each application, enter the IP Address of
Port Services screen and return to the Access Restrictions
the PC running the specific application.
screen, click Close.
Enable Select Enable to enable port forwarding for the
Website Blocking by URL Address relevant application.
If you want to block websites with specific URL addresses, Click Save Settings to apply your changes, or click Cancel
enter each URL in a separate field next to Website Blocking Changes to cancel your changes.
by URL Address.

Website Blocking by Keyword


Applications & Gaming > Port Triggering
The Applications & Gaming > Port Triggering screen allows
If you want to block websites using specific keywords, the Router to watch outgoing data for specific port
enter each keyword in a separate field next to Website numbers. The IP address of the computer that sends the
Blocking by Keyword. matching data is remembered by the Router, so that when
Click Save Settings to apply your changes, or click Cancel the requested data returns through the Router, the data is
Changes to cancel your changes. pulled back to the proper computer by way of IP address
and port mapping rules.
Applications and Gaming > Port Range
Forward
The Applications & Gaming > Port Range Forward screen
allows you to set up public services on your network, such as
web servers, ftp servers, e-mail servers, or other specialized
Internet applications. (Specialized Internet applications are
any applications that use Internet access to perform functions
such as videoconferencing or online gaming. Some Internet
applications may not require any forwarding.)

Applications and Gaming > Port Triggering

Port Triggering
Application Enter the application name of the trigger.

Triggered Range
For each application, list the triggered port number range.
Check with the Internet application documentation for
the port number(s) needed.
Applications and Gaming > Port Range Forward
Start Port Enter the starting port number of the Triggered
Range.
Port Range Forward End Port Enter the ending port number of the Triggered
To forward a port, enter the information on each line for Range.
the criteria required.

Wireless-G Broadband Router 16


Chapter 3 Advanced Configuration

Forwarded Range QoS


For each application, list the forwarded port number Enable/Disable To enable QoS, select Enable. Otherwise,
range. Check with the Internet application documentation select Disable. QoS is disabled by default.
for the port number(s) needed.
Upstream Bandwidth Select Auto or Manual from
Start Port Enter the starting port number of the the drop-down menu. Manual allows you to specify the
Forwarded Range. maximum outgoing bandwidth that applications can
End Port Enter the ending port number of the Forwarded utilize.
Range.
Enable Select Enable to enable port triggering for the
applicable application.
Click Save Settings to apply your changes, or click Cancel
Changes to cancel your changes.

Applications and Gaming > DMZ


The DMZ feature allows one network computer to be
exposed to the Internet for use of a special-purpose
service such as Internet gaming or videoconferencing.
DMZ hosting forwards all the ports at the same time to
one PC. The Port Range Forward feature is more secure
because it only opens the ports you want to have opened,
while DMZ hosting opens all the ports of one computer,
exposing the computer to the Internet.

Applications and Gaming > QoS

Applications and Gaming > DMZ


Device Priority
DMZ Enter the name of your network device in the Device name
field, enter its MAC Address, and then select its priority
Any PC whose port is being forwarded must have its DHCP from the drop-down menu.
client function disabled and should have a new static IP
address assigned to it because its IP address may change Ethernet Port Priority
when using the DHCP function.
Ethernet Port Priority QoS allows you to prioritize
To expose one PC, select Enable. Then, enter the performance for the Routers four ports, LAN Ports 1-4. For
computers IP address in the DMZ Host IP Address field. This each port, select the priority and flow control setting.
feature is disabled by default.
Priority Select High or Low in the Priority column. The
Click Save Settings to apply your changes, or click Cancel Routers four ports have been assigned low priority by
Changes to cancel your changes. default.
Flow Control If you want the Router to control the
Applications and Gaming > QoS transmission of data between network devices, select
Quality of Service (QoS) ensures better service to Enabled. To disable this feature, select Disabled. Ethernet
high-priority types of network traffic, which may Port Priority QoS does not require support from your ISP
involve demanding, real-time applications, such as because the prioritized ports LAN ports 1-4 are in your
videoconferencing. network. This feature is enabled by default.

There are three types of QoS available: Device Priority,


Ethernet Port Priority, and Application Priority.
Wireless-G Broadband Router 17
Chapter 3 Advanced Configuration

Application Priority
Application Priority QoS manages information as it is
transmitted and received. Depending on the settings of
the QoS screen, this feature will assign information a high
or low priority for the applications that you specify.
Optimize Gaming Applications Select this to
automatically allow common game application ports
to have a higher priority. These games include, but are
not limited to: Counter-Strike, Half-Life, Age of Empires,
Everquest, Quake2/Quake3, and Diablo II. The default
setting is unselected.
Application Name Enter the name you wish to give the
application in the Application Name field.
Priority Select High or Low to assign priority to the Administration > Management
application. The default selection is Low.
Specific Port # Enter the port number for the Router Password
application.
Local Router Access
Wireless QoS Router Password Enter a new Password for the Router.
WMM Support Wi-Fi Multimedia (WMM), formerly
Re-enter to confirm Enter the Password again to confirm.
known as Wireless Multimedia Extensions (WME), is
a Wi-Fi Alliance certified feature, based on the IEEE Web Access
802.11e standard. This feature provides QoS to wireless
networks. It is especially suitable for voice, music and Access Server HTTP (HyperText Transport Protocol) is
video applications; for example, Voice over IP (VoIP), video the communications protocol used to connect to servers
streaming, and interactive gaming. If you have other on the World Wide Web. HTTPS uses SSL (Secured Socket
devices on your wireless network that support WMM, Layer) to encrypt data transmitted for higher security.
select Enabled. Otherwise, keep the default, Disabled. Select HTTP or HTTPS. The default selection is HTTP.
No Acknowledgement This feature prevents the Router Wireless Access Web If you are using the Router in
from re-sending data if an error occurs. To use this feature, a public domain where you are giving wireless access
select Enabled. Otherwise, keep the default setting, to your guests, you can disable wireless access to the
Disabled. Routers web-based utility. You will only be able to access
the web-based utility via a wired connection if you disable
Click Save Settings to apply your changes, or click Cancel the setting. Keep the default, Enable, to enable wireless
Changes to cancel your changes. access to the Routers web-based utility, or select Disable
to disable wireless access to the utility.
Administration > Management
Remote Router Access
The Administration > Management screen allows the
networks administrator to manage specific Router Remote Management To access the Router remotely,
functions for access and security. from outside the network, select Enable.
Management Port Enter the port number that will be
open to outside access. You will need to enter the Routers
password when accessing the Router this way, as usual.
Use https To require the use of HTTPS for remote access,
select this feature.

UPnP
UPnP Keep the default, Enable to enable the UPnP
feature; otherwise, select Disable.
Click Save Settings to apply your changes, or click Cancel
Changes to cancel your changes.

Wireless-G Broadband Router 18


Chapter 3 Advanced Configuration

Administration > Log


The Router can keep logs of all traffic for your Internet
connection.

The Ping Test

Administration > Log


Traceroute Test
Log Traceroute To test the performance of a connection,
click Traceroute to open the Traceroute Test screen. Enter
Log To disable the Log function, keep the default setting, the address of the PC whose connection you wish to test
Disable. To monitor traffic between the network and the and click Traceroute. The Traceroute Test screen will show
Internet, select Enable. if the test was successful. To stop the test, click Stop. Click
When you wish to view the logs, click Incoming Log or Clear Log to clear the screen. Click Close to return to the
Outgoing Log, depending on which you wish to view. Diagnostics screen.

Click Save Settings to apply your changes, or click Cancel


Changes to cancel your changes.

Administration > Diagnostics


The diagnostic tests (Ping and Traceroute) allow you to
check the connections of your network components.

The Traceroute Test

Administration > Factory Defaults


The Administration > Factory Defaults screen allows you
to restore the Routers configuration to its factory default
settings.
Administration > Diagnostics
Factory Defaults
Ping Test Restore Factory Defaults To reset the Routers settings
to the default values, select Yes, and then click Save
Ping The Ping test checks the status of a connection. Settings. Any settings you have saved will be lost when
Click Ping to open the Ping Test screen. Enter the address the default settings are restored.
of the PC whose connection you wish to test and how
many times you wish to test it. Then, click Ping. The Ping
Test screen will show if the test was successful. To stop the
test, click Stop. Click Clear Log to clear the screen. Click
Close to return to the Diagnostics screen.

Administration > Factory Defaults

Wireless-G Broadband Router 19


Chapter 3 Advanced Configuration

Administration > Upgrade Firmware Status > Router


The Administration > Upgrade Firmware screen allows you The Status > Router screen displays the Routers current
to upgrade the Routers firmware. Do not upgrade the status.
firmware unless you are experiencing problems with the
Router or the new firmware has a feature you want to use.

Administration > Upgrade Firmware

Before upgrading the firmware, download the Routers


firmware upgrade file from the Linksys website, www.
linksys.com. Then extract the file.
Status > Router
Upgrade Firmware
Please select a file to upgrade Click Browse and select Router Information
the extracted firmware upgrade file. Then click Upgrade
and follow the on-screen instructions. Firmware Version This is the Routers current firmware.
Current Time This shows the time, as you set on the
Administration > Config Management Setup tab.
This screen is used to back up or restore the Routers MAC Address This is the Routers MAC Address, as seen
configuration file. by your ISP.
Router Name This is the specific name for the Router,
which you set on the Setup tab.
Host Name If required by your ISP, this would have been
entered on the Setup tab.
Domain Name If required by your ISP, this would have
been entered on the Setup tab.

Internet
Configuration Type
This section shows the current network information
stored in the Router. The information varies depending on
Administration > Config Management
the Internet connection type selected on the Setup > Basic
Setup screen.
Backup Configuration Click Refresh to update the on-screen information.
To back up the Routers configuration file, click Backup.
Then follow the on-screen instructions.

Restore Configuration
Please select a file to restore Click Browse and select
the configuration file. Then click Restore.

Wireless-G Broadband Router 20


Chapter 3 Advanced Configuration

Status > Local Network Status > Wireless


The Status > Local Network screen displays the status of The Status > Wireless screen displays the status of your
your network. wireless network.

Status > Local Network

Local Network Status > Wireless

MAC Address This is the Routers MAC Address, as seen Wireless


on your local, Ethernet network.
MAC Address This is the Routers MAC Address, as seen
IP Address This shows the Routers IP Address, as it
on your local, wireless network.
appears on your local, Ethernet network.
Mode As selected from the Wireless > Basic Wireless
Subnet Mask This shows the current subnet mask being
Settings screen, this displays the wireless mode (Mixed, G-
configured for your local network.
Only, or Disabled) used by the network.
DHCP Server If you are using the Router as a DHCP server,
SSID As entered on the Wireless > Basic Wireless Settings
that will be displayed here.
screen, this displays the wireless network name or SSID.
Start IP Address For the range of IP Addresses used by
DHCP Server The status of the DHCP server function is
devices on your local, Ethernet network, the beginning of
displayed here.
that range is shown here.
Channel As entered on the Wireless > Basic Wireless
End IP Address For the range of IP Addresses used by
Settings screen, this displays the channel on which your
devices on your local, Ethernet network, the end of that
wireless network is broadcasting.
range is shown here.
Encryption Function As selected on the Wireless >
DHCP Clients Table Clicking this button will open a
Wireless Security screen, this displays the status of the
screen to show you which PCs are utilizing the Router as a
Routers wireless security.
DHCP server. You can delete PCs from that list, and sever
their connections, by checking a Delete box and clicking Click Refresh to update the on-screen information.
the Delete button.

DHCP Clients Table

Click Refresh to update the on-screen information.

Wireless-G Broadband Router 21


Appendix A Troubleshooting

Appendix A: When you double-click the web browser, you are


prompted for a username and password. If you want to
Troubleshooting get rid of the prompt, follow these instructions.
Launch the web browser and perform the following steps
(these steps are specific to Internet Explorer but are similar
Your computer cannot connect to the Internet.
for other browsers):
Follow these instructions until your computer can connect 1. Select Tools > Internet Options.
to the Internet:
2. Click the Connections tab.
Make sure that the Router is powered on. The Power
LED should be green and not flashing. 3. Select Never dial a connection.

If the Power LED is flashing, then power off all of 4. Click OK.
your network devices, including the modem, Router,
The Router does not have a coaxial port for the cable
and computers. Then power on each device in the
connection.
following order:
1. Cable or DSL modem The Router does not replace your modem. You still need
your cable modem in order to use the Router. Connect your
2. Router cable connection to the cable modem, insert the setup
3. Computer CD into your computer, and then follow the onscreen
instructions.
Check the cable connections. The computer should
be connected to one of the ports numbered 1-4 on The computer cannot connect wirelessly to the network.
the Router, and the modem must be connected to the
Internet port on the Router. Make sure the wireless network name or SSID is the same
on both the computer and the Router. If you have enabled
The modem does not have an Ethernet port. wireless security, then make sure the same security
method and key are used by both the computer and the
The modem is a dial-up modem for traditional dial-up
Router.
service. To use the Router, you need a cable/DSL modem
and high-speed Internet connection. You need to modify the settings on the Router.
You cannot use the DSL service to connect manually to Open the web browser (for example, Internet Explorer or
the Internet. Firefox), and enter the Routers IP address in the address
field (the default IP address is 192.168.1.1). When
After you have installed the Router, it will automatically
prompted, leave the User name field blank and enter the
connect to your Internet Service Provider (ISP), so you no
password to the Router (the default is admin). Click the
longer need to connect manually.
appropriate tab to change the settings.
The DSL telephone line does not fit into the Routers
Internet port.
The Router does not replace your modem. You still need WEB: If your questions are not addressed here,
your DSL modem in order to use the Router. Connect refer to the Linksys website, www.linksys.com.
the telephone line to the DSL modem, insert the setup
CD into your computer, and then follow the onscreen
instructions.

Wireless-G Broadband Router 22


Appendix B Specifications

Appendix B:
Specifications
Model WRT54G2
Standards IEEE 802.3, IEEE 802.3u,
IEEE 802.11g, IEEE 802.11b
Ports Internet: One 10/100 RJ-45 Port
Button Reset
LEDs Power, WLAN, LAN (1-4),
Internet, Wifi Protected Setup
(WPS)
Cabling Type CAT5
# of Antennas 2 Internal Antennas
RF Power Output 18dBm
UPnP able/cert Able
Security Features Stateful Packet Inspection (SPI)
Firewall, Internet Policy
Wireless Security Wi-Fi Protected Access2 (WPA2),
WEP, Wireless MAC Filtering
Environmental
Dimensions 7.99" x 1.38" x 6.30"
(203 x 35 x 160 mm)
Weight 9.88 oz (280 g)
Power External, 12V DC, 0.5A
Certifications FCC, CE, IC-UL Wi-Fi (802.11b,
802.11g), WPA2, WMM
Operating Temp. 32 to 104F (0 to 40C)
Storage Temp. -4 to 140F (-20 to 60C)
Operating Humidity 10 to 85%, Noncondensing
Storage Humidity 5 to 90%, Noncondensing

Wireless-G Broadband Router 23


Appendix C Warranty and Regulatory Information

Appendix C: TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT


WILL LINKSYS BE LIABLE FOR ANY LOST DATA, REVENUE
Warranty and Regulatory OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL,
INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF THE
Information THEORY OF LIABILITY (INCLUDING NEGLIGENCE), ARISING
OUT OF OR RELATED TO THE USE OF OR INABILITY TO
USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN
Limited Warranty IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES. IN NO EVENT WILL LINKSYS LIABILITY
Linksys warrants to You that, for a period of one year EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT.
(the "Warranty Period"), your Linksys Product will be The foregoing limitations will apply even if any warranty or
substantially free of defects in materials and workmanship remedy provided under this Agreement fails of its essential
under normal use. Your exclusive remedy and Linksys purpose. Some jurisdictions do not allow the exclusion or
entire liability under this warranty will be for Linksys at limitation of incidental or consequential damages, so the
its option to repair or replace the Product or refund Your above limitation or exclusion may not apply to You.
purchase price less any rebates. This limited warranty
Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine,
extends only to the original purchaser.
CA 92623.
If the Product proves defective during the Warranty
Period call Linksys Technical Support in order to obtain
a Return Authorization Number, if applicable. BE SURE
TO HAVE YOUR PROOF OF PURCHASE ON HAND WHEN
CALLING. If You are requested to return the Product, mark
the Return Authorization Number clearly on the outside
of the package and include a copy of your original proof
of purchase. RETURN REQUESTS CANNOT BE PROCESSED
WITHOUT PROOF OF PURCHASE. You are responsible
for shipping defective Products to Linksys. Linksys pays
for UPS Ground shipping from Linksys back to You only.
Customers located outside of the United States of America
and Canada are responsible for all shipping and handling
charges.
ALL IMPLIED WARRANTIES AND CONDITIONS OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE ARE LIMITED TO THE DURATION OF
THE WARRANTY PERIOD. ALL OTHER EXPRESS OR
IMPLIED CONDITIONS, REPRESENTATIONS AND
WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
NONINFRINGEMENT, ARE DISCLAIMED. Some jurisdictions
do not allow limitations on how long an implied warranty
lasts, so the above limitation may not apply to You. This
warranty gives You specific legal rights, and You may also
have other rights which vary by jurisdiction.
This warranty does not apply if the Product (a) has been
altered, except by Linksys, (b) has not been installed,
operated, repaired, or maintained in accordance with
instructions supplied by Linksys, or (c) has been subjected
to abnormal physical or electrical stress, misuse,
negligence, or accident. In addition, due to the continual
development of new techniques for intruding upon and
attacking networks, Linksys does not warrant that the
Product will be free of vulnerability to intrusion or attack.

Wireless-G Broadband Router 24


Appendix C Warranty and Regulatory Information

Wireless Disclaimer Industry Canada (Canada)


The maximum performance for wireless is derived from This device complies with Industry Canada ICES-003 rule.
IEEE Standard 802.11 specifications. Actual performance
Cet appareil est conforme la norme NMB003 dIndustrie
can vary, including lower wireless network capacity,
Canada.
data throughput rate, range and coverage. Performance
depends on many factors, conditions and variables,
including distance from the access point, volume of IC Statement
network traffic, building materials and construction, Operation is subject to the following two conditions:
operating system used, interference and other adverse 1. This device may not cause interference and
conditions.
2. This device must accept any interference, including
FCC Statement interference that may cause undesired operation of
the device.
This product has been tested and complies with the
specifications for a Class B digital device, pursuant to Part Rglement dIndustry Canada
15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in Le fonctionnement est soumis aux conditions suivantes :
a residential installation. This equipment generates, 1. Ce priphrique ne doit pas causer dinterfrences;
uses, and can radiate radio frequency energy and, if not 2. Ce priphrique doit accepter toutes les interfrences
installed and used according to the instructions, may reues, y compris celles qui risquent dentraner un
cause harmful interference to radio communications. fonctionnement indsirable.
However, there is no guarantee that interference will not
occur in a particular installation. If this equipment does
cause harmful interference to radio or television reception,
which is found by turning the equipment off and on, the
user is encouraged to try to correct the interference by
one or more of the following measures:
Reorient or relocate the receiving antenna
Increase the separation between the equipment or
devices
Connect the equipment to an outlet other than the
receivers
Consult a dealer or an experienced radio/TV technician
for assistance

Safety Notices
Caution: To reduce the risk of fire, use only No.26 AWG or
larger telecommunication line cord.
Do not use this product near water, for example, in a wet
basement or near a swimming pool.

Avoid using this product during an electrical storm. There


may be a remote risk of electric shock from lightning.

WARNING: This product contains lead, known


to the State of California to cause cancer, and
birth defects or other reproductive harm. Wash
hands after handling.

Wireless-G Broadband Router 25


Appendix C Warranty and Regulatory Information

User Information for Consumer Products Cetina (Czech) - Informace o ochran ivotnho
prosted pro zkaznky v zemch Evropsk unie
Covered by EU Directive 2002/96/EC on Evropsk smrnice 2002/96/ES zakazuje, aby zazen oznaen
Waste Electric and Electronic Equipment tmto symbolem na produktu anebo na obalu bylo likvidovno
s netdnm komunlnm odpadem. Tento symbol udv,
(WEEE) e dan produkt mus bt likvidovn oddlen od bnho
komunlnho odpadu. Odpovdte za likvidaci tohoto produktu
This document contains important information for users a dalch elektrickch a elektronickch zazen prostednictvm
with regards to the proper disposal and recycling of urench sbrnch mst stanovench vldou nebo mstnmi
ady. Sprvn likvidace a recyklace pomh pedchzet
Linksys products. Consumers are required to comply with
potencilnm negativnm dopadm na ivotn prosted a lidsk
this notice for all electronic products bearing the following zdrav. Podrobnj informace o likvidaci starho vybaven si
symbol: laskav vydejte od mstnch ad, podniku zabvajcho se
likvidac komunlnch odpad nebo obchodu, kde jste produkt
zakoupili.

Dansk (Danish) - Miljinformation for kunder i EU


EU-direktiv 2002/96/EF krver, at udstyr der brer dette symbol
p produktet og/eller emballagen ikke m bortskaffes som
usorteret kommunalt affald. Symbolet betyder, at dette produkt
skal bortskaffes adskilt fra det almindelige husholdningsaffald.
Det er dit ansvar at bortskaffe dette og andet elektrisk og
English - Environmental Information for Customers in elektronisk udstyr via bestemte indsamlingssteder udpeget
the European Union af staten eller de lokale myndigheder. Korrekt bortskaffelse
European Directive 2002/96/EC requires that the equipment og genvinding vil hjlpe med til at undg mulige skader for
bearing this symbol on the product and/or its packaging must miljet og menneskers sundhed. Kontakt venligst de lokale
not be disposed of with unsorted municipal waste. The symbol myndigheder, renovationstjenesten eller den butik, hvor du
indicates that this product should be disposed of separately har kbt produktet, angende mere detaljeret information om
from regular household waste streams. It is your responsibility to bortskaffelse af dit gamle udstyr.
dispose of this and other electric and electronic equipment via
designated collection facilities appointed by the government or
local authorities. Correct disposal and recycling will help prevent Deutsch (German) - Umweltinformation fr Kunden
potential negative consequences to the environment and innerhalb der Europischen Union
human health. For more detailed information about the disposal Die Europische Richtlinie 2002/96/EC verlangt, dass technische
of your old equipment, please contact your local authorities, Ausrstung, die direkt am Gert und/oder an der Verpackung mit
waste disposal service, or the shop where you purchased the diesem Symbol versehen ist , nicht zusammen mit unsortiertem
product. Gemeindeabfall entsorgt werden darf. Das Symbol weist darauf
hin, dass das Produkt von regulrem Haushaltmll getrennt
entsorgt werden sollte. Es liegt in Ihrer Verantwortung, dieses
(Bulgarian) - Gert und andere elektrische und elektronische Gerte ber
die dafr zustndigen und von der Regierung oder rtlichen
Behrden dazu bestimmten Sammelstellen zu entsorgen.
2002/96/EC , Ordnungsgemes Entsorgen und Recyceln trgt dazu bei,
/ , potentielle negative Folgen fr Umwelt und die menschliche
. Gesundheit zu vermeiden. Wenn Sie weitere Informationen zur
, Entsorgung Ihrer Altgerte bentigen, wenden Sie sich bitte an
. die rtlichen Behrden oder stdtischen Entsorgungsdienste
oder an den Hndler, bei dem Sie das Produkt erworben haben.


.

.
-
,
, .

Wireless-G Broadband Router 26


Appendix C Warranty and Regulatory Information

Eesti (Estonian) - Keskkonnaalane informatsioon Franais (French) - Informations environnementales


Euroopa Liidus asuvatele klientidele pour les clients de lUnion europenne
Euroopa Liidu direktiivi 2002/96/E nuete kohaselt on La directive europenne 2002/96/CE exige que lquipement
seadmeid, millel on tootel vi pakendil kesolev smbol , sur lequel est appos ce symbole sur le produit et/ou son
keelatud krvaldada koos sorteerimata olmejtmetega. See emballage ne soit pas jet avec les autres ordures mnagres. Ce
smbol nitab, et toode tuleks krvaldada eraldi tavalistest symbole indique que le produit doit tre limin dans un circuit
olmejtmevoogudest. Olete kohustatud krvaldama kesoleva distinct de celui pour les dchets des mnages. Il est de votre
ja ka muud elektri- ja elektroonikaseadmed riigi vi kohalike responsabilit de jeter ce matriel ainsi que tout autre matriel
ametiasutuste poolt ette nhtud kogumispunktide kaudu. lectrique ou lectronique par les moyens de collecte indiqus
Seadmete korrektne krvaldamine ja ringlussevtt aitab vltida par le gouvernement et les pouvoirs publics des collectivits
vimalikke negatiivseid tagajrgi keskkonnale ning inimeste territoriales. Llimination et le recyclage en bonne et due forme
tervisele. Vanade seadmete krvaldamise kohta tpsema ont pour but de lutter contre limpact nfaste potentiel de ce
informatsiooni saamiseks vtke palun hendust kohalike type de produits sur lenvironnement et la sant publique. Pour
ametiasutustega, jtmekitlusfirmaga vi kauplusega, kust te plus dinformations sur le mode dlimination de votre ancien
toote ostsite. quipement, veuillez prendre contact avec les pouvoirs publics
locaux, le service de traitement des dchets, ou lendroit o vous
avez achet le produit.
Espaol (Spanish) - Informacin medioambiental para
clientes de la Unin Europea
La Directiva 2002/96/CE de la UE exige que los equipos que Italiano (Italian) - Informazioni relative allambiente
lleven este smbolo en el propio aparato y/o en su embalaje per i clienti residenti nellUnione Europea
no deben eliminarse junto con otros residuos urbanos no La direttiva europea 2002/96/EC richiede che le apparecchiature
seleccionados. El smbolo indica que el producto en cuestin contrassegnate con questo simbolo sul prodotto e/o
debe separarse de los residuos domsticos convencionales con sullimballaggio non siano smaltite insieme ai rifiuti urbani
vistas a su eliminacin. Es responsabilidad suya desechar este y non differenziati. Il simbolo indica che questo prodotto non
cualesquiera otros aparatos elctricos y electrnicos a travs de deve essere smaltito insieme ai normali rifiuti domestici.
los puntos de recogida que ponen a su disposicin el gobierno y responsabilit del proprietario smaltire sia questi prodotti sia
las autoridades locales. Al desechar y reciclar correctamente estos le altre apparecchiature elettriche ed elettroniche mediante
aparatos estar contribuyendo a evitar posibles consecuencias le specifiche strutture di raccolta indicate dal governo o dagli
negativas para el medio ambiente y la salud de las personas. Si enti pubblici locali. Il corretto smaltimento ed il riciclaggio
desea obtener informacin ms detallada sobre la eliminacin aiuteranno a prevenire conseguenze potenzialmente negative
segura de su aparato usado, consulte a las autoridades locales, per lambiente e per la salute dellessere umano. Per ricevere
al servicio de recogida y eliminacin de residuos de su zona o informazioni pi dettagliate circa lo smaltimento delle vecchie
pregunte en la tienda donde adquiri el producto. apparecchiature in Vostro possesso, Vi invitiamo a contattare gli
enti pubblici di competenza, il servizio di smaltimento rifiuti o il
negozio nel quale avete acquistato il prodotto.
(Greek) -

Latvieu valoda (Latvian) - Ekoloiska informcija
2002/96/EC klientiem Eiropas Savienbas jurisdikcij
/ Direktv 2002/96/EK ir prasba, ka aprkojumu, kam pievienota
zme uz paa izstrdjuma vai uz t iesaiojuma, nedrkst
. izmest neirot veid kop ar komunlajiem atkritumiem
(tiem, ko rada vietji iedzvotji un uzmumi). zme nozm
. to, ka ierce ir jizmet atkritumos t, lai t nenonktu kop ar
parastiem mjsaimniecbas atkritumiem. Jsu pienkums ir o
un citas elektriskas un elektroniskas ierces izmest atkritumos,
. izmantojot paus atkritumu savkanas veidus un ldzekus, ko
nodroina valsts un pavaldbu iestdes. Ja izmeana atkritumos
. un prstrde tiek veikta pareizi, tad mazins iespjamais
kaitjums dabai un cilvku veselbai. Skkas zias par
, novecojua aprkojuma izmeanu atkritumos js varat saemt
, vietj pavaldb, atkritumu savkanas dienest, k ar veikal,
. kur iegdjties o izstrdjumu.

Wireless-G Broadband Router 27


Appendix C Warranty and Regulatory Information

Lietuvkai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten


skirta Europos Sjungos vartotojams in de Europese Unie
Europos direktyva 2002/96/EC numato, kad rangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die
kurios pakuot yra paymta iuo simboliu (veskite simbol), is voorzien van dit symbool op het product of de verpakking,
negalima alinti kartu su neriuotomis komunalinmis niet mag worden ingezameld met niet-gescheiden huishoudelijk
atliekomis. is simbolis rodo, kad gamin reikia alinti atskirai afval. Dit symbool geeft aan dat het product apart moet worden
nuo bendro buitini atliek srauto. Js privalote utikrinti, kad ingezameld. U bent zelf verantwoordelijk voor de vernietiging
i ir kita elektros ar elektronin ranga bt alinama per tam van deze en andere elektrische en elektronische apparatuur via de
tikras nacionalins ar vietins valdios nustatytas atliek rinkimo daarvoor door de landelijke of plaatselijke overheid aangewezen
sistemas. Tinkamai alinant ir perdirbant atliekas, bus ivengta inzamelingskanalen. De juiste vernietiging en recycling van
galimos alos aplinkai ir moni sveikatai. Daugiau informacijos deze apparatuur voorkomt mogelijke negatieve gevolgen voor
apie js senos rangos alinim gali pateikti vietins valdios het milieu en de gezondheid. Voor meer informatie over het
institucijos, atliek alinimo tarnybos arba parduotuvs, kuriose vernietigen van uw oude apparatuur neemt u contact op met
sigijote t gamin. de plaatselijke autoriteiten of afvalverwerkingsdienst, of met de
winkel waar u het product hebt aangeschaft.

Malti (Maltese) - Informazzjoni Ambjentali gal Klijenti


fl-Unjoni Ewropea Norsk (Norwegian) - Miljinformasjon for kunder i EU
Id-Direttiva Ewropea 2002/96/KE titlob li t-tagmir li jkun fih is- EU-direktiv 2002/96/EF krever at utstyr med flgende symbol
simbolu fuq il-prodott u/jew fuq l-ippakkjar ma jistax jintrema avbildet p produktet og/eller pakningen, ikke m kastes
ma skart muniipali li ma iex isseparat. Is-simbolu jindika sammen med usortert avfall. Symbolet indikerer at dette
li dan il-prodott gandu jintrema separatament minn ma l- produktet skal hndteres atskilt fra ordinr avfallsinnsamling
iskart domestiku regolari. Hija responsabbilt tiegek li tarmi for husholdningsavfall. Det er ditt ansvar kvitte deg med
dan it-tagmir u kull tagmir ieor ta l-elettriku u elettroniku dette produktet og annet elektrisk og elektronisk avfall via egne
permezz ta failitajiet ta bir appuntati apposta mill-gvern jew innsamlingsordninger slik myndighetene eller kommunene
mill-awtoritajiet lokali. Ir-rimi bmod korrett u r-riikla jgin bestemmer. Korrekt avfallshndtering og gjenvinning vil
jipprevjeni konsegwenzi negattivi potenzjali gall-ambjent u vre med p forhindre mulige negative konsekvenser for
gas-saa tal-bniedem. Gal aktar informazzjoni dettaljata milj og helse. For nrmere informasjon om hndtering av
dwar ir-rimi tat-tagmir antik tiegek, jekk jogbok ikkuntattja det kasserte utstyret ditt, kan du ta kontakt med kommunen,
lill-awtoritajiet lokali tiegek, is-servizzi gar-rimi ta l-iskart, jew en innsamlingsstasjon for avfall eller butikken der du kjpte
il-anut minn fejn xtrajt il-prodott. produktet.

Magyar (Hungarian) - Krnyezetvdelmi informci az Polski (Polish) - Informacja dla klientw w Unii
eurpai unis vsrlk szmra Europejskiej o przepisach dotyczcych ochrony
A 2002/96/EC szm eurpai unis irnyelv megkvnja, hogy rodowiska
azokat a termkeket, amelyeken, s/vagy amelyek csomagolsn Dyrektywa Europejska 2002/96/EC wymaga, aby sprzt
az albbi cmke megjelenik, tilos a tbbi szelektlatlan lakossgi oznaczony symbolem znajdujcym si na produkcie i/lub jego
hulladkkal egytt kidobni. A cmke azt jelli, hogy az adott opakowaniu nie by wyrzucany razem z innymi niesortowanymi
termk kidobsakor a szokvnyos hztartsi hulladkelszlltsi odpadami komunalnymi. Symbol ten wskazuje, e produkt
rendszerektl elklntett eljrst kell alkalmazni. Az n nie powinien by usuwany razem ze zwykymi odpadami z
felelssge, hogy ezt, s ms elektromos s elektronikus gospodarstw domowych. Na Pastwu spoczywa obowizek
berendezseit a kormnyzati vagy a helyi hatsgok ltal wyrzucania tego i innych urzdze elektrycznych oraz
kijellt gyjtredszereken keresztl szmolja fel. A megfelel elektronicznych w punktach odbioru wyznaczonych przez wadze
hulladkfeldolgozs segt a krnyezetre s az emberi egszsgre krajowe lub lokalne. Pozbywanie si sprztu we waciwy sposb
potencilisan rtalmas negatv hatsok megelzsben. Ha i jego recykling pomog zapobiec potencjalnie negatywnym
elavult berendezseinek felszmolshoz tovbbi rszletes konsekwencjom dla rodowiska i zdrowia ludzkiego. W celu
informcira van szksge, krjk, lpjen kapcsolatba a helyi uzyskania szczegowych informacji o usuwaniu starego sprztu,
hatsgokkal, a hulladkfeldolgozsi szolglattal, vagy azzal prosimy zwrci si do lokalnych wadz, sub oczyszczania
zlettel, ahol a termket vsrolta. miasta lub sklepu, w ktrym produkt zosta nabyty.

Wireless-G Broadband Router 28


Appendix C Warranty and Regulatory Information

Portugus (Portuguese) - Informao ambiental para Slovenina (Slovene) - Okoljske informacije za stranke
clientes da Unio Europeia v Evropski uniji
A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/EC prepoveduje odlaganje opreme,
que exibe este smbolo no produto e/ou na sua embalagem oznaene s tem simbolom na izdelku in/ali na embalai med
no seja eliminado junto com os resduos municipais no obiajne, nerazvrene odpadke. Ta simbol opozarja, da je treba
separados. O smbolo indica que este produto deve ser izdelek odvrei loeno od preostalih gospodinjskih odpadkov.
eliminado separadamente dos resduos domsticos regulares. Vaa odgovornost je, da to in preostalo elektrino in elektronsko
da sua responsabilidade eliminar este e qualquer outro opremo odnesete na posebna zbiralia, ki jih doloijo
equipamento elctrico e electrnico atravs dos instalaes dravne ustanove ali lokalna uprava. S pravilnim odlaganjem
de recolha designadas pelas autoridades governamentais ou in recikliranjem boste prepreili morebitne kodljive vplive na
locais. A eliminao e reciclagem correctas ajudaro a prevenir okolje in zdravje ljudi. e elite izvedeti ve o odlaganju stare
as consequncias negativas para o ambiente e para a sade opreme, se obrnite na lokalno upravo, odpad ali trgovino, kjer
humana. Para obter informaes mais detalhadas sobre a ste izdelek kupili.
forma de eliminar o seu equipamento antigo, contacte as
autoridades locais, os servios de eliminao de resduos ou o
estabelecimento comercial onde adquiriu o produto. Suomi (Finnish) - Ymprist koskevia tietoja EU-
alueen asiakkaille
EU-direktiivi 2002/96/EY edellytt, ett jos laitteistossa on tm
Romn (Romanian) - Informaii de mediu pentru symboli itse tuotteessa ja/tai sen pakkauksessa, laitteistoa
clienii din Uniunea European ei saa hvitt lajittelemattoman yhdyskuntajtteen mukana.
Directiva european 2002/96/CE impune ca echipamentele care Symboli merkitsee sit, ett tm tuote on hvitettv erilln
prezint acest simbol pe produs i/sau pe ambalajul acestuia s tavallisesta kotitalousjtteest. Sinun vastuullasi on hvitt
nu fie casate mpreun cu gunoiul menajer municipal. Simbolul tm elektroniikkatuote ja muut vastaavat elektroniikkatuotteet
indic faptul c acest produs trebuie s fie casat separat de viemll tuote tai tuotteet viranomaisten mrmn
gunoiul menajer obinuit. Este responsabilitatea dvs. s casai keryspisteeseen. Laitteiston oikea hvittminen est
acest produs i alte echipamente electrice i electronice prin mahdolliset kielteiset vaikutukset ympristn ja ihmisten
intermediul unitilor de colectare special desemnate de guvern terveyteen. Listietoja vanhan laitteiston oikeasta hvitystavasta
sau de autoritile locale. Casarea i reciclarea corecte vor ajuta saa paikallisilta viranomaisilta, jtteenhvityspalvelusta tai siit
la prevenirea potenialelor consecine negative asupra sntii myymlst, josta ostit tuotteen.
mediului i a oamenilor. Pentru mai multe informaii detaliate
cu privire la casarea acestui echipament vechi, contactai
autoritile locale, serviciul de salubrizare sau magazinul de la Svenska (Swedish) - Miljinformation fr kunder i
care ai achiziionat produsul. Europeiska unionen
Det europeiska direktivet 2002/96/EC krver att utrustning med
denna symbol p produkten och/eller frpackningen inte fr
Slovenina (Slovak) - Informcie o ochrane ivotnho kastas med osorterat kommunalt avfall. Symbolen visar att denna
prostredia pre zkaznkov v Eurpskej nii produkt br kastas efter att den avskiljts frn vanligt hushllsavfall.
Poda eurpskej smernice 2002/96/ES zariadenie s tmto Det faller p ditt ansvar att kasta denna och annan elektrisk och
symbolom na produkte a/alebo jeho balen nesmie by elektronisk utrustning p faststllda insamlingsplatser utsedda
likvidovan spolu s netriedenm komunlnym odpadom. av regeringen eller lokala myndigheter. Korrekt kassering och
Symbol znamen, e produkt by sa mal likvidova oddelene tervinning skyddar mot eventuella negativa konsekvenser
od benho odpadu z domcnost. Je vaou povinnosou fr miljn och personhlsa. Fr mer detaljerad information om
likvidova toto i ostatn elektrick a elektronick zariadenia kassering av din gamla utrustning kontaktar du dina lokala
prostrednctvom pecializovanch zbernch zariaden urench myndigheter, avfallshanteringen eller butiken dr du kpte
vldou alebo miestnymi orgnmi. Sprvna likvidcia a recyklcia produkten.
pome zabrni prpadnm negatvnym dopadom na ivotn
prostredie a zdravie ud. Ak mte zujem o podrobnejie
informcie o likvidcii starho zariadenia, obrte sa, prosm, na WEB: For additional information, please visit
miestne orgny, organizcie zaoberajce sa likvidciou odpadov www.linksys.com
alebo obchod, v ktorom ste si produkt zakpili.

8010410NC-DF
Wireless-G Broadband Router 29

Você também pode gostar