Page 6 / 44 Scroll up to view Page 1 - 5
Chapter 1
Product Overview
2
Wireless-G Broadband Router
Wall-Mounting Placement
The Router has two wall-mount slots on its bottom
panel. The distance between the slots is 152 mm
(6 inches).
Two screws are needed to mount the Router.
Suggested Mounting Hardware
2.5-3.0 mm
4-5 mm
1-1.5 mm
Note: Mounting hardware illustrations are not
true to scale.
NOTE:
Linksys is not responsible for damages
incurred by insecure wall-mounting hardware.
Follow these instructions:
Determine where you want to mount the Router. Make
1.
sure that the wall you use is smooth, flat, dry, and
sturdy. Also make sure the location is within reach of
an electrical outlet.
Drill two holes into the wall. Make sure the holes are
2.
152 mm (6 inches) apart.
Insert
a
screw
into
each
hole
and
leave
3
mm
3.
(0.12 inches) of its head exposed.
Maneuver the Router so the wall-mount slots line up
4.
with the two screws.
Place the wall-mount slots over the screws and slide
5.
the Router down until the screws fit snugly into the
wall-mount slots.
152 mm
Wall Mounting Template
Print this page at 100% size.
Cut along the dotted line, and place on the wall to drill precise spacing.
Page 7 / 44
Chapter 2
Wireless Security Checklist
3
Wireless-G Broadband Router
Chapter 2:
Wireless Security Checklist
Wireless networks are convenient and easy to install, so
homes with high-speed Internet access are adopting them
at a rapid pace. Because wireless networking operates by
sending information over radio waves, it can be more
vulnerable to intruders than a traditional wired network.
Like signals from your cellular or cordless phones, signals
from your wireless network can also be intercepted. Since
you cannot physically prevent someone from connecting
to your wireless network, you need to take some additional
steps to keep your network secure.
1. Change the default wireless
network name or SSID
Wireless devices have a default wireless network name
or Service Set Identifier (SSID) set by the factory. This
is the name of your wireless network, and can be up
to 32 characters in length. Linksys wireless products
use
linksys
as the default wireless network name. You
should change the wireless network name to something
unique to distinguish your wireless network from other
wireless networks that may exist around you, but do not
use personal information (such as your Social Security
number) because this information may be available for
anyone to see when browsing for wireless networks.
2. Change the default password
For wireless products such as access points and routers,
you will be asked for a password when you want to change
their settings. These devices have a default password set
by the factory. The Linksys default password is
admin
.
Hackers know these defaults and may try to use them
to access your wireless device and change your network
settings. To thwart any unauthorized changes, customize
the device’s password so it will be hard to guess.
3. Enable MAC address filtering
Linksys routers give you the ability to enable Media Access
Control (MAC) address filtering. The MAC address is a
unique series of numbers and letters assigned to every
networking device. With MAC address filtering enabled,
wireless network access is provided solely for wireless
devices with specific MAC addresses. For example, you can
specify the MAC address of each computer in your home
so that only those computers can access your wireless
network.
4. Enable encryption
Encryption protects data transmitted over a wireless
network. Wi-Fi Protected Access (WPA/WPA2) and Wired
Equivalency Privacy (WEP) offer different levels of security
for wireless communication. Currently, devices that are
Wi-Fi certified are required to support WPA2, but are not
required to support WEP.
A network encrypted with WPA/WPA2 is more secure
than a network encrypted with WEP, because WPA/WPA2
uses dynamic key encryption. To protect the information
as it passes over the airwaves, you should enable the
highest level of encryption supported by your network
equipment.
WEP is an older encryption standard and may be the
only option available on some older devices that do not
support WPA.
General Network Security Guidelines
Wireless network security is useless if the underlying
network is not secure.
Password protect all computers on the network and
individually password protect sensitive files.
Change passwords on a regular basis.
Install
anti-virus
software
and
personal
firewall
software.
Disable file sharing (peer-to-peer). Some applications
may open file sharing without your consent and/or
knowledge.
Additional Security Tips
Keep wireless routers, access points, or gateways away
from exterior walls and windows.
Turn wireless routers, access points, or gateways
off when they are not being used (at night, during
vacations).
Use strong passphrases that are at least eight characters
in length. Combine letters and numbers to avoid using
standard words that can be found in the dictionary.
WEB:
For
more
information
on
wireless
security, visit
www.linksys.com/security
Page 8 / 44
Chapter 3
Advanced Configuration
4
Wireless-G Broadband Router
Chapter 3:
Advanced Configuration
After setting up the Router with the Setup Wizard (located
on the CD-ROM), the Router will be ready for use. However,
if you’d like to change its advanced settings, use the
Router’s web-based utility. This chapter describes each
web page of the utility and each page’s key functions. You
can access the utility via a web browser on a computer
connected to the Router.
The web-based utility has these main tabs: Setup,
Wireless, Security, Access Restrictions, Applications &
Gaming, Administration, and Status. Additional tabs will
be available after you click one of the main tabs.
NOTE:
When first installing the Router, you
should use the Setup Wizard on the Setup
CD-ROM. If you want to configure advanced
settings, use this chapter to learn about the
web-based utility.
How to Access the Web-Based Utility
To access the web-based utility, launch the web browser on
your computer, and enter the Router’s default IP address,
192.168.1.1
, in the
Address
field. Then, press
Enter
.
A password request screen will appear. (Non-Windows XP
users will see a similar screen.) Leave the
User name
field
blank. The first time you open the Web-based utility, use
the default password
admin
. (You can set a new password
from the Administration tab’s
Management
screen.) Click
OK
to continue.
Password Screen
Setup > Basic Setup
The first screen that appears is the
Basic Setup
screen. This
allows you to change the Router’s general settings.
Setup > Basic Setup
Internet Setup
The Internet Setup section configures the Router to your
Internet connection. Most of this information can be
obtained through your ISP.
Internet Connection Type
Select the type of Internet connection your ISP provides
from the drop-down menu. The available types are:
Automatic Configuration - DHCP
Static IP
PPPoE
PPTP
L2TP
Telstra Cable
Automatic Configuration - DHCP
By default, the Router’s Internet Connection Type is set
to
Automatic Configuration - DHCP
, which should be
kept only if your ISP supports DHCP or you are connecting
through a dynamic IP address. (This option usually applies
to cable connections.)
Page 9 / 44
Chapter 3
Advanced Configuration
5
Wireless-G Broadband Router
Internet Connection Type > Automatic Configuration - DHCP
Static IP
If you are required to use a permanent IP address to
connect to the Internet, select
Static IP
.
Internet Connection Type > Static IP
Internet IP Address
This is the Router’s IP address, when
seen from the Internet. Your ISP will provide you with the
IP Address you need to specify here.
Subnet Mask
This is the Router’s Subnet Mask, as seen
by users on the Internet (including your ISP). Your ISP will
provide you with the Subnet Mask.
Gateway
Your ISP will provide you with the Gateway
Address, which is the ISP server’s IP address.
DNS
Your ISP will provide you with at least one DNS
(Domain Name System) Server IP Address.
PPPoE
Some DSL-based ISPs use PPPoE (Point-to-Point Protocol
over Ethernet) to establish Internet connections. If you are
connected to the Internet through a DSL line, check with
your ISP to see if they use PPPoE. If they do, you will have
to enable
PPPoE
.
Internet Connection Type > PPPoE
User Name and Password
Enter the User Name and
Password provided by your ISP.
Connect on Demand: Max Idle Time
You can configure
the Router to cut the Internet connection after it has been
inactive for a specified period of time (Max Idle Time). If
your Internet connection has been terminated due to
inactivity, Connect on Demand enables the Router to
automatically re-establish your connection as soon as you
attempt to access the Internet again. To use this option,
select
Connect on Demand
. In the
Max Idle Time
field,
enter the number of minutes you want to have elapsed
before your Internet connection terminates. The default
Max Idle Time is
5
minutes.
Keep Alive: Redial Period
If you select this option,
the
Router
will
periodically
check
your
Internet
connection. If you are disconnected, then the Router
will automatically re-establish your connection. To use
this option, select
Keep Alive
. In the
Redial Period
field,
you specify how often you want the Router to check
the Internet connection. The default Redial Period is
30
seconds.
PPTP
Point-to-Point Tunneling Protocol (PPTP) is a service that
applies to connections in Europe only.
Internet Connection Type > PPTP
If your ISP supports DHCP or you are connecting through
a dynamic IP address, then select
Obtain an IP Address
Automatically
. If you are required to use a permanent IP
address to connect to the Internet, then select
Specify an
IP Address
. Then configure the following:
Specify
an IP Address
This is the Router’s IP address,
as seen from the Internet. Your ISP will provide you
with the IP Address you need to specify here.
Subnet Mask
This is the Router’s Subnet Mask, as
seen by users on the Internet (including your ISP). Your
ISP will provide you with the Subnet Mask.
Default Gateway
Your ISP will provide you with the
IP address of the ISP server.
DNS 1-3
Your ISP will provide you with at least one
DNS (Domain Name System) server IP address.
PPTP Server IP Address
Your ISP will provide you with
the IP address of the PPTP server.
Username and Password
Enter the Username and
Password provided by your ISP.
Connect on Demand: Max Idle Time
You can configure
the Router to cut the Internet connection after it has been
inactive for a specified period of time (Max Idle Time). If
your Internet connection has been terminated due to
inactivity, Connect on Demand enables the Router to
Page 10 / 44
Chapter 3
Advanced Configuration
6
Wireless-G Broadband Router
automatically re-establish your connection as soon as you
attempt to access the Internet again. To use this option,
select
Connect on Demand
. In the
Max Idle Time
field,
enter the number of minutes you want to have elapsed
before your Internet connection terminates. The default
Max Idle Time is
5
minutes.
Keep Alive: Redial Period
If you select this option, the
Router will periodically check your Internet connection. If
you are disconnected, then the Router will automatically
re-establish your connection. To use this option, select
Keep Alive
. In the
Redial Period
field, you specify how often
you want the Router to check the Internet connection. The
default value is
30
seconds.
L2TP
L2TP is a service that applies to connections in Israel only.
Internet Connection Type > L2TP
User Name and Password
Enter the User Name and
Password provided by your ISP.
L2TP Server
This is the IP address of the L2TP Server.
Your ISP will provide you with the IP Address you need to
specify here.
Connect on Demand: Max Idle Time
You can configure
the Router to cut the Internet connection after it has been
inactive for a specified period of time (Max Idle Time). If
your Internet connection has been terminated due to
inactivity, Connect on Demand enables the Router to
automatically re-establish your connection as soon as you
attempt to access the Internet again. To use this option,
select
Connect on Demand
. In the
Max Idle Time
field,
enter the number of minutes you want to have elapsed
before your Internet connection terminates. The default
Max Idle Time is
5
minutes
Keep Alive: Redial Period
If you select this option,
the
Router
will
periodically
check
your
Internet
connection. If you are disconnected, then the Router
will automatically re-establish your connection. To use
this option, select
Keep Alive
. In the
Redial Period
field,
you specify how often you want the Router to check
the Internet connection. The default Redial Period is
30
seconds.
Telstra Cable
Telstra Cable is a service that applies to connections in
Australia only. If your ISP uses HeartBeat Signal (HBS), then
select
Telstra
.
Internet Connection Type > Telstra Cable
User Name and Password
Enter the User Name and
Password provided by your ISP.
Heart Beat Server
This is the IP address of the
Heartbeat
Server. Your ISP will provide you with the IP Address you
need to specify here.
Connect on Demand: Max Idle Time
You can configure
the Router to cut the Internet connection after it has been
inactive for a specified period of time (Max Idle Time). If
your Internet connection has been terminated due to
inactivity, Connect on Demand enables the Router to
automatically re-establish your connection as soon as you
attempt to access the Internet again. To use this option,
select
Connect on Demand
. In the
Max Idle Time
field,
enter the number of minutes you want to have elapsed
before your Internet connection terminates. The default
Max Idle Time is
5
minutes
Keep Alive: Redial Period
If you select this option,
the
Router
will
periodically
check
your
Internet
connection. If you are disconnected, then the Router
will automatically re-establish your connection. To use
this option, select
Keep Alive
. In the
Redial Period
field,
you specify how often you want the Router to check
the Internet connection. The default Redial Period is
30
seconds.
Optional Settings
Some of these settings may be required by your ISP. Verify
with your ISP before making any changes.
Optional Settings
Router Name
In this field, you can enter a name of up to
39 characters to represent the Router.
Host Name/Domain Name
These fields allow you to
supply a host and domain name for the Router. Some ISPs,
usually cable ISPs, require these names as identification.
You may have to check with your ISP to see if your
broadband Internet service has been configured with a
host and domain name. In most cases, leaving these fields
blank will work.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top