Wireless-G Broadband Router Table of Contents Chapter 1: Introduction Welcome What’s in this Guide? Chapter 2: Planning Your Wireless Network Network Topology Ad-Hoc versus Infrastructure Mode Network Layout Chapter 3: Getting to Know the Wireless-G Broadband Router The Back The Front Panel Chapter 4: Connecting the Wireless-G Broadband Router Hardware Installation for Connection to the Broadband Router Chapter 5: Configuring the Wireless-G Broadband Router...
Page 4
Wireless-G Broadband Router The Status Tab - Router The Status Tab - Local Network The Status Tab - Wireless Appendix A: Troubleshooting Common Problems and Solutions Frequently Asked Questions Appendix B: Wireless Security Security Precautions Security Threats Facing Wireless Networks Appendix C: Upgrading Firmware Appendix D: Windows Help Appendix E: Finding the MAC Address and IP Address for Your Ethernet Adapter...
Page 5
Wireless-G Broadband Router List of Figures Figure 3-1: The Broadband Router’s Back Panel Figure 3-2: The Broadband Router’s Front Panel Figure 4-1: Connecting Your Internet Connection Figure 4-2: Connecting Your Network Devices Figure 4-3: Connecting the Power Figure 5-1: Password Screen Figure 5-2: Setup Tab - Basic Setup Figure 5-3: Static IP Connection Type Figure 5-4: PPPoE Connection Type...
Page 6
Wireless-G Broadband Router Figure 5-26: List of PCs Figure 5-27: Security Tab - VPN Passthrough Figure 5-28: Applications and Gaming Tab - Port Range Forward Figure 5-29: Applications and Gaming Tab - Port Triggering Figure 5-30: Applications and Gaming Tab - UPnP Forwarding Figure 5-31: Applications and Gaming Tab - DMZ Figure 5-32: Administration Tab - Management Figure 5-33: Backup and Restore Configuration...
Wireless-G Broadband Router Chapter 1: Introduction Welcome Thank you for choosing the Linksys Wireless-G Broadband Router. The Wireless-G Broadband Router will allow you to network wirelessly better than ever, sharing Internet access, files and fun, easily and securely. How does the Wireless-G Broadband Router do all of this? A router is a device that allows access to an Internet connection over a network.
Wireless-G Broadband Router What’s in this Guide? This user guide covers the steps for setting up and using the Wireless-G Broadband Router. • Chapter 1: Introduction This chapter describes the Router’s applications and this User Guide. • Chapter 2: Planning Your Wireless Network This chapter describes the basics of wireless networking.
Page 9
Wireless-G Broadband Router • Appendix G: Specifications This appendix provides the technical specifications for the Router. • Appendix H: Warranty Information This appendix supplies the warranty information for the Router. • Appendix I: Regulatory Information This appendix supplies the regulatory information regarding the Router. •...
Wireless-G Broadband Router Chapter 2: Planning Your Wireless Network Network Topology A wireless network is exactly like a regular local network, except that each computer in your wireless network uses a wireless device to connect to the network. Computers in a wireless network share the same frequency channel and SSID, which is an identification name shared by the wireless devices belonging to the same wireless SSID: your wireless network’s name.
Wireless-G Broadband Router Network Layout The Wireless-G Broadband Router has been specifically designed for use with both your 802.11b and 802.11g products. Now, products using these standards can communicate with each other. The Wireless-G Broadband Router is compatible with all 802.11b and 802.11g adapters, such as the Notebook Adapters (WPC54G, WPC11) for your laptop computers, PCI Adapter (WMP54G, WMP11) for your desktop PC, and USB Adapter (WUSB54G, WUSB11) when you want to enjoy USB connectivity.
Wireless-G Broadband Router Chapter 3: Getting to Know the Wireless-G Broadband Router The Back The Broadband Router's ports, where the cables are connected, are located on the back panel. Important: Resetting the Broadband Router to factory defaults will erase all of your settings Figure 3-1: The Broadband Router’s Back Panel (WEP Encryption, Wireless and wired network settings, etc.) and replace them with the...
Wireless-G Broadband Router The Front Panel The Router’s LEDs, where information about network activity is displayed, are located on the front panel. Figure 3-2: The Broadband Router’s Front Panel Power Green. The Power LED lights up and will stay on while the Router is powered on. When the Router goes through its self-diagnostic mode during every boot-up, this LED will flash.
Wireless-G Broadband Router Chapter 4: Connecting the Wireless-G Broadband Router Hardware Installation for Connection to the Broadband Router 1. Power down your network devices. 2. Locate an optimum location for the Broadband Router. The best place for the Broadband Router is usually at the center of your wireless network, with line of sight to all of your mobile stations.
Wireless-G Broadband Router 5. Connect your network PCs or Ethernet devices to the Broadband Router’s numbered ports using standard Ethernet network cabling. Figure 4-2: Connecting Your Network Devices IMPORTANT: Make sure you use the power adapter that is supplied with the Router. Use of a 6.
Wireless-G Broadband Router Chapter 5: Configuring the Wireless-G Broadband Router Overview NOTE: When installing the Router for the first- When you first install the Router, you should use the Setup CD-ROM to make sure all settings are correct. If you do time installation, you should use the Setup not wish to run the Setup Wizard on the Setup CD-ROM, then you can use the Web-based Utility to configure the Wizard on the Setup CD-ROM.
Wireless-G Broadband Router The Setup Tab - Basic Setup The first screen that appears displays the Setup tab. This allows you to change the Broadband Router's general settings. Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes.
Wireless-G Broadband Router • PPPoE. Some DSL-based ISPs use PPPoE (Point-to-Point Protocol over Ethernet) to establish Internet connections. If you are connected to the Internet through a DSL line, check with your ISP to see if they use PPPoE. If they do, you will have to enable PPPoE. User Name and Password.
Wireless-G Broadband Router Keep Alive Option: Redial Period. If you select this option, the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re-establish your connection. To use this option, click the radio button next to Keep Alive. In the Redial Period field, you specify how often you want the Router to check the Internet connection.
Wireless-G Broadband Router Keep Alive and Redial Period. This option keeps your Internet access connected indefinitely, even when it sits idle. If you select this option, the Router will periodically check your Internet connection. If the connection is down, then the Router will automatically re-establish the connection. To use this option, click the radio button next to Keep Alive.
Wireless-G Broadband Router DHCP Server. DHCP is enabled by factory default. If you already have a DHCP server on your network, or you don’t want a DHCP server, then click the Disable radio button (no other DHCP features will be available). Starting IP Address.
Wireless-G Broadband Router The Setup Tab - DDNS The Router offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address. It is useful when you are hosting your own website, FTP server, or other server behind the Router.
Wireless-G Broadband Router The Setup Tab - MAC Address Clone A MAC address is a 12-digit code assigned to a unique piece of hardware for identification. Some ISPs will require you to register a MAC address in order to access the Internet. If you do not wish to re-register the MAC address with your ISP, you may assign the MAC address you have currently registered with your ISP to the Router with the MAC Address Clone feature.
Wireless-G Broadband Router The Setup Tab - Advanced Routing This tab is used to set up the Router’s advanced functions. NAT allows mulitple uses to share one Internet connection. Dynamic Routing will automatically adjust how packets travel on your network. Static Routing sets up a fixed route to another network destination.
Wireless-G Broadband Router Click the Show Routing Table button to view the Static Routes you’ve already set up. Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes. Figure 5-17: Setup Tab - Routing Table The Wireless Tab - Basic Wireless Settings The basic settings for wireless networking are set on this screen.
Wireless-G Broadband Router The Wireless Tab - Wireless Security IMPORTANT: If you are using WPA, always remember that each device in your wireless network MUST use the same WPA method and shared key, or The Wireless Security settings configure the security of your wireless network. There are three wireless security else the network will not function properly.
Wireless-G Broadband Router WEP. WEP is a basic encryption method, which is not as secure as WPA. To indicate which WEP key to use, select IMPORTANT: If you are using WEP the appropriate Default Transmit Key number. Then, select the level of WEP encryption, 64 bits 10 hex digits or encryption, always remember that each 128 bits 26 hex digits.
Wireless-G Broadband Router The Wireless Tab - Wireless Network Access Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network’s radius. MAC Filter. To filter wireless users by MAC Address, either permitting or blocking access, click Enable. If you do not wish to filter users by MAC Address, select Disable.
Wireless-G Broadband Router The Wireless Tab - Advanced Wireless Settings This tab is used to set up the Router’s advanced wireless functions. These settings should only be adjusted by an expert administrator as incorrect settings can reduce wireless performance. Basic Rate. The Basic Rate setting is not actually one rate of transmission but a series of rates at which the Router can transmit.
Page 30
Wireless-G Broadband Router Fragmentation Threshold. This value specifies the maximum size for a packet before data is fragmented into multiple packets. If you experience a high packet error rate, you may slightly increase the Fragmentation Threshold. Setting the Fragmentation Threshold too low may result in poor network performance. Only minor reduction of the default value is recommended.
Wireless-G Broadband Router The Security Tab - Filter Filters block specific internal users from accessing the Internet. From the Filters tab, you can set up a filter through an IP address or a network port number. Filter IP Address Range. To set up a filter using IP addresses, enter the range of IP addresses you wish to filter in the IP address fields.
Wireless-G Broadband Router The Security Tab - VPN Passthrough Use the settings on this tab to allow VPN tunnels in either IPSec or PPTP protocols to pass through the Router’s firewall. IPSec Passthrough. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer.
Wireless-G Broadband Router The Applications and Gaming Tab - Port Range Forwarding The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized Internet applications. (Specialized Internet applications are any applications that use Internet access to perform functions such as videoconferencing or online gaming.
Wireless-G Broadband Router The Applications and Gaming Tab - Port Triggering Port Triggering Port Triggering is used for special applications that can request a port to be opened on demand. For this feature, the Gateway will watch outgoing data for specific port numbers. The Gateway will remember the IP address of the computer that sends a transmission requesting data, so that when the requested data returns through the Gateway, the data is pulled back to the proper computer by way of IP address and port mapping rules.
Wireless-G Broadband Router The Applications and Gaming Tab - DMZ The DMZ feature allows one network user to be exposed to the Internet for use of a special-purpose service such as Internet gaming or videoconferencing. DMZ hosting forwards all the ports at the same time to one PC. The Port Range Forward feature is more secure because it only opens the ports you want to have opened, while DMZ hosting opens all the ports of one computer, exposing the computer to the Internet.
Wireless-G Broadband Router The Administration Tab - Management This section of the Administration tab allows the network’s administrator to manage specific Router functions for access and security. Local Router Access. You can change the Router’s password from here. Enter a new Router password and then type it again in the Re-enter to confirm field to confirm.
Wireless-G Broadband Router The Administration Tab - Log The Router can keep logs of all traffic for your Internet connection. To disable the Log function, keep the default setting, No. To monitor traffic between the network and the Internet, select Yes. Enter the IP Address of the PC where the Logviewer is installed in the Logviewer IP Address field.
Wireless-G Broadband Router The Administration Tab - Factory Defaults Click the Yes radio button to reset all configuration settings to their default values, and then click the Save Settings button. Any settings you have saved will be lost when the default settings are restored. This feature is disabled, with No selected, by default.
Wireless-G Broadband Router The Status Tab - Router The Router screen on the Status Tab displays the Router’s current status. The screen will vary depending on the Internet Connection Type selected on the Setup screen. Firmware Version. This is the Router’s current firmware. Current Time.
Wireless-G Broadband Router The Status Tab - Local Network The Local Network screen on the Status Tab displays the status of your network. MAC Address. This is the Router’s MAC Address, as seen on your local, Ethernet network. IP Address. This shows the Router’s IP Address, as it appears on your local, Ethernet network. Subnet Mask.
Wireless-G Broadband Router Appendix A: Troubleshooting This appendix consists of two parts: “Common Problems and Solutions” and “Frequently Asked Questions.” Provided are possible solutions to problems that may occur during the installation and operation of the Router. Read the descriptions below to help you solve your problems. If you can’t find an answer here, check the Linksys website at www.linksys.com.
Page 42
Wireless-G Broadband Router • For Windows 2000: 1. Click Start, Settings, and Control Panel. Double-click Network and Dial-Up Connections. 2. Right-click the Local Area Connection that is associated with the Ethernet adapter you are using, and select the Properties option. 3.
Page 43
Wireless-G Broadband Router • Refer to “Chapter 5: Configuring the PCs” for details. Make sure Obtain IP address automatically is selected in the settings. B Open a command prompt. For Windows 98SE and Me: • Click Start and Run. In the Open field, type command. Press the Enter key or click the OK button. For Windows 2000 and XP: •...
Page 44
Wireless-G Broadband Router 5. I am not able to access the Setup page of the Router’s web-based utility. • Refer to “Problem #2, I want to test my Internet connection” to verify that your computer is properly connected to the Router. •...
Page 45
Wireless-G Broadband Router 7. I need to set up online game hosting or use other Internet applications. If you want to play online games or use Internet applications, most will work without doing any port forwarding or DMZ hosting. There may be cases when you want to host an online game or Internet application.
Page 46
Wireless-G Broadband Router Follow these steps to set DMZ hosting: 1. Access the Router’s web-based utility by going to http://192.168.1.1 or the IP address of the Router. Go to the Applications & Gaming => Port Forwarding tab. 2. Disable or remove the entries you have entered for forwarding. Keep this information in case you want to use it at a later time.
Page 47
Wireless-G Broadband Router 11. To start over, I need to set the Router to factory default. Hold the Reset button for 10 seconds and then release it. This will return the password, forwarding, and other settings on the Router to the factory default settings. In other words, the Router will revert to its original factory configuration.
Page 48
Wireless-G Broadband Router 15. I can’t access my e-mail, web or I am getting corrupted data from the Internet. The Maximum Transmission Unit (MTU) setting may need to be adjusted. By default, the MTU is set at 1500. For most DSL users, it is strongly recommended to use MTU 1492. •...
Wireless-G Broadband Router Frequently Asked Questions What is the maximum number of IP addresses that the Router will support? The Router will support up to 253 IP addresses. Is IPSec Pass-Through supported by the Router? Yes, it is a built-in feature that the Router automatically enables. Where is the Router installed on the network? In a typical environment, the Router is installed between the cable/DSL modem and the wired network.
Page 50
Wireless-G Broadband Router I set up an Unreal Tournament Server, but others on the network cannot join. What do I need to do? If you have a dedicated Unreal Tournament server running, you need to create a static IP for each of the network computers and forward ports 7777, 7778, 7779, 7780, 7781, and 27900 to the IP address of the server.
Page 51
Wireless-G Broadband Router that version contains new features that you would like to use. Downloading a more current version of Router firmware will not enhance the quality or speed of your Internet connection, and may disrupt your current connection stability. Will the Router function in a Macintosh environment? Yes, but the Router’s setup pages are accessible only through Internet Explorer 4.0 or Netscape Navigator 4.0 or higher for Macintosh.
Page 52
Wireless-G Broadband Router How do I get mIRC to work with the Router? Under the Port Forwarding tab, set port forwarding to 113 for the PC on which you are using mIRC. Can the Router act as my DHCP server? Yes.
Page 53
Wireless-G Broadband Router maintain contact with the wireless network even when not actually transmitting data. Achieving these functions simultaneously requires a dynamic RF networking technology that links access points and nodes. In such a system, the user’s end node undertakes a search for the best possible access to the system. First, it evaluates such factors as signal strength and quality, as well as the message load currently being carried by each access point and the distance of each access point to the wired backbone.
Page 54
Wireless-G Broadband Router What is WEP? WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 64-bit or 128-bit shared key algorithm, as described in the IEEE 802.11 standard. What is a MAC Address? The Media Access Control (MAC) address is a unique number assigned by the manufacturer to any Ethernet networking device, such as a network adapter, that allows the network to identify it at the hardware level.
Wireless-G Broadband Router Appendix B: Wireless Security Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation.
Page 56
Wireless-G Broadband Router SSID. There are several things to keep in mind about the SSID: 1. Disable Broadcast 2. Make it unique 3. Change it often Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network.
Page 57
Wireless-G Broadband Router WPA Pre-Shared Key. If you do not have a RADIUS server, Select the type of algorithm, TKIP or AES, enter a password in the Pre-Shared key field of 8-64 characters, and enter a Group Key Renewal period time between 0 and 99,999 seconds, which instructs the Router or other device how often it should change the encryption keys.
Wireless-G Broadband Router Appendix C: Upgrading Firmware The Broadband Router's firmware is upgraded through the Web-based Utility's Administration tab. Follow these instructions: 1. Download the firmware from Linksys's website at www.linksys.com. 2. Click the Firmware Upgrade tab on the Web-Utility's Administration tab, and the Upgrade Firmware screen will appear.
Wireless-G Broadband Router Appendix D: Windows Help All Linksys wireless products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix.
Wireless-G Broadband Router Appendix E: Finding the MAC Address and IP Address for Your Ethernet Adapter This section describes how to find the MAC address for your computer’s Ethernet adapter so you can use the MAC filtering and/or MAC address cloning feature of the Router. You can also find the IP address of your computer’s Ethernet adapter.
Wireless-G Broadband Router Windows 2000 or XP Instructions 1. Click Start and Run. In the Open field, enter cmd. Press the Enter key or click the OK button. 2. At the command prompt, enter ipconfig /all. Then press the Enter key. 3.
Wireless-G Broadband Router Appendix F: Glossary 802.11a - A wireless networking standard that specifies a maximum data transfer rate of 54Mbps and an operating frequency of 5GHz. 802.11b - A wireless networking standard that specifies a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GHz.
Page 63
Wireless-G Broadband Router Buffer - A shared or assigned memory area that is used to support and coordinate different computing and networking activities so one isn't held up by the other. Byte - A unit of data that is usually eight bits long Cable Modem - A device that connects a computer to the cable television network, which in turn connects to the Internet.
Page 64
Wireless-G Broadband Router DTIM (Delivery Traffic Indication Message) - A message included in data packets that can increase wireless efficiency. Dynamic IP Address - A temporary IP address assigned by a DHCP server. EAP (Extensible Authentication Protocol) - A general authentication protocol used to control network access. Many specific authentication methods work within this framework.
Page 65
Wireless-G Broadband Router Infrastructure - A wireless network that is bridged to a wired network via an access point. IP (Internet Protocol) - A protocol used to send data over a network. IP Address - The address used to identify a computer or device on a network. IPCONFIG - A Windows 2000 and XP utility that displays the IP address for a particular networking device.
Page 66
Wireless-G Broadband Router Packet - A unit of data sent over a network. Passphrase - Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products. PEAP (Protected Extensible Authentication Protocol) - A mutual authentication method that uses a combination of digital certificates and another system, such as passwords.
Page 67
Wireless-G Broadband Router SNMP (Simple Network Management Protocol) - A widely used network monitoring and control protocol. Software - Instructions for the computer. A series of instructions that performs a particular task is called a "program". SOHO (Small Office/Home Office) - Market segment of professionals who work at home or in small offices. SPI (Stateful Packet Inspection) Firewall - A technology that inspects incoming packets of information before allowing them to enter the network.
Page 68
Wireless-G Broadband Router TKIP (Temporal Key Integrity Protocol) - a wireless encryption protocol that provides dynamic encryption keys for each packet transmitted. Topology - The physical layout of a network. TX Rate - Transmission Rate. UDP (User Datagram Protocol) - A network protocol for transmitting data that does not require acknowledgement from the recipient of the data that is sent.
Wireless-G Broadband Router Appendix H: Warranty Information LIMITED WARRANTY Linksys warrants to You that, for a period of three years (the “Warranty Period”), your Linksys Product will be substantially free of defects in materials and workmanship under normal use. Your exclusive remedy and Linksys' entire liability under this warranty will be for Linksys at its option to repair or replace the Product or refund your purchase price less any rebates.
Wireless-G Broadband Router Appendix I: Regulatory Information FCC STATEMENT This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Page 73
Wireless-G Broadband Router EN 300-328-1, EN 300-328-2 Technical requirements for Radio equipment. Caution: This equipment is intended to be used in all EU and EFTA countries. Outdoor use may be restricted to certain frequencies and/or may require a license for operation. Contact local Authority for procedure to follow. Note: Combinations of power levels and antennas resulting in a radiated power level of above 100 mW equivalent isotropic radiated power (EIRP) are considered as not compliant with the above mentioned directive and are not allowed for use within the European community and countries that have adopted the European R&TTE directive 1999/5/EC.
Wireless-G Broadband Router Appendix J: Contact Information Need to contact Linksys? Visit us online for information on the latest products and updates to your existing products at: http://www.linksys.com or ftp.linksys.com Can't find information about a product you want to buy on the web? Do you want to know more about networking with Linksys products? Give our advice line a call at: 800-546-5797 (LINKSYS)
Page 75
FCC Caution: 1. This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) This device must accept any interference received, including interference that may cause undesired operation.