background image

65

Appendix H: Warranty Information

Wireless-G Broadband Router

Appendix H: Warranty Information

LIMITED WARRANTY

Linksys warrants to You that, for a period of three years (the “Warranty Period”), your Linksys Product will be substantially 
free of defects in materials and workmanship under normal use.  Your exclusive remedy and Linksys' entire liability under 
this warranty will be for Linksys at its option to repair or replace the Product or refund your purchase price less any 
rebates.  This limited warranty extends only to the original purchaser.  

If the Product proves defective during the Warranty Period call Linksys Technical Support in order to obtain a Return 
Authorization Number, if applicable.  BE SURE TO HAVE YOUR PROOF OF PURCHASE ON HAND WHEN CALLING.  If You are 
requested to return the Product, mark the Return Authorization Number clearly on the outside of the package and include a 
copy of your original proof of purchase.  RETURN REQUESTS CANNOT BE PROCESSED WITHOUT PROOF OF PURCHASE.  You 
are responsible for shipping defective Products to Linksys.  Linksys pays for UPS Ground shipping from Linksys back to You 
only.  Customers located outside of the United States of America and Canada are responsible for all shipping and handling 
charges. 

ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE ARE LIMITED 
TO THE DURATION OF THE WARRANTY PERIOD.  ALL OTHER EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND 
WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF NON-INFRINGEMENT, ARE DISCLAIMED.  Some jurisdictions do not 
allow limitations on how long an implied warranty lasts, so the above limitation may not apply to You.  This warranty gives 
You specific legal rights, and You may also have other rights which vary by jurisdiction.

This warranty does not apply if the Product (a) has been altered, except by Linksys, (b) has not been installed, operated, 
repaired, or maintained in accordance with instructions supplied by Linksys, or (c) has been subjected to abnormal 
physical or electrical stress, misuse, negligence, or accident.  In addition, due to the continual development of new 
techniques for intruding upon and attacking networks, Linksys does not warrant that the Product will be free of 
vulnerability to intrusion or attack.

TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL LINKSYS BE LIABLE FOR ANY LOST DATA, REVENUE OR PROFIT, 
OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF THE THEORY OF 
LIABILITY (INCLUDING NEGLIGENCE), ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE PRODUCT 
(INCLUDING ANY SOFTWARE), EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.  IN NO EVENT 
WILL LINKSYS’ LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT.  The foregoing limitations will apply even 
if any warranty or remedy provided under this Agreement fails of its essential purpose.  Some jurisdictions do not allow the 
exclusion or limitation of incidental or consequential damages, so the above limitation or exclusion may not apply to You.

Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623.

Summary of Contents for Linksys WRK54G

Page 1: ...A Division of Cisco Systems Inc Model No Broadband Router Wireless G WRK54G User Guide WIRELESS GHz 2 4802 11g ...

Page 2: ... this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents This exclamation point means there is a caution or warning and is something that could damage your property or the Wireless G Broadband Router This checkmark means there is a not...

Page 3: ...etup Tab Basic Setup 11 The Setup Tab DDNS 16 The Setup Tab MAC Address Clone 17 The Setup Tab Advanced Routing 18 The Wireless Tab Basic Wireless Settings 19 The Wireless Tab Wireless Security 20 The Wireless Tab Wireless Network Access 22 The Wireless Tab Advanced Wireless Settings 23 The Security Tab Filter 25 The Security Tab VPN Passthrough 26 The Applications and Gaming Tab Port Range Forwar...

Page 4: ...ons 49 Security Threats Facing Wireless Networks 49 Appendix C Upgrading Firmware 52 Appendix D Windows Help 53 Appendix E Finding the MAC Address and IP Address for Your Ethernet Adapter 54 Windows 98SE or Me Instructions 54 Windows 2000 or XP Instructions 55 For the Router s Web based Utility 55 Appendix F Glossary 56 Appendix G Specifications 63 Appendix H Warranty Information 65 Appendix I Reg...

Page 5: ...8 L2TP Connection Type 13 Figure 5 9 Optional Settings 14 Figure 5 10 Router IP 14 Figure 5 11 Network Address Server Settings 15 Figure 5 12 Time Setting 15 Figure 5 13 Setup Tab DDNS 16 Figure 5 14 Setup Tab TZO 16 Figure 5 15 Setup Tab MAC Address Clone 17 Figure 5 16 Setup Tab Advanced Routing 18 Figure 5 17 Setup Tab Routing Table 19 Figure 5 18 Wireless Tab Basic Wireless 19 Figure 5 19 Wire...

Page 6: ...ment 30 Figure 5 33 Backup and Restore Configuration 30 Figure 5 34 Administration Tab Log 31 Figure 5 35 The Administration Tab Factory Defaults 32 Figure 5 36 Administration Tab Firmware Upgrade 32 Figure 5 37 Status Tab Router 33 Figure 5 38 Status Tab Local Network 34 Figure 5 39 DHCP Client Table 34 Figure 5 40 Status Tab Wireless 34 Figure C 1 Upgrade Firmware 52 Figure E 1 IP Configuration ...

Page 7: ...uter s hard drive Networks are even used for playing multiplayer video games So networks are not only useful in homes and offices they can also be fun PCs on a wired network are connected with Ethernet cables which is why the network is called wired PCs equipped with wireless cards or adapters can communicate without cumbersome cables By sharing the same wireless settings within their transmission...

Page 8: ...he Wireless G Broadband Router Appendix A Troubleshooting This appendix describes some problems and solutions as well as frequently asked questions regarding installation and use of the Wireless G Broadband Router Appendix B Wireless Security This appendix explains the risks of wireless networking and some solutions to reduce the risks Appendix C Upgrading Firmware This appendix instructs you on h...

Page 9: ... for the Router Appendix H Warranty Information This appendix supplies the warranty information for the Router Appendix I Regulatory Information This appendix supplies the regulatory information regarding the Router Appendix J Contact Information This appendix provides contact information for a variety of Linksys resources including Technical Support ...

Page 10: ...n Infrastructure mode The basis of Infrastructure mode centers around a wireless router or an access point such as the Wireless G Broadband Router which serves as the main point of communications in a wireless network The Router transmits data to PCs equipped with wireless network adapters which can roam within a certain radial range of the Router You can arrange the Router and multiple access poi...

Page 11: ... Adapter WUSB54G WUSB11 when you want to enjoy USB connectivity The Broadband Router will also communicate with the Wireless PrintServer WPS54GU2 WPS11 and Wireless Ethernet Bridges WET54G WET11 When you wish to connect your wireless network with your wired network you can use the Wireless G Broadband Router s four network ports To add more ports any of the Wireless G Broadband Router s network po...

Page 12: ...ion tab Factory Defaults in the Broadband Router s Web based Utility Internet The Internet port is where you will connect your broadband Internet connection 1 2 3 4 These ports 1 2 3 4 connect the Broadband Router to your networked PCs and other Ethernet network devices Power The Power port is where you will connect the power adapter Important Resetting the Broadband Router to factory defaults wil...

Page 13: ...e DMZ function is being used This LED will remain lit as long as DMZ is enabled WLAN Green The WLAN LED lights up whenever there is a successful wireless connection If the LED is flashing the Broadband Router is actively sending or receiving data over the network 1 2 3 4 Green These numbered LEDs corresponding with the numbered ports on the Broadband Router s back panel serve two purposes If the L...

Page 14: ...he best place for the Broadband Router is usually at the center of your wireless network with line of sight to all of your mobile stations 3 Fix the direction of the antenna Try to place the Router in a position that will best cover your wireless network Normally the higher you place the antenna the better the performance will be 4 Connect a standard Ethernet network cable to the Broadband Router ...

Page 15: ...r to the Broadband Router s Power port and the other end into an electrical outlet Only use the power adapter supplied with the Broadband Router Use of a different adapter may result in product damage Now that the hardware installation is complete proceed to Chapter 5 Configuring the Router Figure 4 2 Connecting Your Network Devices Figure 4 3 Connecting the Power IMPORTANT Make sure you use the p...

Page 16: ... s default password is admin To secure the Router change the Password from its default There are six main tabs Setup Wireless Security Applications Gaming Administration and Status Additional tabs will be available after you click one of the main tabs To access the Web based Utility launch Internet Explorer or Netscape Navigator and enter the Router s default IP address 192 168 1 1 in the Address ...

Page 17: ...n menu DHCP By default the Router s Internet Connection Type is set to Obtain an IP Automatically which should be kept only if your ISP supports DHCP or you are connecting through a dynamic IP address Static IP If you are required to use a permanent IP address to connect to the Internet select Static IP Internet IP Address This is the Router s IP address when seen from the Internet Your ISP will p...

Page 18: ...al Period field you specify how often you want the Router to check the Internet connection The default Redial Period is 30 seconds RAS for SingTel Users RAS is a service used in Singapore only If you are using a RAS connection check with your ISP for the necessary setup information PPTP Point to Point Tunneling Protocol PPTP is a service that applies to connections in Europe only Specify Internet ...

Page 19: ... number of minutes you want to have elapsed before your Internet connection terminates Keep Alive Option Redial Period If you select this option the Router will periodically check your Internet connection If you are disconnected then the Router will automatically re establish your connection To use this option click the radio button next to Keep Alive In the Redial Period field you specify how oft...

Page 20: ...igured with a host and domain name In most cases leaving these fields blank will work MTU MTU is the Maximum Transmission Unit It specifies the largest packet size permitted for Internet transmission Thhis is disnabled by default Enable this to manually enter the largest packet size that will be transmitted The recommended size entered in the Size field is 1492 You should leave this value in the 1...

Page 21: ...a network user will be allowed connection to the Router with their current dynamic IP address Enter the amount of time in minutes that the user will be leased this dynamic IP address After the time is up the user will be automatically assigned a new dynamic IP address The default is 0 minutes which means one day Static DNS 1 3 The Domain Name System DNS is how the Internet translates domain or web...

Page 22: ...DDNS service provider you use DynDNS org User Name Enter the User Name for your DDNS account Password Enter the Password for your DDNS account Host Name The is the DDNS URL assigned by the DDNS service Internet IP Address This is the Router s current IP Address as seen on the Internet Status This displays the status of the DDNS connection TZO com Email Address Enter the Email Address of the servic...

Page 23: ...net If you do not wish to re register the MAC address with your ISP you may assign the MAC address you have currently registered with your ISP to the Router with the MAC Address Clone feature Enable Disable To have the MAC Address cloned click the radio button beside Enable User Defined Entry Enter the MAC Address registered with your ISP here Change these settings as described here and click the ...

Page 24: ...cluded for use with non Linksys routers Receive RIP Version To use dynamic routing for reception of network data select the protocol you want RIP1 or RIP2 Static Routing To set up a static route between the Router and another network select a number from the Static Routing drop down list A static route is a pre determined pathway that network information must travel to reach a specific host or net...

Page 25: ...e shared among all points in a wireless network The SSID must be identical for all devices in the wireless network It is case sensitive and must not exceed 32 characters use any of the characters on the keyboard Make sure this setting is the same for all points in your wireless network For added security you should change the default SSID linksys to a unique name Wireless Channel Select the approp...

Page 26: ... TKIP with dynamic encryption keys Select the type of algorithm TKIP Enter a WPA Shared Key of 8 32 characters Then enter a Group Key Renewal period which instructs the Router how often it should change the encryption keys WPA RADIUS This option features WPA used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router First select the type of W...

Page 27: ...and click the Generate button If you want to enter the WEP key s manually then enter it in the Key 1 4 field s Do not leave a field blank and do not enter all zeroes they are not valid key values If you are using 64 bit WEP encryption the key must be exactly 10 hexadecimal characters in length If you are using 128 bit WEP encryption the key must be exactly 26 hexadecimal characters in length Valid...

Page 28: ...re convenient way to add MAC addresses click the Select MAC Address From Networked Computers button The Wireless Client MAC List screen will appear Select the MAC Addresses you want Then click the Save Changes button Click the Cancel Changes button to return to the previous screen If you want detailed instructions on how to find the MAC address of a specific computer refer to Appendix E Finding th...

Page 29: ... default value is Auto Preamble Type The preamble defines the length of the CRC block for communication between the Router and the roaming Network Card High network traffic areas should use the shorter preamble type Select the appropriate preamble type Long Preamble default or Short Preamble Authentication Type The default is set to Auto which allows either Open System or Shared Key authentication...

Page 30: ...ain at its default value of 2346 RTS Threshold Should you encounter inconsistent data flow only minor reduction of the default value 2347 is recommended If a network packet is smaller than the preset RTS threshold size the RTS CTS mechanism will not be enabled The Router sends Request to Send RTS frames to a particular receiving station and negotiates the sending of a data frame After receiving an...

Page 31: ...When the screen appears select the range in the drop down menu and in a MAC number field enter the 12 digit MAC address you want to filter Click Apply to save the changes or Undo to undo the changes For information on obtaining a MAC address go to Appendix E Finding the MAC Address and IP Address for your Ethernet Adapter Block WAN Requests Enable the Block WAN Request feature by checking the radi...

Page 32: ...sthrough Point to Point Protocol over Ethernet allows your PC s to use the PPPoE client software provided by your ISP Some ISPs may request that you use this feature To allow allow PPPoE Passthrough click the radio button beside Enabled PPPoE Passthrough is enabled by default Click Disabled to disable the function PPTP Passthrough Point to Point Tunneling Protocol is the method used to enable VPN ...

Page 33: ...ormation on each line for the criteria required Descriptions of each criteria are described here Application In this field enter the name you wish to give the application Each name can be up to 12 characters Start End This is the port range Enter the number that starts the port range under Start and the number that ends the range under End Protocol Enter the protocol used for this application eith...

Page 34: ...es or click the Cancel Changes button to undo your changes The Applications and Gaming Tab UPnP Forwarding UPnP Forwarding The UPnP Forwarding screen provides options for customization of port services for common applications When users send this type of request to your network via the Internet the Gateway will forward those requests to the appropriate computer Any computer whose port is being for...

Page 35: ...se it only opens the ports you want to have opened while DMZ hosting opens all the ports of one computer exposing the computer to the Internet Any PC whose port is being forwarded must have its DHCP client function disabled and should have a new static IP address assigned to it because its IP address may change when using the DHCP function To expose one PC select Enable Then enter the computer s I...

Page 36: ...ct Enabled Enter the Administration Port number you will use to remotely access the Router UPnP UPnP allows Windows XP and Windows Me to automatically configure the Router for various Internet applications such as gaming and videoconferencing To enable UPnP check the Enabled box Allow Users to Make Configuration Changes When enabled this feature allows you to make manual changes while still using ...

Page 37: ...t setting No To monitor traffic between the network and the Internet select Yes Enter the IP Address of the PC where the Logviewer is installed in the Logviewer IP Address field When you wish to view the logs click Incoming Log or Outgoing Log depending on which you wish to view Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to ca...

Page 38: ...the default settings are restored This feature is disabled with No selected by default The Administration Tab Firmware Upgrade Firmware can be upgraded by clicking the Upgrade button after browsing for the firmware which you can download from the Linksys website Do not upgrade your firmware unless you are experiencing problems with the Broadband Router For more information about upgrading firmware...

Page 39: ...n and you want to establish an Internet connection and a Disconnect button to disconnect the Internet connection Internet IP Address The Router s Internet IP Address is displayed here Subnet Mask and Default Gateway The Router s Subnet Mask and Default Gateway address are displayed here for DHCP and static IP connections DNS 1 2 3 Shown here are the DNS Domain Name System IP addresses currently us...

Page 40: ... and sever their connections by checking a Delete box and clicking the Delete button The Status Tab Wireless The Wireless screen on the Status Tab displays the status of your wireless network MAC Address This is the Router s MAC Address as seen on your local wireless network Mode As selected from the Wireless tab this will display the wireless mode Mixed G Only or Disabled used by the network SSID...

Page 41: ...dress on a PC You can assign a static IP address to a PC by performing the following steps For Windows 98SE and Me 1 Click Start Settings and Control Panel Double click Network 2 In The following network components are installed box select the TCP IP associated with your Ethernet adapter If you only have one Ethernet adapter installed you will only see one TCP IP line with no association to an Eth...

Page 42: ...sked For Windows XP The following instructions assume you are running Windows XP with the default interface If you are using the Classic interface where the icons and menus look like previous Windows versions please follow the instructions for Windows 2000 1 Click Start and Control Panel 2 Click the Network and Internet Connections icon and then the Network Connections icon 3 Right click the Local...

Page 43: ...he ping command from a different computer to verify that your original computer is not the cause of the problem If you do NOT get a reply there may be a problem with the connection Try the ping command from a different computer to verify that your original computer is not the cause of the problem 4 I am not getting an IP address on the Internet with my Internet connection Refer to Problem 2 I want...

Page 44: ...ou installed Follow these steps to set up port forwarding through the Router s web based utility We will be setting up web ftp and mail servers 1 Access the Router s web based utility by going to http 192 168 1 1 or the IP address of the Router Go to the Applications Gaming Port Forwarding tab 2 Enter any name you want to use for the Customized Application 3 Enter the External Port range of the se...

Page 45: ...ce that you want the port server to go to For example if the web server s Ethernet adapter IP address is 192 168 1 100 you would enter 100 in the field provided Check Appendix E Finding the MAC Address and IP Address for Your Ethernet Adapter for details on getting an IP address 6 Check the Enable option for the port services you want to use Consider the example below When you have completed the c...

Page 46: ... Router s web based utility by going to http 192 168 1 1 or the IP address of the Router Enter the default password admin and click the Administrations Management tab 2 Enter a different password in the Router Password field and enter the same password in the second field to confirm the password 3 Click the Save Settings button 10 I am a PPPoE user and I need to remove the proxy settings or the di...

Page 47: ...e pdf s instructions Set a static IP address on the PC refer to Problem 1 I need to set a static IP address Use the following IP address settings for the computer you are using IP Address 192 168 1 50 Subnet Mask 255 255 255 0 Gateway 192 168 1 1 Perform the upgrade using the TFTP program or the Administration tab of the Router s web based utility 14 My DSL service s PPPoE is always disconnecting ...

Page 48: ... the device is not working properly Try to flash the firmware by assigning a static IP address to the computer and then upgrade the firmware Try using the following settings IP Address 192 168 1 50 and Subnet Mask 255 255 255 0 17 When I enter a URL or IP address I get a time out error or am prompted to retry Check if other PCs work If they do ensure that your workstation s IP settings are correct...

Page 49: ...owever the Internet connection speed will vary depending on the speed of your broadband connection The Router also supports 100Mbps over the auto sensing Fast Ethernet 10 100 switch on the local network side of the Router What is Network Address Translation and what is it used for Network Address Translation NAT translates multiple IP addresses on the private network to one public address that is ...

Page 50: ... with the same CD key connect at the same time even if on the same network not a problem with 1 0 1 3 As far as hosting games the HL server does not need to be in the DMZ Just forward port 27015 to the local IP address of the server computer How can I block corrupted FTP downloads If you are experiencing corrupted files when you download a file with your FTP client try using another FTP program Th...

Page 51: ...he Connection tab Make sure that Internet Explorer is set to Never dial a connection For Netscape Navigator click Edit Preferences Advanced and Proxy Make sure that Netscape Navigator is set to Direct connection to the Internet What is DMZ Hosting Demilitarized Zone DMZ allows one IP address computer to be exposed to the Internet Some applications require multiple TCP IP ports to be open It is rec...

Page 52: ...e supported The product supports the following IEEE 802 11b functions CSMA CA plus Acknowledge protocol Multi Channel Roaming Automatic Rate Selection RTS CTS feature Fragmentation Power Management What is ad hoc mode When a wireless network is set to ad hoc mode the wireless equipped computers are configured to communicate directly with each other The ad hoc wireless network will not communicate ...

Page 53: ...bilities in the hands of users around the globe What is Spread Spectrum Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable secure mission critical communications systems It is designed to trade off bandwidth efficiency for reliability integrity and security In other words more bandwidth is consumed than in the case of narrowband transmi...

Page 54: ...efault settings How do I resolve issues with signal loss There is no way to know the exact range of your wireless network without testing Every obstacle placed between the Router and a wireless PC will create signal loss Lead glass metal concrete floors water and walls will inhibit the signal and reduce range Start with the Router and your wireless PC in the same room and move it away in small inc...

Page 55: ...eriodically For information on implementing these security features refer to Chapter 6 Configuring the Wireless G Broadband Router Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking products first listen for beacon messages These messages can be easily decrypted and contain much of the network s inf...

Page 56: ...ess filtering MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses This makes it harder for a hacker to access your network with a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can only provide enough security to m...

Page 57: ...is should only be used when a RADIUS server is connected to the Router or other device First select the type of WPA algorithm TKIP or AES Enter the RADIUS server s IP Address and port number along with a key shared between the device and the server Last enter a Group Key Renewal period which instructs the device how often it should change the encryption keys Implementing encryption may have a nega...

Page 58: ...tab Follow these instructions 1 Download the firmware from Linksys s website at www linksys com 2 Click the Firmware Upgrade tab on the Web Utility s Administration tab and the Upgrade Firmware screen will appear 3 Enter the location of the firmware s file or click the Browse button to find the file 4 Then click the Upgrade button to upgrade the firmware Figure C 1 Upgrade Firmware ...

Page 59: ...ns or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing shared re...

Page 60: ...00 or XP Windows 98SE or Me Instructions 1 Click Start and Run In the Open field enter winipcfg Then press the Enter key or the OK button 2 When the IP Configuration screen appears select the Ethernet adapter you have connected to the Router via a CAT 5 Ethernet network cable 3 Write down the Adapter Address as shown on your computer screen This is the MAC address for your Ethernet adapter and is ...

Page 61: ...ernet adapter This appears as a series of numbers and letters The MAC address Physical Address is what you will use for MAC address cloning or MAC filtering The example in Figure E 3 shows the Ethernet adapter s IP address as 192 168 1 100 Your computer may show something different For the Router s Web based Utility For MAC filtering enter the 12 digit MAC address in this format XXXXXXXXXXXX WITHO...

Page 62: ...twork Adapter A device that adds network functionality to your PC Ad hoc A group of wireless devices communicating directly with each other peer to peer without the use of an access point AES Advanced Encryption Standard A security method that uses symmetric 128 bit block data encryption Backbone The part of a network that connects most of the systems and networks together and handles the most dat...

Page 63: ...sting of a website FTP server or e mail server with a fixed domain name e g www xyz com and a dynamic IP address Default Gateway A device that forwards Internet traffic from your local area network DHCP Dynamic Host Configuration Protocol A networking protocol that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited amount of...

Page 64: ...trieved from a common transmission medium Finger A program that tells you the name associated with an e mail address Firewall A set of related programs located at a network gateway server that protects the resources of a network from users from other networks Firmware The programming code that runs a networking device Fragmentation Breaking a packet into smaller units when transmitting over a netw...

Page 65: ...illion bits per second a unit of measurement for data transmission mIRC An Internet Relay Chat program that runs under Windows Multicasting Sending data to a group of destinations at once NAT Network Address Translation NAT technology translates IP addresses of a local area network to a different IP address for the Internet NAT Network Address Translation Traversal A method of enabling specialized...

Page 66: ...ddition to data transport PPTP Point to Point Tunneling Protocol A VPN protocol that allows the Point to Point Protocol PPP to be tunneled through an IP network This protocol is also used as a type of broadband connection in Europe Preamble Part of the wireless signal that synchronizes network traffic RADIUS Remote Authentication Dial In User Service A protocol that uses an authentication server t...

Page 67: ... of UDP through NATs A protocol that enables specialized applications such as Internet phone calls video and audio to travel between your local network and the Internet STUN is a specific type of NAT traversal Subnet Mask An address code that determines the size of the network Switch 1 A data switch that connects computing devices to host computers allowing a large number of devices to share a lim...

Page 68: ...ersion Upload To transmit a file over a network URL Uniform Resource Locator The address of a file located on the Internet VPN Virtual Private Network A security measure to protect data as it leaves one network and goes to another over the Internet WAN Wide Area Network The Internet WEP Wired Equivalent Privacy A method of encrypting network data transmitted on a wireless network for greater secur...

Page 69: ...One 10 100 RJ 45 Port Four 10 100 RJ 45 Switched Ports One Power Port One Reset Button Cabling Type Ethernet Network Cable LEDs Power DMZ WLAN Ethernet 1 4 Internet RF Power Output 22 dBm 1dB UPnP able cert Able Security Features NAT Firewall Internet Policy Wireless Security Wi Fi Protected Access WPA WEP Wireless MAC Filtering Dimensions 7 31 x 1 88 x 6 06 W x H x D 186 mm x 48 mm x 154 mm Unit ...

Page 70: ...ifications Wireless G Broadband Router Certifications FCC Operating Temp 0ºC to 40ºC 32ºF to 104ºF Storage Temp 20ºC to 70ºC 4ºF to 158ºF Operating Humidity 10 to 85 Non Condensing Storage Humidity 5 to 90 Non Condensing ...

Page 71: ...NS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except by Linksys ...

Page 72: ...r relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult a dealer or an experienced radio TV technician for assistance FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operat...

Page 73: ...es et aux dispositions relatives à la directive 1999 5 EC Belgique Dans le cas d une utilisation privée à l extérieur d un bâtiment au dessus d un espace public aucun enregistrement n est nécessaire pour une distance de moins de 300m Pour une distance supérieure à 300m un enregistrement auprès de l IBPT est requise Pour une utilisation publique à l extérieur de bâtiments une licence de l IBPT est ...

Page 74: ...rking with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 823 3002 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorization department f...

Page 75: ...evice must accept any interference received including interference that may cause undesired operation 2 This device and its antenna s must not be co located or operating in conjunction with any other antenna or transmitter 3 Changes or modifications to this unit not expressly approved by the party responsible for compliance could void the user authority to operate the equipment ...

Reviews: