Quick Links. Download this manual. Table of Contents. Page 2: Icon Descriptions Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. All rights reserved.
|Published (Last):||1 June 2004|
|PDF File Size:||13.30 Mb|
|ePub File Size:||12.45 Mb|
|Price:||Free* [*Free Regsitration Required]|
Quick Links. Download this manual. Table of Contents. Wireless-G Linksys is a registered trademark or trademark of Cisco Systems, Inc. All rights reserved. What is a VPN? Configuration is a snap with any web browser.
Chapter 1: Introduction If so, you will need that static IP address when configuring the Gateway. But what do you do once information is sent outside of your local network, when emails are sent to their destination, or when you have to connect to your company's network when you are out on the road? How is your data protected? That is when a VPN can help. With these, and many other, Linksys products, your networking options are limitless. Go to the Linksys international website at www.
Figure Front Panel Power Green. Ethernet Green. You will have to configure your networked computers to accept the IP addresses that the Gateway assigns them if applicable , and you will also have to configure the Gateway with setting s provided by your Internet Service Provider ISP.
Connect one end of an Ethernet network cable to one of the Ethernet ports labeled on the back of the Gateway see Figure , and the other end to an Ethernet port on a computer. Page 19 5. The utility can be accessed via your web computers communicate over the network with browser through use of a computer connected to the Gateway.
This screen allows you to prevent or permit only certain users from attaching to your network. Then press Enter. A password request page, shown in Figure will appear. Enter admin the default user name in the User Name field, and enter admin the default password in the Password field. See Figure If they do, you will have to enable PPPoA. Select Manual and enter the value desired. It is recommended that you leave this value in the to range. By default, MTU is configured automatically.
It is useful when you are hosting your own website, FTP server, or other server behind the Gateway. It is case-sensitive and must not exceed 32 alphanumeric characters, which may be any keyboard character. Linksys recommends that you change the default SSID linksys to a unique name of your choice.
If you want to communicate with non-Linksys wireless products or Windows XP Zero Configuration, make a note of the WEP key generated in the Key 1 field, and enter it manually in the wireless client. The default transmission rate is Auto. The range is from 1 to 54Mbps. The rate of data transmission should be set depending on the speed of your wireless network. Filters block specific Internet data types and block anonymous Internet requests. Using Encryption also helps make your connection more secure.
You may choose either of these, but it must be the same type of encryption that is being used by the VPN device at the other end of the tunnel. In the Key Lifetime field, you may select to have the key expire at the end of a time period of your choosing. You can set up Internet access policies for specific computers and set up filters by using network port numbers.
When users send this type of request to your network via the Internet, the Gateway will forward those requests to the appropriate computer. Specialized Internet applications are any applications that use Internet access to perform functions such as videoconferencing or online gaming.
Some Internet applications may not require any forwarding. DMZ hosting forwards all the ports for one computer at the same time, which differs from Port Range Forwarding, which can only forward a maximum of 10 ranges of ports.
Gateway Access Local Gateway Access. To enable UPnP, click Enabled. When finished making your changes on this tab, click the Save Settings button to save these changes, or click the Cancel Changes button to undo your changes. It also provides logs for VPN and firewall events.
To enable log reporting, click Enabled. Enter the IP Address that you want to ping in the field. Click the Browse button to find the firmware upgrade file that you downloaded from the Linksys international website and then extracted. Double-click the firmware file you downloaded and extracted. Click the Upgrade button, and follow the instructions there. Click the Wireless Clients Connected button to view the wireless clients connected to the Gateway.
Click the Refresh button if you want to Refresh your screen. Page Appendix A: Troubleshooting Provided are possible solutions to problems that may occur during the installation and operation of the Gateway. Read the descriptions below to help you solve your problems. Contact your ISP or go on its website to find the information.
Open a command prompt. In the Open field, type in command. Press the Enter key or click the OK button. I need to set up a server behind my Gateway and make it available to the public.
Check the Enable option for the port services you want to use. If you are having difficulties getting any Internet game, server, or application to function properly, consider exposing one computer to the Internet using DeMilitarized Zone DMZ hosting. This option is available when an application requires too many ports or when you are not sure which port services to use. Page 58 I need to upgrade the firmware.
In order to upgrade the firmware with the latest features, you need to go to the Linksys international website and download the latest firmware at www. Enter the username and password, if asked. The default username and password is admin. Yes, but Linksys does not, at this time, provide technical support for setup, configuration or troubleshooting of any non-Windows operating systems.
Appendix A: Troubleshooting Page 61 How will I be notified of new Gateway firmware upgrades? All Linksys firmware upgrades are posted on the Linksys international website at www. Will the Gateway function in a Macintosh environment? Consult your ISP to obtain this information. Under the Port Forwarding tab, set port forwarding to for the computer on which you are using mIRC.
Each node and access point, for example, must always acknowledge receipt of each message. Each node must maintain contact with the wireless network even when not actually transmitting data. Achieving these functions simultaneously requires a dynamic RF networking technology that links access points and nodes. Page 65 WEP keys and levels 64 or are being used on all nodes of your wireless network. There are eleven available channels, ranging from 1 to 11 in North America.
If your questions are not addressed here, refer to the Linksys international website, www. So, please keep the following points in mind whenever setting up or using your wireless network. Page 67 This includes hackers. Wireless networking products come with a default SSID set by the factory.
Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.
Page 68 These security recommendations should help keep your mind at ease while you are enjoying the most flexible and convenient technology Linksys has to offer. Subnet Mask: Click the Start button, select Run, and type secpol. Figure C Password Screen 2. Then, click the Add button. Click the Add button. Then, click the Edit button. Change the authentication method to Use this string to protect the key exchange preshared key , as shown in Figure C, and enter the preshared key string, such as XYZ Click the OK button.
Linksys WAG54G User Manual
Linksys WAG54GS User Manual
Wireless-G ADSL Gateway