Resumen del contenido incluido en la página 1
USER GUIDE
Wireless-G Home Router
with SpeedBurst
Model: WRT54GH
Resumen del contenido incluido en la página 2
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product. WEB: T
Resumen del contenido incluido en la página 3
Table of Contents Chapter 1: Product Overview 1 Front Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Side Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 2: Wireless Security Checklist 3 General Network Security Guidelines . . . . . . . . . . . . . . . . .
Resumen del contenido incluido en la página 4
Table of Contents Appendix D: Regulatory Information 27 FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27 FCC Radiation Exposure Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27 Safety Notices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27 Industry Canada Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27 Avis d’Indu
Resumen del contenido incluido en la página 5
Product Overview Chapter 1 Back Panel Chapter 1: Product Overview Thank you for choosing the Linksys by Cisco Wireless-G Home Router with SpeedBurst. The Router lets you access the Internet via a wireless connection or through one of its four switched ports. You can also use the Router to share resources such as computers, printers and files. A variety of security features help to protect your data and your Internet The Internet port is where you will privacy while you are online. Secur
Resumen del contenido incluido en la página 6
Product Overview Chapter 1 5. Place the wall-mount slots over the screws and slide Wall-Mounting Placement the Router down until the screws fit snugly into the The Router has two wall-mount slots on its bottom wall-mount slots. panel. The distance between the slots is 51.3 mm (2.02 inches). Two screws are needed to mount the Router. Suggested Mounting Hardware 51.3 mm 4-5 mm 1-1.5 mm † Note: Mounting hardware illustrations are not true to scale. NOTE: Linksys is not responsible for damage
Resumen del contenido incluido en la página 7
Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalent Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication. at a rapid pace. Because wireless networking operates by sending information over radi
Resumen del contenido incluido en la página 8
Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you want to change its advanced settings, use the Router’s browser-based utility. This chapter describes each web page of the utility and each page’s key functions. You can access the utility via a web browser on a computer connected to the Router. The browser-based utility has these main tabs: Setup,
Resumen del contenido incluido en la página 9
Advanced Configuration Chapter 3 before your Internet connection terminates. The default Static IP Max Idle Time is 5 minutes. If you are required to use a permanent IP address to Keep Alive: Redial Period If you select this option, connect to the Internet, select Static IP. the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re-establish your connection. To use this option, select Keep Alive. In the Redial Period field,
Resumen del contenido incluido en la página 10
Advanced Configuration Chapter 3 automatically re-establish your connection as soon as you attempt to access the Internet again. To use this option, select Connect on Demand. In the Max Idle Time field, enter the number of minutes you want to have elapsed before your Internet connection terminates. The default Max Idle Time is 5 minutes. Keep Alive: Redial Period If you select this option, the Internet Connection Type > Telstra Cable Router will periodically check your Internet connection.
Resumen del contenido incluido en la página 11
Advanced Configuration Chapter 3 the best MTU for your Internet connection, keep the default, Auto. Size When Manual is selected in the MTU field, this option is enabled. Leave this value in the 1200 to 1500 range. The default size depends on the Internet Connection Type: • DHCP, Static IP, or Telstra: 1500 • PPPoE: 1492 • PPTP or L2TP: 1460 Network Setup The Network Setup section changes the settings of the local network. Wireless setup is performed through the Wireless tab. DHCP Reservati
Resumen del contenido incluido en la página 12
Advanced Configuration Chapter 3 Static DNS 1-3 The Domain Name System (DNS) is how DynDNS.org the Internet translates domain or website names into Internet addresses or URLs. Your ISP will provide you with at least one DNS Server IP Address. If you wish to use another, enter that IP Address in one of these fields. You can enter up to three DNS Server IP Addresses here. The Router will use these for quicker access to functioning DNS servers. WINS The Windows Internet Naming Service (WINS)
Resumen del contenido incluido en la página 13
Advanced Configuration Chapter 3 Click Save Settings to apply your changes, or click Cancel TZO.com Changes to clear your changes. Wireless > Basic Wireless Settings The basic settings for wireless networking are set on this screen. Basic Wireless Settings Setup > DDNS > TZO E-mail Address, TZO Key, and Domain Name Enter the settings of the account you set up with TZO. Internet IP Address The Router’s Internet IP address is displayed here. Because it is dynamic, it will change. Wireless > Ba
Resumen del contenido incluido en la página 14
Advanced Configuration Chapter 3 Wireless > Wireless Security The Wireless Security screen configures the security of your wireless network. The Router supports the following wireless security mode options: WPA2 Personal, WPA Personal, and WEP. (WPA stands for Wi-Fi Protected Access, which is a security standard stronger than WEP encryption. WEP stands for Wired Equivalent Privacy.) Wireless Security Security Mode > WPA Personal Security Mode Passphrase Enter a Passphrase of 8-63 characters
Resumen del contenido incluido en la página 15
Advanced Configuration Chapter 3 Wireless Client List Wireless > Wireless MAC Filter This screen shows computers and other devices on Wireless access can be filtered by using the MAC addresses of the wireless network. The list can be sorted by Client the wireless devices transmitting within your network’s radius. Name, IP Address, MAC Address, and Status. Select Save to MAC Address Filter List for any device you want to add to the MAC Address Filter List. Then click Add. To update the on
Resumen del contenido incluido en la página 16
Advanced Configuration Chapter 3 authentication, the sender and the recipient do NOT error rate, you may slightly increase the Fragmentation use a WEP key for authentication. With Shared Key Threshold. Setting the Fragmentation Threshold too low authentication, the sender and recipient use a WEP key for may result in poor network performance. Only minor authentication. Select Shared Key to only use Shared Key reduction of the default value is recommended. In most authentication. cases, it sh
Resumen del contenido incluido en la página 17
Advanced Configuration Chapter 3 Filter Multicast Multicasting allows for multiple Security > VPN Passthrough transmissions to specific recipients at the same time. If multicasting is permitted, then the Router will allow IP The VPN Passthrough screen allows you to enable VPN multicast packets to be forwarded to the appropriate tunnels using IPSec, PPTP, or L2TP protocols to pass through computers. Select this option to filter multicasting. This the Router’s firewall. option is disabled by d
Resumen del contenido incluido en la página 18
Advanced Configuration Chapter 3 Access Restrictions > Internet Access The Internet Access screen allows you to block or allow specific kinds of Internet usage and traffic, such as Internet access, designated services, and websites during specific days and times. Summary Status Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu, and select Enabled. To create a policy, follow steps 1-11. Repeat these steps to create additional policies, on
Resumen del contenido incluido en la página 19
Advanced Configuration Chapter 3 5. Select the appropriate option, Deny or Allow, depending on whether you want to block or allow Internet access for the computers you listed on the Internet Access PC List screen. 6. Decide which days and what times you want this policy to be enforced. Select the individual days during which the policy will be in effect, or select Everyday. Then enter a range of hours and minutes during which the policy will be in effect, or select 24 Hours. 7. You can bl
Resumen del contenido incluido en la página 20
Advanced Configuration Chapter 3 Enabled Select Enabled to enable port forwarding for Applications and Gaming > Port Range the applications you have defined. Forwarding Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. The Port Range Forwarding screen allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized Internet Applications & Gaming > Port Range applications. (Specialized Inter