Home > Cisco > Router > Cisco Wrt54g 2 V15 Manual

Cisco Wrt54g 2 V15 Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Wrt54g 2 V15 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							USER GUIDE
    Wireless-G Broadband Router
    Model: WRT54G2 
    						
    							 About This Guide
    i
    Wireless-G Broadband Router
    About This Guide
    Icon Descriptions
    While  reading  through  the  User  Guide  you  may  see 
    various icons that call attention to specific items. Below is 
    a description of these icons:
    NOTE:  This  check  mark  indicates  that  there  is 
    a  note  of  interest  and  is  something  that  you 
    should pay special attention to while using the 
    product.
     WARNING:  This  exclamation  point  indicates 
    that  there  is  a  caution  or  warning  and  it  is 
    something that could damage your property or 
    product.
    WEB:  This  globe  icon  indicates  a  noteworthy 
    website address or e-mail address.
    Online Resources
    Website  addresses  in  this  document  are  listed  without 
    http:// in front of the address because most current web 
    browsers do not require it. If you use an older web browser, 
    you may have to add http:// in front of the web address.
    Resource
    Website
    Linksyswww.linksysbycisco.com
    Linksys 
    International 
    www.linksysbycisco.com/international
    Glossary
    www.linksysbycisco.com/glossary
    Network Security
    www.linksysbycisco.com/security
    Copyright and Trademarks
    Linksys,  Cisco  and  the  Cisco  Logo  are 
    registered  trademarks  or  trademarks  of 
    Cisco  Systems,  Inc.  and/or  its  affiliates  in 
    the U.S. and certain other countries. Other 
    brands and product names are trademarks 
    or registered trademarks of their respective 
    holders.  Copyright  ©  2009  Cisco  Systems, 
    Inc. All rights reserved.     
    						
    							 Table of Contents
    ii
    Wireless-G Broadband Router
    Chapter 1: Product Overview 
    1
    Front Panel. .  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
    Back Panel  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  1
    Placement Options   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  1
    Chapter 2: Wireless Security Checklist 3
    General Network Security Guidelines. .  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
    Additional Security Tips   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  3
    Chapter 3: Advanced Configuration  4
    Setup > Basic Setup  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  4
    Setup > DDNS . .  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
    Setup > MAC Address Clone . .  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
    Setup > Advanced Routing   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  9
    Wireless > Basic Wireless Settings   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 10
    Wireless > Wireless Security  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 11
    Wireless > Wireless MAC Filter . .  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
    Wireless > Advanced Wireless Settings .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 14
    Security > Firewall  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 15
    Security > VPN Passthrough . .  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
    Access Restrictions > Internet Access .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 16
    Applications and Gaming > Port Range Forward . .  . . . . . . . . . . . . . . . . . . . . . . . .17
    Applications & Gaming > Port Triggering   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 18
    Applications and Gaming > DMZ   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 18
    Applications and Gaming > QoS .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 19
    Administration > Management . .  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
    Administration > Log  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 20
    Administration > Diagnostics .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 20
    Administration > Factory Defaults . .  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
    Administration > Upgrade Firmware   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 21
    Administration > Config Management  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 21
    Status > Router .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 22
    Status > Local Network .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 22
    Status > Wireless  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 23
    Appendix A: Troubleshooting  24
    Appendix B: Specifications  25
    Appendix C: Warranty Information  26
    Limited Warranty. .  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26 
    						
    							 Table of Contents
    iii
    Wireless-G Broadband Router
    Appendix D: Regulatory Information 
    28
    FCC Statement  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 28
    FCC Radiation Exposure Statement  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 28
    Safety Notices . .  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
    Industry Canada Statement  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 28
    Avis d’Industrie Canada . .  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29
    Wireless Disclaimer   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 29
    Avis de non-responsabilité concernant les appareils sans fil   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .29
    User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste 
    Electric and Electronic Equipment (WEEE) . .  . . . . . . . . . . . . . . . . . . . . . . . . . . . .30
    Appendix E: Software End User License Agreement  34
    Cisco Products  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 34
    Software Licenses   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 34 
    						
    							Chapter 1Product Overview
    1
    Wireless-G Broadband Router
    Chapter 1:  
    Product Overview
    Thank  you  for  choosing  the  Linksys  by  Cisco  Wireless-G 
    Broadband Router. The Router lets you access the Internet 
    via a wireless connection, broadcast at up to 54 Mbps, or 
    through  one  of  its  four  switched  ports. You  can  also  use 
    the Router to share resources such as computers, printers 
    and files. 
    A variety of security features help to protect your data and 
    your privacy while online. Security features include WPA2 
    security,  a  Stateful  Packet  Inspection  (SPI)  firewall  and 
    NAT technology. Configuring the Router is easy using the 
    provided browser-based utility.
    Front Panel
    1,  2,  3,  4 
    (Green) These  numbered  LEDs, 
    corresponding with the numbered ports on the 
    Router’s  back  panel,  serve  two  purposes.  If  the 
    LED is continuously lit, the Router is successfully 
    connected  to  a  device  through  that  port.  A 
    flashing  LED  indicates  network  activity  over 
    that port.
    Wi-Fi  Protected  Setup  Button  If  you  have 
    client  devices,  such  as  wireless  adapters,  that 
    support  Wi-Fi  Protected  Setup,  then  you  can 
    use  Wi-Fi  Protected  Setup  to  automatically 
    configure  wireless  security  for  your  wireless 
    network(s).
    To  use  Wi-Fi  Protected  Setup,  run  the  Setup 
    Wizard, or refer to  Wi-Fi Protected Setup,  page 
    10.
    Wi-Fi  Protected  Setup  LED  (Green/
    Amber)  It  lights  up  green  when  wireless 
    security  is  enabled.  The  LED  flashes  green  for 
    two  minutes  during  Wi-Fi  Protected  Setup.    
     
    The  LED  lights  up  amber  if  there  is  an  error 
    during the Wi-Fi Protected Setup process. Make 
    sure  the  client  device  supports Wi-Fi  Protected 
    Setup. Wait until the LED is off, and then try again.   
     
    The  LED  flashes  amber  when  a Wi-Fi  Protected 
    Setup  session  is  active,  and  a  second  session 
    begins.  The  Router  supports  one  session  at  a 
    time. Wait until the LED is off before starting the 
    next Wi-Fi Protected Setup session.
    Wireless  (Green) The  Wireless  LED  lights  up 
    when the wireless feature is enabled. If the LED 
    is  flashing,  the  Router  is  actively  sending  or 
    receiving data over the network.
    Internet  (Green) The  Internet  LED  lights  up 
    when  there  is  a  connection  made  through  the 
    Internet port. A flashing LED indicates network 
    activity over the Internet port.
    Power  (Green)  The  Power  LED  lights  up 
    and  will  stay  on  while  the  Router  is  powered 
    on.  When  the  Router  goes  through  its  self-
    diagnostic  mode  during  every  boot-up,  this 
    LED will flash. When the diagnostic is complete, 
    the LED will be solidly lit.
    Back Panel
    Internet  The  Internet  port  is  where  you  
    connect your cable or DSL Internet connection. 
    1, 2, 3, 4  These Ethernet ports (1, 2, 3, 4) connect 
    the  Router  to  PCs  on  your  wired  network  and 
    other Ethernet network devices. 
    Reset  There are two ways to reset the Router’s 
    factory defaults. Either press and hold the Reset 
    Button for approximately five seconds, or restore 
    the  defaults  from  Administration > Factory 
    Defaults in the Router’s web-based utility. 
    Power  The  Power  port  is  where  you  connect 
    the power adapter.
    Placement Options
    There  are  two  ways  to  physically  install  the  Router.  The 
    first  way  is  to  place  the  Router  horizontally  on  a  surface. 
    The second way is to mount the Router on a wall.
    Horizontal Placement
    The Router has four rubber feet on its bottom panel. Place 
    the Router on a level surface near an electrical outlet.           
    						
    							Chapter 1Product Overview
    2
    Wireless-G Broadband Router
    Wall-Mounting Placement
    The  Router  has  two  wall-mount  slots  on  its  bottom 
    panel.  The  distance  between  the  slots  is  152  mm 
     
    (6 inches). 
    Two screws are needed to mount the Router.
    Suggested Mounting Hardware
    2.5-3.0 mm4-5 mm 1-1.5 mm
    Note: Mounting hardware illustrations are not   
    †to scale.
    NOTE:  Linksys  is  not  responsible  for  damages 
    incurred by insecure wall-mounting hardware.  Follow these instructions:
    Determine where you want to mount the Router. Make 
    1. 
    sure  that  the  wall  you  use  is  smooth,  flat,  dry,  and 
    sturdy.  Also  make  sure  the  location  is  within  reach  of 
    an electrical outlet.
    Drill  two  holes  into  the  wall.  Make  sure  the  holes  are   
    2. 
    152 mm (6 inches) apart.
    Insert  a  screw  into  each  hole  and  leave  3  mm   
    3. 
    (0.12 inches) of its head exposed.
    Position  the  Router  so  the  wall-mount  slots  line  up 
    4. 
    with the two screws.
    Place  the  wall-mount  slots  over  the  screws  and  slide 
    5. 
    the  Router  down  until  the  screws  fit  snugly  into  the 
    wall-mount slots.
    152 mm
    Wall Mounting Template
    Print this page at 100% size. 
    Cut along the dotted line, and place on the wall to drill precise spacing.    
    						
    							Chapter 2Wireless Security Checklist
    3
    Wireless-G Broadband Router
    Chapter 2:  
    Wireless Security Checklist
    Wireless  networks  are  convenient  and  easy  to  install,  so 
    homes with high-speed Internet access are adopting them 
    at a rapid pace. Because wireless networking operates by 
    sending  information  over  radio  waves,  it  can  be  more 
    vulnerable  to  intruders  than  a  traditional  wired  network. 
    Like signals from your cellular or cordless phones, signals 
    from your wireless network can also be intercepted. Since 
    you cannot physically prevent someone from connecting 
    to your wireless network, you need to take some additional 
    steps to help keep your network secure. 
    1. 
    Change the default wireless  
      network name or SSID
    Wireless  devices  have  a  default  wireless  network  name 
    or  Service  Set  Identifier  (SSID)  set  by  the  factory.  This 
    is  the  name  of  your  wireless  network,  and  can  be  up 
    to  32  characters  in  length.  Linksys  wireless  products 
    use  linksys  as  the  default  wireless  network  name.  You 
    should  change  the  wireless  network  name  to  something 
    unique  to  distinguish  your  wireless  network  from  other 
    wireless  networks  that  may  exist  around  you,  but  do  not 
    use  personal  information  (such  as  your  Social  Security 
    number)  because  this  information  may  be  available  for 
    anyone to see when browsing for wireless networks. 
    2.   Change the default password
    For wireless products such as access points and routers, you 
    will be asked for a password when you want to change their 
    settings. These devices have a default password set by the 
    factory.  The  Linksys  default  password  is  admin.  Hackers 
    know  these  defaults  and  may  try  to  use  them  to  access 
    your  wireless  device  and  change  your  network  settings. 
    To help thwart any unauthorized changes, customize the 
    device’s password so it will be hard to guess.
    3.   Enable MAC address filtering
    Linksys routers give you the ability to enable Media Access 
    Control  (MAC)  address  filtering.  The  MAC  address  is  a 
    unique  series  of  numbers  and  letters  assigned  to  every 
    networking  device.  With  MAC  address  filtering  enabled, 
    wireless  network  access  is  provided  solely  for  wireless 
    devices with specific MAC addresses. For example, you can 
    specify the MAC address of each computer in your home 
    so  that  only  those  computers  can  access  your  wireless 
    network. 
    4.  Enable encryption
    Encryption  protects  data  transmitted  over  a  wireless 
    network.  Wi-Fi  Protected  Access  (WPA/WPA2)  and  Wired 
    Equivalent  Privacy  (WEP)  offer  different  levels  of  security 
    for  wireless  communication.  Currently,  devices  that  are 
    Wi-Fi  certified  are  required  to  support WPA2,  but  are  not 
    required to support WEP.
    A  network  encrypted  with  WPA/WPA2  is  more  secure 
    than  a  network  encrypted  with WEP,  because WPA/WPA2 
    uses  dynamic  key  encryption. To  protect  the  information 
    as  it  passes  over  the  airwaves,  you  should  enable  the 
    highest  level  of  encryption  supported  by  your  network 
    equipment. 
    WEP  is  an  older  encryption  standard  and  may  be  the 
    only  option  available  on  some  older  devices  that  do  not 
    support WPA.
    General Network Security Guidelines
    Wireless  network  security  is  useless  if  the  underlying 
    network is not secure. 
    Password  protect  all  computers  on  the  network  and 
     
    •
    individually password protect sensitive files.
    Change passwords on a regular basis.
     
    •
    Install  anti-virus  software  and  personal  firewall  
    •
    software.
    Disable  file  sharing  (peer-to-peer).  Some  applications 
     
    •
    may  open  file  sharing  without  your  consent  and/or 
    knowledge.
    Additional Security Tips
    Keep wireless routers, access points, or gateways away  
    •
    from exterior walls and windows.
    Turn  wireless  routers,  access  points,  or  gateways 
     
    •
    off  when  they  are  not  being  used  (at  night,  during 
    vacations).
    Use strong passphrases that are at least eight characters 
     
    •
    in length. Combine letters and numbers to avoid using 
    standard words that can be found in the dictionary. 
    WEB:  For  more  information  on  wireless 
    security, visit www.linksys.com/security          
    						
    							Chapter 3Advanced Configuration
    4
    Wireless-G Broadband Router
    Chapter 3:  
    Advanced Configuration
    After setting up the Router with the Setup Wizard (located 
    on the CD-ROM), the Router will be ready for use. If you’d 
    like to change its advanced settings, use the Router’s web-
    based utility. This chapter describes each web page of the 
    utility  and  each  page’s  key  functions. You  can  access  the 
    utility via a web browser on a computer connected to the 
    Router.
    The  web-based  utility  has  these  main  tabs:  Setup, 
    Wireless,  Security,  Access  Restrictions,  Applications  & 
    Gaming,  Administration,  and  Status.  Additional  tabs  will 
    be available after you click one of the main tabs.
    NOTE:  When  first  installing  the  Router,  you 
    should  use  the  Setup  Wizard  on  the  Setup 
    CD-ROM.  If  you  want  to  configure  advanced 
    settings,  use  this  chapter  to  learn  about  the 
    web-based utility.
    How to Access the Web-Based Utility
    To access the web-based utility, launch the web browser on 
    your computer, and enter the Router’s default IP address, 
    192.168.1.1, in the Address field. Then, press Enter.
    A  password  request  screen  will  appear.  (Non-Windows 
    XP  users  will  see  a  similar  screen.)  Leave  the 
    User  name 
    field  blank.  Then  enter  the  password  you  set  up  during 
    the  Setup  Wizard.  (If  you  did  not  run  the  Setup  Wizard, 
    then use the default password,  admin. You can set a new 
    password  from  the  Administration  tab’s  Management 
    screen.) Click OK to continue.
    Password Screen
    Setup > Basic Setup
    The first screen that appears is the  Basic Setup screen. This 
    allows you to change the Router’s general settings. 
    Setup > Basic Setup
    Internet Setup
    The  Internet  Setup  section  configures  the  Router  to  your 
    Internet  connection.  Most  of  this  information  can  be 
    obtained through your Internet Service Provider (ISP).
    Internet Connection Type
    Select  the  type  of  Internet  connection  your  ISP  provides 
    from the drop-down menu. The available types are:
    Automatic Configuration - DHCP
     
    •
    Static IP 
    •
    PPPoE 
    •
    PPTP 
    •
    L2TP 
    •
    Telstra Cable 
    •
    Automatic Configuration - DHCP
    The  default  Internet  Connection  Type  is  Automatic 
    Configuration  -  DHCP.  Keep  the  default  only  if  your  ISP 
    supports DHCP or if you connect using a dynamic IP address. 
    (This option usually applies to cable connections.)
    Internet Connection Type > Automatic Configuration - DHCP     
    						
    							Chapter 3Advanced Configuration
    5
    Wireless-G Broadband Router
    Static IP
    If  you  are  required  to  use  a  permanent  IP  address  to 
    connect to the Internet, select Static IP.
    Internet Connection Type > Static IP
    Internet IP Address 
    This is the Router’s IP address, when 
    seen from the Internet. Your ISP will provide you with the 
    IP Address you need to specify.
    Subnet  Mask  This  is  the  Router’s  Subnet  Mask,  as  seen 
    by users on the Internet (including your ISP). Your ISP will 
    provide you with the Subnet Mask.
    Gateway  Your  ISP  will  provide  you  with  the  Gateway 
    address, which is the ISP server’s IP address.
    Static  DNS  Your  ISP  will  provide  you  with  at  least  one 
    DNS (Domain Name System) server IP Address.
    PPPoE
    Some  DSL-based  ISPs  use  PPPoE  (Point-to-Point  Protocol 
    over Ethernet) to establish Internet connections. If you are 
    connected to the Internet through a DSL line, check with 
    your ISP to see if they use PPPoE. If they do, you will have 
    to enable PPPoE.
    Internet Connection Type > PPPoE
    User  Name  and  Password  Enter  the  User  Name  and 
    Password provided by your ISP. 
    Connect on Demand: Max Idle Time  You can configure 
    the Router to cut the Internet connection after it has been 
    inactive  for  a  specified  period  of  time  (Max  Idle  Time).  If 
    your  Internet  connection  has  been  terminated  due  to 
    inactivity,  Connect  on  Demand  enables  the  Router  to 
    automatically re-establish your connection as soon as you 
    attempt  to  access  the  Internet  again.  To  use  this  option, 
    select  Connect  on  Demand.  In  the  Max  Idle  Time  field, 
    enter  the  number  of  minutes  you  want  to  elapse  before 
    your  Internet  connection  terminates.  The  default  is  5 
    minutes.
    Keep  Alive:  Redial  Period  If  you  select  this  option,  the 
    Router will periodically check your Internet connection. If  you  are  disconnected,  then  the  Router  will  automatically 
    re-establish  your  connection.  To  use  this  option,  select 
    Keep  Alive.  In  the 
    Redial  Period  field,  specify  how  often 
    the  Router  should  check  the  Internet  connection.  The 
    default is 30 seconds.
    PPTP
    Point-to-Point Tunneling  Protocol  (PPTP)  is  a  service  that 
    applies to connections in Europe only.
    Internet Connection Type > PPTP
    If your ISP supports DHCP or you are connecting through 
    a  dynamic  IP  address,  then  select  Obtain  an  IP  Address 
    Automatically. If you are required to use a permanent IP 
    address to connect to the Internet, then select  Specify an 
    IP Address. Then configure the following:
    Specify an IP Address 
     
    •This is the Router’s IP address, 
    as  seen  from  the  Internet.  Your  ISP  will  provide  you 
    with the IP Address you need to specify.
    Subnet  Mask 
     
    •This  is  the  Router’s  Subnet  Mask,  as 
    seen by users on the Internet (including your ISP). Your 
    ISP will provide you with the Subnet Mask.
    Default  Gateway 
     
    •Your  ISP  will  provide  you  with  the 
    IP address of the ISP server.
    DNS  1-3 
     
    •Your  ISP  will  provide  you  with  at  least  one 
    DNS (Domain Name System) server IP address.
    PPTP  Server  IP  Address  Your  ISP  will  provide  you  with 
    the IP address of the PPTP server.
    Username  and  Password  Enter  the  Username  and 
    Password provided by your ISP.
    Connect on Demand: Max Idle Time  You can configure 
    the Router to cut the Internet connection after it has been 
    inactive  for  a  specified  period  of  time  (Max  Idle  Time).  If 
    your  Internet  connection  has  been  terminated  due  to 
    inactivity,  Connect  on  Demand  enables  the  Router  to 
    automatically re-establish your connection as soon as you 
    attempt  to  access  the  Internet  again.  To  use  this  option, 
    select  Connect  on  Demand.  In  the  Max  Idle  Time  field, 
    enter  the  number  of  minutes  you  want  to  elapse  before 
    your  Internet  connection  terminates.  The  default  is  5 
    minutes.     
    						
    							Chapter 3Advanced Configuration
    6
    Wireless-G Broadband Router
    Keep  Alive:  Redial  Period If  you  select  this  option,  the 
    Router  will  periodically  check  your  Internet  connection.  If 
    you  are  disconnected,  then  the  Router  will  automatically 
    re -establish  your  connection.  To  use  this  option,  select 
    Keep Alive. In the  Redial Period field, specify how often the 
    Router should check the Internet connection. The default is 
    30 seconds.
    L2TP
    L2TP is a service that applies to connections in Israel only.
    Internet Connection Type > L2TP
    User  Name  and  Password  Enter  the  User  Name  and 
    Password provided by your ISP.
    L2TP  Server  This  is  the  IP  address  of  the  L2TP  Server. 
    Your ISP will provide you with the IP address you need to 
    specify.
    Connect on Demand: Max Idle Time  You can configure 
    the Router to cut the Internet connection after it has been 
    inactive  for  a  specified  period  of  time  (Max  Idle  Time).  If 
    your  Internet  connection  has  been  terminated  due  to 
    inactivity,  Connect  on  Demand  enables  the  Router  to 
    automatically re-establish your connection as soon as you 
    attempt  to  access  the  Internet  again.  To  use  this  option, 
    select  Connect  on  Demand.  In  the  Max  Idle  Time  field, 
    enter  the  number  of  minutes  you  want  to  elapse  before 
    your  Internet  connection  terminates.  The  default  is  5 
    minutes.
    Keep  Alive:  Redial  Period  If  you  select  this  option,  the 
    Router will periodically check your Internet connection. If 
    you  are  disconnected,  then  the  Router  will  automatically 
    re-establish  your  connection.  To  use  this  option,  select 
    Keep  Alive.  In  the  Redial  Period  field,  specify  how  often 
    the  Router  should  check  the  Internet  connection.  The 
    default is 30 seconds.
    Telstra Cable
    Telstra  Cable  is  a  service  that  applies  to  connections  in 
    Australia only. If your ISP uses HeartBeat Signal (HBS), then 
    select Telstra Cable.
    Internet Connection Type > Telstra Cable
    User  Name  and  Password  Enter  the  User  Name  and 
    Password provided by your ISP.
    Heart Beat Server  This is the IP address of the Heartbeat 
    Server. Your  ISP  will  provide  you  with  the  IP  Address  you 
    need to specify.
    Connect on Demand: Max Idle Time  You can configure 
    the Router to cut the Internet connection after it has been 
    inactive  for  a  specified  period  of  time  (Max  Idle  Time).  If 
    your  Internet  connection  has  been  terminated  due  to 
    inactivity,  Connect  on  Demand  enables  the  Router  to 
    automatically re-establish your connection as soon as you 
    attempt  to  access  the  Internet  again.  To  use  this  option, 
    select  Connect  on  Demand.  In  the  Max  Idle  Time  field, 
    enter  the  number  of  minutes  you  want  to  have  elapsed 
    before your Internet connection terminates. The default is 
    5 minutes.
    Keep  Alive:  Redial  Period  If  you  select  this  option,  the 
    Router will periodically check your Internet connection. If 
    you  are  disconnected,  then  the  Router  will  automatically 
    re-establish  your  connection.  To  use  this  option,  select 
    Keep  Alive.  In  the  Redial  Period  field,  specify  how  often 
    the  Router  should  check  the  Internet  connection.  The 
    default is 30 seconds.
    Optional Settings
    Some of these settings may be required by your ISP. Verify 
    with your ISP before making any changes.
    Optional Settings
    Router Name  In this field, you can enter a name of up to 
    39 characters to represent the Router. 
    Host  Name/Domain  Name  These  fields  allow  you  to 
    supply a host and domain name for the Router. Some ISPs, 
    usually  cable  ISPs,  require  these  names  as  identification. 
    You  may  have  to  check  with  your  ISP  to  see  if  your 
    broadband  Internet  service  has  been  configured  with  a 
    host and domain name. In most cases, leaving these fields 
    blank will work.      
    						
    All Cisco manuals Comments (0)

    Related Manuals for Cisco Wrt54g 2 V15 Manual