Home > Linksys > Router > Linksys Router WRT54G2 User Manual

Linksys Router WRT54G2 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Linksys Router WRT54G2 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 11 Linksys manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							USER GUIDE
    Wireless-G Broadband Router
    Model: WRT54G2 
    						
    							 About This Guide
    i
    Wireless-G Broadband Router
    About This Guide
    Icon Descriptions
    While  reading  through  the  User  Guide  you  may  see 
    various icons that call attention to specific items. Below is 
    a description of these icons:
    NOTE:  This  check  mark  indicates  that  there  is 
    a  note  of  interest  and  is  something  that  you 
    should pay special attention to while using the 
    product.
     WARNING:  This  exclamation  point  indicates 
    that  there  is  a  caution  or  warning  and  it  is 
    something that could damage your property or 
    product.
    WEB:  This  globe  icon  indicates  a  noteworthy 
    website address or e-mail address.
    Online Resources
    Most  web  browsers  allow  you  to  enter  the  web  address 
    without  adding  the  http://  in  front  of  the  address.  This 
    User Guide will refer to websites without including http:// 
    in  front  of  the  address.  Some  older  web  browsers  may 
    require you to add it.
    Resource
    Website
    Linksys www.linksys.com
    Linksys International  www.linksys.com/international
    Glossary www.linksys.com/glossary
    Network Security www.linksys.com/security
    Copyright and Trademarks
    Linksys  is  a  registered  trademark  or 
    trademark of Cisco Systems, Inc. and/
    or its affiliates in the U.S. and certain 
    other  countries.  Copyright  ©  2008 
    Cisco Systems, Inc. All rights reserved. 
    Other brands and product names are 
    trademarks or registered trademarks 
    of their respective holders.    
    						
    							 Table of Contents
    ii
    Wireless-G Broadband Router
    Chapter 1: Product Overview 
    1
    Front Panel. .  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
    Back Panel  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  1
    Placement Positions . .  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
    Chapter 2: Wireless Security Checklist  3
    General Network Security Guidelines. .  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
    Additional Security Tips   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  3
    Chapter 3: Advanced Configuration  4
    Setup > Basic Setup  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  4
    Setup > DDNS . .  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
    Setup > MAC Address Clone . .  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
    Setup > Advanced Routing   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  9
    Wireless > Basic Wireless Settings   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 10
    Wireless > Wireless Security  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 11
    Wireless > Wireless MAC Filter . .  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
    Wireless > Advanced Wireless Settings .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 14
    Security > Firewall  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 15
    Firewall .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 15
    Security > VPN Passthrough . .  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
    Access Restrictions > Internet Access .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 16
    Applications and Gaming > Port Range Forward . .  . . . . . . . . . . . . . . . . . . . . . . . .17
    Applications & Gaming > Port Triggering   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 17
    Applications and Gaming > DMZ   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 18
    Applications and Gaming > QoS .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 18
    Administration > Management . .  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
    Administration > Log  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 20
    Administration > Diagnostics .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 20
    Administration > Factory Defaults . .  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
    Administration > Upgrade Firmware   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 21
    Administration > Config Management  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 21
    Status > Router .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 22
    Status > Local Network .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 22
    Status > Wireless  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 23
    Appendix A: Troubleshooting  24
    Appendix B: Specifications  25
    Appendix C: Warranty Information  26
    Limited Warranty. .  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26 
    						
    							 Table of Contents
    iii
    Wireless-G Broadband Router
    Appendix D: Regulatory Information 
    28
    FCC Statement  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 28
    FCC Radiation Exposure Statement  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 28
    Safety Notices . .  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
    Industry Canada Statement  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 28
    Avis d’Industrie Canada . .  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29
    Wireless Disclaimer   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 29
    Avis de non-responsabilité concernant les appareils sans fil   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .29
    User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste 
    Electric and Electronic Equipment (WEEE) . .  . . . . . . . . . . . . . . . . . . . . . . . . . . . .30
    Appendix E: Software License Agreement  34
    Software in Linksys Products  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 34
    Software Licenses   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 34 
    						
    							Chapter 1Product Overview
    1
    Wireless-G Broadband Router
    Chapter 1:  
    Product Overview
    Thank you for choosing the Linksys Wireless-G Broadband 
    Router.  The  Router  lets  you  access  the  Internet  via  a 
     
    wireless  connection,  broadcast  at  up  to  54 Mbps,  or 
    through  one  of  its  four  switched  ports. You  can  also  use 
    the Router to share resources such as computers, printers 
    and  files.  A  variety  of  security  features  help  to  protect 
    your data and your privacy while online. Security features 
    include  WPA2  security,  a  Stateful  Packet  Inspection  (SPI) 
    firewall  and  NAT  technology.  Configuring  the  Router  is 
    easy using the provided browser-based utility
    Front Panel
    1,  2,  3,  4  (Green) These  numbered  LEDs, 
    corresponding with the numbered ports on the 
    Router’s  back  panel,  serve  two  purposes.  If  the 
    LED is continuously lit, the Router is successfully 
    connected  to  a  device  through  that  port.  A 
    flashing  LED  indicates  network  activity  over 
    that port.
    Wi-Fi  Protected  Setup  Button  If  you  have 
    client  devices,  such  as  wireless  adapters,  that 
    support  Wi-Fi  Protected  Setup,  then  you  can 
    use  Wi-Fi  Protected  Setup  to  automatically 
    configure  wireless  security  for  your  wireless 
    network(s).
    To  use  Wi-Fi  Protected  Setup,  run  the  Setup 
    Wizard, or refer to the “Wireless > Basic Wireless 
    Settings”  section  of  “Chapter  3:  Advanced 
    Configuration”.
    Wi-Fi  Protected  Setup  LED  (Green/
    Amber)  It  lights  up  green  when  wireless 
    security  is  enabled.  The  LED  flashes  green  for 
    two  minutes  during  Wi-Fi  Protected  Setup.    
     
    The  LED  lights  up  amber  if  there  is  an  error 
    during the Wi-Fi Protected Setup process. Make 
    sure  the  client  device  supports Wi-Fi  Protected 
    Setup. Wait until the LED is off, and then try again.   
     
    The  LED  flashes  amber  when  a Wi-Fi  Protected 
    Setup  session  is  active,  and  a  second  session 
    begins.  The  Router  supports  one  session  at  a 
    time. Wait until the LED is off before starting the 
    next Wi-Fi Protected Setup session.
    Wireless  (Green) The  Wireless  LED  lights  up 
    when the wireless feature is enabled. If the LED 
    is  flashing,  the  Router  is  actively  sending  or 
    receiving data over the network.
    Internet  (Green) The  Internet  LED  lights  up 
    when  there  is  a  connection  made  through  the 
    Internet port. A flashing LED indicates network 
    activity over the Internet port.
    Power  (Green)  The  Power  LED  lights  up 
    and  will  stay  on  while  the  Router  is  powered 
    on.  When  the  Router  goes  through  its  self-
    diagnostic  mode  during  every  boot-up,  this 
    LED will flash. When the diagnostic is complete, 
    the LED will be solidly lit.
    Back Panel
    Internet  The  Internet  port  is  where  you  will 
    connect your cable or DSL Internet connection. 
    1, 2, 3, 4  These Ethernet ports (1, 2, 3, 4) connect 
    the  Router  to  PCs  on  your  wired  network  and 
    other Ethernet network devices. 
    Reset  There are two ways to reset the Router’s 
    factory defaults. Either press and hold the Reset 
    Button for approximately five seconds, or restore 
    the  defaults  from  Administration > Factory 
    Defaults in the Router’s web-based utility. 
    Power  The  Power  port  is  where  you  will  
    connect the power adapter.
    Placement Positions
    There  are  two  ways  to  physically  install  the  Router.  The 
    first  way  is  to  place  the  Router  horizontally  on  a  surface. 
    The second way is to mount the Router on a wall.
    Horizontal Placement
    The Router has four rubber feet on its bottom panel. Place 
    the Router on a level surface near an electrical outlet.           
    						
    							Chapter 1Product Overview
    2
    Wireless-G Broadband Router
    Wall-Mounting Placement
    The  Router  has  two  wall-mount  slots  on  its  bottom 
    panel.  The  distance  between  the  slots  is  152  mm 
     
    (6 inches). 
    Two screws are needed to mount the Router.
    Suggested Mounting Hardware
    2.5-3.0 mm4-5 mm 1-1.5 mm
    Note: Mounting hardware illustrations are not  
    †true to scale.
    NOTE:  Linksys  is  not  responsible  for  damages 
    incurred by insecure wall-mounting hardware.  Follow these instructions:
    Determine where you want to mount the Router. Make 
    1. 
    sure  that  the  wall  you  use  is  smooth,  flat,  dry,  and 
    sturdy.  Also  make  sure  the  location  is  within  reach  of 
    an electrical outlet.
    Drill  two  holes  into  the  wall.  Make  sure  the  holes  are   
    2. 
    152 mm (6 inches) apart.
    Insert  a  screw  into  each  hole  and  leave  3  mm   
    3. 
    (0.12 inches) of its head exposed.
    Maneuver  the  Router  so  the  wall-mount  slots  line  up 
    4. 
    with the two screws.
    Place  the  wall-mount  slots  over  the  screws  and  slide 
    5. 
    the  Router  down  until  the  screws  fit  snugly  into  the 
    wall-mount slots.
    152 mm
    Wall Mounting Template
    Print this page at 100% size. 
    Cut along the dotted line, and place on the wall to drill precise spacing.    
    						
    							Chapter 2Wireless Security Checklist
    3
    Wireless-G Broadband Router
    Chapter 2:  
    Wireless Security Checklist
    Wireless  networks  are  convenient  and  easy  to  install,  so 
    homes with high-speed Internet access are adopting them 
    at a rapid pace. Because wireless networking operates by 
    sending  information  over  radio  waves,  it  can  be  more 
    vulnerable  to  intruders  than  a  traditional  wired  network. 
    Like signals from your cellular or cordless phones, signals 
    from your wireless network can also be intercepted. Since 
    you cannot physically prevent someone from connecting 
    to your wireless network, you need to take some additional 
    steps to keep your network secure. 
    1. 
    Change the default wireless  
      network name or SSID
    Wireless  devices  have  a  default  wireless  network  name 
    or  Service  Set  Identifier  (SSID)  set  by  the  factory.  This 
    is  the  name  of  your  wireless  network,  and  can  be  up 
    to  32  characters  in  length.  Linksys  wireless  products 
    use  linksys  as  the  default  wireless  network  name.  You 
    should  change  the  wireless  network  name  to  something 
    unique  to  distinguish  your  wireless  network  from  other 
    wireless  networks  that  may  exist  around  you,  but  do  not 
    use  personal  information  (such  as  your  Social  Security 
    number)  because  this  information  may  be  available  for 
    anyone to see when browsing for wireless networks. 
    2.   Change the default password
    For  wireless  products  such  as  access  points  and  routers, 
    you will be asked for a password when you want to change 
    their  settings. These  devices  have  a  default  password  set 
    by  the  factory.  The  Linksys  default  password  is  admin. 
    Hackers  know  these  defaults  and  may  try  to  use  them 
    to  access  your  wireless  device  and  change  your  network 
    settings. To  thwart  any  unauthorized  changes,  customize 
    the device’s password so it will be hard to guess.
    3.   Enable MAC address filtering
    Linksys routers give you the ability to enable Media Access 
    Control  (MAC)  address  filtering.  The  MAC  address  is  a 
    unique  series  of  numbers  and  letters  assigned  to  every 
    networking  device.  With  MAC  address  filtering  enabled, 
    wireless  network  access  is  provided  solely  for  wireless 
    devices with specific MAC addresses. For example, you can 
    specify the MAC address of each computer in your home 
    so  that  only  those  computers  can  access  your  wireless 
    network. 
    4.  Enable encryption
    Encryption  protects  data  transmitted  over  a  wireless 
    network.  Wi-Fi  Protected  Access  (WPA/WPA2)  and  Wired 
    Equivalency Privacy (WEP) offer different levels of security 
    for  wireless  communication.  Currently,  devices  that  are 
    Wi-Fi  certified  are  required  to  support WPA2,  but  are  not 
    required to support WEP.
    A  network  encrypted  with  WPA/WPA2  is  more  secure 
    than  a  network  encrypted  with WEP,  because WPA/WPA2 
    uses  dynamic  key  encryption. To  protect  the  information 
    as  it  passes  over  the  airwaves,  you  should  enable  the 
    highest  level  of  encryption  supported  by  your  network 
    equipment. 
    WEP  is  an  older  encryption  standard  and  may  be  the 
    only  option  available  on  some  older  devices  that  do  not 
    support WPA.
    General Network Security Guidelines
    Wireless  network  security  is  useless  if  the  underlying 
    network is not secure. 
    Password  protect  all  computers  on  the  network  and 
     
    •
    individually password protect sensitive files.
    Change passwords on a regular basis.
     
    •
    Install  anti-virus  software  and  personal  firewall  
    •
    software.
    Disable  file  sharing  (peer-to-peer).  Some  applications 
     
    •
    may  open  file  sharing  without  your  consent  and/or 
    knowledge.
    Additional Security Tips
    Keep wireless routers, access points, or gateways away  
    •
    from exterior walls and windows.
    Turn  wireless  routers,  access  points,  or  gateways 
     
    •
    off  when  they  are  not  being  used  (at  night,  during 
    vacations).
    Use strong passphrases that are at least eight characters 
     
    •
    in length. Combine letters and numbers to avoid using 
    standard words that can be found in the dictionary. 
    WEB:  For  more  information  on  wireless 
    security, visit www.linksys.com/security           
    						
    							Chapter 3Advanced Configuration
    4
    Wireless-G Broadband Router
    Chapter 3:  
    Advanced Configuration
    After setting up the Router with the Setup Wizard (located 
    on the CD-ROM), the Router will be ready for use. However, 
    if  you’d  like  to  change  its  advanced  settings,  use  the 
    Router’s  web-based  utility.  This  chapter  describes  each 
    web page of the utility and each page’s key functions. You 
    can  access  the  utility  via  a  web  browser  on  a  computer 
    connected to the Router.
    The  web-based  utility  has  these  main  tabs:  Setup, 
    Wireless,  Security,  Access  Restrictions,  Applications  & 
    Gaming,  Administration,  and  Status.  Additional  tabs  will 
    be available after you click one of the main tabs.
    NOTE:  When  first  installing  the  Router,  you 
    should  use  the  Setup  Wizard  on  the  Setup 
    CD-ROM.  If  you  want  to  configure  advanced 
    settings,  use  this  chapter  to  learn  about  the 
    web-based utility.
    How to Access the Web-Based Utility
    To access the web-based utility, launch the web browser on 
    your computer, and enter the Router’s default IP address, 
    192.168.1.1, in the Address field. Then, press Enter.
    A password request screen will appear. (Non-Windows XP 
    users  will  see  a  similar  screen.)  Leave  the 
    User  name  field 
    blank. The  first  time  you  open  the Web-based  utility,  use 
    the default password  admin. (You can set a new password 
    from  the  Administration  tab’s  Management  screen.)  Click 
    OK to continue.
    Password Screen
    Setup > Basic Setup
    The first screen that appears is the  Basic Setup screen. This 
    allows you to change the Router’s general settings. 
    Setup > Basic Setup
    Internet Setup
    The  Internet  Setup  section  configures  the  Router  to  your 
    Internet  connection.  Most  of  this  information  can  be 
    obtained through your ISP.
    Internet Connection Type
    Select  the  type  of  Internet  connection  your  ISP  provides 
    from the drop-down menu. The available types are:
    Automatic Configuration - DHCP
     
    •
    Static IP 
    •
    PPPoE 
    •
    PPTP 
    •
    L2TP 
    •
    Telstra Cable 
    •
    Automatic Configuration - DHCP
    By  default,  the  Router’s  Internet  Connection  Type  is  set 
    to  Automatic  Configuration  -  DHCP,  which  should  be 
    kept only if your ISP supports DHCP or you are connecting 
    through a dynamic IP address. (This option usually applies 
    to cable connections.)    
    						
    							Chapter 3Advanced Configuration
    5
    Wireless-G Broadband Router
    Internet Connection Type > Automatic Configuration - DHCP
    Static IP
    If  you  are  required  to  use  a  permanent  IP  address  to 
    connect to the Internet, select Static IP.
    Internet Connection Type > Static IP
    Internet IP Address 
    This is the Router’s IP address, when 
    seen from the Internet. Your ISP will provide you with the 
    IP Address you need to specify here.
    Subnet  Mask  This  is  the  Router’s  Subnet  Mask,  as  seen 
    by users on the Internet (including your ISP). Your ISP will 
    provide you with the Subnet Mask.
    Gateway  Your  ISP  will  provide  you  with  the  Gateway 
    Address, which is the ISP server’s IP address.
    DNS  Your  ISP  will  provide  you  with  at  least  one  DNS 
    (Domain Name System) Server IP Address.
    PPPoE
    Some  DSL-based  ISPs  use  PPPoE  (Point-to-Point  Protocol 
    over Ethernet) to establish Internet connections. If you are 
    connected to the Internet through a DSL line, check with 
    your ISP to see if they use PPPoE. If they do, you will have 
    to enable PPPoE.
    Internet Connection Type > PPPoE
    User  Name  and  Password  Enter  the  User  Name  and 
    Password provided by your ISP. 
    Connect on Demand: Max Idle Time  You can configure 
    the Router to cut the Internet connection after it has been 
    inactive  for  a  specified  period  of  time  (Max  Idle  Time).  If 
    your  Internet  connection  has  been  terminated  due  to 
    inactivity,  Connect  on  Demand  enables  the  Router  to 
    automatically re-establish your connection as soon as you 
    attempt  to  access  the  Internet  again.  To  use  this  option, 
    select  Connect  on  Demand.  In  the  Max  Idle  Time  field, 
    enter  the  number  of  minutes  you  want  to  have  elapsed  before  your  Internet  connection  terminates.  The  default 
    Max Idle Time is 5 minutes.
    Keep  Alive:  Redial  Period 
    If  you  select  this  option, 
    the  Router  will  periodically  check  your  Internet 
    connection.  If  you  are  disconnected,  then  the  Router 
    will  automatically  re-establish  your  connection.  To  use 
    this  option,  select  Keep  Alive.  In  the  Redial  Period  field, 
    you  specify  how  often  you  want  the  Router  to  check 
    the  Internet  connection.  The  default  Redial  Period  is   
    30 seconds.
    PPTP
    Point-to-Point Tunneling  Protocol  (PPTP)  is  a  service  that 
    applies to connections in Europe only.
    Internet Connection Type > PPTP
    If your ISP supports DHCP or you are connecting through 
    a  dynamic  IP  address,  then  select  Obtain  an  IP  Address 
    Automatically. If you are required to use a permanent IP 
    address to connect to the Internet, then select  Specify an 
    IP Address. Then configure the following:
    Specify  an IP Address 
     
    •This is the Router’s IP address, 
    as  seen  from  the  Internet.  Your  ISP  will  provide  you 
    with the IP Address you need to specify here.
    Subnet  Mask 
     
    •This  is  the  Router’s  Subnet  Mask,  as 
    seen by users on the Internet (including your ISP). Your 
    ISP will provide you with the Subnet Mask.
    Default  Gateway 
     
    •Your  ISP  will  provide  you  with  the 
    IP address of the ISP server.
    DNS  1-3 
     
    •Your  ISP  will  provide  you  with  at  least  one 
    DNS (Domain Name System) server IP address.
    PPTP  Server  IP  Address  Your  ISP  will  provide  you  with 
    the IP address of the PPTP server.
    Username  and  Password  Enter  the  Username  and 
    Password provided by your ISP.
    Connect on Demand: Max Idle Time  You can configure 
    the Router to cut the Internet connection after it has been 
    inactive  for  a  specified  period  of  time  (Max  Idle  Time).  If 
    your  Internet  connection  has  been  terminated  due  to 
    inactivity,  Connect  on  Demand  enables  the  Router  to       
    						
    							Chapter 3Advanced Configuration
    6
    Wireless-G Broadband Router
    automatically re-establish your connection as soon as you 
    attempt  to  access  the  Internet  again.  To  use  this  option, 
    select 
    Connect  on  Demand.  In  the  Max  Idle  Time  field, 
    enter  the  number  of  minutes  you  want  to  have  elapsed 
    before  your  Internet  connection  terminates.  The  default 
    Max Idle Time is 5 minutes.
    Keep  Alive:  Redial  Period 
    If  you  select  this  option,  the 
    Router  will  periodically  check  your  Internet  connection.  If 
    you  are  disconnected,  then  the  Router  will  automatically   
    re-establish  your  connection.  To  use  this  option,  select 
    Keep Alive. In the  Redial Period field, you specify how often 
    you want the Router to check the Internet connection. The 
    default value is 30 seconds.
    L2TP
    L2TP is a service that applies to connections in Israel only.
    Internet Connection Type > L2TP
    User  Name  and  Password  Enter  the  User  Name  and 
    Password provided by your ISP.
    L2TP  Server  This  is  the  IP  address  of  the  L2TP  Server. 
    Your ISP will provide you with the IP Address you need to 
    specify here.
    Connect on Demand: Max Idle Time  You can configure 
    the Router to cut the Internet connection after it has been 
    inactive  for  a  specified  period  of  time  (Max  Idle  Time).  If 
    your  Internet  connection  has  been  terminated  due  to 
    inactivity,  Connect  on  Demand  enables  the  Router  to 
    automatically re-establish your connection as soon as you 
    attempt  to  access  the  Internet  again.  To  use  this  option, 
    select  Connect  on  Demand.  In  the  Max  Idle  Time  field, 
    enter  the  number  of  minutes  you  want  to  have  elapsed 
    before  your  Internet  connection  terminates.  The  default 
    Max Idle Time is 5 minutes
    Keep  Alive:  Redial  Period  If  you  select  this  option, 
    the  Router  will  periodically  check  your  Internet 
    connection.  If  you  are  disconnected,  then  the  Router 
    will  automatically  re-establish  your  connection.  To  use 
    this  option,  select  Keep  Alive.  In  the  Redial  Period  field, 
    you  specify  how  often  you  want  the  Router  to  check 
    the  Internet  connection.  The  default  Redial  Period  is   
    30 seconds.
    Telstra Cable
    Telstra  Cable  is  a  service  that  applies  to  connections  in 
    Australia only. If your ISP uses HeartBeat Signal (HBS), then 
    select Telstra.
    Internet Connection Type > Telstra Cable
    User  Name  and  Password  Enter  the  User  Name  and 
    Password provided by your ISP.
    Heart Beat Server  This is the IP address of the  Heartbeat 
    Server. Your  ISP  will  provide  you  with  the  IP  Address  you 
    need to specify here.
    Connect on Demand: Max Idle Time  You can configure 
    the Router to cut the Internet connection after it has been 
    inactive  for  a  specified  period  of  time  (Max  Idle  Time).  If 
    your  Internet  connection  has  been  terminated  due  to 
    inactivity,  Connect  on  Demand  enables  the  Router  to 
    automatically re-establish your connection as soon as you 
    attempt  to  access  the  Internet  again.  To  use  this  option, 
    select  Connect  on  Demand.  In  the  Max  Idle  Time  field, 
    enter  the  number  of  minutes  you  want  to  have  elapsed 
    before  your  Internet  connection  terminates.  The  default 
    Max Idle Time is 5 minutes
    Keep  Alive:  Redial  Period  If  you  select  this  option, 
    the  Router  will  periodically  check  your  Internet 
    connection.  If  you  are  disconnected,  then  the  Router 
    will  automatically  re-establish  your  connection.  To  use 
    this  option,  select  Keep  Alive.  In  the  Redial  Period  field, 
    you  specify  how  often  you  want  the  Router  to  check 
    the  Internet  connection.  The  default  Redial  Period  is   
    30 seconds.
    Optional Settings
    Some of these settings may be required by your ISP. Verify 
    with your ISP before making any changes.
    Optional Settings
    Router Name  In this field, you can enter a name of up to 
    39 characters to represent the Router. 
    Host  Name/Domain  Name  These  fields  allow  you  to 
    supply a host and domain name for the Router. Some ISPs, 
    usually  cable  ISPs,  require  these  names  as  identification. 
    You  may  have  to  check  with  your  ISP  to  see  if  your 
    broadband  Internet  service  has  been  configured  with  a 
    host and domain name. In most cases, leaving these fields 
    blank will work.      
    						
    All Linksys manuals Comments (0)

    Related Manuals for Linksys Router WRT54G2 User Manual