WRT54G2 User Guide PDF
Document Details
Uploaded by LawfulJadeite
Collegetown University
2009
Tags
Summary
This document is a user guide for the Linksys by Cisco Wireless-G Broadband Router, model WRT54G2, released in 2009. It provides information on the product's front and back panels, wireless security, advanced configuration options, troubleshooting, and specifications. The guide also covers topics like network security and online resources.
Full Transcript
USER GUIDE Wireless-G Broadband Router Model: WRT54G2 About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Be...
USER GUIDE Wireless-G Broadband Router Model: WRT54G2 About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product. WEB: This globe icon indicates a noteworthy website address or e-mail address. Online Resources Website addresses in this document are listed without http:// in front of the address because most current web browsers do not require it. If you use an older web browser, you may have to add http:// in front of the web address. Resource Website Linksys www.linksysbycisco.com Linksys www.linksysbycisco.com/international International Glossary www.linksysbycisco.com/glossary Network Security www.linksysbycisco.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Other brands and product names are trademarks or registered trademarks of their respective holders. Copyright © 2009 Cisco Systems, Inc. All rights reserved. Wireless-G Broadband Router i Table of Contents Chapter 1: Product Overview 1 Front Panel.................................................. 1 Back Panel................................................... 1 Placement Options............................................. 1 Chapter 2: Wireless Security Checklist 3 General Network Security Guidelines................................. 3 Additional Security Tips.......................................... 3 Chapter 3: Advanced Configuration 4 Setup > Basic Setup............................................. 4 Setup > DDNS................................................ 7 Setup > MAC Address Clone....................................... 8 Setup > Advanced Routing........................................ 9 Wireless > Basic Wireless Settings................................... 10 Wireless > Wireless Security....................................... 11 Wireless > Wireless MAC Filter..................................... 13 Wireless > Advanced Wireless Settings................................ 14 Security > Firewall............................................. 15 Security > VPN Passthrough...................................... 15 Access Restrictions > Internet Access................................. 16 Applications and Gaming > Port Range Forward......................... 17 Applications & Gaming > Port Triggering.............................. 18 Applications and Gaming > DMZ................................... 18 Applications and Gaming > QoS.................................... 19 Administration > Management.................................... 19 Administration > Log........................................... 20 Administration > Diagnostics...................................... 20 Administration > Factory Defaults.................................. 21 Administration > Upgrade Firmware................................. 21 Administration > Config Management................................ 21 Status > Router............................................... 22 Status > Local Network.......................................... 22 Status > Wireless.............................................. 23 Appendix A: Troubleshooting 24 Appendix B: Specifications 25 Appendix C: Warranty Information 26 Limited Warranty............................................. 26 Wireless-G Broadband Router ii Table of Contents Appendix D: Regulatory Information 28 FCC Statement............................................... 28 FCC Radiation Exposure Statement.................................. 28 Safety Notices............................................... 28 Industry Canada Statement....................................... 28 Avis d’Industrie Canada......................................... 29 Wireless Disclaimer............................................ 29 Avis de non-responsabilité concernant les appareils sans fil.................. 29 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE)............................. 30 Appendix E: Software End User License Agreement 34 Cisco Products............................................... 34 Software Licenses............................................. 34 Wireless-G Broadband Router iii Chapter 1 Product Overview Chapter 1: Wireless (Green) The Wireless LED lights up when the wireless feature is enabled. If the LED Product Overview is flashing, the Router is actively sending or receiving data over the network. Thank you for choosing the Linksys by Cisco Wireless-G Internet (Green) The Internet LED lights up Broadband Router. The Router lets you access the Internet when there is a connection made through the via a wireless connection, broadcast at up to 54 Mbps, or Internet port. A flashing LED indicates network through one of its four switched ports. You can also use activity over the Internet port. the Router to share resources such as computers, printers and files. Power (Green) The Power LED lights up and will stay on while the Router is powered A variety of security features help to protect your data and on. When the Router goes through its self- your privacy while online. Security features include WPA2 diagnostic mode during every boot-up, this security, a Stateful Packet Inspection (SPI) firewall and LED will flash. When the diagnostic is complete, NAT technology. Configuring the Router is easy using the the LED will be solidly lit. provided browser-based utility. Front Panel Back Panel 1, 2, 3, 4 (Green) These numbered LEDs, Internet The Internet port is where you corresponding with the numbered ports on the connect your cable or DSL Internet connection. Router’s back panel, serve two purposes. If the 1, 2, 3, 4 These Ethernet ports (1, 2, 3, 4) connect LED is continuously lit, the Router is successfully the Router to PCs on your wired network and connected to a device through that port. A other Ethernet network devices. flashing LED indicates network activity over that port. Reset There are two ways to reset the Router’s factory defaults. Either press and hold the Reset Wi-Fi Protected Setup Button If you have Button for approximately five seconds, or restore client devices, such as wireless adapters, that the defaults from Administration > Factory support Wi-Fi Protected Setup, then you can Defaults in the Router’s web-based utility. use Wi-Fi Protected Setup to automatically configure wireless security for your wireless Power The Power port is where you connect network(s). the power adapter. To use Wi-Fi Protected Setup, run the Setup Wizard, or refer to Wi-Fi Protected Setup, page Placement Options 10. There are two ways to physically install the Router. The Wi-Fi Protected Setup LED (Green/ first way is to place the Router horizontally on a surface. Amber) It lights up green when wireless The second way is to mount the Router on a wall. security is enabled. The LED flashes green for two minutes during Wi-Fi Protected Setup. Horizontal Placement The LED lights up amber if there is an error The Router has four rubber feet on its bottom panel. Place during the Wi‑Fi Protected Setup process. Make the Router on a level surface near an electrical outlet. sure the client device supports Wi‑Fi Protected Setup. Wait until the LED is off, and then try again. The LED flashes amber when a Wi‑Fi Protected Setup session is active, and a second session begins. The Router supports one session at a time. Wait until the LED is off before starting the next Wi-Fi Protected Setup session. Wireless-G Broadband Router 1 Chapter 1 Product Overview Wall-Mounting Placement Follow these instructions: The Router has two wall-mount slots on its bottom 1. Determine where you want to mount the Router. Make panel. The distance between the slots is 152 mm sure that the wall you use is smooth, flat, dry, and (6 inches). sturdy. Also make sure the location is within reach of an electrical outlet. Two screws are needed to mount the Router. 2. Drill two holes into the wall. Make sure the holes are 152 mm (6 inches) apart. Suggested Mounting Hardware 3. Insert a screw into each hole and leave 3 mm 2.5-3.0 mm (0.12 inches) of its head exposed. 4. Position the Router so the wall-mount slots line up 4-5 mm 1-1.5 mm with the two screws. ††Note: Mounting hardware illustrations are not 5. Place the wall-mount slots over the screws and slide to scale. the Router down until the screws fit snugly into the wall-mount slots. NOTE: Linksys is not responsible for damages incurred by insecure wall-mounting hardware. 152 mm Print this page at 100% size. Cut along the dotted line, and place on the wall to drill precise spacing. Wall Mounting Template Wireless-G Broadband Router 2 Chapter 2 Wireless Security Checklist Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless Wireless networks are convenient and easy to install, so network. Wi-Fi Protected Access (WPA/WPA2) and Wired homes with high-speed Internet access are adopting them Equivalent Privacy (WEP) offer different levels of security at a rapid pace. Because wireless networking operates by for wireless communication. Currently, devices that are sending information over radio waves, it can be more Wi-Fi certified are required to support WPA2, but are not vulnerable to intruders than a traditional wired network. required to support WEP. Like signals from your cellular or cordless phones, signals A network encrypted with WPA/WPA2 is more secure from your wireless network can also be intercepted. Since than a network encrypted with WEP, because WPA/WPA2 you cannot physically prevent someone from connecting uses dynamic key encryption. To protect the information to your wireless network, you need to take some additional as it passes over the airwaves, you should enable the steps to help keep your network secure. highest level of encryption supported by your network equipment. 1. Change the default wireless WEP is an older encryption standard and may be the network name or SSID only option available on some older devices that do not support WPA. Wireless devices have a default wireless network name or Service Set Identifier (SSID) set by the factory. This General Network Security Guidelines is the name of your wireless network, and can be up to 32 characters in length. Linksys wireless products Wireless network security is useless if the underlying use linksys as the default wireless network name. You network is not secure. should change the wireless network name to something Password protect all computers on the network and unique to distinguish your wireless network from other individually password protect sensitive files. wireless networks that may exist around you, but do not use personal information (such as your Social Security Change passwords on a regular basis. number) because this information may be available for Install anti-virus software and personal firewall anyone to see when browsing for wireless networks. software. Disable file sharing (peer-to-peer). Some applications 2. Change the default password may open file sharing without your consent and/or knowledge. For wireless products such as access points and routers, you will be asked for a password when you want to change their Additional Security Tips settings. These devices have a default password set by the Keep wireless routers, access points, or gateways away factory. The Linksys default password is admin. Hackers from exterior walls and windows. know these defaults and may try to use them to access your wireless device and change your network settings. Turn wireless routers, access points, or gateways To help thwart any unauthorized changes, customize the off when they are not being used (at night, during device’s password so it will be hard to guess. vacations). Use strong passphrases that are at least eight characters in length. Combine letters and numbers to avoid using 3. Enable MAC address filtering standard words that can be found in the dictionary. Linksys routers give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a WEB: For more information on wireless unique series of numbers and letters assigned to every security, visit www.linksys.com/security networking device. With MAC address filtering enabled, wireless network access is provided solely for wireless devices with specific MAC addresses. For example, you can specify the MAC address of each computer in your home so that only those computers can access your wireless network. Wireless-G Broadband Router 3 Chapter 3 Advanced Configuration Chapter 3: Setup > Basic Setup Advanced Configuration The first screen that appears is the Basic Setup screen. This allows you to change the Router’s general settings. After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. If you’d like to change its advanced settings, use the Router’s web- based utility. This chapter describes each web page of the utility and each page’s key functions. You can access the utility via a web browser on a computer connected to the Router. The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. Additional tabs will be available after you click one of the main tabs. NOTE: When first installing the Router, you should use the Setup Wizard on the Setup CD-ROM. If you want to configure advanced settings, use this chapter to learn about the web-based utility. How to Access the Web-Based Utility To access the web-based utility, launch the web browser on your computer, and enter the Router’s default IP address, Setup > Basic Setup 192.168.1.1, in the Address field. Then, press Enter. A password request screen will appear. (Non-Windows Internet Setup XP users will see a similar screen.) Leave the User name The Internet Setup section configures the Router to your field blank. Then enter the password you set up during Internet connection. Most of this information can be the Setup Wizard. (If you did not run the Setup Wizard, obtained through your Internet Service Provider (ISP). then use the default password, admin. You can set a new password from the Administration tab’s Management Internet Connection Type screen.) Click OK to continue. Select the type of Internet connection your ISP provides from the drop-down menu. The available types are: Automatic Configuration - DHCP Static IP PPPoE PPTP L2TP Telstra Cable Automatic Configuration - DHCP Password Screen The default Internet Connection Type is Automatic Configuration - DHCP. Keep the default only if your ISP supports DHCP or if you connect using a dynamic IP address. (This option usually applies to cable connections.) Internet Connection Type > Automatic Configuration - DHCP Wireless-G Broadband Router 4 Chapter 3 Advanced Configuration Static IP you are disconnected, then the Router will automatically re-establish your connection. To use this option, select If you are required to use a permanent IP address to Keep Alive. In the Redial Period field, specify how often connect to the Internet, select Static IP. the Router should check the Internet connection. The default is 30 seconds. PPTP Point-to-Point Tunneling Protocol (PPTP) is a service that applies to connections in Europe only. Internet Connection Type > Static IP Internet IP Address This is the Router’s IP address, when seen from the Internet. Your ISP will provide you with the IP Address you need to specify. Subnet Mask This is the Router’s Subnet Mask, as seen by users on the Internet (including your ISP). Your ISP will provide you with the Subnet Mask. Gateway Your ISP will provide you with the Gateway address, which is the ISP server’s IP address. Internet Connection Type > PPTP Static DNS Your ISP will provide you with at least one DNS (Domain Name System) server IP Address. If your ISP supports DHCP or you are connecting through a dynamic IP address, then select Obtain an IP Address PPPoE Automatically. If you are required to use a permanent IP address to connect to the Internet, then select Specify an Some DSL-based ISPs use PPPoE (Point-to-Point Protocol IP Address. Then configure the following: over Ethernet) to establish Internet connections. If you are connected to the Internet through a DSL line, check with Specify an IP Address This is the Router’s IP address, your ISP to see if they use PPPoE. If they do, you will have as seen from the Internet. Your ISP will provide you to enable PPPoE. with the IP Address you need to specify. Subnet Mask This is the Router’s Subnet Mask, as seen by users on the Internet (including your ISP). Your ISP will provide you with the Subnet Mask. Default Gateway Your ISP will provide you with the IP address of the ISP server. DNS 1-3 Your ISP will provide you with at least one Internet Connection Type > PPPoE DNS (Domain Name System) server IP address. User Name and Password Enter the User Name and PPTP Server IP Address Your ISP will provide you with Password provided by your ISP. the IP address of the PPTP server. Connect on Demand: Max Idle Time You can configure Username and Password Enter the Username and the Router to cut the Internet connection after it has been Password provided by your ISP. inactive for a specified period of time (Max Idle Time). If your Internet connection has been terminated due to Connect on Demand: Max Idle Time You can configure inactivity, Connect on Demand enables the Router to the Router to cut the Internet connection after it has been automatically re-establish your connection as soon as you inactive for a specified period of time (Max Idle Time). If attempt to access the Internet again. To use this option, your Internet connection has been terminated due to select Connect on Demand. In the Max Idle Time field, inactivity, Connect on Demand enables the Router to enter the number of minutes you want to elapse before automatically re-establish your connection as soon as you your Internet connection terminates. The default is 5 attempt to access the Internet again. To use this option, minutes. select Connect on Demand. In the Max Idle Time field, enter the number of minutes you want to elapse before Keep Alive: Redial Period If you select this option, the your Internet connection terminates. The default is 5 Router will periodically check your Internet connection. If minutes. Wireless-G Broadband Router 5 Chapter 3 Advanced Configuration Keep Alive: Redial Period If you select this option, the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re‑establish your connection. To use this option, select Keep Alive. In the Redial Period field, specify how often the Router should check the Internet connection. The default is 30 seconds. Internet Connection Type > Telstra Cable L2TP User Name and Password Enter the User Name and L2TP is a service that applies to connections in Israel only. Password provided by your ISP. Heart Beat Server This is the IP address of the Heartbeat Server. Your ISP will provide you with the IP Address you need to specify. Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time). If Internet Connection Type > L2TP your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to User Name and Password Enter the User Name and automatically re-establish your connection as soon as you Password provided by your ISP. attempt to access the Internet again. To use this option, select Connect on Demand. In the Max Idle Time field, L2TP Server This is the IP address of the L2TP Server. enter the number of minutes you want to have elapsed Your ISP will provide you with the IP address you need to before your Internet connection terminates. The default is specify. 5 minutes. Connect on Demand: Max Idle Time You can configure Keep Alive: Redial Period If you select this option, the the Router to cut the Internet connection after it has been Router will periodically check your Internet connection. If inactive for a specified period of time (Max Idle Time). If you are disconnected, then the Router will automatically your Internet connection has been terminated due to re-establish your connection. To use this option, select inactivity, Connect on Demand enables the Router to Keep Alive. In the Redial Period field, specify how often automatically re-establish your connection as soon as you the Router should check the Internet connection. The attempt to access the Internet again. To use this option, default is 30 seconds. select Connect on Demand. In the Max Idle Time field, enter the number of minutes you want to elapse before Optional Settings your Internet connection terminates. The default is 5 minutes. Some of these settings may be required by your ISP. Verify with your ISP before making any changes. Keep Alive: Redial Period If you select this option, the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re-establish your connection. To use this option, select Keep Alive. In the Redial Period field, specify how often the Router should check the Internet connection. The default is 30 seconds. Telstra Cable Optional Settings Telstra Cable is a service that applies to connections in Router Name In this field, you can enter a name of up to Australia only. If your ISP uses HeartBeat Signal (HBS), then 39 characters to represent the Router. select Telstra Cable. Host Name/Domain Name These fields allow you to supply a host and domain name for the Router. Some ISPs, usually cable ISPs, require these names as identification. You may have to check with your ISP to see if your broadband Internet service has been configured with a host and domain name. In most cases, leaving these fields blank will work. Wireless-G Broadband Router 6 Chapter 3 Advanced Configuration MTU MTU is the Maximum Transmission Unit. It specifies Router’s default IP address is 192.168.1.1, the Starting IP the largest packet size permitted for Internet transmission. Address must be 192.168.1.2 or greater, but smaller than Select Manual if you want to manually enter the largest 192.168.1.253. The default is 192.168.1.100. packet size that is transmitted. To have the Router select Maximum Number of DHCP Users Enter the maximum the best MTU for your Internet connection, keep the number of PCs that you want the DHCP server to assign default, Auto. IP addresses to. This number cannot be greater than 253. Size When Manual is selected in the MTU field, this option The default is 50. is enabled. Leave this value in the 1200 to 1500 range. The Client Lease Time The Client Lease Time is the amount default size depends on the Internet Connection Type: of time a network user will be allowed connection to the DHCP, Static IP, or Telstra: 1500 Router with their current dynamic IP address. Enter the amount of time, in minutes, that the user will be “leased” PPPoE: 1492 this dynamic IP address. After the time is up, the user will PPTP or L2TP: 1460 be automatically assigned a new dynamic IP address, or the lease will be renewed. The default is 0 minutes, which Network Setup means one day. The Network Setup section changes the settings on the Static DNS (1-3) The Domain Name System (DNS) is how network connected to the Router’s Ethernet ports. Wireless the Internet translates domain or website names into Setup is performed through the Wireless tab. Internet addresses or URLs. Your ISP will provide you with at least one DNS Server IP Address. If you wish to use another, Router IP enter that IP Address in one of these fields. You can enter up to three DNS Server IP Addresses here. The Router will use This presents both the Router’s IP Address and Subnet these for quicker access to functioning DNS servers. Mask as seen by your network. WINS The Windows Internet Naming Service (WINS) manages each PC’s interaction with the Internet. If you use a WINS server, enter that server’s IP Address here. Otherwise, leave this blank. Router IP Address Time Setting Network Address Server Settings (DHCP) Select the time zone in which your network functions The settings allow you to configure the Router’s Dynamic from this drop-down menu. (You can even automatically Host Configuration Protocol (DHCP) server function. The adjust for daylight saving time.) Router can be used as a DHCP server for your network. A DHCP server automatically assigns an IP address to each computer on your network. If you choose to enable the Router’s DHCP server option, make sure there is no other DHCP server on your network. Time Setting Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Setup > DDNS The Router offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address. It is useful when you are hosting your own website, FTP server, or other Network Address Server Settings (DHCP) server behind the Router. Before you can use this feature, you need to sign DHCP Server DHCP is enabled by factory default. If you up for DDNS service with a DDNS service provider, already have a DHCP server on your network, or you do www.dyndns.org or www.TZO.com. If you do not want not want a DHCP server, then select Disable (no other to use this feature, keep the default setting, Disable. DHCP features will be available). Starting IP Address Enter a value for the DHCP server to start with when issuing IP addresses. Because the Wireless-G Broadband Router 7 Chapter 3 Advanced Configuration DDNS TZO.com The Router offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address. It is useful when you are hosting your own website, FTP server, or other server behind the Router. Before you can use this feature, you need to sign up for DDNS service at one of two DDNS service providers, DynDNS.org or TZO.com. If you do not want to use this feature, keep the default, Disable. DDNS Service If your DDNS service is provided by DynDNS.org, then select DynDNS.org from the drop-down menu. If your DDNS service is provided by TZO, then select TZO.com. The features available on the DDNS screen will vary, depending on which DDNS service provider you use. Setup > DDNS > TZO DynDNS.org E-mail Address, TZO Key, and Domain Name Enter the settings of the account you set up with TZO. Internet IP Address The Router’s Internet IP address is displayed. Because it is dynamic, it will change. Status The status of the DDNS service connection is displayed. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Setup > MAC Address Clone Some ISPs will require you to register a MAC address Setup > DDNS > DynDNS in order to access the Internet. A MAC address is a 12-digit code assigned to a unique piece of hardware for User Name Enter the User Name for your DDNS account. identification. If you do not wish to re-register the MAC Password Enter the Password for your DDNS account. address with your ISP, you can use the MAC Address Clone feature to assign the currently registered MAC address to Host Name The is the DDNS URL assigned by the DDNS the Router. service. Internet IP Address The Router’s Internet IP address is displayed. Because it is dynamic, it will change. Status The status of the DDNS service connection is displayed. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Setup > MAC Address Clone MAC Address Clone Enable/Disable To have the MAC Address cloned, select Enable. Wireless-G Broadband Router 8 Chapter 3 Advanced Configuration User Defined Entry Enter the MAC Address registered Router is chosen, Dynamic Routing will be available as with your ISP here. an option. Clone Your PC’s MAC Clicking this button will clone the Dynamic Routing MAC address of the computer you are using. RIP This feature enables the Router to automatically Click Save Settings to apply your changes, or click Cancel adjust to physical changes in the network’s layout and Changes to clear your changes. exchange routing tables with the other router(s). The Router determines the network packets’ route based on Setup > Advanced Routing the fewest number of hops between the source and the This screen is used to set up the Router’s advanced routing destination. This feature is Disabled by default. From the functions. NAT routes the host Router‘s network connection drop-down menu, you can also select LAN & Wireless, to the Internet. Dynamic Routing automatically adjusts which performs dynamic routing over your Ethernet and how packets travel on your network. Static Routing sets wireless networks. You can also select WAN (Internet), up a fixed route to another network destination. which performs dynamic routing with data coming from the Internet. Finally, selecting Both enables dynamic routing for both networks, as well as data from the Internet. Select set number To set up a static route between the Router and another network, select a number from the Static Routing drop-down list. (A static route is a pre- determined pathway that network information must travel to reach a specific host or network.) Enter the information described below to set up a new static route. (Click the Delete This Entry button to delete a static route.) Enter Route Name Enter a name for the Route here, using a maximum of 25 alphanumeric characters. Destination LAN IP The Destination LAN IP is the address of the remote network or host to which you want to assign a static route. Setup > Advanced Routing (Gateway) Subnet Mask The Subnet Mask determines which portion of a Destination LAN IP address is the network portion, and which portion is the host portion. Default Gateway This is the IP address of the gateway device that allows for contact between the Router and the remote network or host. Interface This interface tells you whether the Destination IP Address is on the LAN & Wireless (Ethernet and wireless networks) or the WAN (Internet). Delete This Entry To delete a route, select its number from the drop-down menu, and click this button. Show Routing Table Click Show Routing Table to open a screen displaying how data is routed through your local network. For each route, the Destination LAN IP address, Subnet Mask, Gateway, and Interface are displayed. Click Refresh to update the information. Click Close to exit this Setup > Advanced Routing (Router ) screen. Advanced Routing Operating Mode Select the mode in which this Router will function. If this Router is hosting your network’s connection to the Internet, select Gateway. If another Router exists on your network, select Router. When Routing Table Wireless-G Broadband Router 9 Chapter 3 Advanced Configuration Click Save Settings to apply your changes, or click Cancel Wireless SSID Broadcast When wireless clients survey Changes to clear your changes. the local area for wireless networks to associate with, they will detect the SSID broadcast by the Router. To broadcast Wireless > Basic Wireless Settings the Router’s SSID, keep the default, Enabled. If you do not want to broadcast the Router’s SSID, then select The basic settings for wireless networking are set on this Disabled. screen. Click Save Settings to apply your changes, or click Cancel There are two ways to configure the Router’s wireless Changes to clear your changes. network(s), manual and Wi-Fi Protected Setup. Wi-Fi Protected Setup is a feature that makes it easy to set Wi-Fi Protected Setup up your wireless network. If you have client devices, such There are three methods available. Use the method that as wireless adapters, that support Wi-Fi Protected Setup, applies to the client device you are configuring. then you can use Wi-Fi Protected Setup. Wireless > Basic Wireless Settings (Manual Setup) Wireless Configuration To manually configure your wireless network, select Manual. Proceed to the “Wireless Network (Manual)” section. To use Wi-Fi Protected Setup, select Wi-Fi Protected Setup. Proceed to Wi-Fi Protected Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) Setup, page 10. Wireless Network (Manual) Wireless Network Mode From this drop-down menu, you can select the wireless standards running on your network. If you have Wireless-N, Wireless-G, and Wireless-B devices in your network, keep the default setting, Mixed. If you have only Wireless-G and Wireless-B devices in your network, select BG-Mixed. If you have only Wireless-N devices, select Wireless-N Only. If you have only Wireless-G devices, select Wireless-G Only. If you have only Wireless-B devices, select Wireless-B Only. If your network has no wireless devices, or if you want to disable wireless networking, select Disabled. Wireless Network Name (SSID) The SSID is the network name shared among all points in a wireless network. The SSID must be identical for all devices in the wireless Wi-Fi Protected Setup > Congratulations network. It is case-sensitive and must not exceed 32 keyboard characters. For added security, you should NOTE: Wi-Fi Protected Setup configures one change the default SSID (linksys) to a unique name. client device at a time. Repeat the instructions Wireless Channel Select the channel from the list for each client device that supports Wi-Fi provided to correspond with your network settings. All Protected Setup. devices in your wireless network must be broadcast on the same channel in order to function correctly. Wireless-G Broadband Router 10 Chapter 3 Advanced Configuration Method #1 Wireless Security Use this method if your client device has a Wi-Fi Protected Wireless security is strongly recommended, and WPA2 is Setup button. the strongest method available. Use WPA2 if it is supported 1. Click or press the Wi-Fi Protected Setup button on by all of your wireless devices. the client device. Security Mode 2. Click the Wi‑Fi Protected Setup button on this screen. Select the security method for your wireless network. If you do not want to use wireless security, keep the default, 3. After the client device has been configured, click Disabled. OK. Then refer back to your client device or its documentation for further instructions. WPA2 Personal Method #2 NOTE: If you are using WPA2 or WPA, each Use this method if your client device has a Wi-Fi Protected device in your wireless network MUST use the Setup PIN number. same WPA method and shared key, or else the 1. Enter the PIN number in the field on this screen. network will not function properly. 2. Click Register. 3. After the client device has been configured, click OK. Then refer back to your client device or its documentation for further instructions. Method #3 Use this method if your client device asks for the Router’s PIN number. 1. Enter the PIN number listed on this screen. (It is also listed on the label on the bottom of the Router.) 2. After the client device has been configured, click OK. Then refer back to your client device or its Security Mode > WPA2 Personal documentation for further instructions. The Wi-Fi Protected Setup Status, Network Name (SSID), WPA Algorithm WPA2 supports two encryption methods, Security, Encryption, and Passphrase are displayed at the TKIP and AES, with dynamic encryption keys. Select the bottom of the screen. type of algorithm, AES, or TKIP + AES. The default is AES. WPA Shared Key Enter a WPA Shared Key of 8-63 NOTE: If you have client devices that do not characters. support Wi-Fi Protected Setup, note the wireless Group Key Renewal Enter a Group Key Renewal period, settings, and then manually configure those which instructs the Router how often it should change the client devices. encryption keys. The default is 3600 seconds. Wireless > Wireless Security The Wireless Security settings configure the security of your wireless network. There are six wireless security mode options supported by the Router: WPA2 Personal, WPA Personal, WPA2 Enterprise, WPA Enterprise, RADIUS, and WEP. WPA (Wi-Fi Protected Access) is a stronger security standard than WEP (Wireless Equivalent Privacy), and WPA2 is even more secure than WPA. RADIUS is Remote Authentication Dial-In User Service. These six are briefly discussed here. For more information about wireless security, refer to Chapter 2: Wireless Security Checklist, page 3. Wireless-G Broadband Router 11 Chapter 3 Advanced Configuration WPA Personal RADIUS Server Address Enter the IP Address of the RADIUS server. NOTE: If you are using WPA2 or WPA, each RADIUS Port Enter the port number of the RADIUS device in your wireless network MUST use the server. The default is 1812. same WPA method and shared key, or else the Shared Key Enter the key shared between the Router network will not function properly. and the server. Key Renewal Timeout Enter a Key Renewal Timeout period, which instructs the Router how often it should change the encryption keys. The default is 3600 seconds. WPA Enterprise This option features WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) Security Mode > WPA Personal WPA Algorithm WPA supports two encryption methods, TKIP and AES, with dynamic encryption keys. Select the type of algorithm, TKIP or AES. (AES is a stronger encryption method than TKIP.) WPA Shared Key Enter the key shared by the Router and your other network devices. It must have 8-63 characters. Group Key Renewal Enter a Key Renewal period, which tells the Router how often it should change the encryption Security Mode > WPA Enterprise keys. The default is 3600 seconds. WPA Algorithm WPA supports two encryption methods, WPA2 Enterprise TKIP and AES, with dynamic encryption keys. Select the type of algorithm, TKIP or AES. (AES is a stronger This option features WPA2 used in coordination with a encryption method than TKIP.) RADIUS server. (This should only be used when a RADIUS server is connected to the Router. RADIUS Server Address Enter the IP Address of the RADIUS server. RADIUS Port Enter the port number of the RADIUS server. The default is 1812. Shared Key Enter the key shared between the Router and the server. Key Renewal Timeout Enter a Key Renewal Timeout period, which instructs the Router how often it should change the encryption keys. The default is 3600 seconds. Security Mode > WPA2 Enterprise WPA Algorithm WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. Select the type of algorithm, AES, or TKIP + AES. The default is AES Wireless-G Broadband Router 12 Chapter 3 Advanced Configuration RADIUS IMPORTANT: If you are using WEP encryption, This option features WEP used in coordination with a each device in your wireless network MUST RADIUS server. (This should only be used when a RADIUS use the same WEP encryption method and server is connected to the Router.) encryption key, or else your wireless network will not function properly. Security Mode > WEP Security Mode > RADIUS Default Transmit Key Select a Default Transmit Key IMPORTANT: If you are using WEP encryption, (choose which Key to use). The default is 1. each device in your wireless network MUST use the same WEP encryption method and WEP Encryption Select a level of WEP encryption, 64 bits encryption key, or else your wireless network will 10 hex digits or 128 bits 26 hex digits. The default is not function properly. 64 bits 10 hex digits. Passphrase Enter a Passphrase to automatically generate RADIUS Server Address Enter the IP Address of the WEP keys. Then click Generate. RADIUS server. Key 1-4 If you did not enter a Passphrase, enter the WEP RADIUS Port Enter the port number of the RADIUS key(s) manually. server. The default is 1812. Click Save Settings to apply your changes, or click Cancel Shared Key Enter the key shared between the Router Changes to clear your changes. and the server. Default Transmit Key Select a Default Transmit Key Wireless > Wireless MAC Filter (choose which Key to use). The default is 1. Wireless access can be filtered (restricted) by specifying the WEP Encryption Select a level of WEP encryption, MAC addresses of the devices in your wireless network. 64 bits 10 hex digits or 128 bits 26 hex digits. The default is 64 bits 10 hex digits. Passphrase Enter a Passphrase to automatically generate WEP keys. Then click Generate. Key 1-4 If you did not enter a Passphrase, enter the WEP key(s) manually. WEP WEP is a basic encryption method, which is not as secure as WPA. Wireless > Wireless MAC Filter Wireless-G Broadband Router 13 Chapter 3 Advanced Configuration Wireless MAC Filter Wireless MAC Filter To filter wireless users by MAC Address, either permitting or blocking access, click Enable. If you do not wish to filter users by MAC Address, keep the default, Disable. Prevent Select this to block wireless access by MAC Address. This button is selected by default. Permit Only Select this to allow wireless access by MAC Address. This button is not selected by default. Edit MAC Filter List Click this to open the MAC Address Filter List screen. On this screen, you can list users, by MAC Address, to whom you wish to provide or block access. For Wireless > Advanced Wireless Settings easy reference, click Wireless Client MAC List to display a list of network users by MAC Address. Advanced Wireless Authentication Type The default is set to Auto, which allows either Open System or Shared Key authentication to be used. With Open System authentication, the sender and the recipient do NOT use a WEP key for authentication. With Shared Key authentication, the sender and recipient use a WEP key for authentication. Basic Rate The Basic Rate setting is not actually one rate of transmission but a series of rates at which the Router can transmit. The Router will advertise its Basic Rate to the other wireless devices in your network, so they know which rates will be used. The Router will also advertise that it will automatically select the best rate for transmission. The default setting is Default, for transmission at all standard wireless rates (1-2 Mbps, 5.5 Mbps, 11 Mbps, 18 Mbps, and 24 Mbps). Other options are 1-2Mbps, for use with older wireless technology, and All, for transmission at all wireless rates. The Basic Rate is not the actual rate MAC Address Filter List of data transmission. If you want to specify the Router’s rate of data transmission, configure the Transmission Rate Click Save Settings to apply your changes, or click Cancel setting. Changes to clear your changes. Transmission Rate The rate of data transmission should be set depending on the speed of your wireless network. Wireless > Advanced Wireless Settings You can select from a range of transmission speeds, or you can select Auto to have the Router automatically use the This Wireless > Advanced Wireless Settings screen is used fastest possible data rate and enable the Auto-Fallback to set up the Router’s advanced wireless functions. feature. Auto-Fallback will negotiate the best possible These settings should only be adjusted by an expert connection speed between the Router and a wireless administrator because incorrect settings can reduce client. The default is Auto. wireless performance. CTS Protection Mode CTS (Clear-To-Send) Protection Mode should remain disabled unless you are having severe problems with your Wireless-G products not being able to transmit to the Router in an environment with heavy 802.11b traffic. This function boosts the Router’s ability to catch all Wireless-G transmissions but will severely decrease performance. Frame Burst Enabling this option should provide your network with greater performance, depending on the Wireless-G Broadband Router 14 Chapter 3 Advanced Configuration manufacturer of your wireless products. To turn on the Frame Burst option, select Enable. The default is Disable. Beacon Interval A beacon is a packet broadcast by the Router to synchronize the wireless network. The default is 100. Enter a value between 1 and 65,535 milliseconds. The Beacon Interval value indicates the frequency interval of the beacon. DTIM Interval This value, between 1 and 255, indicates the interval of the Delivery Traffic Indication Message Security > Firewall (DTIM). A DTIM field is a countdown field informing clients of the next window for listening to broadcast and multicast messages. When the Router has buffered Firewall broadcast or multicast messages for associated clients, it Firewall Protection To use firewall protection, keep the sends the next DTIM with a DTIM Interval value. Its clients default selection, Enable. To turn off firewall protection, hear the beacons and awaken to receive the broadcast select Disable. and multicast messages. The default is 1. Fragmentation Threshold This value specifies the Block WAN Requests maximum size for a packet before data is fragmented Block Anonymous Internet Requests This feature into multiple packets. If you experience a high packet makes it more difficult for outside users to work their error rate, you may slightly increase the Fragmentation way into your network. This feature is selected by default. Threshold. Setting the Fragmentation Threshold too low Deselect the feature to allow anonymous Internet may result in poor network performance. Only minor requests. reduction of the default value is recommended. In most cases, it should remain at its default value of 2346. Filter Multicast Multicasting allows for multiple transmissions to specific recipients at the same time. If RTS Threshold Should you encounter inconsistent data multicasting is permitted, then the Router will allow IP flow, only minor reduction of the default value, 2347, is multicast packets to be forwarded to the appropriate recommended. If a network packet is smaller than the computers. This feature is selected by default. Deselect preset RTS threshold size, the RTS/CTS mechanism will this feature to disable it. not be enabled. The Router sends Request to Send (RTS) frames to a particular receiving station and negotiates Filter Internet NAT Redirection This feature uses the sending of a data frame. After receiving an RTS, the port forwarding to block access to local servers from wireless station responds with a Clear to Send (CTS) frame local networked computers. Select Filter Internet NAT to acknowledge the right to begin transmission. The RTS Redirection to filter Internet NAT redirection. This feature Threshold value should remain at its default value of is not selected by default. 2347. Filter IDENT (Port 113) This feature keeps port 113 from AP Isolation This isolates all wireless clients and wireless being scanned by devices outside of your local network. devices on your network from each other. Wireless devices This feature is selected by default. Deselect this feature to will be able to communicate with the Router but not with disable it. each other. To use this function, select On. AP Isolation is Click Save Settings to apply your changes, or click Cancel turned Off by default. Changes to clear your changes. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Security > VPN Passthrough Security > Firewall The Security > VPN Passthrough screen allows you to enable VPN tunnels using IPSec, PPTP, or L2TP protocols to pass The Security > Firewall screen is used to configure a firewall through the Router’s firewall. that can filter out various types of unwanted traffic on the Router’s local network. Wireless-G Broadband Router 15 Chapter 3 Advanced Configuration Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, keep the default, Enable. PPTP Passthrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be tunneled through an IP network. To allow PPTP tunnels to pass through the Router, keep the default, Enable. L2TP Passthrough Layer 2 Tunneling Protocol is the Access Restrictions > Internet Access method used to enable Point-to-Point sessions via the Internet on the Layer 2 level. To allow L2TP tunnels to pass Internet Access through the Router, keep the default, Enable. Internet Access Policy Access can be managed by a Click Save Settings to apply your changes, or click Cancel policy. Use the settings on this screen to establish an Changes to clear your changes. access policy (after Save Settings is clicked). Selecting a policy from the drop-down menu will display that policy’s Access Restrictions > Internet Access settings. To delete a policy, select that policy’s number The Access Restrictions > Internet Access screen allows you and click Delete. To view all the policies, click Summary. to block or allow specific kinds of Internet usage and (To delete policies from the Summary screen, select the traffic, such as Internet access, designated services, and policy or policies, and click Delete. To return to the Internet websites during specific days and times. Access screen, click Close.) Internet Policy Summary Status Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu, and select Enable. To create an Internet Access policy: 1. Select a number from the Internet Access Policy drop- down menu. 2. To enable this policy, select Enable. 3. Enter a Policy Name in the field provided. 4. Click Edit List of PCs to select which PCs will be affected by the policy. The List of PCs screen appears. You can Wireless-G Broadband Router 16 Chapter 3 Advanced Configuration select a PC by MAC Address or IP Address. You can also To modify a service, select it from the list on the right. enter a range of IP Addresses if you want this policy Change its name, protocol setting, or port range. Then to affect a group of PCs. After making your changes, click Modify. click Save Settings to apply your changes or Cancel To delete a service, select it from the list on the right. Then Changes to clear your changes. Then click Close. click Delete. When you are finished making changes on the Port Services screen, click Apply to save the changes. If you want to clear your changes, click Cancel. To close the Port Services screen and return to the Access Restrictions screen, click Close. Website Blocking by URL Address If you want to block websites with specific URL addresses, enter each URL in a separate field next to Website Blocking by URL Address. List of PCs Website Blocking by Keyword 5. Select the appropriate option, Deny or Allow, If you want to block websites using specific keywords, depending on whether you want to block or allow enter each keyword in a separate field next to Website Internet access for the PCs you listed on the List of PCs Blocking by Keyword. screen. 6. Decide which days and what times you want this policy Click Save Settings to apply your changes, or click Cancel to be enforced. Select the individual days during which Changes to clear your changes. the policy will be in effect, or select Everyday. Then enter a range of hours and minutes during which the Applications and Gaming > Port Range policy will be in effect, or select 24 Hours. Forward 7. Select any Blocked Services or Website Blocking you wish to use. The Applications & Gaming > Port Range Forward screen allows you to set up public services on your network, such as 8. Click Save Settings to save the policy’s settings, or web servers, ftp servers, e-mail servers, or other specialized click Cancel Changes to cancel the policy’s settings. Internet applications. (Specialized Internet applications are Blocked Services any applications that use Internet access to perform functions such as videoconferencing or online gaming. Some Internet You can filter access to various services accessed over the applications may not require any forwarding.) Internet, such as FTP or telnet, by selecting services from the drop-down menus next to Blocked Services. (You can block up to 20 services.) Then enter the range of ports you want to filter. If the service you want to block is not listed or you want to edit a service’s settings, then click Add/Edit Service. The Port Services screen appears. Port Services Applications and Gaming > Port Range Forward To add a service, enter the service’s name in the Service Name field. Select its protocol from the Protocol drop- down menu, and enter its range in the Port Range fields. Then click Add. Wireless-G Broadband Router 17 Chapter 3 Advanced Configuration Port Range Forward Start Port Enter the starting port number of the Triggered Range. To forward a port, enter the information on each line for the criteria required. End Port Enter the ending port number of the Triggered Range. Application In this field, enter the name you wish to give the application. Each name can be up to 12 characters. Forwarded Range Start/End This is the port range. Enter the number that For each application, list the forwarded port number starts the port range in the Start column and the number range. Check with the Internet application documentation that ends the range in the End column. for the port number(s) needed. Protocol Select the protocol used for this application, Start Port Enter the starting port number of the either TCP or UDP, or Both. Forwarded Range. IP Address For each application, enter the IP Address of End Port Enter the ending port number of the Forwarded the PC running the specific application. Range. Enable Select Enable to enable port forwarding for the Enable Select Enable to enable port triggering for the relevant application. applicable application. Click Save Settings to apply your changes, or click Cancel Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Changes to clear your changes. Applications & Gaming > Port Triggering Applications and Gaming > DMZ The Applications & Gaming > Port Triggering screen allows The DMZ feature allows one network computer to be the Router to watch outgoing data for specific port exposed to the Internet for use of a special-purpose numbers. The IP address of the computer that sends the service such as Internet gaming or videoconferencing. matching data is remembered by the Router, so that when DMZ hosting forwards all the ports at the same time to the requested data returns through the Router, the data is one PC. The Port Range Forward feature is more secure pulled back to the proper computer by way of IP address because it only opens the ports you want to have opened, and port mapping rules. while DMZ hosting opens all the ports of one computer, exposing the computer to the Internet. Applications and Gaming > DMZ DMZ Any PC whose port is being forwarded must have its DHCP client function disabled and should have a new static IP Applications and Gaming > Port Triggering address assigned to it because its IP address may change when using the DHCP function. Port Triggering To expose one PC, select Enable. Then, enter the Application Enter the application name of the trigger. computer’s IP address in the DMZ Host IP Address field. This feature is disabled by default. Triggered Range Click Save Settings to apply your changes, or click Cancel For each application, list the triggered port number range. Changes to clear your changes. Check with the Internet application documentation for the port number(s) needed. Wireless-G Broadband Router 18 Chapter 3 Advanced Configuration Applications and Gaming > QoS Priority Select High or Low in the Priority column. The Router’s four ports have been assigned low priority by Quality of Service (QoS) ensures better service to default. high-priority types of network traffic, which may Flow Control If you want the Router to control the involve demanding, real-time applications, such as transmission of data between network devices, select videoconferencing. Enabled. To disable this feature, select Disabled. Ethernet There are three types of QoS available: Device Priority, Port Priority QoS does not require support from your ISP Ethernet Port Priority, and Application Priority. because the prioritized ports (LAN ports 1-4) are in your network. This feature is enabled by default. QoS Application Priority Enable/Disable To enable QoS, select Enable. Otherwise, select Disable. QoS is disabled by default. Application Priority QoS manages information as it is transmitted and received. Depending on the settings of Upstream Bandwidth Select Auto or Manual from the QoS screen, this feature will assign information a high the drop-down menu. Manual allows you to specify the or low priority for the applications that you specify. maximum outgoing bandwidth that applications can utilize. Optimize Gaming Applications Select this to automatically allow common game application ports to have a higher priority. These games include, but are not limited to: Counter-Strike, Half-Life, Age of Empires, EverQuest, Quake2/Quake3, and Diablo II. The default setting is unselected. Application Name Enter the name you wish to give the application in the Application Name field. Priority Select High or Low to assign priority to the application. The default selection is Low. Specific Port # Enter the port number for the application. Wireless QoS WMM Support Wi-Fi Multimedia (WMM), formerly known as Wireless Multimedia Extensions (WME), is a Wi-Fi Alliance certified feature, based on the IEEE 802.11e standard. This feature provides QoS to wireless networks. It is especially suitable for voice, music and video applications; for example, Voice over IP (VoIP), video streaming, and interactive gaming. If you have other devices on your wireless network that support WMM, select Enabled. Otherwise, keep the default, Disabled. No Acknowledgement This feature prevents the Router Applications and Gaming > QoS from re-sending data if an error occurs. To use this feature, select Enabled. Otherwise, keep the default, Disabled. Device Priority Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Enter the name of your network device in the Device name field, enter its MAC Address, and then select its priority from the drop-down menu. Administration > Management The Administration > Management screen allows the Ethernet Port Priority network’s administrator to manage specific Router Ethernet Port Priority QoS allows you to prioritize functions for access and security. performance for the Router’s four ports, LAN Ports 1-4. For each port, select the priority and flow control setting. Wireless-G Broadband Router 19 Chapter 3 Advanced Configuration Administration > Log The Router can keep logs of all traffic for your Internet connection. Administration > Log Administration > Management Log Router Password Log To disable the Log function, keep the default setting, Disable. To monitor traffic between the network and the Local Router Access Internet, select Enable. Router Password Enter a new Password for the Router. When you wish to view the logs, click Incoming Log or Re-enter to confirm Enter the Password again to confirm. Outgoing Log, depending on which you wish to view. Click Save Settings to apply your changes, or click Cancel Web Access Changes to clear your changes. Access Server HTTP (HyperText Transport Protocol) is the communications protocol used to connect to servers Administration > Diagnostics on the World Wide Web. HTTPS uses SSL (Secured Socket Layer) to encrypt data transmitted for higher security. The diagnostic tests (Ping and Traceroute) allow you to Select HTTP or HTTPS. The default is HTTP. check the connections of your network components. Wireless Access Web If you are using the Router in a public domain where you are giving wireless access to your guests, you can disable wireless access to the Router’s web-based utility. You will only be able to access the web-based utility via a wired connection if you disable the setting. Keep the default, Enable, to enable wireless access to the Router’s web-based utility, or select Disable to disable wireless access to the utility. Remote Router Access Remote Management To access the Router remotely, Administration > Diagnostics from outside the network, select Enable. Management Port Enter the port number that will be Ping Test open to outside access. You will need to enter the Router’s password when accessing the Router this way, as usual. Ping The Ping test checks the status of a connection. Click Ping to open the Ping Test screen. Enter the address Use https To require the use of HTTPS for remote access, of the PC whose connection you wish to test and how select this feature. many times you wish to test it. Then, click Ping. The Ping UPnP Test screen will show if the test was successful. To stop the test, click Stop. Click Clear Log to clear the screen. Click UPnP Keep the default, Enable to enable the UPnP Close to return to the Diagnostics screen. feature; otherwise, select Disable. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Wireless-G Broadband Router 20 Chapter 3 Advanced Configuration Administration > Upgrade Firmware The Administration > Upgrade Firmware screen allows you to upgrade the Router’s firmware. Do not upgrade the firmware unless you are experiencing problems with the Router or the new firmware has a feature you want to use. Ping Test Traceroute Test Traceroute To test the performance of a connection, click Traceroute to open the Traceroute Test screen. Enter the address of the PC whose connection you wish to test and click Traceroute. The Traceroute Test screen will show if the test was successful. To stop the test, click Stop. Click Administration > Upgrade Firmware Clear Log to clear the screen. Click Close to return to the Diagnostics screen. Before upgrading the firmware, download the Router’s firmware upgrade file from the Linksys website, www.linksysbycisco.com. Upgrade Firmware Please select a file to upgrade Click Browse and select the firmware upgrade file. Then click Upgrade and follow the on-screen instructions. Administration > Config Management Traceroute Test This screen is used to back up or restore the Router’s configuration file. Administration > Factory Defaults The Administration > Factory Defaults screen allows you to