Linksys Router WRT54GS User Manual
Have a look at the manual Linksys Router WRT54GS User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 11 Linksys manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Chapter 3Advanced Configuration W reless-G Broadband Router w th SpeedBooster DynDNS.org Setup > DDNS > DynDNS User Name Enter the User Name for your DDNS account. Password Enter the Password for your DDNS account. Host Name The is the DDNS URL assigned by the DDNS service. Internet IP Address The Router’s Internet IP address is displayed here. Because it is dynamic, it will change. Status The status of the DDNS service connection is displayed here. Click the Save Sett ngs button to apply your changes, or click the Cancel Changes button to cancel your changes. TZO.com Setup > DDNS > TZO E-ma l Address, TZO Key, and Doma n Name Enter the settings of the account you set up with TZO. Internet IP Address The Router’s Internet IP address is displayed here. Because it is dynamic, it will change. Status The status of the DDNS service connection is displayed here. Click the Save Sett ngs button to apply your changes, or click the Cancel Changes button to cancel your changes. Setup > MAC Address Clone A MAC address is a 12-digit code assigned to a unique piece of hardware for identification. Some ISPs will require you to register a MAC address in order to access the Internet. If you do not wish to re-register the MAC address with your ISP, you may assign the MAC address you have currently registered with your ISP to the Router with the MAC Address Clone feature. Setup > MAC Address Clone MAC Address Clone Enable/D sable To have the MAC Address cloned, select Enable. User Def ned Entry Enter the MAC Address registered with your ISP here. Clone Your PC’s MAC Address Clicking this button will clone the MAC address of the computer you are using. Click the Save Sett ngs button to apply your changes, or click the Cancel Changes button to cancel your changes. Setup > Advanced Routing This screen is used to set up the Router’s advanced functions. Operating Mode allows you to select the type(s) of advanced functions you use. Dynamic Routing automatically adjusts how packets travel on your network. Static Routing sets up a fixed route to another network destination. Setup > Advanced Routing (Gateway)
Chapter 3Advanced Configuration 8 W reless-G Broadband Router w th SpeedBooster Setup > Advanced Routing (Router) Advanced Routing Operat ng Mode Select the mode in which this Router will function. If this Router is hosting your network’s connection to the Internet, select Gateway. If another Router exists on your network, select Router. When Router is chosen, Dynamic Routing will be available as an option. Dynam c Rout ng This feature enables the Router to automatically adjust to physical changes in the network’s layout and exchange routing tables with the other router(s). The Router determines the network packets’ route based on the fewest number of hops between the source and the destination. This feature is D sabled by default. From the drop-down menu, you can also select LAN & W reless, which performs dynamic routing over your Ethernet and wireless networks. You can also select WAN (Internet), which performs dynamic routing with data coming from the Internet. Selecting Both enables dynamic routing for both networks, as well as data from the Internet. Stat c Rout ng To set up a static route between the Router and another network, select a number from the Static Routing drop-down list. (A static route is a pre-determined pathway that network information must travel to reach a specific host or network.) Enter the information described below to set up a new static route. (Click the Delete Th s Entry button to delete a static route.) Enter Route Name Enter a name for the Route here, using a maximum of 25 alphanumeric characters. Dest nat on LAN IP The Destination LAN IP is the address of the remote network or host to which you want to assign a static route. Subnet Mask The Subnet Mask determines which portion of a Destination LAN IP address is the network portion, and which portion is the host portion. • • • Default Gateway This is the IP address of the gateway device that allows for contact between the Router and the remote network or host. Interface This interface tells you whether the Destination IP Address is on the LAN & W reless (Ethernet and wireless networks) or the WAN (Internet). Click the Show Rout ng Table button to view the Static Routes you have already set up. Click the Save Sett ngs button to apply your changes, or click the Cancel Changes button to cancel your changes. Wireless > Basic Wireless Settings The basic settings for wireless networking are set on this screen. Wireless > Basic Wireless Settings Wireless Network W reless Network Mode From this drop-down menu, you can select the wireless standards running on your network. If you have both 802.11g and 802.11b devices in your network, keep the default setting, M xed. If you have only 802.11g devices, select G-Only. If you have only 802.11b devices, select B-Only. If you do not have any 802.11g and 802.11b devices in your network, select D sable . SpeedBooster works automatically with all settings, providing the added bonus of increased speed across your entire network and even greater speed when you use SpeedBooster products only. NOTE: SpeedBooster ONLY works in Infrastructure Mode. W reless Network Name (SSID) The SSID is the network name shared among all points in a wireless network. The SSID must be identical for all devices in the wireless network. It is case-sensitive and must not exceed 32 characters (use any of the characters on the keyboard). Make sure this setting is the same for all points in your • •
Chapter 3Advanced Configuration 9 W reless-G Broadband Router w th SpeedBooster wireless network. For added security, you should change the default SSID ( l nksys) to a unique name. W reless Channel Select the appropriate channel from the list provided to correspond with your network settings. All devices in your wireless network must use the same channel in order to communicate. W reless SSID Broadcast When wireless clients survey the local area for wireless networks to associate with, they will detect the SSID broadcast by the Router. To broadcast the Router’s SSID, keep the default setting, Enable. If you do not want to broadcast the Router’s SSID, then select D sable . SecureEasySetup If you did not utilize this network connection feature during the Setup Wizard, you may use it here by clicking the green logo. When you are prompted to start the push button setup, click OK. Reset Secur ty Use this button to reset the security settings on your network. You will need to run SecureEasySetup again on each device on your network to re-associate it with your network. Click the Save Sett ngs button to apply your changes, or click the Cancel Changes button to cancel your changes. Wireless > Wireless Security The Wireless Security settings configure the security of your wireless network. There are six wireless security mode options supported by the Router: WPA Personal, WPA Enterprise, WPA2 Personal, WPA2 Enterprise, RADIUS, and WEP. (WPA stands for Wi-Fi Protected Access, which is a security standard stronger than WEP encryption. WEP stands for Wired Equivalent Privacy, while RADIUS stands for Remote Authentication Dial-In User Service.) These six are briefly discussed here. For detailed instructions on configuring wireless security for the Router, refer to “Chapter 2: Wireless Security.” Wireless Security Security Mode Select the security method for your wireless network. If you do not want to use wireless security, keep the default, D sabled . WPA Personal NOTE: If you are using WPA, always remember that each device in your wireless network MUST use the same WPA method and shared key, or else the network will not function properly. Security Mode > WPA Personal WPA Algor thm WPA supports two encryption methods, TKIP and AES, with dynamic encryption keys. Select the type of algorithm, TKIP or AES. The default is TKIP. WPA Shared Key Enter a WPA Shared Key of 8-63 characters. Group Key Renewal Enter a Group Key Renewal period, which instructs the Router how often it should change the encryption keys. The default Group Key Renewal period is 3600 seconds. WPA Enterprise This option features WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) Security Mode > WPA Enterprise WPA Algor thm WPA supports two encryption methods, TKIP and AES, with dynamic encryption keys. Select the type of algorithm, TKIP or AES. The default is TKIP. RADIUS Server Address Enter the IP Address of the RADIUS server. RADIUS Port Enter the port number of the RADIUS server. Shared Key Enter the key shared between the Router and the server. Key Renewal T meout Enter a Key Renewal Timeout period, which instructs the Router how often it should change the encryption keys. The default Key Renewal Timeout period is 3600 seconds.
Chapter 3Advanced Configuration 0 W reless-G Broadband Router w th SpeedBooster WPA2 Personal Security Mode > WPA2 Personal WPA Algor thm WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. Select the type of algorithm, AES, or TKIP + AES. The default is AES. WPA Shared Key Enter a WPA Shared Key of 8-63 characters. Group Key Renewal Enter a Group Key Renewal period, which instructs the Router how often it should change the encryption keys. The default Group Key Renewal period is 3600 seconds. WPA2 Enterprise This option features WPA2 used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) Security Mode > WPA2 Enterprise WPA Algor thm WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. Select the type of algorithm, AES, or TKIP + AES. The default is AES. WPA Algor thm WPA supports two encryption methods, TKIP and AES, with dynamic encryption keys. Select the type of algorithm, TKIP or AES. RADIUS Server Address Enter the IP Address of the RADIUS server. RADIUS Port Enter the port number of the RADIUS server. Shared Key Enter the key shared between the Router and the server. Key Renewal T meout Enter a Key Renewal Timeout period, which instructs the Router how often it should change the encryption keys. The default Key Renewal Timeout period is 3600 seconds. RADIUS This option features WEP used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) IMPORTANT: If you are using WEP encryption, always remember that each device in your wireless network MUST use the same WEP encryption method and encryption key, or else your wireless network will not function properly. Security Mode > RADIUS RADIUS Server Address Enter the IP Address of the RADIUS server. RADIUS Port Enter the port number of the RADIUS server. Shared Key Enter the key shared between the Router and the server. Default Transm t Key Select a Default Transmit Key (choose which Key to use). The default is . WEP Encrypt on Select a level of WEP encryption, 64 b ts 0 hex d g ts or 28 b ts 26 hex d g ts. The default is 64 b ts 0 hex d g ts. Passphrase Enter a Passphrase to automatically generate WEP keys. Then click the Generate button. Key -4 If you did not enter a Passphrase, enter the WEP key(s) manually.
Chapter 3Advanced Configuration W reless-G Broadband Router w th SpeedBooster WEP WEP is a basic encryption method, which is not as secure as WPA. Security Mode > WEP Default Transm t Key Select a Default Transmit Key (choose which Key to use). The default is . WEP Encrypt on Select a level of WEP encryption, 64 b ts 0 hex d g ts or 28 b ts 26 hex d g ts. The default is 64 b ts 0 hex d g ts . Passphrase Enter a Passphrase to automatically generate WEP keys. Then click the Generate button. Key -4 If you did not enter a Passphrase, enter the WEP key(s) manually. Click the Save Sett ngs button to apply your changes, or click the Cancel Changes button to cancel your changes. Wireless > Wireless MAC Filter Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network’s radius. Wireless > Wireless MAC Filter Wireless MAC Filter W reless MAC F lter To filter wireless users by MAC Address, either permitting or blocking access, click Enable. If you do not wish to filter users by MAC Address, keep the default setting, D sable. Prevent Clicking this button will block wireless access by MAC Address. This button is selected by default. Perm t Only Clicking this button will allow wireless access by MAC Address. Ed t MAC Address F lter L st Clicking this button will open the MAC Address Filter List. On this screen, you can list users, by MAC Address, to whom you wish to provide or block access. For easy reference, click the W reless Cl ent MAC L st button to display a list of network users by MAC Address. MAC Address Filter List Click the Save Sett ngs button to apply your changes, or click the Cancel Changes button to cancel your changes. Wireless > Advanced Wireless Settings This Wireless > Advanced Wireless Settings screen is used to set up the Router’s advanced wireless functions. These settings should only be adjusted by an expert administrator as incorrect settings can reduce wireless performance.
Chapter 3Advanced Configuration 2 W reless-G Broadband Router w th SpeedBooster Wireless > Advanced Wireless Settings Advanced Wireless Authent cat on Type The default is set to Auto, which allows either Open System or Shared Key authentication to be used. With Open System authentication, the sender and the recipient do NOT use a WEP key for authentication. With Shared Key authentication, the sender and recipient use a WEP key for authentication. Bas c Rate The Basic Rate setting is not actually one rate of transmission but a series of rates at which the Router can transmit. The Router will advertise its Basic Rate to the other wireless devices in your network, so they know which rates will be used. The Router will also advertise that it will automatically select the best rate for transmission. The default setting is Default, when the Router can transmit at all standard wireless rates (1-2Mbps, 5.5Mbps, 11Mbps, 18Mbps, and 24Mbps). Other options are -2Mbps, for use with older wireless technology, and All, when the Router can transmit at all wireless rates. The Basic Rate is not the actual rate of data transmission. If you want to specify the Router’s rate of data transmission, configure the Transmission Rate setting. Transm ss on Rate The rate of data transmission should be set depending on the speed of your wireless network. You can select from a range of transmission speeds, or you can select Auto to have the Router automatically use the fastest possible data rate and enable the Auto-Fallback feature. Auto-Fallback will negotiate the best possible connection speed between the Router and a wireless client. The default value is Auto. CTS Protect on Mode CTS (Clear-To-Send) Protection Mode should remain disabled unless you are having severe problems with your Wireless-G products not being able to transmit to the Router in an environment with heavy 802.11b traffic. This function boosts the Router’s ability to catch all Wireless-G transmissions but will severely decrease performance. Frame Burst Enabling this option should provide your network with greater performance, depending on the manufacturer of your wireless products. To turn off the Frame Burst option, select D sable. The default is Enable. Beacon Interval The default value is 00. Enter a value between 1 and 65,535 milliseconds. The Beacon Interval value indicates the frequency interval of the beacon. A beacon is a packet broadcast by the Router to synchronize the wireless network. DTIM Interval This value, between 1 and 255, indicates the interval of the Delivery Traffic Indication Message (DTIM). A DTIM field is a countdown field informing clients of the next window for listening to broadcast and multicast messages. When the Router has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value. Its clients hear the beacons and awaken to receive the broadcast and multicast messages. The default value is . Fragmentat on Threshold This value specifies the maximum size for a packet before data is fragmented into multiple packets. If you experience a high packet error rate, you may slightly increase the Fragmentation Threshold. Setting the Fragmentation Threshold too low may result in poor network performance. Only minor reduction of the default value is recommended. In most cases, it should remain at its default value of 2346. RTS Threshold Should you encounter inconsistent data flow, only minor reduction of the default value, 234 , is recommended. If a network packet is smaller than the preset RTS threshold size, the RTS/CTS mechanism will not be enabled. The Router sends Request to Send (RTS) frames to a particular receiving station and negotiates the sending of a data frame. After receiving an RTS, the wireless station responds with a Clear to Send (CTS) frame to acknowledge the right to begin transmission. The RTS Threshold value should remain at its default value of 234 . AP Isolat on This isolates all wireless clients and wireless devices on your network from each other. Wireless devices will be able to communicate with the Router but not with each other. To use this function, select On. AP Isolation is turned Off by default. Secure Easy Setup This feature allows you to enable or disable the SecureEasySetup feature. Select Disable to disable the feature and turn off the button’s light. The feature is enabled by default. Click the Save Sett ngs button to apply your changes, or click the Cancel Changes button to cancel your changes. Security > Firewall The Security > Firewall screen is used to configure a firewall that can filter out various types of unwanted traffic on the Router’s local network.
Chapter 3Advanced Configuration 3 W reless-G Broadband Router w th SpeedBooster Security > Firewall Firewall Block WAN Requests Block Anonymous Internet Requests This feature makes it more difficult for outside users to work their way into your network. This feature is Enabled by default. Deselect the feature to allow anonymous Internet requests. F lter Mult cast Multicasting allows for multiple transmissions to specific recipients at the same time. If multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate computers. Select F lter Mult cast to filter multicasting, or deselect the feature to disable it. F lter Internet NAT Red rect on This feature uses port forwarding to block access to local servers from local networked computers. Select F lter Internet NAT Red rect on to filter Internet NAT redirection, or deselect the feature to disable it. F lter IDENT (Port 3) This feature keeps port 113 from being scanned by devices outside of your local network. Select F lter INDENT (Port 3) to filter port 113, or deselect the feature to disable it. Click the Save Sett ngs button to apply your changes, or click the Cancel Changes button to cancel your changes. Security > VPN Passthrough Security > VPN Passthrough The Security > VPN Passthrough screen allows you to enable VPN tunnels using IPSec, PPTP, or L2TP protocols to pass through the Router’s firewall. VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, keep the default, Enable. PPTP Passthrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be tunneled through an IP network. To allow PPTP tunnels to pass through the Router, keep the default, Enable. L2TP Passthrough Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the Internet on the Layer 2 level. To allow L2TP tunnels to pass through the Router, keep the default, Enable. Click the Save Sett ngs button to apply your changes, or click the Cancel Changes button to cancel your changes. Access Restrictions > Internet Access The Access Restrictions > Internet Access screen allows you to block or allow specific kinds of Internet usage and traffic, such as Internet access, designated services, and websites during specific days and times. Access Restrictions > Internet Access Internet Access Internet Access Pol cy Access can be managed by a policy. Use the settings on this screen to establish an access policy (after the Save Sett ngs button is clicked). Selecting a policy from the drop-down menu will display that policy’s settings. To delete a policy, select that
Chapter 3Advanced Configuration 4 W reless-G Broadband Router w th SpeedBooster policy’s number and click the Delete button. To view all the policies, click the Summary button. (Policies can be deleted from the Summary screen by selecting the policy or policies and clicking the Delete button. To return to the Internet Access tab, click the Close button.) Internet Policy Summary Status Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu, and select Enable. To create an Internet Access policy: Select a number from the Internet Access Policy drop- down menu. To enable this policy, select Enable. Enter a Policy Name in the field provided. Click the Ed t L st of PCs button to select which PCs will be affected by the policy. The List of PCs screen appears. You can select a PC by MAC Address or IP Address. You can also enter a range of IP Addresses if you want this policy to affect a group of PCs. After making your changes, click the Save Sett ngs button to apply your changes or Cancel Changes to cancel your changes. Then click the Close button. List of PCs Select the appropriate option, Deny or Allow, depending on whether you want to block or allow Internet access for the PCs you listed on the List of PCs screen. 1. 2. 3. 4. 5. Decide which days and what times you want this policy to be enforced. Select the individual days during which the policy will be in effect, or select Everyday. Then enter a range of hours and minutes during which the policy will be in effect, or select 24 Hours. Select any Blocked Services or Website Blocking you wish to use. Click the Save Sett ngs button to save the policy’s settings, or click the Cancel Changes button to cancel the policy’s settings. Blocked Services You can filter access to various services accessed over the Internet, such as FTP or telnet, by selecting services from the drop-down menus next to Blocked Services. (You can block up to 20 services.) Then enter the range of ports you want to filter. If the service you want to block is not listed or you want to edit a service’s settings, then click the Add/Ed t Serv ce button. Then the Port Services screen will appear. Port Services To add a service, enter the service’s name in the Service Name field. Select its protocol from the Protocol drop- down menu, and enter its range in the Port Range fields. Then click the Add button. To modify a service, select it from the list on the right. Change its name, protocol setting, or port range. Then click the Mod fy button. To delete a service, select it from the list on the right. Then click the Delete button. When you are finished making changes on the Port Services screen, click the Apply button to save the changes. If you want to cancel your changes, click the Cancel button. To close the Port Services screen and return to the Access Restrictions screen, click the Close button. Website Blocking by URL Address If you want to block websites with specific URL addresses, enter each URL in a separate field next to Website Blocking by URL Address. 6. 7. 8.
Chapter 3Advanced Configuration 5 W reless-G Broadband Router w th SpeedBooster Website Blocking by Keyword If you want to block websites using specific keywords, enter each keyword in a separate field next to Website Blocking by Keyword. Click the Save Sett ngs button to apply your changes, or click Cancel Changes to cancel your changes. Applications and Gaming > Port Range Forward The Applications & Gaming > Port Range Forward screen allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized Internet applications. (Specialized Internet applications are any applications that use Internet access to perform functions such as videoconferencing or online gaming. Some Internet applications may not require any forwarding.) Applications and Gaming > Port Range Forward Port Range Forward To forward a port, enter the information on each line for the criteria required. Appl cat on In this field, enter the name you wish to give the application. Each name can be up to 12 characters. Start/End This is the port range. Enter the number that starts the port range in the Start column and the number that ends the range in the End column. Protocol Select the protocol used for this application, either TCP or UDP, or Both. IP Address For each application, enter the IP Address of the PC running the specific application. Enable Select Enable to enable port forwarding for the relevant application. Click the Save Sett ngs button to apply your changes, or click Cancel Changes to cancel your changes. Applications & Gaming > Port Triggering The Applications & Gaming > Port Triggering screen allows the Router to watch outgoing data for specific port numbers. The IP address of the computer that sends the matching data is remembered by the Router, so that when the requested data returns through the Router, the data is pulled back to the proper computer by way of IP address and port mapping rules. Applications and Gaming > Port Triggering Port Triggering Appl cat on Enter the application name of the trigger. Triggered Range For each application, list the triggered port number range. Check with the Internet application documentation for the port number(s) needed. Start Port Enter the starting port number of the Triggered Range. End Port Enter the ending port number of the Triggered Range. Forwarded Range For each application, list the forwarded port number range. Check with the Internet application documentation for the port number(s) needed. Start Port Enter the starting port number of the Forwarded Range. End Port Enter the ending port number of the Forwarded Range. Enable Select Enable to enable port triggering for the applicable application. Click the Save Sett ngs button to apply your changes, or click Cancel Changes to cancel your changes.
Chapter 3Advanced Configuration 6 W reless-G Broadband Router w th SpeedBooster Applications and Gaming > DMZ The DMZ feature allows one network computer to be exposed to the Internet for use of a special-purpose service such as Internet gaming or videoconferencing. DMZ hosting forwards all the ports at the same time to one PC. The Port Range Forward feature is more secure because it only opens the ports you want to have opened, while DMZ hosting opens all the ports of one computer, exposing the computer to the Internet. Applications and Gaming > DMZ DMZ Any PC whose port is being forwarded must have its DHCP client function disabled and should have a new static IP address assigned to it because its IP address may change when using the DHCP function. To expose one PC, select Enable. Then, enter the computer’s IP address in the DMZ Host IP Address field. Click the Save Sett ngs button to apply your changes, or click Cancel Changes to cancel your changes. Applications and Gaming > QoS Quality of Service (QoS) ensures better service to high-priority types of network traffic, which may involve demanding, real-time applications, such as videoconferencing. There are three types of QoS available: Device Priority, Ethernet Port Priority, and Application Priority. QoS Enable/D sable To enable QoS, select Enable. Otherwise, select D sable. Upstream Bandw dth Select Auto or Manual from the drop-down menu. Manual allows you to specify the maximum outgoing bandwidth that applications can utilize. Applications and Gaming > QoS Device Priority Enter the name of your network device in the Device name field, enter its MAC Address, and then select its priority from the drop-down menu. Ethernet Port Priority Ethernet Port Priority QoS allows you to prioritize performance for the Router’s four ports, LAN Ports 1-4. For each port, select the priority and flow control setting. Pr or ty Select H gh or Low in the Priority column. The Router’s four ports have been assigned low priority by default. Flow Control If you want the Router to control the transmission of data between network devices, select Enable. To disable this feature, select D sable. Ethernet Port Priority QoS does not require support from your ISP because the prioritized ports LAN ports 1-4 are in your network. Application Priority Application Priority QoS manages information as it is transmitted and received. Depending on the settings of the QoS screen, this feature will assign information a high or low priority for the applications that you specify.