WPA2 Personal. WPA2 gives you two encryption methods, TKIP and AES, with dynamic encryption keys. Select
the type of algorithm, AES, or TKIP +AES. Enter a WPA Shared Key of 8-63 characters. Then enter a Group Key
Renewal period, which instructs the Router how often it should change the encryption keys.
WPA2 Enterprise. This option features WPA2 used in coordination with a RADIUS server. (This should only be
used when a RADIUS server is connected to the Router.) First, select the type of WPA algorithm you want to use,
AES, or TKIP +AES. Enter the RADIUS server’s IP Address and port number, along with a key shared between the
Router and the server. Last, enter a Key Renewal Timeout, which instructs the Router how often it should change
the encryption keys.
Figure 5-21: Wireless Tab - Wireless Security
(WPA2 Personal)
Chapter 5: Configuring the Wireless-G Broadband Router
The Wireless Tab - Wireless Security
Figure 5-22: Wireless Tab - Wireless Security
(WPA2 Enterprise)
23
Wireless-G Broadband Router
RADIUS. This option features WEP used in coordination with a RADIUS server. (This should only be used when a
RADIUS server is connected to the Router.) First, enter the RADIUS server’s IP Address and port number, along
with a key shared between the Router and the server. Then, select a Default Transmit Key (choose which Key to
use), and a level of WEP encryption, 64 bits 10 hex digits or 128 bits 26 hex digits. Last, either generate a
WEP key using the Passphrase or enter the WEP key manually.
IMPORTANT: If you are using WEP encryption, always remember
that each device in your wireless network MUST use the same
WEP encryption method and encryption key, or else your wireless
network will not function properly.
WEP. WEP is a basic encryption method, which is not as secure as WPA. To use WEP, select a Default Transmit Key
(choose which Key to use), and a level of WEP encryption, 64 bits 10 hex digits or 128 bits 26 hex digits. Then
either generate a WEP key using the Passphrase or enter the WEP key manually.
Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes. For detailed instructions on configuring wireless security for the Router, turn to
“Appendix B: Wireless Security.”
Chapter 5: Configuring the Wireless-G Broadband Router
The Wireless Tab - Wireless Security
Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your
network’s radius.
Wireless MAC Filter. To filter wireless users by MAC Address, either permitting or blocking access, click Enable.
If you do not wish to filter users by MAC Address, select Disable.
Prevent. Clicking this button will block wireless access by MAC Address.
Permit Only. Clicking this button will allow wireless access by MAC Address.
Edit MAC Address Filter List. Clicking this button will open the MAC Address Filter List. On this screen, you can list users, by MAC Address, to whom you wish to provide or block access. For easy reference, click the Wireless
Client MAC List button to display a list of network users by MAC Address.
Change these settings as described here and click the Save Settings button to apply your changes or Cancel
Changes to cancel your changes.
Figure 5-25: Wireless Tab - Wireless MAC Filter
Chapter 5: Configuring the Wireless-G Broadband Router
The Wireless Tab - Wireless MAC Filter
Figure 5-26: MAC Address Filter List
25
Wireless-G Broadband Router
The Wireless Tab - Advanced Wireless Settings
This tab is used to set up the Router’s advanced wireless functions. These settings should only be adjusted by an
expert administrator as incorrect settings can reduce wireless performance.
Transmission Rate. The rate of data transmission should be set depending on the speed of your wireless
network. You can select from a range of transmission speeds, or you can select Auto to have the Router
automatically use the fastest possible data rate and enable the Auto-Fallback feature. Auto-Fallback will
negotiate the best possible connection speed between the Router and a wireless client. The default value is Auto.
Beacon Interval. The default value is 100. Enter a value between 20 and 1,000 milliseconds. The Beacon
Interval value indicates the frequency interval of the beacon. A beacon is a packet broadcast by the Router to
synchronize the wireless network.
DTIM Interval. This value, between 1 and 255, indicates the interval of the Delivery Traffic Indication Message
(DTIM). A DTIM field is a countdown field informing clients of the next window for listening to broadcast and
multicast messages. When the Router has buffered broadcast or multicast messages for associated clients, it
sends the next DTIM with a DTIM Interval value. Its clients hear the beacons and awaken to receive the broadcast
and multicast messages. The default value is 1.
Fragmentation Threshold. This value specifies the maximum size for a packet before data is fragmented into
multiple packets. If you experience a high packet error rate, you may slightly increase the Fragmentation
Threshold. Setting the Fragmentation Threshold too low may result in poor network performance. Only minor
reduction of the default value is recommended. In most cases, it should remain at its default value of 2346.
RTS Threshold. Should you encounter inconsistent data flow, only minor reduction of the default value, 2347, is
recommended. If a network packet is smaller than the preset RTS threshold size, the RTS/CTS mechanism will
not be enabled. The Router sends Request to Send (RTS) frames to a particular receiving station and negotiates
the sending of a data frame. After receiving an RTS, the wireless station responds with a Clear to Send (CTS)
frame to acknowledge the right to begin transmission. The RTS Threshold value should remain at its default value
of 2347.
Frame Burst. Enabling this option should provide your network with greater performance, depending on the
manufacturer of your wireless products. If you are not sure how to use this option, keep the default, Disable.
Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes.
Chapter 5: Configuring the Wireless-G Broadband Router
The Wireless Tab - Advanced Wireless Settings
26
Wireless-G Broadband Router
The Security Tab - Firewall
Block WAN Requests. Enable the Block WAN Request feature by checking the box beside Block Anonymous
Internet Requests and you can prevent your network from being “pinged,” or detected, by other Internet users.
The Block WAN Request feature also reinforces your network security by hiding your network ports. Both
functions of the Block WAN Request feature make it more difficult for outside users to work their way into your
network. This feature is enabled by default. Select Disabled to allow anonymous Internet requests.
Filter Multicast. Multicasting allows for multiple transmissions to specific recipients at the same time. If
multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate
computers. Select Enabled to filter multicasting, or Disabled to disable this feature.
Filter Internet NAT Redirection. This feature uses port forwarding to block access to local servers from local
networked computers. Select Enabled to filter Internet NAT redirection, or Disabled to disable this feature.
Filter IDENT (Port 113). This feature keeps port 113 from being scanned by devices outside of your local
network. Select Enabled to filter port 113, or Disabled to disable this feature.
Change these settings as described here and click the Save Settings button to apply your changes or Cancel
Changes to cancel your changes.
The Security Tab - VPN Passthrough
Figure 5-28: Security Tab - Firewall
NOTE: The Wireless-G Broadband Router always has
its firewall protection enabled.
Use the settings on this tab to allow VPN tunnels using IPSec, PPTP, or L2TP protocols to pass through the
Router’s firewall.
IPSec Pass-through. Internet Protocol Security (IPSec), enabled by default, is a suite of protocols used to
implement secure exchange of packets at the IP layer. To turn off this feature, click Disable.
PPTP Pass-through. Point-to-Point Tunneling Protocol (PPTP), enabled by default, allows the Point-to-Point
Protocol (PPP) to be tunneled through an IP network. To turn off this feature, click Disable.
L2TP Pass-through. Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. To allow L2TP tunnels to pass through the Router, click Enable. L2TP Pass-Through
is enabled by default.
Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes.
Chapter 5: Configuring the Wireless-G Broadband Router
The Security Tab - Firewall
Figure 5-29: Security Tab - VPN Passthrough
27
Wireless-G Broadband Router
The Access Restrictions Tab - Internet Access
The Internet Access screen allows you to block or allow specific kinds of Internet usage and traffic, such as
Internet access, designated services, websites, and inbound traffic during specific days and times.
Internet Access Policy. Access can be managed by a policy. Use the settings on this screen to establish an
access policy (after the Save Settings button is clicked). Selecting a policy from the drop-down menu will
display that policy’s settings. To delete a policy, select that policy’s number and click the Delete button. To view
all the policies, click the Summary button. (Policies can be deleted from the Summary screen by selecting the
policy or policies and clicking the Delete button. To return to the Internet Access tab, click the Close button.)
Status. Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu,
and click the radio button beside Enable.
You can create two kinds of policies, one kind to manage Internet access and another kind to manage inbound
traffic.
To create an Internet Access policy:
1. Select a number from the Internet Access Policy drop-down menu.
2. To enable this policy, click the radio button beside Enable.
3. Enter a Policy Name in the field provided.
4. Select Internet Access as the Policy Type.
5. Click the Edit List button to select which PCs will be affected by the policy. The List of PCs screen will appear.
You can select a PC by MAC Address or IP Address. You can also enter a range of IP Addresses if you want this
policy to affect a group of PCs. After making your changes, click the Save Settings button to apply your
changes or Cancel Changes to cancel your changes. Then click the Close button.
6. Click the appropriate option, Deny or Allow, depending on whether you want to block or allow Internet access
for the PCs you listed on the List of PCs screen.
7. Decide which days and what times you want this policy to be enforced. Select the individual days during
which the policy will be in effect, or select Everyday. Then enter a range of hours and minutes during which
the policy will be in effect, or select 24 Hours.
8. You can filter access to various services accessed over the Internet, such as FTP or telnet, by selecting
services from the drop-down menus next to Blocked Services. (You can block up to 20 services.)
Chapter 5: Configuring the Wireless-G Broadband Router
The Access Restrictions Tab - Internet Access
Figure 5-30: Access Restrictions Tab - Internet Access
Figure 5-31: Internet Policy Summary
Figure 5-32: List of PCs
28
Wireless-G Broadband Router
Then, enter the range of ports you want to filter.
If the service you want to block is not listed or you want to edit a service’s settings, then click the Add/Edit Service button. Then the Port Services screen will appear.
To add a service, enter the service’s name in the Service Name field. Select its protocol from the Protocol
drop-down menu, and enter its range in the Port Range fields. Then click the Add button.
To modify a service, select it from the list on the right. Change its name, protocol setting, or port range. Then
click the Modify button.
To delete a service, select it from the list on the right. Then click the Delete button.
When you are finished making changes on the Port Services screen, click the Apply button to save changes.
If you want to cancel your changes, click the Cancel button. To close the Port Services screen and return to
the Access Restrictions screen, click the Close button.
9. If you want to block websites with specific URL addresses, enter each URL in a separate field next to Website Blocking by URL Address.
10. If you want to block websites using specific keywords, enter each keyword in a separate field next to Website Blocking by Keyword.
Change these settings as described here and click the Save Settings button to apply your changes or Cancel
Changes to cancel your changes.
Figure 5-33: Port Services
Chapter 5: Configuring the Wireless-G Broadband Router
The Access Restrictions Tab - Internet Access
29
Wireless-G Broadband Router
The Applications and Gaming Tab - Port Range Forward
The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp
servers, e-mail servers, or other specialized Internet applications. (Specialized Internet applications are any
applications that use Internet access to perform functions such as videoconferencing or online gaming. Some
Internet applications may not require any forwarding.)
To forward a port, enter the information on each line for the criteria required. The criteria are described here.
Application. In this field, enter the name you wish to give the application. Each name can be up to 12 characters.
Start/End. This is the port range. Enter the number that starts the port range under Start and the number that ends the range under End.
Protocol. Enter the protocol used for this application, either TCP or UDP, or Both.
IP Address. For each application, enter the IP Address of the PC running the specific application.
Enable. Click the Enable checkbox to enable port forwarding for the relevant application.
Change these settings as described here and click the Save Settings button to apply your changes or Cancel
Changes to cancel your changes.
Chapter 5: Configuring the Wireless-G Broadband Router
The Applications and Gaming Tab - Port Range Forward
Figure 5-34: Applications and Gaming Tab - Port
Range Forward
30
Wireless-G Broadband Router
The Applications & Gaming Tab - Port Triggering
The Port Triggering screen allows the Router to watch outgoing data for specific port numbers. The IP address of
the computer that sends the matching data is remembered by the Router, so that when the requested data
returns through the Router, the data is pulled back to the proper computer by way of IP address and port
mapping rules.
Port Triggering
Application. Enter the application name of the trigger.
Triggered Range
For each application, list the triggered port number range. Check with the Internet application documentation for
the port number(s) needed.
Start Port. Enter the starting port number of the Triggered Range.
End Port. Enter the ending port number of the Triggered Range.
Forwarded Range
For each application, list the forwarded port number range. Check with the Internet application documentation for
the port number(s) needed.
Figure 5-35: Applications and Gaming Tab -
Port Triggering
Start Port. Enter the starting port number of the Forwarded Range.
End Port. Enter the ending port number of the Forwarded Range.
Change these settings as described here and click the Save Settings button to apply your changes or Cancel
Changes to cancel your changes.
Chapter 5: Configuring the Wireless-G Broadband Router
The Applications & Gaming Tab - Port Triggering
31
Wireless-G Broadband Router
The Applications and Gaming Tab - DMZ
The DMZ feature allows one network user to be exposed to the Internet for use of a special-purpose service such
as Internet gaming or videoconferencing. DMZ hosting forwards all the ports at the same time to one PC. The Port
Range Forward feature is more secure because it only opens the ports you want to have opened, while DMZ
hosting opens all the ports of one computer, exposing the computer to the Internet.
Any PC whose port is being forwarded must have its DHCP client function disabled and should have a new static
IP address assigned to it because its IP address may change when using the DHCP function.
To expose one PC, select Enable. Then, enter the computer's IP address in the DMZ Host IP Address field.
Change these settings as described here and click the Save Settings button to apply your changes or Cancel
Changes to cancel your changes.
The Applications and Gaming Tab - QoS
Two types of Quality of Service (QoS) are available. Wireless QoS controls devices that are wirelessly
communicating with the Router. QoS controls devices plugged into the Router with an Ethernet cable.
Wireless QoS
WMM Support. Wireless QoS is also referred to as Wi-Fi Multi Media (WMM). Select Enable to utilize WMM if
you are using other wireless devices that are also WMM certified.
Figure 5-36: Applications and Gaming Tab - DMZ
No Acknowledgement. Enable this option if you would like to disable acknowledgement. When enabled, the
Router will not resent data if an error occurs.
QoS
In this section, you can set priority based on a type of Category (such as an Application, Port Range, or MAC
Address). There are four priories you can set: High, Medium, Normal, or Low. Enable or Disable to set the Internet
Access priority.
Internet Access Priority. To limit outgoing bandwidth for the QoS policies in use, select Enable. Otherwise,
select Disable.
Upstream Bandwidth. This setting allows you to limit the outgoing bandwidth for the QoS policies in use, so you
can control how much bandwidth a particular application is allowed to use. Enter the bandwidth in the field.
Chapter 5: Configuring the Wireless-G Broadband Router
The Applications and Gaming Tab - DMZ
Figure 5-37: Applications and Gaming Tab - QOS
32
Wireless-G Broadband Router
Category. From this drop-down menu, you can select the Category for which you will set bandwidth priority.
These Categories include applications, ethernet ports, MAC addresses, and online games.
Application. With this option you can select None, Add a New Application, Online Game, or select from the
list of applications you want to set. To create a new entry, select Add a New Application, and refer to the Add a New Application section.
Priority. Select the bandwidth priority for the application you selected. Select High, Medium, Normal, or
Low for the bandwidth you need for that application. Don’t set all applications to High, because this will
defeat the purpose of allocating the available bandwidth. If you want to select below normal bandwidth,
select Low. Depending on the application, a few attempts may be needed to achieve your goal. Once you
have made your selection, click Add to add to the Summary list.
Add a New Application
Enter a NameEnter any name to indicate the name of the entry.
CategorySelect from Port Range or MAC Address for the Router to use to set the bandwidth priority.
Port RangeIf you selected Port Range, then this category will be available. It allows you to enter the port
range that the application will be using. For example, if you want to allocate bandwidth for
FTP, you can enter 21-21. If you need services for an application that uses from 1000 to 1250,
you enter 1000-1250 as your settings. You can have up to three ranges to define for this
bandwidth allocation. Port numbers can range from 1 to 65535. Check your application's
documentation for details on the service ports used.
MAC AddressIf you selected MAC Address, then this category will be available. Enter the 12 hexadecimal
digit MAC Address to represent the device you want to set as a bandwidth priority. This is a
unique identifier for your network device. When the Router identifies the device entered, the
Router will allocate the priority set for that entry. Check the device’s documentation to obtain
the MAC Address.
PrioritySelect the bandwidth priority for the application you selected. Select High, Medium, Normal,
or Low for the bandwidth, but don’t set all applications to High. Once you have made your
selection, click Add to add to the Summary list.
Chapter 5: Configuring the Wireless-G Broadband Router
The Applications and Gaming Tab - QoS
Figure 5-38: Applications and Gaming Tab - QOS
Adding an New Application
33
Wireless-G Broadband Router
Summary. This section will display a summary of all the categories of applications with QoS assigned.
PriorityThis displays the bandwidth allocation priority of High, Medium, Normal, or Low, that you set
for the application.
NameThis displays the application name or the entries you entered to be allocated.
InformationThis displays the Port Range or MAC Address entered when you added a new application. If a
pre-configured application was selected, there will be no valid entry shown in this section.
RemoveThis button allows you to remove the application entry. To remove the entry, click the Remove
button.
EditThis button allows you to edit the application entry. To edit the entry, click the Edit button.
Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes.
Chapter 5: Configuring the Wireless-G Broadband Router
The Applications and Gaming Tab - QoS
34
Wireless-G Broadband Router
The Administration Tab - Management
This section of the Administration tab allows the network’s administrator to manage specific Router functions for
access and security.
Local Router Access. You can change the Router’s password from here. Enter a new Router password and then
type it again in the Re-enter to confirm field to confirm.
Web Access. HTTP (HyperText Transport Protocol) - The communications protocol used to connect to servers on
the World Wide Web. HTTPS - Uses SSL (Secured Socket Layer) to encrypt data transmitted for higher security.
Select HTTP or HTTPS. Wireless Access Web - If you are using your Wireless Router in a public domain where you
are giving wireless access to your guests, you can disable wireless access to the router’s web-based utility. You
will only be able to access the web-based utility via a wired connection if you disable the setting. Select Enable
to enable wireless access to the Router’s web-based utility or Disable to disable wireless access to the utility.
Remote Router Access. To access the Router remotely, from outside the network, verify that Enable is selected.
Then, enter the port number that will be open to outside access. You will need to enter the Router’s password
when accessing the Router this way, as usual. To utilize this feature, Web Access HTTPS must be enabled.
UPnP. When using UPnP features, select Enable. Because allowing this may present a risk to security, this
feature is disabled by default.
Change these settings as described here and click the Save Settings button to apply your changes or Cancel
Changes to cancel your changes.
Figure 5-39: Administration Tab - Management
The Administration Tab - Log
The Router can keep logs of all traffic for your Internet connection. To disable the Log function, keep the default
setting, Disable. To monitor traffic between the network and the Internet, select Enable. When you wish to view
the logs, click Incoming Log or Outgoing Log, depending on which you wish to view.
Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes.
Chapter 5: Configuring the Wireless-G Broadband Router
The Administration Tab - Management
Figure 5-40: Administration Tab - Log
35
Wireless-G Broadband Router
The Administration Tab - Diagnostics
The diagnostic tests (Ping and Traceroute) allow you to check the connections of your network components.
Ping Test. The Ping test will check the status of a connection. Click the Ping button to open the Ping Test screen.
Enter the address of the PC whose connection you wish to test and how many times you wish to test it. Then,
click the Ping button. The Ping Test screen will then display the test results. To stop the test, click the Stop
button. Click the Clear Log button to clear the screen. Click the Close button to return to the Diagnostics screen.
Traceroute Test. To test the performance of a connect, click the Traceroute button. Enter the address of the PC
whose connection you wish to test and click the Traceroute button. The Traceroute screen will then display the
test results. To stop the test, click the Stop button. Click the Clear Log button to clear the screen. Click the Close
button to return to the Diagnostics screen.
Change these settings as described here and click the Save Settings button to apply your changes or Cancel
Changes to cancel your changes.
Figure 5-41: Administration Tab - Diagnostics
Chapter 5: Configuring the Wireless-G Broadband Router
The Administration Tab - Diagnostics
Figure 5-42: The Ping Test
Figure 5-43: The Traceroute Test
36
Wireless-G Broadband Router
The Administration Tab - Factory Defaults
Click the Yes button to reset all configuration settings to their default values, and then click the Save Settings
button. Any settings you have saved will be lost when the default settings are restored. This feature is disabled by
default.
The Administration Tab - Firmware Upgrade
Firmware can be upgraded by clicking the Upgrade button after browsing for the firmware, which you can
download from the Linksys website. Do not upgrade your firmware unless you are experiencing problems with
the Router. For more information about upgrading firmware, refer to “Appendix C: Upgrading Firmware”.
This screen is used to back up or restore the Router’s configuration file.
To back up the Router’s configuration file, click the Backup button. Then follow the on-screen instructions.
To restore the Router’s configuration file, click the Browse button to locate the file, and follow the on-screen
instructions. After you have selected the file, click the Restore button.
Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes
Chapter 5: Configuring the Wireless-G Broadband Router
The Administration Tab - Factory Defaults
The Router screen on the Status Tab displays the Router’s current status. Click the Refresh button to update the
information displayed on this screen.
Firmware Version. This is the Router’s current firmware.
Current Time. This shows the time, as you set on the Setup Tab.
MAC Address. This is the Router’s MAC Address, as seen by your ISP.
Router Name. This is the specific name for the Router, which you set on the Setup Tab.
Host Name. If required by your ISP, this would have been entered on the Setup Tab.
Domain Name. If required by your ISP, this would have been entered on the Setup Tab.
Configuration Type. This shows the information required by your ISP for connection to the Internet. This
information was entered on the Setup Tab. You can Connect or Disconnect your connection here by clicking on
that button.
Figure 5-47: Status Tab - Router
Chapter 5: Configuring the Wireless-G Broadband Router
The Status Tab - Router
38
Wireless-G Broadband Router
The Status Tab - Local Network
The Local Network screen on the Status Tab displays the status of your network. Click the Refresh button to
update the information displayed on this screen.
MAC Address. This is the Router’s MAC Address, as seen on your local, Ethernet network.
IP Address. This shows the Router’s IP Address, as it appears on your local, Ethernet network.
Subnet Mask. When the Router is using a Subnet Mask, it is shown here.
DHCP Server. If you are using the Router as a DHCP server, that will be displayed here.
Start IP Address. For the range of IP Addresses used by devices on your local, Ethernet network, the beginning
of that range is shown here.
End IP Address. For the range of IP Addresses used by devices on your local, Ethernet network, the end of that
range is shown here.
DHCP Clients Table. Clicking this button will open a screen to show you which PCs are utilizing the Router as a
DHCP server. You can delete PCs from that list, and sever their connections, by checking a Delete box and
clicking the Delete button.
Figure 5-48: Status Tab - Local Network
The Status Tab - Wireless
The Wireless screen on the Status Tab displays the status of your wireless network. Click the Refresh button to
update the information displayed on this screen.
MAC Address. This is the Router’s MAC Address, as seen on your local, wireless network.
Mode. As selected from the Wireless tab, this will display the wireless mode (Mixed, G-Only, or Disabled) used by
the network.
SSID. As entered on the Wireless tab, this will display the wireless network name or SSID.
Channel. As entered on the Wireless tab, this will display the channel on which your wireless network is
broadcasting.
Encryption Function. As selected on the Security Tab, this will display what type of encryption the Router uses
for security.
Chapter 5: Configuring the Wireless-G Broadband Router
The Status Tab - Local Network
Figure 5-49: DHCP Clients Table
Figure 5-50: Status Tab - Wireless
39
Wireless-G Broadband Router
Appendix A: Troubleshooting
This appendix consists of two parts: “Common Problems and Solutions” and “Frequently Asked Questions.”
Provided are possible solutions to problems that may occur during the installation and operation of the Router.
Read the descriptions below to help you solve your problems. If you can’t find an answer here, check the Linksys
website at www.linksys.com/international.
Common Problems and Solutions
1. I’m trying to access the Router’s Web-based Utility, but I do not see the login screen. Instead, I see a
screen saying, “404 Forbidden.”
If you are using Windows Explorer, perform the following steps until you see the Web-based Utility’s login
screen (Netscape Navigator will require similar steps):
1. Click File. Make sure Work Offline is NOT checked.
2. Press CTRL + F5. This is a hard refresh, which will force Windows Explorer to load new webpages,
not cached ones.
3. Click Tools. Click Internet Options. Click the Security tab. Click the Default level button. Make sure
the security level is Medium or lower. Then click the OK button.
2. I need to set a static IP address on a PC.
You can assign a static IP address to a PC by performing the following steps:
• For Windows 98SE and Me:
1. Click Start, Settings, and Control Panel. Double-click Network.
2. In The following network components are installed box, select the TCP/IP-> associated with your
Ethernet adapter. If you only have one Ethernet adapter installed, you will only see one TCP/IP line
with no association to an Ethernet adapter. Highlight it and click the Properties button.
3. In the TCP/IP properties window, select the IP address tab, and select Specify an IP address. Enter
a unique IP address that is not used by any other computer on the network connected to the Router.
Make sure that each IP address is unique for each PC or network device.
4. Click the Gateway tab, and in the New Gateway prompt, enter 192.168.1.1, which is the default IP
address of the Router. Click the Add button to accept the entry.
5. Click the DNS tab, and make sure the DNS Enabled option is selected. Enter the Host and Domain
names (e.g., John for Host and home for Domain). Enter the DNS entry provided by your ISP. If your
ISP has not provided the DNS IP address, contact your ISP to get that information or go to its website
for the information.
6. Click the OK button in the TCP/IP properties window, and click Close or the OK button for the Network
window.
7. Restart the computer when asked.
Appendix A: Troubleshooting
Common Problems and Solutions
40
Wireless-G Broadband Router
• For Windows 2000:
1. Click Start, Settings, and Control Panel. Double-click Network and Dial-Up Connections.
2. Right-click the Local Area Connection that is associated with the Ethernet adapter you are using, and
select the Properties option.
3. In the Components checked are used by this connection box, highlight Internet Protocol (TCP/IP),
and click the Properties button. Select Use the following IP address option.
4. Enter a unique IP address that is not used by any other computer on the network connected to the
Router.
5. Enter the Subnet Mask, 255.255.255.0.
6. Enter the Default Gateway, 192.168.1.1 (Router’s default IP address).
7. Toward the bottom of the window, select Use the following DNS server addresses, and enter the
Preferred DNS server and Alternative DNS server (provided by your ISP). Contact your ISP or go on its
website to find the information.
8. Click the OK button in the Internet Protocol (TCP/IP) Properties window, and click the OK button in the
Local Area Connection Properties window.
9. Restart the computer if asked.
• For Windows XP:
The following instructions assume you are running Windows XP with the default interface. If you are using
the Classic interface (where the icons and menus look like previous Windows versions), please follow the
instructions for Windows 2000.
1. Click Start and Control Panel.
2. Click the Network and Internet Connections icon and then the Network Connections icon.
3. Right-click the Local Area Connection that is associated with the Ethernet adapter you are using,
and select the Properties option.
4. In the This connection uses the following items box, highlight Internet Protocol (TCP/IP). Click the
Properties button.
5. Enter a unique IP address that is not used by any other computer on the network connected to the
Router.
6. Enter the Subnet Mask, 255.255.255.0.
7. Enter the Default Gateway, 192.168.1.1 (Router’s default IP address).
8. Toward the bottom of the window, select Use the following DNS server addresses, and enter the
Preferred DNS server and Alternative DNS server (provided by your ISP). Contact your ISP or go on its
website to find the information.
9. Click the OK button in the Internet Protocol (TCP/IP) Properties window. Click the OK button in the
Local Area Connection Properties window.
3. I want to test my Internet connection.
ACheck your TCP/IP settings.
For Windows 98SE, Me, 2000, and XP:
• Refer to Windows Help for details. Make sure Obtain IP address automatically is selected in the settings.
Appendix A: Troubleshooting
Common Problems and Solutions
41
Loading...
+ 42 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.