Product Overview Chapter 1 Chapter 1: Wireless Security (Green/Red) The Security LED lights up when wireless security is enabled. Product Overview It flashes during the Wi-Fi Protected Setup process. The LED becomes red when wireless security is disabled. Thank you for choosing the Linksys Wireless-G ADSL2+ Green.
Product Overview Chapter 1 Method #3 Wi-Fi Protected Setup If you have client devices, such as a wireless adapter, that supports Use this method if your client device asks for Wi-Fi Protected Setup, then you can use Wi-Fi the Gateway’s PIN number. Protected Setup to automatically configure wireless security for your wireless network(s).
Product Overview Chapter 1 Reset There are two ways to reset the Gateway’s NOTE: Linksys is not responsible for damages settings to factory defaults. Either press and incurred by insecure wall-mounting hardware. hold the Reset button for approximately ten seconds, or restore the defaults from the Follow these instructions: Administration >...
Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalency Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
Advanced Configuration Chapter 3 Chapter 3: Setup > ADSL Advanced Configuration The first screen that appears is the Basic Setup screen. Configure the Gateway’s ADSL settings on this screen. There are two views available, Basic and Advanced. The To configure the Gateway, use its web-based utility. This default view is Basic.
Page 10
Advanced Configuration Chapter 3 IPoE (RFC2684 Bridged) • NOTE: PVCs are layer 2 (physical and link), while WAN connections are layer 3, meaning IP and IPoA (RFC2684 Routed) • Point-to-Point (PPP) connections. Each PVC PPPoE (RFC 2516) • supports multiple connections. For each PVC, you can configure one IP connection and up to PPPoA (RFC 2364) •...
Page 11
Advanced Configuration Chapter 3 select Connect on Demand. In the Max Idle Time field, enter the number of minutes you want to have elapsed before your Internet connection terminates. The default Max Idle Time is 5 minutes. Keep Alive If you select this option, the Gateway will periodically check your Internet connection.
Advanced Configuration Chapter 3 Service Name (Advanced View) Enter the Service Name Optional Settings (Advanced View) (optional) provided by your service provider. MTU Size Keep this value in the 1200 to 1500 range. The default MTU is configured automatically. NOTE: Zealand, follow these...
Page 13
Advanced Configuration Chapter 3 Internet Setup Option Tag Enter the DHCP Option Tag to be included • in the DHCP Sent request. WAN Connection Option Value Enter the DHCP Option Value to be • included in the DHCP Sent request. The value must Select PVC Connection The connection you added is be a hexadecimal string to represent a binary option...
Page 14
Advanced Configuration Chapter 3 PPPoE Settings for PPPoE (RFC 2516) DHCP Option Entry Option Tag Enter the DHCP Option Tag to be proxyed • to the LAN if it is received from the DHCP server on the WAN side. To add the entry, click Add Option. To cancel your changes and return to the ADSL screen, click Back to ADSL Setup.
Advanced Configuration Chapter 3 Connect on Demand: Max Idle Time You can configure Optional Settings (Advanced View) the Gateway to cut the Internet connection after it has MTU Size Keep this value in the 1200 to 1500 range. The been inactive for a specified period of time (Max Idle Time). default MTU is configured automatically.
Page 16
Advanced Configuration Chapter 3 Set Connection Shaping To disable QoS Shaping, select Static DNS 1 (Required) and 2 (Optional) DNS Enter the No Shaping. To shape according to link speed, select DNS (Domain Name System) server IP address(es) provided Auto (link speed). To manually enter the shape rate, by your service provider.
Advanced Configuration Chapter 3 your multimedia application devices. Otherwise, keep the default, Disabled. VLAN ID Mark (Advanced View) Enter the 802.1Q VLAN ID Mark to be used on egress to the interface associated with this connection. A value of -1 indicates no VLAN tagging for this connection.
Page 18
Advanced Configuration Chapter 3 DHCP Option Conditional Serving Pool Enable DHCP Conditional Serving To enable this • option, select the check box. Otherwise, leave the check box blank. For each entry, the table lists the following: MAC Address, Vendor Class ID, User Class ID, Client ID, Host Name, Domain Name, IP Address, Precedence, and Action.
Advanced Configuration Chapter 3 Static DNS 1-3 (Advanced View) These entries are valid Update Time Click this option to immediately synchronize only when the DNS Proxy option is disabled. At least one the Gateway with the NTP server. DNS server IP address is provided by your service provider. Click Save Settings to apply your changes, or click Cancel You can enter up to three DNS server IP addresses here.
Advanced Configuration Chapter 3 Setup > Advanced Routing Gateway This is the IP address of the gateway device that allows for contact between the Gateway and the remote This screen is used to set up the Gateway’s advanced network or host. routing functions.
Advanced Configuration Chapter 3 VLAN Bridge Entry Enabled Select Enabled to enable the mapping rule. VLAN ID Enter the VLAN you want to map. The default is 2. MAC Address Enter the packet’s source MAC address, if applicable as a filter condition. 802.1p Enter the priority level for each port.
Advanced Configuration Chapter 3 Wireless Network State If you want to use the wireless WPA2-Personal network, select Enabled. Otherwise, select Disabled. Wireless SSID Broadcast When wireless devices survey the local area for wireless networks to associate with, they will detect the wireless network name or SSID broadcast by the Gateway.
Advanced Configuration Chapter 3 RADIUS Server Enter the IP address of the RADIUS server. RADIUS Port Enter the port number of the RADIUS server. The default value is 1812. Shared Key Enter the key shared between the Gateway and the server. Key Renewal Enter a Key Renewal period, which instructs the Gateway how often it should change the encryption...
Advanced Configuration Chapter 3 NOTE: Wi-Fi Protected Setup can only be used for the default wireless network. (The Gateway supports up to four wireless networks. The other three can be configured using the Wireless > Basic Settings screen of the Gateway’s web-based utility.) Wireless >...
Advanced Configuration Chapter 3 Method #2 Use this method if your client device has a Wi-Fi Protected Setup PIN number. Enter the client PIN number in the PIN field on this screen (the Gateway’s Wi-Fi Protected Setup screen). Register. Click Method #3 Use this method if your client device asks for the Router’s PIN number.
Advanced Configuration Chapter 3 DTIM Interval This value, between 1 and 255, indicates NOTE: If the Gateway was provided by your the interval of the Delivery Traffic Indication Message service provider, then it may restrict access (DTIM). A DTIM field is a countdown field informing to the Admin View of the Voice screens in the clients of the next window for listening to broadcast and web-based utility.
Page 27
Advanced Configuration Chapter 3 RTP Bytes Sent The number of RTP bytes sent by the Calls 1 and 2 have the same status information available. Gateway is displayed. Call 1/2 State The status of the call is displayed. RTP Packets Recv The number of RTP packets received Call 1/2 Tone The type of tone used by the call is...
Advanced Configuration Chapter 3 PSTN Loop Current The loop current to the Line (FXO) port is displayed. Voice > System The System screen displays system settings. (The User View only accesses the User Password setting.) Voice > System (User View) VoIP System Configuration User Password...
Advanced Configuration Chapter 3 Storage > Disk Detail Cfwd Last Caller Enter the caller number that is actively forwarded to the Cfwd Last Dest number when the Call Forward Last activation code is used. The Disk Detail screen lists the location, Make and Model, Physical Size, and Free Space of the storage device Cfwd Last Dest Enter the forward number for the Cfwd...
Advanced Configuration Chapter 3 Security > Firewall The Firewall screen is used to configure a firewall that can filter out various types of unwanted traffic on the Gateway’s local network. Security > Disk Management Security > Firewall Disk Management Firewall Select Disk Select the storage location.
Advanced Configuration Chapter 3 Access Restrictions > Internet Access Policy Access Restriction Deny/Allow Select the appropriate option, Deny or The Internet Access Policy screen allows you to block or Allow, depending on whether you want to block or allow allow specific kinds of Internet usage and traffic, such as Internet access.
Advanced Configuration Chapter 3 Applications and Gaming > Port Range Click Add Rule to save the policy’s settings. To cancel the policy’s settings, click Cancel Changes. Forwarding Applications and Gaming > Single Port The Port Range Forwarding screen allows you to set up Forwarding public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized Internet...
Advanced Configuration Chapter 3 Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Applications and Gaming > DMZ The DMZ feature allows one network computer to be exposed to the Internet for use of a special-purpose service such as Internet gaming or videoconferencing.
Page 34
Advanced Configuration Chapter 3 Scheduler Select the scheduling algorithm: SP, WFQ, • or WRR (Weighted Round Robin). The default is SP. Dropper Select the dropping algorithm used if there • is congestion: RED (Random Early Detection), DT (Drop Tail), or WRED (Weighted RED). The default is WRED. Weight When WFQ or WRR is used, this option •...
Page 35
Advanced Configuration Chapter 3 QoS (Quality of Service) Source Port If you selected TCP or UDP for the Protocol • setting, enter the Source port range, if applicable as a filter condition. Source MAC Enter the Source MAC address of the •...
Advanced Configuration Chapter 3 Administration > Management On the original QoS screen, click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. The Administration > Management screen allows the network’s administrator to manage specific Gateway Applications and Gaming >...
Advanced Configuration Chapter 3 TR64 NOTE: When you are in a remote location and wish to manage the Gateway, enter TR64 is the DSL Forum’s specification for the Gateway’s https://<Internet_IP_address>:port LAN management through UPnP services. http://<Internet_IP_address>:port. Enter TR64 To use this option, select Enabled. Otherwise, keep the Gateway’s specific Internet IP address in the default, Disabled.
Advanced Configuration Chapter 3 Email to Address Enter the e-mail address that will receive alert logs. Email From Address Enter the return address for the e-mail alerts. (This can be a dummy address.) Event Log For each log, the Event Log displays the following information: Time, Description, Source Address, and Destination Address.
Advanced Configuration Chapter 3 NOTE: Restoring factory defaults deletes custom NOTE: In rare cases (such as a power failure), settings except for the voice settings. Note your the firmware upgrade may fail. If that happens, custom settings before clicking the Restore the Gateway will enter recovery mode and Factory Defaults button.
Advanced Configuration Chapter 3 Status > Local Network Local Network Status > Internet IP Address The Gateway’s IP address, as it appears on Gateway Information your local network, is displayed. Manufacturer OUI The manufacturer ID number is Subnet Mask The Subnet Mask of the Gateway is displayed.
Advanced Configuration Chapter 3 Downstream Rate The download speed of traffic from the Internet to the Gateway is displayed. Upstream Rate The upload speed of traffic from the Gateway to the Internet is displayed. For ADSL connection, the Upstream Rate is typically 25% of the Downstream Rate.
Page 42
Advanced Configuration Chapter 3 Status > Bridges Bridges The total number of bridges and their descriptions are displayed. Port (Name/Type) The port name or type is displayed. Learned Host (MAC/IP/Time to Expire) The MAC address, IP address, or Time to Expire duration is displayed. IGMP (Group Address/Time to Expire) The IGMP Group Information of this port is displayed.
Troubleshooting Appendix A Appendix A: You need to modify the advanced settings on the Gateway. Troubleshooting Open the web browser (for example, Internet Explorer or Firefox), and enter the Gateway’s IP address in the address field (the default IP address is 192.168.1.1). When Your computer cannot connect to the Internet.
Regulatory Information Appendix C Appendix C: FCC Part 68 Statement This equipment complies with Part 68 of the FCC Rules. A Regulatory Information label is attached to the equipment that contains, among other information, its FCC registration number and ringer equivalence number.
équivalente (p.i.r.e.) ne soit pas supérieure limits to radiofrequency fields, the antenna of au niveau requis pour obtenir une communication the WAG310G should be no closer than 20 cm satisfaisante. from the body during use. Avis d’Industrie Canada concernant l’exposition aux radio- Canada fréquences :...
Regulatory Information Appendix C Avis de non-responsabilité concernant les Dieses Gerät entspricht den grundlegenden Deutsch appareils sans fil Anforderungen weiteren entsprechenden Vorgaben der Richtlinie [German]: 1999/5/EU. Les performances maximales pour les réseaux sans fil sont tirées des spécifications de la norme IEEE 802.11. Les performances réelles peuvent varier, notamment Eesti See seade vastab direktiivi 1999/5/EÜ...
Page 48
Regulatory Information Appendix C TPC: For operation in the 5 GHz band, the maximum power Urządzenie jest zgodne ogólnymi level is 3 dB or more below the applicable limit. As such, Polski wymaganiami oraz szczególnymi warunkami TPC is not required. [Polish]: określonymi Dyrektywą...
Page 49
Regulatory Information Appendix C The requirements for any country may evolve. Linksys product is operating within the boundaries of the owner’s recommends that you check with the local authorities for property, its use requires a “general authorization”. Please the latest status of their national regulations for both the check http://www.comunicazioni.it/it/ for more details.
Page 50
Regulatory Information Appendix C User Information for Consumer Products Covered Third-Party Software or Firmware by EU Directive 2002/96/EC on Waste Electric and The use of software or firmware not supported/provided by Linksys may result that the equipment is no longer Electronic Equipment (WEEE) compliant with the regulatory requirements.
Page 51
Regulatory Information Appendix C Ceština (Czech) - Informace o ochraně životního Eesti (Estonian) - Keskkonnaalane informatsioon prostředí pro zákazníky v zemích Evropské unie Euroopa Liidus asuvatele klientidele Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on tímto symbolem na produktu anebo na obalu bylo likvidováno seadmeid, millel on tootel või pakendil käesolev sümbol s netříděným komunálním odpadem.
Page 52
Regulatory Information Appendix C Français (French) - Informations environnementales Lietuvškai (Lithuanian) - Aplinkosaugos informacija, pour les clients de l’Union européenne skirta Europos Sąjungos vartotojams La directive européenne 2002/96/CE exige que l’équipement Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir sur lequel est apposé ce symbole sur le produit et/ou son kurios pakuotė...
Page 53
Regulatory Information Appendix C Nederlands (Dutch) - Milieu-informatie voor klanten Português (Portuguese) - Informação ambiental para in de Europese Unie clientes da União Europeia De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die A Directiva Europeia 2002/96/CE exige que o equipamento is voorzien van dit symbool op het product of de verpakking, que exibe este símbolo...
Page 54
Regulatory Information Appendix C Slovenčina (Slovene) - Okoljske informacije za stranke v Evropski uniji Evropska direktiva 2002/96/EC prepoveduje odlaganje opreme, označene s tem simbolom – na izdelku in/ali na embalaži – med običajne, nerazvrščene odpadke. Ta simbol opozarja, da je treba izdelek odvreči ločeno od preostalih gospodinjskih odpadkov.
CISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR USING THE PRODUCT CONTAINING This product from Cisco-Linksys LLC or from one of its THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco- THIS AGREEMENT.
Page 56
Software License Agreement Appendix D your Linksys product and/or the Software is being used in OR RELATED TO THE USE OF OR INABILITY TO USE THE accordance with the terms of this Agreement; (iii) to provide SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF improvements to the way Linksys delivers technology to THE POSSIBILITY OF SUCH DAMAGES.
Page 57
Software License Agreement Appendix D GNU General Public License is intended to guarantee your TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND freedom to share and change free software–to make sure MODIFICATION the software is free for all its users. This General Public This License applies to any program or other work License applies to most of the Free Software Foundation’s which contains a notice placed by the copyright...
Page 58
Software License Agreement Appendix D If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
Page 59
Software License Agreement Appendix D If, as a consequence of a court judgment or allegation not specify a version number of this License, you of patent infringement or for any other reason (not may choose any version ever published by the Free limited to patent issues), conditions are imposed on Software Foundation.
Page 60
Software License Agreement Appendix D GNU LESSER GENERAL PUBLIC LICENSE To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the Version 2.1, February 1999 library is modified by someone else and passed on, the recipients should know that what they have is not the Copyright (C) 1991, 1999 Free Software Foundation, Inc.
Page 61
Software License Agreement Appendix D freedom and the wherewithal to run that program using a You may copy and distribute verbatim copies of the modified version of the Library. Library’s complete source code as you receive it, in any medium, provided that you conspicuously and The precise terms and conditions for copying, distribution appropriately publish on each copy an appropriate and modification follow.
Page 62
Software License Agreement Appendix D Thus, it is not the intent of this section to claim When a “work that uses the Library” uses material from rights or contest your rights to work written entirely a header file that is part of the Library, the object code by you;...
Page 63
Software License Agreement Appendix D Use a suitable shared library mechanism for linking You may not copy, modify, sublicense, link with, or with the Library. A suitable mechanism is one that distribute the Library except as expressly provided (1) uses at run time a copy of the library already under this License.
Page 64
Software License Agreement Appendix D software distributed through that system in reliance BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, on consistent application of that system; it is up to THERE IS NO WARRANTY FOR THE LIBRARY, TO THE the author/donor to decide if he or she is willing to EXTENT PERMITTED BY APPLICABLE LAW.
Page 66
Software License Agreement Appendix D DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.