Product Overview Chapter 1 Back Panel Chapter 1: Product Overview Thank you for choosing the Linksys ADSL2 Gateway with 4-Port Switch, the all-in-one solution for Internet connectivity in your home. The internal ADSL modem function gives you an Internet connection that is far faster than a dial-up and does not tie up your phone line.
Configuration Chapter 2 The Setup Tab > Basic Setup Chapter 2: Configuration The Basic Setup screen is the first screen you see when you access the web-based utility. This screen allows you to change the Gateway’s general settings. Follow the steps in this chapter to use the Gateway’s web-based utility to configure the Gateway.
Page 6
Configuration Chapter 2 email; or VBR, Variable Bite Rate for Bursty traffic and IP Settings Select Obtain an IP Address Automatically bandwidth sharing with other application. if your ISP says you are connecting through a dynamic IP address. • Pcr Rate Peak Cell Rate, divide the DSL line rate by 424 to find the PCR to get the maximum rate the sender Static IP...
Page 7
Configuration Chapter 2 RFC 2364 PPPoA IP Address This is the Gateway’s IP address, when • seen from the Internet. Your ISP will provide you with the IP Address you need to specify here. Subnet Mask This is the Gateway’s Subnet Mask. Your •...
Page 8
Configuration Chapter 2 Optional Settings Network Address Server Settings (DHCP) Some of these settings may be required by your ISP. Verify A Dynamic Host Configuration Protocol (DHCP) server with your ISP before making any changes. automatically assigns an IP address to each computer on your network for you.
Configuration Chapter 2 The Setup Tab > DDNS E-mail Address, Password, Domain Name Enter the e-mail address, TZO password key, and domain name of The Gateway offers a Dynamic Domain Name System the service you set up with TZO.com. (DDNS) feature. DDNS lets you assign a fixed host and Internet IP Address The Gateway’s current Internet IP domain name to a dynamic Internet IP address.
Configuration Chapter 2 The Security Tab > Firewall DDNS Service Transmit RIP Version. To transmit RIP messages, select the protocol you want: RIP1, RIP1- The Firewall screen contains filters and an option to block Compatible, or RIP2. WAN requests. Filters block specific Internet data types Receive RIP Version To receive RIP messages, select the and block anonymous Internet requests.
Configuration Chapter 2 The Security Tab > VPN To establish this tunnel, select the tunnel you wish to create in the Select Tunnel Entry drop-down box. It is Virtual Private Networking (VPN) is a security measure possible to create up to five simultaneous tunnels. Then that creates a secure connection between two remote click Enabled to enable the IPSec VPN tunnel.
Page 12
Configuration Chapter 2 Advanced VPN Tunnel Setup Key Management Select Auto (IKE) or Manual from the drop-down menu. From the Advanced IPSec VPN Tunnel Setup screen you can The two methods are described below. adjust the settings for specific VPN tunnels. Auto (IKE) Select Auto (IKE) and enter a series of numbers or letters in the Pre-shared Key field.
Configuration Chapter 2 In the Key Lifetime field, you may optionally Key Life Time select to have the key expire at the end of a time period of your choosing. Enter the number of seconds you’d like the key to be used until a re-key negotiation between each endpoint is completed.
Configuration Chapter 2 To create a new Internet Access policy: To add a new service to the list, enter the service’s name in the Service Name field, enter the service’s range in Internet Access Policy drop- Select a number from the the Port Range fields, and select the service’s protocol down menu.
Configuration Chapter 2 Enter the application’s IP address in the IP Address field. When you have finished making changes, click Save Then click Enabled to enable forwarding for the chosen Settings to save the changes, or click Cancel Changes to application.
Configuration Chapter 2 The Applications & Gaming Tab > DMZ Application-based QoS Application-based QoS manages information as it is The DMZ screen allows one local user to be exposed to transmitted and received. Depending on the settings of the Internet for use of a special-purpose service such as the QoS screen, this feature will assign information a high Internet gaming and videoconferencing through DMZ or low priority for the five preset applications and three...
Configuration Chapter 2 The Administration Tab > Management Remote Username, Remote Password, and Re-enter to confirm Complete these fields to specify the account When you click the Administration tab, you will see the that will be used for remote management. Management screen.
Configuration Chapter 2 Denial of Service Thresholds Enter the thresholds of Ping Timeout Enter the time in milliseconds. events you want to receive. Ping Result The results of the ping test will be shown SMTP Mail Server Enter the IP address of the SMTP here.
Configuration Chapter 2 The Administration Tab > Firmware The Status Tab > Gateway Upgrade The Router screen displays information about your Gateway and its WAN (Internet) Connections. The Firmware Upgrade screen allows you to upgrade the Gateway’s firmware. Do not upgrade the firmware unless you are experiencing problems with the Gateway or the new firmware has a feature you want to use.
Configuration Chapter 2 The Status Tab > Local Network ARP/RARP Table Click ARP/RARP Table to show the current ARP/RARP Table. This table displays the MAC The Local Network screen displays information about the address and IP address of the network clients using ARP/ local network.
Troubleshooting Appendix A Appendix A: Troubleshooting I can’t connect to the Internet. Verify the proper LEDs are lit on the Gateway. • Make sure the Power LED has a steady green light and is not flashing. • Verify the Ethernet LED has a fairly steady green light.
Warranty Information Appendix C Appendix C: network on which the product or software is used will be free of vulnerability to intrusion or attack. The product Warranty Information may include or be bundled with third party software or service offerings. This limited warranty shall not apply to such third party software or service offerings.
Page 24
Warranty Information Appendix C and a copy of your dated proof of original purchase when returning your product. Products received without a RMA number and dated proof of original purchase will be rejected. Do not include any other items with the product you are returning to Linksys.
Regulatory Information Appendix D Avis d’Industrie Canada Appendix D: Regulatory Information Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Le fonctionnement est soumis aux conditions suivantes : FCC Statement Ce périphérique ne doit pas causer d’interférences; This product has been tested and complies with the Ce périphérique doit accepter toutes les interférences specifications for a Class B digital device, pursuant to Part...
Regulatory Information Appendix D User Information for Consumer Products Čeština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené Waste Electric and Electronic Equipment tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem.
Page 27
Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
Page 28
Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
Page 29
Regulatory Information Appendix D Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
CISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR USING THE PRODUCT CONTAINING This product from Cisco-Linksys LLC or from one of its THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco- THIS AGREEMENT.
Page 31
Software License Agreement Appendix E your Linksys product and/or the Software is being used in OR RELATED TO THE USE OF OR INABILITY TO USE THE accordance with the terms of this Agreement; (iii) to provide SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF improvements to the way Linksys delivers technology to THE POSSIBILITY OF SUCH DAMAGES.
Page 32
Software License Agreement Appendix E TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND GNU General Public License is intended to guarantee your freedom to share and change free software–to make sure MODIFICATION the software is free for all its users. This General Public This License applies to any program or other work License applies to most of the Free Software Foundation’s which contains a notice placed by the copyright...
Page 33
Software License Agreement Appendix E If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
Page 34
Software License Agreement Appendix E If, as a consequence of a court judgment or allegation not specify a version number of this License, you of patent infringement or for any other reason (not may choose any version ever published by the Free limited to patent issues), conditions are imposed on Software Foundation.
Page 35
Software License Agreement Appendix E GNU LESSER GENERAL PUBLIC LICENSE To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the Version 2.1, February 1999 library is modified by someone else and passed on, the recipients should know that what they have is not the Copyright (C) 1991, 1999 Free Software Foundation, Inc.
Page 36
Software License Agreement Appendix E freedom and the wherewithal to run that program using a You may copy and distribute verbatim copies of the modified version of the Library. Library’s complete source code as you receive it, in any medium, provided that you conspicuously and The precise terms and conditions for copying, distribution appropriately publish on each copy an appropriate and modification follow.
Page 37
Software License Agreement Appendix E Thus, it is not the intent of this section to claim When a “work that uses the Library” uses material from rights or contest your rights to work written entirely a header file that is part of the Library, the object code by you;...
Page 38
Software License Agreement Appendix E Use a suitable shared library mechanism for linking You may not copy, modify, sublicense, link with, or with the Library. A suitable mechanism is one that distribute the Library except as expressly provided (1) uses at run time a copy of the library already under this License.
Page 39
Software License Agreement Appendix E software distributed through that system in reliance BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, on consistent application of that system; it is up to THERE IS NO WARRANTY FOR THE LIBRARY, TO THE the author/donor to decide if he or she is willing to EXTENT PERMITTED BY APPLICABLE LAW.
Page 41
Software License Agreement Appendix E DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.