Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

Chapter 1: Planning Your Network
The Gateway’s Functions
IP Addresses
What is a VPN?
Why do I need a VPN?
Chapter 2: Getting to Know the Wireless-G ADSL Gateway with 2 Phone Ports
The Back Panel
The Front Panel
Chapter 3: Connecting the Wireless-G ADSL Gateway
Wired Connection to a Computer
Figure 3-1: Connecting your networking devices
Figure 3-4: Connecting the power
Wireless Connection to a Computer
Chapter 4: Configuring the Gateway
How to Access the Web-based Utility
The Setup Tab
Figure 4-11: Setup Tab - DDNS (DynDNS.org)
Figure 4-14: Routing Table
The Wireless Tab
Figure 4-17: Wireless Tab - Wireless Security (WPA Pre-Shared Key)
Figure 4-19: Wireless Tab - Wireless Security (WPA2 Professional)
Figure 4-22: Wireless Tab - Wireless Network Access
The Security Tab
Figure 4-26: Security Tab - VPN
Figure 4-30: System Log
The Access Restrictions Tab
Figure 4-33: Access Restrictions Tab - Internet Access
Figure 4-35: List of PCs
The Applications and Gaming Tab
Figure 4-38: Applications and Gaming Tab - Port Range Forwarding
Figure 4-40: Applications and Gaming Tab - DMZ
The Administration Tab
Figure 4-46: Administration Tab - Diagnostics
Figure 4-47: Administration Tab - Backup&Restore
Figure 4-49: Administration Tab - Firmware Upgrade
The Status Tab
Figure 4-53: Status Tab - Wireless
The Voice Tab
Chapter 5: Using the Linksys Parental Control Service
Figure 5-6: Connecting to the Parental Control Service
Managing Linksys Parental Controls
Figure 5-8: Parental Controls Login
Support Center
Figure 5-9: Support Center
Figure 5-11: Update Contact Information
Activity Reports
Figure 5-13: Activity Reports
Family Settings
Suggest a Rating
Using the Parental Control Service
Figure 5-29: Suggest a Rating
Figure 5-31: Welcome to Parental Controls
Figure 5-34: Pop-up Screen (Sign Out)
Figure 5-35: Right-Click Tray Icon
Common Problems and Solutions
Frequently Asked Questions
How to Establish a Secure IPSec Tunnel
Figure C-1: Local Security Screen
Figure C-2: Rules Tab
Figure C-10: IP Filter List Tab
Figure C-13: Authentication Methods
Figure C-14: Preshared Key
Figure C-16: Tunnel Setting Tab
Figure C-17: Connection Type Tab
Figure C-19: IP Filter List Tab
Figure C-20: Filter Action Tab
Figure C-22: Preshared Key
Figure C-23: New Preshared Key
Figure C-25: Connection Type
Figure C-26: Rules
Appendix D: Finding the MAC Address and IP Address for Your Ethernet Adapter
Windows 98 or Me Instructions
Windows 2000 or XP Instructions
Appendix E: Upgrading Firmware
Appendix F: Windows Help
Appendix G: Glossary
Appendix H: Specifications
Appendix I: Warranty Information
Appendix J: Regulatory Information
Appendix K: Contact Information
0 of .
Results for:
No results containing your search query
P. 1
WAG54GP2_User Guide (English)

WAG54GP2_User Guide (English)

Ratings: (0)|Views: 31|Likes:
Published by connect01

More info:

Published by: connect01 on Jan 08, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 4 to 85 are not shown in this preview.
You're Reading a Free Preview
Pages 90 to 104 are not shown in this preview.
You're Reading a Free Preview
Pages 108 to 128 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->