Linksys Network Router WRT54G3GV2 ST User Manual

USER GUIDE  
Wireless-G  
Router for  
Mobile Broadband  
Model No: WRT54G3GV2-ST  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Table of Contents  
Wꢀreless-G Router for Mobꢀle Broadband  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ꢀꢀ  
Table of Contents  
Wꢀreless-G Router for Mobꢀle Broadband  
ꢀꢀꢀ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Product Overview  
Chapterꢀ1  
Side Panel  
Chapter 1:  
Product Overvꢀew  
Thank you for choosing the Linksys Wireless-G Router for  
Mobile Broadband. The Router lets you access the Internet  
through either your mobile broadband service (requires  
a mobile broadband data card or USB adapter, available  
separately), or your cable or DSL broadband service. This  
access can be shared via a wireless connection or through  
one of the Router’s four switched ports.  
USB Port Reserved for future use.  
Power (Green) The Power LED lights up and  
stays on while the Router is powered on.  
A variety of security features help to protect your data  
and your privacy while online. Security features include  
WPA2 (Wi-Fi Protected Access 2) security, a Stateful Packet  
Inspection (SPI) firewall, and NAT technology. Configuring  
the Router is easy using the Setup Wizard or provided  
browser-based utility.  
Ethernet 1-ꢁ (Green) These numbered LEDs,  
corresponding with the numbered ports on the  
Router’s back panel, serve two purposes. If the  
LED is continuously lit, the Router is successfully  
connected to a device through that port. It  
flashes to indicate network activity over that  
port.  
Top Panel  
Wꢀreless (Green) The Wireless LED lights up  
when the wireless feature is enabled. It flashes  
when the Router is actively sending or receiving  
data over the wireless network.  
If you have a mobile broadband data card, use the PC Card  
slot. If you have a mobile broadband USB adapter, use one  
of the USB ports.  
Modem Internet (Green) The Modem LED  
lightsupandstaysonwhenthereisaconnection  
made through the Modem port. It flashes to  
indicate network activity over the Modem port.  
NOTE: The Router supports a single mobile  
broadband device. Connect either a data card  
or a USB adapter—do not connect both at the  
same time.  
Mobꢀle Internet (Blue) The Mobile LED  
flashes as the Router connects to the mobile  
network. When the LED stops flashing and  
stays on, then the connection is active.  
If the LED flashes quickly, the Router is not  
connected to the mobile network. Before you  
press the Mobile Connect/Disconnect button,  
make sure the mobile broadband data card or  
USB adapter is already installed.  
Mobꢀle USB Ports If the Router will connect to  
a mobile broadband service, insert the mobile  
broadband USB adapter (available separately)  
into one of the USB ports. For more information,  
refer to the documentation of the mobile  
broadband USB adapter.  
Opposite Side Panel with Antenna  
Mobꢀle PC Card Slot If the Router will connect  
toamobilebroadbandservice, insertthemobile  
broadband data card (available separately) into  
this slot. After the data card is inserted, the eject  
button will pop up. To remove the data card,  
press the eject button.  
Mobꢀle Connect/Dꢀsconnect Button Press  
this button to connect to and disconnect from  
the mobile network. (You can also use the Basic  
Setup screen of the Router’s web-based utility.)  
Modem The Modem port is where you will  
connect your cable or DSL modem.  
Ethernet 1, 2, 3, ꢁ These Ethernet ports (1, 2, 3,  
4) connect the Router to wired computers and  
other Ethernet network devices.  
Wꢀreless-G Router for Mobꢀle Broadband  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Product Overview  
Chapterꢀ1  
Securꢀty Bracket The security bracket labeled  
Placement Positions  
There are three ways to physically install the Router. The  
first way is to place the Router horizontally on a surface.  
The second way is to stand the Router vertically on a  
surface. The third way is to mount the Router on a wall.  
“Resetclips onto the Router. It covers the Reset  
button and the security slot on the Router’s top  
panel. You can remove the security bracket to  
access the Reset button.  
Reset There are two ways to reset the Router’s  
factory defaults. Either press and hold the Reset  
buttonforapproximatelyfiveseconds,orrestore  
the defaults from the Administration > Factory  
Defaults screen of the Router’s web-based  
utility.  
Horizontal Placement  
The Router has four rubber feet on its bottom panel. Place  
the Router on a level surface near an electrical outlet.  
Power The Power port is where you will  
connect the power adapter.  
Front Panel  
Vertical Placement  
The Router has a stand on the panel opposite to the  
antenna. Rotate the stand 90 degrees, and place the  
Router on a level surface near an electrical outlet.  
Securꢀty Slot To protect the Router from theft,  
you can attach a lock to the Router using the  
security slot.  
Bottom Panel  
To place the Router in a vertical position, rotate the stand  
90 degrees.  
Wꢀreless-G Router for Mobꢀle Broadband  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Product Overview  
Chapterꢀ1  
Wall-Mounting Placement  
The Router has four wall-mount slots on its back panel.  
The distance between two adjacent slots is 68 mm  
(2.68 inches).  
Two screws are needed to mount the Router.  
Suggested Mountꢀng Hardware  
4-5 mm  
1-1.5 mm  
Note: Mounting hardware illustrations are not  
true to scale.  
NOTE: Linksys is not responsible for damages  
incurred by insecure wall-mounting hardware.  
Follow these instructions:  
1. Determine where you want to mount the Router. Make  
sure that the wall you use is smooth, flat, dry, and  
sturdy. Also make sure the location is within reach of  
an electrical outlet.  
2. Drill two holes into the wall. Make sure the holes are  
68 mm (2.68 inches) apart.  
3. Insert a screw into each hole and leave 3 mm  
(0.12 inches) of its head exposed.  
4. Maneuver the Router so two of the wall-mount slots  
line up with the two screws.  
5. Place the wall-mount slots over the screws and slide  
the Router down until the screws fit snugly into the  
wall-mount slots.  
68 mm  
Print this page at 100% size. Cut along  
the dotted line, and place on the wall  
to drill precise spacing.  
Wall Mounting Template  
Wꢀreless-G Router for Mobꢀle Broadband  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless Security Checklist  
Chapterꢀ2  
Chapter 2:  
ꢁ. Enable encryptꢀon  
Wꢀreless Securꢀty Checklꢀst  
Encryption protects data transmitted over a wireless  
network. Wi-Fi Protected Access (WPA/WPA2) and Wired  
Equivalency Privacy (WEP) offer different levels of security  
for wireless communication.  
Wireless networks are convenient and easy to install, so  
homes with high-speed Internet access are adopting them  
at a rapid pace. Because wireless networking operates by  
sending information over radio waves, it can be more  
vulnerable to intruders than a traditional wired network.  
Like signals from your cellular or cordless phones, signals  
from your wireless network can also be intercepted. Since  
you cannot physically prevent someone from connecting  
to your wireless network, you need to take some additional  
steps to keep your network secure.  
A network encrypted with WPA/WPA2 is more secure  
than a network encrypted with WEP, because WPA/WPA2  
uses dynamic key encryption. To protect the information  
as it passes over the airwaves, you should enable the  
highest level of encryption supported by your network  
equipment.  
WEP is an older encryption standard and may be the  
only option available on some older devices that do not  
support WPA.  
1. Change the default wꢀreless  
network name or SSID  
General Network Security Guidelines  
Wireless network security is useless if the underlying  
Wireless devices have a default wireless network name  
or Service Set Identifier (SSID) set by the factory. This  
is the name of your wireless network, and can be up  
to 32 characters in length. Linksys wireless products  
use lꢀnksys as the default wireless network name. You  
should change the wireless network name to something  
unique to distinguish your wireless network from other  
wireless networks that may exist around you, but do not  
use personal information (such as your Social Security  
number) because this information may be available for  
anyone to see when browsing for wireless networks.  
network is not secure.  
Password protect all computers on the network and  
individually password protect sensitive files.  
Change passwords on a regular basis.  
Install anti-virus software and personal firewall  
software.  
Disable file sharing (peer-to-peer). Some applications  
may open file sharing without your consent and/or  
knowledge.  
2. Change the default password  
Additional Security Tips  
For wireless products such as access points, routers, and  
gateways, you will be asked for a password when you  
want to change their settings.These devices have a default  
password set by the factory. The Linksys default password  
is admꢀn. Hackers know these defaults and may try to  
use them to access your wireless device and change your  
network settings. To thwart any unauthorized changes,  
customize the device’s password so it will be hard to  
guess.  
Keep wireless routers, access points, or gateways away  
from exterior walls and windows.  
Turn wireless routers, access points, or gateways  
off when they are not being used (at night, during  
vacations).  
Usestrongpassphrasesthatareatleasteightcharacters  
in length. Combine letters and numbers to avoid using  
standard words that can be found in the dictionary.  
WEB: For more information on wireless  
3. Enable MAC address fꢀlterꢀng  
Linksys routers and gateways give you the ability to  
enable Media Access Control (MAC) address filtering. The  
MAC address is a unique series of numbers and letters  
assigned to every networking device. With MAC address  
filtering enabled, wireless network access is provided  
solely for wireless devices with specific MAC addresses.  
For example, you can specify the MAC address of each  
computer in your home so that only those computers can  
access your wireless network.  
Wꢀreless-G Router for Mobꢀle Broadband  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Advanced Configuration  
Chapterꢀ3  
Chapter 3:  
Advanced Confꢀguratꢀon  
After setting up the Router with the Setup Wizard (located  
on the CD-ROM), the Router will be ready for use. However,  
if you’d like to change its advanced settings, use the  
Router’s web-based utility. This chapter describes each  
web page of the utility and each page’s key functions. You  
can access the utility via a web browser on a computer  
connected to the Router.  
The web-based utility has these main tabs: Setup,  
Wireless, Security, Access Restrictions, Applications &  
Gaming, Administration, and Status. Additional tabs will  
be available after you click one of the main tabs.  
NOTE: When first installing the Router, you  
should use the Setup Wizard on the Setup  
CD-ROM. If you want to configure advanced  
settings, use this chapter to learn about the  
web-based utility.  
How to Access the Web-Based Utility  
Toaccesstheweb-basedutility, launchthewebbrowseron  
your computer, and enter the Router’s default IP address,  
192.1ꢃꢅ.1.1, in the Address field. Then, press Enter.  
Setup > Basic Setup  
Internet Setup  
A login screen will appear. (Non-Windows XP users will see  
a similar screen.) Enter admꢀn (the default) in both the User  
name and Password fields. (You can set a new password on  
the Administration tab’s Management screen.) Click OK to  
continue.  
The Internet Setup section configures the Router to your  
Internet connection. Most of this information can be  
obtained through your ISP.  
Internet Connection Type  
Select the type of Internet connection your ISP provides  
from the drop-down menu. These are the available types:  
Automatic Configuration - DHCP  
Static IP  
PPPoE  
PPTP  
L2TP  
Telstra Cable  
Login Screen  
Automatic Configuration - DHCP  
Setup > Basic Setup  
The first screen that appears is the Basic Setup screen. This  
By default, the Router’s Internet Connection Type is set  
to Automatꢀc Confꢀguratꢀon - DHCP, which should be  
kept only if your ISP supports DHCP or you are connecting  
through a dynamic IP address. (This option usually applies  
to cable connections.)  
allows you to change the Router’s general settings.  
Wꢀreless-G Router for Mobꢀle Broadband  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Advanced Configuration  
Chapterꢀ3  
select Connect on Demand. In the Max Idle Time field,  
enter the number of minutes you want to have elapsed  
before your Internet connection terminates. The default  
Max Idle Time is 1ꢂ minutes.  
Internet Connection Type > Automatic Configuration - DHCP  
Static IP  
Keep Alꢀve: Redꢀal Perꢀod If you select this option, the  
Router will periodically check your Internet connection. If  
you are disconnected, then the Router will automatically  
re-establish your connection. To use this option, select  
Keep Alꢀve. In the Redial Period field, specify how often  
you want the Router to check the Internet connection. The  
default Redial Period is 30 seconds.  
If you are required to use a permanent IP address to  
connect to the Internet, select Statꢀc IP.  
PPTP  
Point-to-Point Tunneling Protocol (PPTP) is a service that  
applies to connections in Europe only.  
Internet Connection Type > Static IP  
Internet IP Address This is the Router’s IP address, when  
seen from the Internet. Your ISP will provide you with the  
IP address you need to specify here.  
Subnet Mask This is the Router’s Subnet Mask, as seen  
by users on the Internet (including your ISP). Your ISP will  
provide you with the Subnet Mask.  
Default Gateway Your ISP will provide you with the IP  
address of the ISP server.  
Internet Connection Type > PPTP  
Server IP Address This is the Router’s IP address, as seen  
from the Internet. Your ISP will provide you with the IP  
address you need to specify here.  
DNS 1-3 Your ISP will provide you with at least one DNS  
(Domain Name System) server IP address.  
PPPoE  
Subnet Mask This is the Router’s Subnet Mask, as seen  
by users on the Internet (including your ISP). Your ISP will  
provide you with the Subnet Mask.  
Some DSL-based ISPs use PPPoE (Point-to-Point Protocol  
over Ethernet) to establish Internet connections. If you are  
connected to the Internet through a DSL line, check with  
your ISP to see if they use PPPoE. If they do, you will have  
to enable PPPoE.  
Default Gateway Your ISP will provide you with the IP  
address of the ISP server.  
Username and Password Enter the Username and  
Password provided by your ISP.  
Connect on Demand: Max Idle Tꢀme You can configure  
the Router to cut the Internet connection after it has been  
inactive for a specified period of time (Max Idle Time). If  
your Internet connection has been terminated due to  
inactivity, Connect on Demand enables the Router to  
automatically re-establish your connection as soon as you  
attempt to access the Internet again. To use this option,  
select Connect on Demand. In the Max Idle Time field,  
enter the number of minutes you want to have elapsed  
before your Internet connection terminates. The default  
Max Idle Time is 1ꢂ minutes.  
Internet Connection Type > PPPoE  
Username and Password Enter the Username and  
Password provided by your ISP.  
Servꢀce Name If provided by your ISP, enter the Service  
Name.  
Keep Alꢀve: Redꢀal Perꢀod If you select this option, the  
Router will periodically check your Internet connection. If  
you are disconnected, then the Router will automatically  
re-establish your connection. To use this option, select  
Keep Alꢀve. In the Redial Period field, specify how often  
you want the Router to check the Internet connection. The  
default Redial Period is 30 seconds.  
Connect on Demand: Max Idle Tꢀme You can configure  
the Router to cut the Internet connection after it has been  
inactive for a specified period of time (Max Idle Time). If  
your Internet connection has been terminated due to  
inactivity, Connect on Demand enables the Router to  
automatically re-establish your connection as soon as you  
attempt to access the Internet again. To use this option,  
Wꢀreless-G Router for Mobꢀle Broadband  
9
Download from Www.Somanuals.com. All Manuals Search And Download.  
Advanced Configuration  
Chapterꢀ3  
packet size that is transmitted. To have the Router select  
the best MTU for your Internet connection, keep the  
default, Auto.  
L2TP  
L2TP is a service that applies to connections in Israel only.  
Sꢀze When Manual is selected in the MTU field, this option  
is enabled. Leave this value in the 1200 to 1500 range. The  
default size depends on the Internet Connection Type:  
DHCP, Static IP, or Telstra: 1ꢂ00  
PPPoE: 1ꢁ92  
Internet Connection Type > L2TP  
PPTP or L2TP: 1ꢁꢃ0  
Server IP Address This is the IP address of the L2TP  
Server. Your ISP will provide you with the IP address you  
need to specify here.  
Network Setup  
The Network Setup section changes the settings on the  
network connected to the Router’s Ethernet ports.Wireless  
setup is performed through the Wireless tab.  
Username and Password Enter the Username and  
Password provided by your ISP.  
Connect on Demand: Max Idle Tꢀme You can configure  
the Router to cut the Internet connection after it has been  
inactive for a specified period of time (Max Idle Time). If  
your Internet connection has been terminated due to  
inactivity, Connect on Demand enables the Router to  
automatically re-establish your connection as soon as you  
attempt to access the Internet again. To use this option,  
select Connect on Demand. In the Max Idle Time field,  
enter the number of minutes you want to have elapsed  
before your Internet connection terminates. The default  
Max Idle Time is 1ꢂ minutes.  
Router IP  
This presents both the Router’s IP Address and Subnet  
Mask as seen by your network.  
Router IP  
DHCP Server Settings  
This setting determines how the clients (network devices)  
use DNS/WINS.  
Keep Alꢀve: Redꢀal Perꢀod If you select this option, the  
Router will periodically check your Internet connection. If  
you are disconnected, then the Router will automatically  
re-establish your connection. To use this option, select  
Keep Alꢀve. In the Redial Period field, specify how often  
you want the Router to check the Internet connection. The  
default Redial Period is 30 seconds.  
Mode1-Fꢀxedconfꢀguratꢀon(Default) Selectthisoption  
if you want the Router to advertise itself as the DNS server  
to use and handle upstream changes automatically.  
Mode2-NetworkSupplꢀed Selectthisoptionifyouwant  
the Router to pass through the DNS server values (learned  
from the Modem port or mobile network) to the client,  
depending on how the Router is currently connected.  
Optional Settings  
Some of these settings may be required by your ISP. Verify  
with your ISP before making any changes.  
NOTE: If the upstream DNS servers change  
between connections, the clients may become  
unable to resolve addresses because they  
have valid DHCP leases that use the old server  
values.  
Mode 3 - Manual confꢀguratꢀon Select this option if you  
want to set arbitrary DNS/WINS values for the clients to  
use. These values are not validated by the Router.  
Optional Settings  
Host Name and Domaꢀn Name These fields allow you to  
supply a host and domain name for the Router. Some ISPs,  
usually cable ISPs, require these names as identification.  
You may have to check with your ISP to see if your  
broadband Internet service has been configured with a  
host and domain name. In most cases, leaving these fields  
blank will work.  
DHCP Server Settings  
MTU MTU is the Maximum Transmission Unit. It specifies  
the largest packet size permitted for Internet transmission.  
Select Manual if you want to manually enter the largest  
Wꢀreless-G Router for Mobꢀle Broadband  
10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Advanced Configuration  
Chapterꢀ3  
the Assign IP Address field. Enter its MAC address in the  
To This MAC Address field. Then click Add.  
Network Address Server Settings (DHCP)  
The settings allow you to configure the Router’s Dynamic  
Host Configuration Protocol (DHCP) server function. The  
Router can be used as a DHCP server for your network. A  
DHCP server automatically assigns an IP address to each  
computer on your network. If you choose to enable the  
Router’s DHCP server option, make sure there is no other  
DHCP server on your network.  
Clients Already Reserved  
A list of DHCP clients and their fixed local IP addresses  
will be displayed at the bottom of the screen. If you  
want to remove a client from this list, click Remove.  
Click Save Settꢀngs to apply your changes, or click  
Cancel Changes to cancel your changes. To view the  
most up-to-date information, click Refresh. To exit this  
screen, click Close.  
Start IP Address Enter a value for the DHCP server to  
start with when issuing IP addresses. Because the Router’s  
default IP address is 192.168.1.1, the Start IP Address must  
be 192.168.1.2 or greater, but smaller than 192.168.1.253.  
The default is 192.1ꢃꢅ.1.100  
.
Maxꢀmum Number of Users Enter the maximum  
number of PCs that you want the DHCP server to assign  
IP addresses to. This number cannot be greater than 253.  
The default is ꢂ0.  
Network Address Server Settings (DHCP)  
DHCP Server DHCP is enabled by factory default. If you  
already have a DHCP server on your network, or you don’t  
want a DHCP server, then select Dꢀsabled (no other DHCP  
features will be available).  
IP Address Range Displayed here is the range of available  
IP addresses.  
DHCP Reservatꢀon Click this button if you want to assign  
a fixed local IP address to a MAC address.  
Clꢀent Lease Tꢀme The Client Lease Time is the amount  
of time a network user will be allowed connection to the  
Router with their current dynamic IP address. Enter the  
amount of time, in minutes, that the user will be “leased”  
this dynamic IP address. After the time is up, the user will  
be automatically assigned a new dynamic IP address. The  
default is 0 minutes, which means one day.  
DHCP Reservation  
You will see a list of DHCP clients with the following  
information: Client Name, Interface, IP Address, and  
MAC Address.  
Statꢀc DNS 1-3 These settings are available if you  
selected Mode 3 - Manual configuration for the DHCP  
Server Setting. The Domain Name System (DNS) is how the  
Internet translates domain or website names into Internet  
addresses or URLs. Your ISP will provide you with at least  
one DNS server IP address. If you wish to use another, enter  
that IP address in one of these fields. You can enter up to  
three DNS server IP addresses here. The Router will use  
these for quicker access to functioning DNS servers  
.
WINS 0-1 These settings are available if you selected  
Mode 3 - Manual configuration for the DHCP Server  
Setting. The Windows Internet Naming Service (WINS)  
manages each PC’s interaction with the Internet. If you  
use a WINS server, enter that server’s IP address. You can  
enter up to two WINS server IP addresses here. Otherwise,  
leave these fields blank.  
DHCP Reservation  
Time Setting  
Select Clꢀents from DHCP Table Click the Select  
check box to reserve a client’s IP address. Then click  
Add Clꢀents.  
Tꢀme Zone Select the time zone in which your network  
functions from this drop-down menu. (You can even  
automatically adjust for daylight saving time.)  
Manually Addꢀng Clꢀent To manually assign an IP  
address, enter the client’s name in the Enter Client  
Name field. Enter the IP address you want it to have in  
Wꢀreless-G Router for Mobꢀle Broadband  
Download from Www.Somanuals.com. All Manuals Search And Download.  
11  
Advanced Configuration  
Chapterꢀ3  
terminated due to inactivity, Connect on Demand enables  
the Router to automatically re-establish your connection  
as soon as you attempt to access the Internet again. To  
use this option, select Connect on Demand. In the Max  
Idle Time field, enter the number of minutes you want to  
have elapsed before your mobile network connection  
terminates. The default Max Idle Time is ꢃ0 minutes.  
Time Setting  
Click Save Settꢀngs to apply your changes, or click Cancel  
Changes to cancel your changes.  
Keep Alꢀve: Redꢀal Perꢀod If you select this option,  
the Router will periodically check your mobile network  
connection. If you are disconnected, then the Router will  
automatically re-establish your connection. To use this  
option, select Keep Alꢀve. In the Redial Period field, specify  
how often you want the Router to check the mobile network  
connection. The default Redial Period is 30 seconds.  
Setup > Mobile Network  
Configure mobile network settings and view status  
information for your mobile broadband service and device  
(data card or USB adapter). Some of these settings will  
be automatically configured by the Router and, in most  
cases, should not be changed unless you are instructed  
to do so.  
Modem Backup valꢀdatꢀon sꢀte To use the default  
Network Time Protocol (NTP) server, keep the default,  
NTP. To use a different time server, select Custom, and  
enter its IP address.  
Mobile Network Status  
Network Name The name of the mobile network the  
Router uses is displayed.  
Servꢀce Type The type of mobile service is displayed.  
Sꢀgnal Strength The strength of the mobile broadband  
signal that the Router receives is displayed.  
Connectꢀon Tꢀme The length of time the Router has  
been connected to the mobile network since your last  
connection is displayed.  
Current Sessꢀon Usage The amount of data that has  
been sent to and received from the mobile network since  
your last connection is displayed.  
Data Card Status  
Card Manufacturer The manufacturer of your mobile  
Setup > Mobile Network  
broadband device is displayed.  
Mobile Network Connection Mode  
Card Model The model number of your mobile  
broadband device is displayed.  
Auto Connect If you want the Router to automatically  
connect to the default mobile network when it powers  
on, keep the default, Auto. To manually connect to a  
mobile network, select Manual. You can use the Mobile  
Connect/Disconnect button on the Router to connect and  
disconnect from the mobile network.  
Card Fꢀrmware The firmware version of your mobile  
broadband device is displayed.  
Phone Number The phone number of your mobile  
broadband account is displayed.  
ESN The Electronic Serial Number (ESN) of your mobile  
broadband device is displayed. The ESN is a unique  
identification number given to each device by its  
manufacturer.  
Modem Backup When the cable/DSL modem is the  
primary connection, the Router can use the mobile  
network connection as a backup if the primary connection  
fails. To use this feature, select Enable. Otherwise, keep  
the default, Dꢀsable.  
PRL Versꢀon Your mobile broadband device contains a  
PRL (Preferred Roaming List) that was programmed by the  
service provider. The version of the PRL specifies the radio  
frequency channels that the device is permitted to use,  
and it also instructs your device which cell towers to look  
for when establishing a connection.  
Connect on Demand: Max Idle Tꢀme You can configure  
the Router to cut the mobile network connection after  
it has been inactive for a specified period of time (Max  
Idle Time). If your mobile network connection has been  
Wꢀreless-G Router for Mobꢀle Broadband  
12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Advanced Configuration  
Chapterꢀ3  
Maꢀl Exchange (Optꢀonal) Enter the address of your mail  
exchange server, so e-mails to your DynDNS address go to  
your mail server.  
Actꢀve Vꢀsꢀon User Name The user name of your Active  
Vision account is displayed after the account has been  
provisioned by Sprint.  
Backup MX This feature allows the mail exchange server  
to be a backup. To disable this feature, keep the default,  
Dꢀsabled. To enable the feature, select Enabled. If you  
are not sure which setting to select, keep the default,  
Dꢀsabled.  
Click Refresh to update the on-screen information.  
Click Save Settꢀngs to apply your changes, or click Cancel  
Changes to cancel your changes.  
Setup > DDNS  
Wꢀldcard This setting enables or disables wildcards  
for your host. For example, if your DDNS address is  
myplace.dyndns.org and you enable wildcards, then  
x.myplace.dyndns.org will work as well (x is the wildcard).  
To disable wildcards, keep the default, Dꢀsabled.To enable  
wildcards, select Enabled. If you are not sure which setting  
to select, keep the default, Dꢀsabled.  
The Router offers a Dynamic Domain Name System (DDNS)  
feature. DDNS lets you assign a fixed host and domain  
name to a dynamic Internet IP address. It is useful when  
you are hosting your own website, FTP server, or other  
server behind the Router.  
Before you can use this feature, you need to sign  
up for DDNS service with a DDNS service provider,  
use this feature, keep the default, Dꢀsabled.  
Internet IP Address The Router’s Internet IP address is  
displayed here. Because it is dynamic, it will change.  
Status The status of the DDNS service connection is  
displayed here.  
DDNS  
Update To manually trigger an update, click this button.  
DDNS Service  
Click Save Settꢀngs to apply your changes, or click Cancel  
Changes to cancel your changes.  
If your DDNS service is provided by DynDNS.org, then  
select DynDNS.org from the drop-down menu. If your  
DDNS service is provided by TZO, then select TZO.com.  
The features available on the DDNS screen will vary,  
depending on which DDNS service provider you use.  
TZO.com  
DynDNS.org  
Setup > DDNS > TZO  
E-maꢀl Address, TZO Key, and Domaꢀn Name Enter the  
settings of the account you set up with TZO.  
Internet IP Address The Router’s Internet IP address is  
displayed here. Because it is dynamic, it will change.  
Setup > DDNS > DynDNS  
Status The status of the DDNS service connection is  
displayed here.  
Username Enter the Username for your DDNS account.  
Update To manually trigger an update, click this button.  
Password Enter the Password for your DDNS account.  
Click Save Settꢀngs to apply your changes, or click Cancel  
Changes to cancel your changes.  
Host Name This is the DDNS URL assigned by the DDNS  
service.  
System Select the DynDNS service you use: Dynamꢀc,  
Statꢀc, or Custom. The default is Dynamꢀc.  
Setup > MAC Address Clone  
A MAC address is a 12-digit code assigned to a unique  
piece of hardware for identification. Some ISPs will require  
Wꢀreless-G Router for Mobꢀle Broadband  
13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Advanced Configuration  
Chapterꢀ3  
you to register a MAC address in order to access the  
Internet. If you do not wish to re-register the MAC address  
with your ISP, you may assign the MAC address you have  
currently registered with your ISP to the Router with the  
MAC Address Clone feature.  
Advanced Routing  
NAT  
Enabled/Dꢀsabled If this Router is hosting your network’s  
connection to the Internet, keep the default, Enabled. If  
another router exists on your network, select Dꢀsabled.  
When the NAT setting is disabled, dynamic routing will be  
enabled.  
Dynamic Routing (RIP)  
Enabled/Dꢀsabled This feature enables the Router to  
automatically adjust to physical changes in the network’s  
layoutandexchangeroutingtableswiththeotherrouter(s).  
The Router determines the network packets’ route based  
on the fewest number of hops between the source and  
the destination. When the NAT setting is enabled, the  
Dynamic Routing feature is automatically disabled. When  
the NAT setting is disabled, this feature is available. Select  
Enabled to use the Dynamic Routing feature.  
Setup > MAC Address Clone  
MAC Address Clone  
Enabled/Dꢀsabled To have the MAC Address cloned,  
select Enabled.  
Static Routing  
MAC Address Enter the MAC Address registered with  
A static route is a pre-determined pathway that network  
information must travel to reach a specific host or network.  
Enter the information described below to set up a new  
static route.  
your ISP here.  
Clone My PCs MAC Click this button to clone the MAC  
address of the computer you are using.  
Click Save Settꢀngs to apply your changes, or click Cancel  
Changes to cancel your changes.  
Route Entrꢀes To set up a static route between the Router  
and another network, select a number from the drop-  
down list. Click Delete Thꢀs Entry to delete a static route.  
Setup > Advanced Routing  
Enter Route Name Enter a name for the Route here,  
using a maximum of 25 alphanumeric characters.  
This screen is used to set up the Router’s advanced  
functions. Operating Mode allows you to select the  
type(s) of advanced functions you use. Dynamic Routing  
automatically adjusts how packets travel on your network.  
Static Routing sets up a fixed route to another network  
destination.  
Destꢀnatꢀon LAN IP The Destination LAN IP is the address  
of the remote network or host to which you want to assign  
a static route.  
Subnet Mask The Subnet Mask determines which  
portion of a Destination LAN IP address is the network  
portion, and which portion is the host portion.  
Gateway This is the IP address of the gateway device that  
allows for contact between the Router and the remote  
network or host.  
Interface This interface tells you whether the Destination  
IP address is on the LAN & Wꢀreless (Ethernet and wireless  
networks) or the WAN (Internet).  
Click Show Routꢀng Table to view the static routes you  
have already set up.  
Setup > Advanced Routing  
Wꢀreless-G Router for Mobꢀle Broadband  
1ꢁ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Advanced Configuration  
Chapterꢀ3  
SSID Broadcast When wireless clients survey the local  
area for wireless networks to associate with, they will  
detect the SSID broadcast by the Router. To broadcast the  
Router’sSSID, keepthedefault, Enabled. Ifyoudonotwant  
to broadcast the Router’s SSID, then select Dꢀsabled.  
Click Save Settꢀngs to apply your changes, or click Cancel  
Changes to cancel your changes.  
Advanced Routing > Routing Table  
Wireless > Wireless Security  
The Wireless Security screen configures the security of  
your wireless network. There are six wireless security  
mode options supported by the Router: WPA Personal,  
WPA2 Personal, WPA Enterprise, WPA2 Enterprise, RADIUS,  
and WEP. (WPA stands for Wi-Fi Protected Setup, which  
is a security method stronger than WEP encryption. WEP  
stands for Wired Equivalent Privacy, while RADIUS stands  
for Remote Authentication Dial-In User Service.) These  
six are briefly discussed here. For detailed instructions  
on configuring wireless security for the Router, refer to  
“Chapter 2: Wireless Security.”  
Routing Table  
For each route, the Destination LAN IP address, Subnet  
Mask, Gateway, and Interface are displayed. Click  
Refresh to update the information. Click Close to exit  
this screen.  
Click Save Settꢀngs to apply your changes, or click Cancel  
Changes to cancel your changes.  
Wireless > Basic Wireless Settings  
The basic settings for wireless networking are set on this  
screen.  
Wireless Security  
Security Mode  
Select the security method for your wireless network. If  
you do not want to use wireless security, keep the default,  
Dꢀsabled.  
WPA Personal  
NOTE: If you are using WPA, always remember  
that each device in your wireless network MUST  
use the same WPA method and passphrase, or  
else the network will not function properly.  
Wireless > Basic Wireless Settings  
Basic Wireless Settings  
Network Mode From this drop-down menu, you can  
select the wireless standards running on your network.  
If you have Wireless-G and Wireless-B devices in your  
network, keep the default, Mꢀxed. If you have only  
Wireless-G devices, select G-Only. If you have only  
Wireless-B devices, select B-Only. If you do not have any  
wireless devices in your network, select Dꢀsabled.  
Network Name (SSID) The SSID is the network name  
shared among all points in a wireless network. The  
SSID must be identical for all devices in the wireless  
network. It is case-sensitive and must not exceed  
32 characters (use any of the characters on the keyboard).  
Make sure this setting is the same for all points in your  
wireless network. For added security, you should change  
the default SSID (lꢀnksys) to a unique name.  
Security Mode > WPA Personal  
Encryptꢀon WPA supports two encryption methods, TKIP  
and AES, with dynamic encryption keys. Select the type of  
algorithm, TKIP or AES. The default is TKIP.  
Passphrase Enter a Passphrase of 8-63 characters.  
Standard Channel Select the channel you want to use  
for wireless networking.  
Wꢀreless-G Router for Mobꢀle Broadband  
1ꢂ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Advanced Configuration  
Chapterꢀ3  
Key Renewal Enter a Key Renewal period, which instructs  
the Router how often it should change the encryption  
keys. The default is 3ꢃ00 seconds.  
Shared Secret Enter the key shared between the Router  
and the server.  
Key Renewal Enter a Key Renewal period, which instructs  
the Router how often it should change the encryption  
keys. The default Key Renewal period is 3ꢃ00 seconds.  
WPA2 Personal  
WPA2 Enterprise  
This option features WPA2 used in coordination with a  
RADIUS server. (This should only be used when a RADIUS  
server is connected to the Router.)  
Security Mode > WPA2 Personal  
Encryptꢀon WPA2 supports two encryption methods,  
TKIP and AES, with dynamic encryption keys. Select the  
type of algorithm, AES or AES or TKIP. The default is AES  
or TKIP.  
Passphrase Enter a Passphrase of 8-63 characters.  
Security Mode > WPA2 Enterprise  
Key Renewal Enter a Key Renewal period, which instructs  
the Router how often it should change the encryption  
keys. The default is 3ꢃ00 seconds.  
Encryptꢀon WPA2 supports two encryption methods,  
TKIP and AES, with dynamic encryption keys. Select the  
type of algorithm, AES or AES or TKIP. The default is AES  
or TKIP.  
WPA Enterprise  
This option features WPA used in coordination with a  
RADIUS server. (This should only be used when a RADIUS  
server is connected to the Router.)  
RADIUS Server Enter the IP address of the RADIUS  
server.  
RADIUS Port Enter the port number of the RADIUS  
server. The default is 1ꢅ12.  
Shared Secret Enter the key shared between the Router  
and the server.  
Key Renewal Enter a Key Renewal period, which instructs  
the Router how often it should change the encryption  
keys. The default is 3ꢃ00 seconds.  
RADIUS  
This option features WEP used in coordination with a  
RADIUS server. (This should only be used when a RADIUS  
server is connected to the Router.)  
Security Mode > WPA Enterprise  
Encryptꢀon WPA supports two encryption methods, TKIP  
and AES, with dynamic encryption keys. Select the type of  
algorithm, TKIP or AES. The default is TKIP.  
RADIUS Server Enter the IP address of the RADIUS  
server.  
RADIUS Port Enter the port number of the RADIUS  
server. The default is 1ꢅ12.  
Wꢀreless-G Router for Mobꢀle Broadband  
1ꢃ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Advanced Configuration  
Chapterꢀ3  
Security Mode > WEP  
Security Mode > RADIUS  
Encryptꢀon Select  
a
level of WEP encryption,  
ꢁ0/ꢃꢁ bꢀts (10 hex dꢀgꢀts) or 10ꢁ/12ꢅ bꢀts (2ꢃ hex dꢀgꢀts).  
The default is ꢁ0/ꢃꢁ bꢀts (10 hex dꢀgꢀts).  
IMPORTANT: If you are using WEP encryption,  
always remember that each device in your  
wireless network MUST use the same WEP  
encryption method and encryption key, or else  
your wireless network will not function properly.  
Passphrase Enter a Passphrase to automatically generate  
WEP keys. Then click Generate.  
Key 1-ꢁ If you did not enter a Passphrase, enter the WEP  
key(s) manually.  
RADIUS Server Enter the IP address of the RADIUS  
server.  
TX Key Select which TX (Transmit) Key to use. The default  
is 1.  
RADIUS Port Enter the port number of the RADIUS  
server. The default is 1ꢅ12.  
Click Save Settꢀngs to apply your changes, or click Cancel  
Changes to cancel your changes.  
Shared Secret Enter the key shared between the Router  
and the server.  
Wireless > Wireless MAC Filter  
Wireless access can be filtered by using the MAC addresses of  
Encryptꢀon Select  
ꢁ0/ꢃꢁ bꢀts (10 hex dꢀgꢀts) or 10ꢁ/12ꢅ bꢀts (2ꢃ hex dꢀgꢀts).  
The default is ꢁ0/ꢃꢁ bꢀts (10 hex dꢀgꢀts).  
a
level of WEP encryption,  
the wireless devices transmitting within your network’s radius.  
Passphrase Enter a Passphrase to automatically generate  
WEP keys. Then click Generate.  
Key 1-ꢁ If you did not enter a Passphrase, enter the WEP  
key(s) manually.  
TX Key Select which TX (Transmit) Key to use. The default  
is 1.  
WEP  
WEP is a basic encryption method, which is not as secure  
as WPA.  
Wꢀreless-G Router for Mobꢀle Broadband  
1ꢄ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Advanced Configuration  
Chapterꢀ3  
Wireless Client List  
This screen shows computers and other devices on  
the wireless network. The list can be sorted by Client  
Name, Interface, IP Address, MAC Address, and Status.  
Select Save to MAC Address Fꢀlter Lꢀst for any device  
you want to add to the MAC Address Filter List. Then  
click Add.  
To retrieve the most up-to-date information, click  
Refresh. To exit this screen and return to the Wireless  
MAC Filter screen, click Close.  
MAC 01-ꢂ0 Enter the MAC addresses of the devices  
whose wireless access you want to block or allow.  
Click Save Settꢀngs to apply your changes, or click Cancel  
Changes to cancel your changes.  
Wireless > Advanced Wireless Settings  
This Advanced Wireless Settings screen is used to set up  
the Router’s advanced wireless functions. These settings  
should only be adjusted by an expert administrator as  
incorrect settings can reduce wireless performance.  
Wireless > Wireless MAC Filter  
Wireless MAC Filter  
Enabled/Dꢀsabled To filter wireless users by MAC Address,  
either permitting or blocking access, select Enabled. If you  
do not wish to filter users by MAC Address, keep the default,  
Dꢀsabled  
.
Access Restriction  
Prevent Select this to block wireless access by MAC  
Address. This button is selected by default.  
Permꢀt Select this to allow wireless access by MAC  
Address. This button is not selected by default.  
Wireless > Advanced Wireless Settings  
MAC Address Filter List  
Wꢀreless Clꢀent Lꢀst Click this to open the Wireless Client  
List screen.  
Advanced Wireless  
AP Isolatꢀon This isolates all wireless clients and wireless  
devices on your network from each other. Wireless devices  
will be able to communicate with the Router but not  
with each other. To use this function, select Enabled. AP  
Isolation is disabled by default.  
Frame Burst Enabling this option should provide your  
network with greater performance, depending on the  
manufacturer of your wireless products. To use this option,  
keep the default, Enabled. Otherwise, select Dꢀsabled.  
Authentꢀcatꢀon Type The default is set to Auto, which  
allows either Open System or Shared Key authentication  
to be used. With Open System authentication, the sender  
and the recipient do NOT use aWEP key for authentication.  
With Shared Key authentication, the sender and recipient  
Wireless Client List  
Wꢀreless-G Router for Mobꢀle Broadband  
1ꢅ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Advanced Configuration  
Chapterꢀ3  
use a WEP key for authentication. Select Shared Key to  
only use Shared Key authentication.  
RTS Threshold Should you encounter inconsistent data  
flow, only minor reduction of the default value, 23ꢁꢄ, is  
recommended. If a network packet is smaller than the  
preset RTS threshold size, the RTS/CTS mechanism will  
not be enabled. The Router sends Request to Send (RTS)  
frames to a particular receiving station and negotiates  
the sending of a data frame. After receiving an RTS, the  
wireless station responds with a Clear to Send (CTS) frame  
to acknowledge the right to begin transmission. The RTS  
Threshold value should remain at its default value of  
23ꢁꢄ.  
Basꢀc Rate The Basic Rate setting is not actually one rate  
of transmission but a series of rates at which the Router  
can transmit. The Router will advertise its Basic Rate to  
the other wireless devices in your network, so they know  
which rates will be used. The Router will also advertise that  
it will automatically select the best rate for transmission.  
The default is Default, when the Router can transmit at  
all standard wireless rates (1-2Mbps, 5.5Mbps, 11Mbps,  
18Mbps, and 24Mbps). Other options are 1-2Mbps, for  
use with older wireless technology, and All, when the  
Router can transmit at all wireless rates. The Basic Rate  
is not the actual rate of data transmission. If you want to  
specify the Router’s rate of data transmission, configure  
the Transmission Rate setting.  
Click Save Settꢀngs to apply your changes, or click Cancel  
Changes to cancel your changes.  
Security > Firewall  
The Firewall screen is used to configure a firewall that can  
filter out various types of unwanted traffic on the Router’s  
local network.  
Transmꢀssꢀon Rate The rate of data transmission should  
be set depending on the speed of your wireless network.  
You can select from a range of transmission speeds, or you  
can select Auto to have the Router automatically use the  
fastest possible data rate and enable the Auto-Fallback  
feature. Auto-Fallback will negotiate the best possible  
connection speed between the Router and a wireless  
client. The default is Auto.  
CTS Protectꢀon Mode The Router will automatically  
use CTS (Clear-To-Send) Protection Mode when your  
Wireless-N and Wireless-G products are experiencing  
severe problems and are not able to transmit to the  
Router in an environment with heavy 802.11b traffic. This  
function boosts the Router’s ability to catch all Wireless-  
N and Wireless-G transmissions but will severely decrease  
performance. The default is Auto.  
Security > Firewall  
Beacon Interval Enter a value between 1 and 65,535  
milliseconds. The Beacon Interval value indicates the  
frequency interval of the beacon. A beacon is a packet  
broadcast by the Router to synchronize the wireless  
network. The default is 100.  
Firewall  
SPI Fꢀrewall Protectꢀon To use firewall protection, keep  
the default, Enabled. To turn off firewall protection, select  
Dꢀsabled.  
DTIM Interval This value, between 1 and 255, indicates  
the interval of the Delivery Traffic Indication Message  
(DTIM). A DTIM field is a countdown field informing  
clients of the next window for listening to broadcast  
and multicast messages. When the Router has buffered  
broadcast or multicast messages for associated clients, it  
sends the next DTIM with a DTIM Interval value. Its clients  
hear the beacons and awaken to receive the broadcast  
and multicast messages. The default is 1.  
Internet Filter  
Fꢀlter Anonymous Internet Requests This feature makes  
it more difficult for outside users to work their way into  
your network. This feature is selected by default. Deselect  
the feature to allow anonymous Internet requests  
.
Fꢀlter Multꢀcast Multicasting allows for multiple  
transmissions to specific recipients at the same time. If  
multicasting is permitted, then the Router will allow IP  
multicast packets to be forwarded to the appropriate  
computers. Select this feature to filter multicasting. This  
feature is not selected by default.  
Fragmentatꢀon Threshold This value specifies the  
maximum size for a packet before data is fragmented  
into multiple packets. If you experience a high packet  
error rate, you may slightly increase the Fragmentation  
Threshold. Setting the Fragmentation Threshold too low  
may result in poor network performance. Only minor  
reduction of the default value is recommended. In most  
cases, it should remain at its default of 23ꢁꢃ.  
Fꢀlter Internet NAT Redꢀrectꢀon This feature uses port  
forwarding to block access to local servers from local  
networked computers. Select this feature to filter Internet  
NAT redirection. It is not selected by default.  
Wꢀreless-G Router for Mobꢀle Broadband  
19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Advanced Configuration  
Chapterꢀ3  
Fꢀlter IDENT (Port 113) This feature keeps port 113 from  
being scanned by devices outside of your local network.  
This feature is selected by default. Deselect this feature to  
disable it.  
L2TP Passthrough Layer 2 Tunneling Protocol is the  
method used to enable Point-to-Point sessions via the  
Internet on the Layer 2 level. To allow L2TP tunnels to pass  
through the Router, keep the default, Enabled.  
Click Save Settꢀngs to apply your changes, or click Cancel  
Changes to cancel your changes.  
Web Filter  
Proxy Use of WAN proxy servers may compromise the  
Gateway’s security. Denying Proxy will disable access to  
any WAN proxy servers. Select this feature to enable proxy  
Access Restrictions > Internet Access  
The Internet Access screen allows you to block or allow  
specific kinds of Internet usage and traffic, such as Internet  
access, designated services, and websites during specific  
days and times.  
filtering. Deselect the feature to allow proxy access  
.
Java Java is a programming language for websites. If you  
deny Java, you run the risk of not having access to Internet  
sites created using this programming language. Select  
this feature to enable Java filtering. Deselect the feature  
to allow Java usage  
.
ActꢀveX ActiveX is a programming language for websites.  
If you deny ActiveX, you run the risk of not having access to  
Internet sites created using this programming language.  
Select this feature to enable ActiveX filtering. Deselect the  
feature to allow ActiveX usage  
.
Cookꢀes A cookie is data stored on your computer and  
used by Internet sites when you interact with them. Select  
this feature to filter cookies. Deselect the feature to allow  
cookie usage  
.
Click Save Settꢀngs to apply your changes, or click Cancel  
Changes to cancel your changes.  
Security > VPN Passthrough  
The VPN Passthrough screen allows you to enable VPN  
tunnels using IPSec, PPTP, or L2TP protocols to pass through  
the Router’s firewall.  
Access Restrictions > Internet Access  
Internet Access Policy  
Access Polꢀcy Access can be managed by a policy. Use the  
settings on this screen to establish an access policy (after  
Save Settꢀngs is clicked). Selecting a policy from the drop-  
down menu will display that policy’s settings. To delete a  
policy, select that policy’s number and click Delete Thꢀs  
Polꢀcy. To view all the policies, click Summary.  
Security > VPN Passthrough  
VPN Passthrough  
IPSec Passthrough Internet Protocol Security (IPSec) is  
a suite of protocols used to implement secure exchange  
of packets at the IP layer. To allow IPSec tunnels to pass  
through the Router, keep the default, Enabled.  
Summary  
The policies are listed with the following information: No.,  
Policy Name, Access, Days, Time, and status (Enabled). To  
enable a policy, select Enabled. To delete a policy, click  
Delete. Click Save Settꢀngs to save your changes, or click  
Cancel Changes to cancel your changes. To return to the  
Internet Access Policy screen, click Close.  
PPTP Passthrough Point-to-Point Tunneling Protocol  
(PPTP) allows the Point-to-Point Protocol (PPP) to be  
tunneled through an IP network. To allow PPTP tunnels to  
pass through the Router, keep the default, Enabled.  
Wꢀreless-G Router for Mobꢀle Broadband  
20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Advanced Configuration  
Chapterꢀ3  
6. Decide which days and what times you want this policy  
to be enforced. Select the individual days during which  
the policy will be in effect, or select Everyday. Then  
enter a range of hours and minutes during which the  
policy will be in effect, or select 2ꢁ Hours.  
7. You can block websites with specific URL addresses.  
Enter each URL in a separate Website Blocking by URL  
Address field.  
8. You can also block websites using specific keywords.  
Enter each keyword in a separate Website Blocking by  
Keyword field.  
9. You can filter access to various services accessed  
over the Internet, such as FTP or telnet. (You  
can block up to three applications per policy.)  
Summary  
Status Policies are disabled by default. To enable a policy,  
select the policy number from the drop-down menu, and  
select Enabled.  
From the Applications list, select the application you  
want to block. Then click the >> button to move it to  
the Blocked List. To remove an application from the  
Blocked List, select it and click the << button.  
To create a policy, follow steps 1-11. Repeat these steps to  
create additional policies, one at a time.  
1. Select a number from the Access Policy drop-down  
10. If the application you want to block is not listed  
or you want to edit a service’s settings, enter the  
application’s name in the Application Name field. Enter  
its range in the Port Range fields. Select its protocol  
from the Protocol drop-down menu. Then click Add.  
menu.  
2. Enter a Policy Name in the field provided.  
3. To enable this policy, select Enabled.  
4. Click Edꢀt Lꢀst to select which PCs will be affected by  
the policy. The List of PCs screen appears. You can  
select a PC by MAC address or IP address. You can also  
enter a range of IP addresses if you want this policy to  
affect a group of PCs. After making your changes, click  
Save Settꢀngs to apply your changes, or click Cancel  
Changes to cancel your changes. Then click Close.  
To modify  
a
service, select it from the  
Application list. Change its name, port range,  
and/or protocol setting. Then click Modꢀfy.  
To delete a service, select it from the Application list.  
Then click Delete.  
11. Click Save Settꢀngs to save the policy’s settings. To  
cancel the policy’s settings, click Cancel Changes.  
Applications and Gaming > Single Port  
Forwarding  
The Single Port Forwarding screen allows you to customize  
port services for common applications on this screen.  
When users send these types of requests to your network via  
the Internet, the Router will forward those requests to the  
appropriate servers (computers). Before using forwarding,  
you should assign static IP addresses to the designated  
servers (use the DHCP Reservation feature on the Basic Setup  
screen).  
List of PCs  
5. Select the appropriate option, Deny or Allow,  
depending on whether you want to block or allow  
Internet access for the PCs you listed on the List of PCs  
screen.  
Wꢀreless-G Router for Mobꢀle Broadband  
21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Advanced Configuration  
Chapterꢀ3  
applications that use Internet access to perform functions  
such as videoconferencing or online gaming. Some Internet  
applications may not require any forwarding.)  
When users send these types of requests to your network via  
the Internet, the Router will forward those requests to the  
appropriate servers (computers). Before using forwarding,  
you should assign static IP addresses to the designated  
servers (use the DHCP Reservation feature on the Basic Setup  
screen).  
If you need to forward all ports to one computer, click the  
DMZ tab.  
Applications and Gaming > Single Port Forwarding  
Single Port Forwarding  
Common applications are available for the first five  
entries. Select the appropriate application. Then enter the  
IP address of the server that should receive these requests.  
Select Enabled to activate this entry.  
For additional applications, complete the following fields:  
Applications and Gaming > Port Range Forwarding  
Applꢀcatꢀon Name Enter the name you wish to give the  
application. Each name can be up to 12 characters.  
Port Range Forwarding  
To forward a port, enter the information on each line for  
the criteria required.  
External Port Enter the external port number used by  
the server or Internet application. Check with the Internet  
application documentation for more information.  
Internal Port Enter the internal port number used by  
the server or Internet application. Check with the Internet  
application documentation for more information.  
Applꢀcatꢀon Name In this field, enter the name you  
wish to give the application. Each name can be up to 12  
characters.  
Protocol Select the protocol used for this application,  
either TCP or UDP, or Both.  
Start~End Port Enter the number or range of port(s)  
used by the server or Internet applications. Check  
with the Internet application documentation for more  
information.  
To IP Address For each application, enter the IP address  
of the PC that should receive the requests. If you assigned  
a static IP address to the PC, then you can click DHCP  
Reservatꢀon on the Basic Setup screen to look up its static  
IP address.  
Protocol Select the protocol used for this application,  
either TCP or UDP, or Both.  
To IP Address For each application, enter the IP address  
of the PC running the specific application. If you assigned  
a static IP address to the PC, then you can click DHCP  
Reservatꢀon on the Basic Setup screen to look up its static  
IP address.  
Enabled For each application, select Enabled to enable  
port forwarding.  
Click Save Settꢀngs to apply your changes, or click Cancel  
Changes to cancel your changes.  
Enabled Select Enabled to enable port forwarding for  
the applications you have defined.  
Applications and Gaming > Port Range  
Forwarding  
The Port Range Forwarding screen allows you to set up  
public services on your network, such as web servers,  
ftp servers, e-mail servers, or other specialized Internet  
applications. (Specialized Internet applications are any  
Click Save Settꢀngs to apply your changes, or click Cancel  
Changes to cancel your changes.  
Wꢀreless-G Router for Mobꢀle Broadband  
22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Advanced Configuration  
Chapterꢀ3  
Applications & Gaming > Port Range  
Triggering  
The Port Range Triggering screen allows the Router to  
watch outgoing data for specific port numbers. The IP  
address of the computer that sends the matching data is  
remembered by the Router, so that when the requested  
data returns through the Router, the data is pulled back  
to the proper computer by way of IP address and port  
mapping rules.  
Applications and Gaming > DMZ  
DMZ  
Any PC whose port is being forwarded must have its DHCP  
client function disabled and should have a new static IP  
address assigned to it because its IP address may change  
when using the DHCP function.  
Enabled/Dꢀsabled To disable DMZ hosting, select  
Dꢀsabled. To expose one PC, select Enabled. Then  
configure the following settings:  
Source IP Address If you want any IP address to be the  
source, select Any IP Address. If you want to specify an IP  
address or range of IP addresses as the designated source,  
select and complete the IP address range fields.  
Applications and Gaming > Port Range Triggering  
Port Range Triggering  
Applꢀcatꢀon Name Enter the application name of the  
Destꢀnatꢀon If you want to specify the DMZ host by IP  
address, select IP Address and enter the IP address in  
the field provided. If you want to specify the DMZ host  
by MAC address, select MAC Address and enter the MAC  
address in the field provided. To retrieve this information,  
click DHCP Clꢀent Table.  
trigger.  
Trꢀggered Range For each application, enter the starting  
and ending port numbers of the triggered port number  
range. Check with the Internet application documentation  
for the port number(s) needed.  
ForwardedRange Foreachapplication,enterthestarting  
and ending port numbers of the forwarded port number  
range. Check with the Internet application documentation  
for the port number(s) needed.  
Enabled Select Enabled to enable port triggering for the  
applications you have defined.  
Click Save Settꢀngs to apply your changes, or click Cancel  
Changes to cancel your changes.  
DMZ > DHCP Client Table  
Applications and Gaming > DMZ  
The DMZ feature allows one network computer to be  
exposed to the Internet for use of a special-purpose  
service such as Internet gaming or videoconferencing.  
DMZ hosting forwards all the ports at the same time to  
one PC. The Port Range Forwarding feature is more secure  
because it only opens the ports you want to have opened,  
while DMZ hosting opens all the ports of one computer,  
exposing the computer to the Internet.  
DHCP Client Table  
TheDHCPClientTablelistscomputersandotherdevices  
that have been assigned IP addresses by the Router.  
The list can be sorted by Client Name, Interface, IP  
Address, or MAC Address. To select a DHCP client, click  
Select. To retrieve the most up-to-date information,  
click Refresh. To exit this screen and return to the DMZ  
screen, click Close.  
Wꢀreless-G Router for Mobꢀle Broadband  
23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Advanced Configuration  
Chapterꢀ3  
Click Save Settꢀngs to apply your changes, or click Cancel  
Changes to cancel your changes.  
Applications  
Applꢀcatꢀons Select the appropriate application. If you  
select Add a New Application, follow the Add a New  
Application instructions.  
Applications and Gaming > QoS  
Quality of Service (QoS) ensures better service to  
high-priority types of network traffic, which may  
involve demanding, real-time applications, such as  
videoconferencing.  
Prꢀorꢀty Select the appropriate priority: Hꢀgh, Medꢀum,  
Normal, or Low.  
Click Add to save your changes.Your new entry will appear  
in the Summary list.  
Add a New Application  
QoS > Add a New Application  
Enter a Name Enter any name to indicate the name of  
the entry.  
Applications and Gaming > QoS  
Port Range Enter the port range that the application will  
be using. For example, if you want to allocate bandwidth  
for FTP, you can enter 21-21. If you need services for an  
application that uses from 1000 to 1250, you enter 1000-  
1250 as your settings. You can have up to three ranges  
to define for this bandwidth allocation. Port numbers  
can range from 1 to 65535. Check your application’s  
documentation for details on the service ports used.  
QoS (Quality of Service)  
Wireless  
Wꢀreless QoS If you have other devices on your network  
that support Wireless QoS, select Enabled. Otherwise,  
keep the default, Dꢀsabled.  
NoAcknowledgement IfyouwanttodisabletheRouter’s  
Acknowledgement feature, so the Router will not re-send  
data if an error occurs, then select Enabled. Otherwise,  
keep the default, Dꢀsabled.  
Select the protocol TCP or UDP, or select Both.  
Prꢀorꢀty Select the appropriate priority: Hꢀgh, Medꢀum  
(Recommend), Normal, or Low.  
Click Add to save your changes.Your new entry will appear  
in the Summary list.  
Internet Access Priority  
In this section, you can set the bandwidth priority for a  
variety of applications and devices. There are four levels  
priority: High, Medium, Normal, or Low. When you set  
priority, do not set all applications to High, because this will  
defeat the purpose of allocating the available bandwidth.  
If you want to select below normal bandwidth, select Low.  
Depending on the application, a few attempts may be  
needed to set the appropriate bandwidth priority.  
Online Games  
QoS > Online Games  
Enabled/Dꢀsabled To use the QoS policies you have set,  
keep the default, Enabled. Otherwise, select Dꢀsabled.  
Games Select the appropriate game.  
Prꢀorꢀty Select the appropriate priority: Hꢀgh, Medꢀum  
(Recommend), Normal, or Low.  
Category  
There are four categories available. Select one of the  
following: Applꢀcatꢀons, Onlꢀne Games, MAC Address,  
EthernetPort,orVoꢀceDevꢀce.Proceedtotheinstructions  
for your selection.  
Click Add to save your changes.Your new entry will appear  
in the Summary list.  
Wꢀreless-G Router for Mobꢀle Broadband  
2ꢁ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Advanced Configuration  
Chapterꢀ3  
Name This column displays the application, device, or  
port name.  
MAC Address  
Informatꢀon This column displays the port range or  
MAC address entered for your entry. If a pre-configured  
application or game was selected, there will be no valid  
entry shown in this section.  
Remove Click this button to remove an entry.  
QoS > MAC Address  
Edꢀt Click this button to make changes.  
Enter a Name Enter a name for your device.  
Click Save Settꢀngs to apply your changes, or click Cancel  
Changes to cancel your changes.  
MAC Address Enter the MAC address of your device.  
Prꢀorꢀty Select the appropriate priority: Hꢀgh, Medꢀum  
(Recommend), Normal, or Low.  
Administration > Management  
The Administration > Management screen allows the  
network’s administrator to manage specific Router  
functions for access and security.  
Click Add to save your changes.Your new entry will appear  
in the Summary list.  
Ethernet Port  
QoS > Ethernet Port  
Ethernet Select the appropriate Ethernet port.  
Prꢀorꢀty Select the appropriate priority: Hꢀgh, Medꢀum  
(Recommend), Normal, or Low.  
Click Add to save your changes.Your new entry will appear  
in the Summary list.  
Voice Device  
Administration > Management  
Management  
QoS > Voice Device  
Router Access  
Enter a Name Enter a name for your voice device.  
To ensure the Router’s security, you will be asked for your  
password when you access the Router’s web-based utility.  
The default is admꢀn.  
MAC Address Enter the MAC address of your voice  
device.  
Prꢀorꢀty Select the appropriate priority: Hꢀgh  
(Recommend), Medꢀum, Normal, or Low.  
Router Password Enter a new password for the Router.  
Re-enter to confꢀrm Enter the password again to  
confirm.  
Click Add to save your changes.Your new entry will appear  
in the Summary list.  
Web Access  
Summary  
Web Utꢀlꢀty Access HTTP (HyperText Transport Protocol)  
is the communications protocol used to connect to servers  
on the World Wide Web. HTTPS uses SSL (Secured Socket  
Layer) to encrypt data transmitted for higher security.  
Select HTTP or HTTPS. HTTP is the default.  
This lists the QoS entries you have created for your  
applications and devices.  
Prꢀorꢀty This column displays the bandwidth priority of  
High, Medium, Normal, or Low.  
Wꢀreless-G Router for Mobꢀle Broadband  
2ꢂ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Advanced Configuration  
Chapterꢀ3  
Web Utꢀlꢀty Access vꢀa Wꢀreless If you are using the  
Router in a public domain where you are giving wireless  
access to your guests, you can disable wireless access to  
the Router’s web-based utility. You will only be able to  
access the utility via a wired connection if you disable  
the setting. Keep the default, Enabled, to allow wireless  
access to the utility, or select Dꢀsabled to block wireless  
access to the utility.  
Allow Users to Dꢀsable Internet Access Select Enabled,  
if you want to be able to prohibit any and all Internet  
connections. Otherwise, keep the default, Dꢀsabled.  
Backup and Restore  
Backup Confꢀguratꢀons To back up the Router’s  
configuration settings, click this button and follow the on-  
screen instructions.  
Remote Access  
Restore Confꢀguratꢀons To restore the Router’s  
configuration settings, click this button and follow the on-  
screen instructions. (You must have previously backed up  
the Router’s configuration settings.)  
Remote Management To permit remote access of the  
Router, from outside the local network, select Enabled.  
Otherwise, keep the default, Dꢀsabled.  
Click Save Settꢀngs to apply your changes, or click Cancel  
Changes to cancel your changes.  
Web Utꢀlꢀty Access HTTP (HyperText Transport Protocol)  
is the communications protocol used to connect to servers  
on the World Wide Web. HTTPS uses SSL (Secured Socket  
Layer) to encrypt data transmitted for higher security.  
Select HTTP or HTTPS. HTTP is the default.  
Administration > Log  
The Router can keep logs of all traffic for your Internet  
connection.  
Remote Upgrade If you want to be able to upgrade the  
Router remotely, from outside the local network, select  
Enabled. (You must have the Remote Management  
feature enabled as well.) Otherwise, keep the default,  
Dꢀsabled.  
Allowed Remote IP Address If you want to be able to  
access the Router from any external IP address, select Any  
IP Address. If you want to specify an external IP address or  
range of IP addresses, then select the second option and  
complete the fields provided.  
Remote Management Port Enter the port number that  
will be open to outside access.  
Administration > Log  
Log  
NOTE: When you are in a remote location  
and wish to manage the Router, enter  
Log To disable the Log function, keep the default,  
Dꢀsabled. To monitor traffic between the network and the  
Internet, select Enabled. With logging enabled, you can  
choose to view temporary logs.  
or  
depending on whether you use HTTP or HTTPS.  
Enter the Router’s specific Internet IP address in  
place of <Internet_IP_address>, and enter the  
Remote Management Port number in place of  
the word port.  
Vꢀew Log To view the logs, click Vꢀew Log.  
UPnP  
Universal Plug and Play (UPnP) allows Windows XP or Vista  
to automatically configure the Router for various Internet  
applications, such as gaming and videoconferencing.  
UPnP If you want to use UPnP, keep the default, Enabled.  
Otherwise, select Dꢀsabled.  
Allow Users to Confꢀgure Keep the default, Enabled,  
if you want to be able to make manual changes to the  
Router while using the UPnP feature. Otherwise, select  
Dꢀsabled.  
Log > View Log  
Wꢀreless-G Router for Mobꢀle Broadband  
2ꢃ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Advanced Configuration  
Chapterꢀ3  
Log  
Type Select Incomꢀng Log, Outgoꢀng Log, Securꢀty  
Log, or DHCP Clꢀent Log.  
<Type> Log The Incoming Log will display  
a
temporary log of the source IP addresses and  
destination port numbers for the incoming Internet  
traffic. The Outgoing Log will display a temporary  
log of the local IP addresses, destination URLs/IP  
addresses, and service/port numbers for the outgoing  
Internet traffic. The Security log will display the login  
information for the web-based utility. The DHCP  
Client Log will display the LAN DHCP server status  
information.  
Diagnostics > Ping  
Traceroute Test  
The Traceroute test tests the performance of  
connection.  
a
Click Save the Log to save this information to a file  
on your PC’s hard drive. Click Refresh to update the  
log. Click Clear to clear all the information that is  
displayed.  
IP or URL Address Enter the address of the PC whose  
connection you wish to test.  
Start to Traceroute To run the test, click this button. The  
Traceroute Test screen will show if the test was successful.  
Click Close to return to the Diagnostics screen. Click Stop  
to end the test.  
Click Save Settꢀngs to apply your changes, or click Cancel  
Changes to cancel your changes.  
Administration > Diagnostics  
The diagnostic tests (Ping and Traceroute) allow you to  
check the connections of your network devices, including  
connection to the Internet.  
Diagnostics > Traceroute  
Administration > Factory Defaults  
The Administration > Factory Defaults screen allows you  
to restore the Router’s configuration to its factory default  
settings.  
Administration > Diagnostics  
Diagnostics  
Ping Test  
The Ping test checks the status of a connection.  
IP or URL Address Enter the address of the PC whose  
connection you wish to test.  
Packet Sꢀze Enter the packet size you want to use. The  
default is 32 bytes.  
Administration > Factory Defaults  
Tꢀmes to Pꢀng Enter many times you wish to test it.  
NOTE: Do not restore the factory defaults unless  
you are having difficulties with the Router and  
have exhausted all other troubleshooting  
measures. Once the Router is reset, you will have  
to re-enter all of your configuration settings.  
Start to Pꢀng To run the test, click this button. The Ping  
Test screen will show if the test was successful. Click Close  
to return to the Diagnostics screen. Click Stop to end the  
test.  
Wꢀreless-G Router for Mobꢀle Broadband  
2ꢄ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Advanced Configuration  
Chapterꢀ3  
Factory Defaults  
Status > Mobile Network  
Restore All Settꢀngs To reset the Router’s settings to the  
default values, click this button and then follow the on-  
screen instructions. Any settings you have saved will be  
lost when the default settings are restored.  
The Mobile Network screen displays the status information  
for your mobile broadband service and device (data card  
or USB adapter).  
Administration > Firmware Upgrade  
The Firmware Upgrade screen allows you to upgrade the  
Router’s firmware. Do not upgrade the firmware unless  
you are experiencing problems with the Router or the new  
firmware has a feature you want to use.  
Status > Mobile Network  
Mobile Network Status  
Network Name The name of the mobile network the  
Administration > Firmware Upgrade  
Router uses is displayed.  
Servꢀce Type The type of mobile service is displayed.  
NOTE: The Router may lose the settings you  
have customized. Before you upgrade its  
firmware, write down all of your custom settings.  
After you upgrade its firmware, you will have to  
re-enter all of your configuration settings.  
Sꢀgnal Strength The strength of the mobile broadband  
signal that the Router receives is displayed.  
Connectꢀon Tꢀme The length of time the Router has  
been connected to the mobile network since your last  
connection is displayed.  
Upgrade Firmware  
Before upgrading the firmware, download the Router’s  
firmware upgrade file from the Linksys website,  
Current Sessꢀon Usage The amount of data that has  
been sent to and received from the mobile network since  
your last connection is displayed.  
Data Card Status  
Please select a fꢀle to upgrade the fꢀrmware Click  
Browse and select the extracted firmware upgrade file.  
Card Manufacturer The manufacturer of your mobile  
broadband device is displayed.  
Start to Upgrade After you have selected the  
appropriate file, click this button, and follow the on-screen  
instructions.  
Card Model The model number of your mobile  
broadband device is displayed.  
Card Fꢀrmware The firmware version of your mobile  
broadband device is displayed.  
Phone Number The phone number of your mobile  
broadband account is displayed.  
ESN The Electronic Serial Number (ESN) of your mobile  
broadband device is displayed. The ESN is a unique  
identification number given to each device by its  
manufacturer.  
PRL Versꢀon Your mobile broadband device contains a  
PRL (Preferred Roaming List) that was programmed by the  
Wꢀreless-G Router for Mobꢀle Broadband  
2ꢅ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Advanced Configuration  
Chapterꢀ3  
service provider. The version of the PRL specifies the radio  
frequency channels that the device is permitted to use,  
and it also instructs your device which cell towers to look  
for when establishing a connection.  
Status > Local Network  
The Local Network screen displays information about the  
local, wired network.  
Actꢀve Vꢀsꢀon User Name The user name of your Active  
Vision account is displayed after the account has been  
provisioned by Sprint.  
Click Refresh to update the on-screen information.  
Status > Router  
The Router screen displays information about the Router  
and its current settings.  
Status > Local Network  
Local Network  
Local MAC Address The MAC address of the Router’s  
local, wired interface is displayed.  
Router IP Address The Router’s IP address, as it appears  
on your local network, is displayed.  
Subnet Mask The Subnet Mask of the Router is  
displayed.  
DHCP Server  
DHCP Server The status of the Router’s DHCP server  
function is displayed.  
Status > Router  
Start IP Address For the range of IP addresses used by  
devices on your local network, the starting IP address is  
displayed.  
Router Information  
Fꢀrmware Versꢀon The version number of the Router’s  
current firmware is displayed.  
End IP Address For the range of IP addresses used by  
devices on your local network, the ending IP address is  
displayed.  
Current Tꢀme The time set on the Router is displayed.  
Internet MAC Address The Router’s MAC Address, as  
seen by your ISP, is displayed.  
DHCP Clꢀents Table Click this button to view a list of PCs  
that are using the Router as a DHCP server.  
Host Name If the Router’s Host Name was entered on the  
Basic Setup screen, then it is displayed.  
Domaꢀn Name If the Router’s Domain Name was entered  
on the Basic Setup screen, then it is displayed.  
Internet Connection  
This section shows the current network information  
stored in the Router. The information varies depending on  
the Internet connection type selected on the Basic Setup  
screen.  
DHCP Clients Table  
Click Refresh to update the on-screen information.  
DHCP Client Table  
The DHCP Client Table lists computers and other  
devices that have been assigned IP addresses by  
Wꢀreless-G Router for Mobꢀle Broadband  
29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Advanced Configuration  
Chapterꢀ3  
the Router. The list can be sorted by Client Name,  
Interface, IP Address, or MAC Address. To remove a  
DHCP client, click Delete. To retrieve the most up-to-  
date information, click Refresh. To exit this screen and  
return to the Local Network screen, click Close.  
Status > Wireless Network  
The Wireless Network screen displays information about  
your wireless network.  
Status > Wireless Network  
Wireless Network  
MAC Address The MAC address of the Router’s local,  
wireless interface is displayed.  
Mode The wireless mode used by the network is  
displayed.  
Network Name (SSID) The name of the wireless network,  
which is also called the SSID, is displayed.  
Standard Channel The channel used by the Router is  
displayed.  
Securꢀty The wireless security method used by the Router  
is displayed.  
SSID Broadcast The status of the SSID Broadcast feature  
is displayed.  
Wꢀreless-G Router for Mobꢀle Broadband  
30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Troubleshooting  
AppendixꢀA  
You need to modify the basic settings on the Router.  
Appendꢀx A:  
Run the Setup Wizard on the Setup CD-ROM.  
Troubleshootꢀng  
You need to modify the advanced settings on the  
Router.  
Your computer cannot connect to the Internet.  
Open the web browser (for example, Internet Explorer or  
Firefox), and enter the Router’s IP address in the address  
field (the default IP address is 192.1ꢃꢅ.1.1). When  
prompted, complete the User name and Password fields  
(the default user name and password is admꢀn). Click the  
appropriate tab to change the settings.  
Follow the instructions until your computer can connect  
to the Internet:  
Make sure that the Router is powered on. The Power  
LED should be green and not flashing.  
If the Power LED is flashing, then power off all of your  
network devices, including the Router and computers.  
Then power on each device in the following order:  
How do you connect to the mobile network?  
There are three options available.  
1. Router  
First Option Using the Front Panel Button  
2. Computer  
1. Power on the Router with the mobile broadband data  
card or USB adapter installed.  
Check the LEDs on the front panel of the Router. Make  
sure the Power, DSL, and at least one of the numbered  
LEDs are lit. If they are not, then check the cable  
connections. The computer should be connected to  
one of the ports numbered 1-4 on the Router, and  
the Line port of the Router must be connected to the  
ADSL line.  
2. Press the Mobꢀle Connect/Dꢀsconnect button on the  
front panel of the Router.  
3. The Router will connect to the mobile network via the  
mobile broadband data card or USB adapter. If this is  
successful, the Internet Mobile LED on the Router will  
light up.  
When you double-click the web browser, you are  
prompted for a username and password. If you want to  
get rid of the prompt, follow these instructions.  
Second Option Using the Web-Based Utility  
1. Open the web browser.  
Launch the web browser and perform the following steps  
(these steps are specific to Internet Explorer but are similar  
for other browsers):  
2. Enter the Router’s IP address in the Address field (the  
default IP address is 192.1ꢃꢅ.1.1). Press Enter.  
3. When prompted, complete the User name and  
Password fields (the default user name and password  
is admꢀn). Click OK.  
1. Select Tools > Internet Optꢀons.  
2. Click the Connectꢀons tab.  
3. Select Never dꢀal a connectꢀon.  
4. Click OK.  
4. On the first screen you see, the Basic Setup screen,  
click the Connect button near the top of the screen.  
5. The Router will connect to the mobile network via  
the mobile broadband data card or USB adapter. If  
this is successful, the Mobile Connection line will say,  
“Connectedinstead of “Disconnected.”  
You are using a static IP address and cannot connect.  
Refer to Windows Help and change your Internet Protocol  
(TCP/IP) Properties to Obtain an IP address automatically.  
Third Option Using the Auto Connect Feature  
The Router’s Auto Connect feature enables the Router to  
automatically connect to the mobile network whenever it  
is powered on.  
The computer cannot connect wirelessly to the network.  
Make sure the wireless network name or SSID is the same  
on both the computer and the Router. If you have enabled  
wireless security, then make sure the same security  
method and key are used by both the computer and the  
Router.  
1. Open the web browser.  
2. Enter the Router’s IP address in the Address field (the  
default IP address is 192.1ꢃꢅ.1.1). Press Enter.  
3. When prompted, complete the User name and  
Password fields (the default user name and password  
is admꢀn). Click OK.  
Wꢀreless-G Router for Mobꢀle Broadband  
31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Troubleshooting  
AppendixꢀA  
4. On the first screen you see, the Basic Setup screen,  
5. Click the Mobꢀle Network tab. In the Mobile Network  
Status section, on the Network Name line, you will see  
the name of the network you are currently using.  
click the Mobꢀle Network tab.  
5. On the Mobile Network screen, there is an Auto  
Connect option at the top of the screen. Select Auto,  
and then click Save Settꢀngs.  
Whom should you call if there is a question or problem?  
For technical support regarding the mobile broadband  
data card or the Router, contact Sprint. If you have  
questions about your bill, contact the mobile broadband  
service provider.  
6. After the webpage has refreshed, click the Basꢀc  
Setup tab.  
7. On the Basic Setup screen, click the Connect button  
to connect to the mobile network.  
8. The next time the Router is powered on, it will  
automatically connect to the mobile network.  
WEB: If your questions are not addressed here,  
refer to the Sprint website, www.sprꢀnt.com  
What do the indicator LEDs signify on the Router?  
Power (Green) The Power LED lights up and  
stays on while the Router is powered on.  
Ethernet 1-ꢁ (Green) These numbered LEDs,  
corresponding with the numbered ports on the  
Router’s back panel, serve two purposes. If the  
LED is continuously lit, the Router is successfully  
connected to a device through that port. It  
flashes to indicate network activity over that  
port.  
Wꢀreless (Green) The Wireless LED lights up  
when the wireless feature is enabled. It flashes  
when the Router is actively sending or receiving  
data over the wireless network.  
Modem Internet (Green) The Modem LED  
lightsupandstaysonwhenthereisaconnection  
made through the Modem port. It flashes to  
indicate network activity over the Modem port.  
Mobꢀle Internet (Blue) The Mobile LED  
flashes as the Router connects to the mobile  
network. When the LED stops flashing and  
stays on, then the connection is active.  
If the LED flashes quickly, the Router is not  
connected to the mobile network. Before you  
press the Mobile Connect/Disconnect button,  
make sure the mobile broadband data card or  
USB adapter is already installed.  
How do you know which mobile network you are using?  
1. Open the web browser.  
2. Enter the Router’s IP address in the Address field (the  
default IP address is 192.1ꢃꢅ.1.1). Then press Enter.  
3. When prompted, complete the User name and  
Password fields (the default user name and password  
is admꢀn). Click OK.  
4. Click the Status tab.  
Wꢀreless-G Router for Mobꢀle Broadband  
32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Specifications  
AppendixꢀB  
Appendꢀx B:  
Specꢀfꢀcatꢀons  
Model Number  
WRT54G3GV2-ST  
Standards  
IEEE 802.3, IEEE 802.3u, IEEE 802.11g,  
IEEE 802.11b  
Ports  
Internet, Ethernet (4), PC Card,  
USB 2.0 (3), Power, and  
Antenna (SMA)  
Button  
LEDs  
Mobile Connect/Disconnect, Reset  
Power, Ethernet (1-4), Wireless,  
Modem Internet, Mobile Internet  
Cabling Type  
# of Antennas  
UTP CAT 5  
1
Detachable (Y/N) Yes  
RF Pwr (EIRP)  
in dBm  
802.11g: Typical 14 dBm ( 1.5),  
802.11b: Typical 16 dBm ( 1.5)  
Antenna Gain  
in dBi  
3.3  
UPnP  
Able  
Security Features Stateful Packet Inspection (SPI)  
Firewall, Internet Policy  
Envꢀronmental  
Dimensions  
6.69" x 6.69" x 1.30"  
(170 x 170 x 33 mm)  
Weight  
12.35 oz (350 g)  
Power  
External 12V DC, 1.5A  
Certification  
FCC, IC-03, CE, Wi-Fi (802.11b,  
802.11g), WPA  
Operating Temp. 32 to 104°F (0 to 40°C)  
Storage Temp.  
-4 to 140°F (-20 to 60°C)  
Operating  
Humidity  
10 to 85%, Relative Humidity,  
Noncondensing  
Storage Humidity 5 to 90% Noncondensing  
Specifications are subject to change without notice.  
Wꢀreless-G Router for Mobꢀle Broadband  
33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Warranty Information  
AppendixꢀC  
service offerings. This limited warranty shall not apply to  
such third party software or service offerings. This limited  
warranty does not guarantee any continued availability  
of a third party’s service for which this product’s use or  
operation may require.  
Appendꢀx C:  
Warranty Informatꢀon  
Limited Warranty  
TO THE EXTENT NOT PROHIBITED BY LAW, ALL IMPLIED  
WARRANTIES AND CONDITIONS OF MERCHANTABILITY,  
SATISFACTORY QUALITY OR FITNESS FOR A PARTICULAR  
PURPOSE ARE LIMITED TO THE DURATION OF THE  
WARRANTY PERIOD. ALL OTHER EXPRESS OR IMPLIED  
CONDITIONS, REPRESENTATIONS AND WARRANTIES,  
INCLUDING, BUT NOT LIMITED TO, ANY IMPLIED  
WARRANTY OF NON-INFRINGEMENT, ARE DISCLAIMED.  
Some jurisdictions do not allow limitations on how long  
an implied warranty lasts, so the above limitation may not  
apply to you. This limited warranty gives you specific legal  
rights, and you may also have other rights which vary by  
jurisdiction.  
Linksys warrants this Linksys hardware product against  
defects in materials and workmanship under normal  
use for the Warranty Period, which begins on the date of  
purchase by the original end-user purchaser and lasts for  
the period specified below:  
One (1) year for new product  
Ninety (90) days for refurbished product  
This limited warranty is non-transferable and extends only  
to the original end-user purchaser. Your exclusive remedy  
and Linksys’ entire liability under this limited warranty  
will be for Linksys, at its option, to (a) repair the product  
with new or refurbished parts, (b) replace the product  
with a reasonably available equivalent new or refurbished  
Linksys product, or (c) refund the purchase price of the  
product less any rebates. Any repaired or replacement  
products will be warranted for the remainder of the  
original Warranty Period or thirty (30) days, whichever is  
longer. All products and parts that are replaced become  
the property of Linksys.  
TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT  
WILL LINKSYS BE LIABLE FOR ANY LOST DATA, REVENUE  
OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL,  
INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF THE  
THEORY OF LIABILITY (INCLUDING NEGLIGENCE), ARISING  
OUT OF OR RELATED TO THE USE OF OR INABILITY TO  
USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN  
IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF  
SUCH DAMAGES. IN NO EVENT WILL LINKSYS’ LIABILITY  
EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT.  
The foregoing limitations will apply even if any warranty  
or remedy provided under this limited warranty fails of  
its essential purpose. Some jurisdictions do not allow  
the exclusion or limitation of incidental or consequential  
damages, so the above limitation or exclusion may not  
apply to you.  
Exclusions and Limitations  
This limited warranty does not apply if: (a) the product  
assembly seal has been removed or damaged, (b) the  
product has been altered or modified, except by Linksys,  
(c) the product damage was caused by use with non-  
Linksys products, (d) the product has not been installed,  
operated, repaired, or maintained in accordance with  
instructions supplied by Linksys, (e) the product has  
been subjected to abnormal physical or electrical stress,  
misuse, negligence, or accident, (f) the serial number on  
the Product has been altered, defaced, or removed, or (g)  
the product is supplied or licensed for beta, evaluation,  
testing or demonstration purposes for which Linksys does  
not charge a purchase price or license fee.  
Obtaining Warranty Service  
If you have any questions about the services provided  
by your Service Provider or your Linksys product, please  
contact your Service Provider that provided the Linksys  
product to you. You also will find a variety of online  
support tools and information to assist you with your  
product at www.lꢀnksys.com/support. If the product  
proves defective during the Warranty Period, contact your  
Service Provider for instructions on how to obtain warranty  
service. The telephone number for your Service Provider  
in your area can be found in the written documentation  
included with your Linksys product.  
ALL SOFTWARE PROVIDED BY LINKSYS WITH THE  
PRODUCT, WHETHER FACTORY LOADED ON THE  
PRODUCT OR CONTAINED ON MEDIA ACCOMPANYING  
THE PRODUCT, IS PROVIDED “AS ISWITHOUT WARRANTY  
OF ANY KIND. Without limiting the foregoing, Linksys does  
not warrant that the operation of the product or software  
will be uninterrupted or error free. Also, due to the  
continual development of new techniques for intruding  
upon and attacking networks, Linksys does not warrant  
that the product, software or any equipment, system or  
network on which the product or software is used will be  
free of vulnerability to intrusion or attack. The product  
may include or be bundled with third party software or  
Have your product serial number and proof of purchase  
(if applicable) on hand when calling your Service Provider.  
If you are requested to return your product, you will be  
given a Return Materials Authorization (RMA) number  
and instructions for shipping the product to your Service  
Provider. You are responsible for properly packaging and  
shipping your product at your cost and risk. You must  
include the RMA number and a copy of your dated proof  
Wꢀreless-G Router for Mobꢀle Broadband  
3ꢁ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Warranty Information  
AppendixꢀC  
of original purchase (if applicable) when returning your  
product. Products received without a RMA number and  
dated proof of original purchase (if applicable) will be  
rejected. Do not include any other items with the product  
youarereturning.Defectiveproductcoveredbythislimited  
warranty will be repaired or replaced and returned to you  
without charge. Customers outside of the United States  
of America and Canada are responsible for all shipping  
and handling charges, custom duties, VAT and other  
associated taxes and charges. Repairs or replacements for  
your product not covered under this limited warranty will  
be subject to charge at Linksysthen-current rates.  
Technical Support  
This limited warranty is neither  
a
service nor  
a
support contract. Information about Linksys’ current  
technical support offerings and policies (including  
any fees for support services) can be found at  
This limited warranty is governed by the laws of the  
jurisdiction in which the Linksys product was purchased  
by you.  
Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine,  
CA 92623  
Wꢀreless-G Router for Mobꢀle Broadband  
3ꢂ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Regulatory Information  
AppendixꢀD  
Safety Notices  
Appendꢀx D:  
Regulatory Informatꢀon  
Caution: To reduce the risk of fire, use only No.26 AWG  
or larger telecommunication line cord.  
Do not use this product near water, for example, in a  
wet basement or near a swimming pool.  
FCC Statement  
This device complies with Part 15 of the FCC Rules.  
Operation is subject to the following two conditions: (1)  
Thisdevicemaynotcauseharmfulinterference, and(2)this  
device must accept any interference received, including  
interference that may cause undesired operation.  
Avoid using this product during an electrical storm.  
There may be a remote risk of electric shock from  
lightning.  
WARNING: This product contains lead, known  
to the State of California to cause cancer, and  
birth defects or other reproductive harm. Wash  
hands after handling.  
This product has been tested and complies with the  
specifications for a Class B digital device, pursuant to Part  
15 of the FCC Rules. These limits are designed to provide  
reasonable protection against harmful interference in  
a residential installation. This equipment generates,  
uses, and can radiate radio frequency energy and, if not  
installed and used according to the instructions, may  
cause harmful interference to radio communications.  
However, there is no guarantee that interference will not  
occur in a particular installation. If this equipment does  
cause harmful interference to radio or television reception,  
which is found by turning the equipment off and on, the  
user is encouraged to try to correct the interference by  
one or more of the following measures:  
Industry Canada Statement  
This Class B digital apparatus complies with Canadian  
ICES-003 and RSS210.  
Operation is subject to the following two conditions:  
1. This device may not cause interference and  
2. This device must accept any interference, including  
interference that may cause undesired operation of the  
device. This device has been designed to operate with  
an antenna having a maximum gain of 2dBi. Antenna  
havingahighergainisstrictlyprohibitedperregulations  
of Industry Canada. The required antenna impedance  
is 50 ohms.  
Reorient or relocate the receiving antenna  
Increase the separation between the equipment or  
devices  
Connect the equipment to an outlet other than the  
receiver’s  
To reduce potential radio interference to other users,  
the antenna type and its gain should be so chosen  
that the EIRP is not more than required for successful  
communication.  
Consult a dealer or an experienced radio/TV technician  
for assistance  
FCC Caution: Any changes or modifications not expressly  
approved by the party responsible for compliance could  
void the user’s authority to operate this equipment.  
Industry Canada Radiation Exposure Statement:  
This equipment complies with IC radiation exposure limits  
set forth for an uncontrolled environment. This equipment  
should be installed and operated with minimum distance  
20cm between the radiator & your body.  
FCC Radiation Exposure Statement  
This equipment complies with FCC radiation exposure  
limits set forth for an uncontrolled environment. This  
equipment should be installed and operated with  
minimum distance 20cm between the radiator and your  
body.  
This transmitter must not be co-located or operating in  
conjunction with any other antenna or transmitter.  
This transmitter must not be co-located or operating in  
conjunction with any other antenna or transmitter. IEEE  
802.11b or 802.11g operation of this product in the USA is  
firmware-limited to channels 1 through 11.  
Wꢀreless-G Router for Mobꢀle Broadband  
3ꢃ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Regulatory Information  
AppendixꢀD  
Avis d’Industrie Canada  
Cet appareil numérique de la classe B est conforme aux  
Avis de non-responsabilité concernant les  
appareils sans fil  
normes NMB-003 et RSS210 du Canada.  
Les performances maximales pour les réseaux sans fil  
sont tirées des spécifications de la norme IEEE 802.11.  
Les performances réelles peuvent varier, notamment  
en fonction de la capacité du réseau sans fil, du débit  
de la transmission de données, de la portée et de la  
couverture. Les performances dépendent de facteurs,  
conditions et variables multiples, en particulier de la  
distance par rapport au point d’accès, du volume du trafic  
réseau, des matériaux utilisés dans le bâtiment et du  
type de construction, du système d’exploitation et de la  
combinaison de produits sans fil utilisés, des interférences  
et de toute autre condition défavorable.  
Lutilisation de ce dispositif est autorisée seulement aux  
conditions suivantes :  
1. il ne doit pas produire de brouillage et  
2. il doit accepter tout brouillage radioélectrique reçu,  
mêmesicebrouillageestsusceptibledecompromettre  
le fonctionnement du dispositif. Le dispositif a été  
conçupourfonctionneravecuneantenneayantungain  
maximum de 2 dBi. Les règlements d’Industrie Canada  
interdisent strictement l’utilisation d’antennes dont le  
gain est supérieur à cette limite. L’impédance requise  
de l’antenne est de 50 ohms.  
Afin de réduire le risque d’interférence aux autres  
utilisateurs, le type d’antenne et son gain doivent  
être choisis de façon à ce que la puissance isotrope  
rayonnée équivalente (p.i.r.e.) ne soit pas supérieure  
au niveau requis pour obtenir une communication  
satisfaisante.  
Avis d’Industrie Canada concernant l’exposition  
aux radiofréquences :  
Ce matériel est conforme aux limites établies par IC  
en matière d’exposition aux radiofréquences dans un  
environnement non contrôlé. Ce matériel doit être installé  
et utilisé à une distance d’au moins 20 cm entre l’antenne  
et le corps de l’utilisateur.  
L’émetteur ne doit pas être placé près d’une autre antenne  
ou d’un autre émetteur, ou fonctionner avec une autre  
antenne ou un autre émetteur.  
Wireless Disclaimer  
The maximum performance for wireless is derived from  
IEEE Standard 802.11 specifications. Actual performance  
can vary, including lower wireless network capacity,  
data throughput rate, range and coverage. Performance  
depends on many factors, conditions and variables,  
including distance from the access point, volume of  
network traffic, building materials and construction,  
operating system used, mix of wireless products used,  
interference and other adverse conditions.  
Wꢀreless-G Router for Mobꢀle Broadband  
3ꢄ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Regulatory Information  
AppendixꢀD  
Ceštꢀna (Czech) - Informace o ochraně žꢀvotního  
prostředí pro zákazníky v zemích Evropské unꢀe  
User Information for Consumer Products  
Covered by EU Directive 2002/96/EC on  
Waste Electric and Electronic Equipment  
(WEEE)  
This document contains important information for users  
with regards to the proper disposal and recycling of  
Linksys products. Consumers are required to comply with  
this notice for all electronic products bearing the following  
symbol:  
Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené  
tímto symbolem na produktu anebo na obalu bylo likvidováno  
s netříděným komunálním odpadem. Tento symbol udává,  
že daný produkt musí být likvidován odděleně od běžného  
komunálního odpadu. Odpovídáte za likvidaci tohoto produktu  
a dalších elektrických a elektronických zařízení prostřednictvím  
určených sběrných míst stanovených vládou nebo místními  
úřady. Správná likvidace  
a
recyklace pomáhá předcházet  
potenciálním negativním dopadům na životní prostředí a lidské  
zdraví. Podrobnější informace o likvidaci starého vybavení si  
laskavě vyžádejte od místních úřadů, podniku zabývajícího se  
likvidací komunálních odpadů nebo obchodu, kde jste produkt  
zakoupili.  
Dansk (Danꢀsh) - Mꢀljøꢀnformatꢀon for kunder ꢀ EU  
EU-direktiv 2002/96/EF kræver, at udstyr der bærer dette symbol  
på produktet og/eller emballagen ikke må bortskaffes som  
usorteret kommunalt affald. Symbolet betyder, at dette produkt  
skal bortskaffes adskilt fra det almindelige husholdningsaffald.  
Det er dit ansvar at bortskaffe dette og andet elektrisk og  
elektronisk udstyr via bestemte indsamlingssteder udpeget  
af staten eller de lokale myndigheder. Korrekt bortskaffelse  
og genvinding vil hjælpe med til at undgå mulige skader for  
miljøet og menneskers sundhed. Kontakt venligst de lokale  
myndigheder, renovationstjenesten eller den butik, hvor du  
har købt produktet, angående mere detaljeret information om  
bortskaffelse af dit gamle udstyr.  
Englꢀsh - Envꢀronmental Informatꢀon for Customers ꢀn  
the European Unꢀon  
European Directive 2002/96/EC requires that the equipment  
bearing this symbol on the product and/or its packaging must  
not be disposed of with unsorted municipal waste. The symbol  
indicates that this product should be disposed of separately  
from regular household waste streams. It is your responsibility to  
dispose of this and other electric and electronic equipment via  
designated collection facilities appointed by the government or  
local authorities. Correct disposal and recycling will help prevent  
potential negative consequences to the environment and  
human health. For more detailed information about the disposal  
of your old equipment, please contact your local authorities,  
waste disposal service, or the shop where you purchased the  
product.  
Deutsch (German) - Umweltꢀnformatꢀon für Kunden  
ꢀnnerhalb der Europäꢀschen Unꢀon  
Die Europäische Richtlinie 2002/96/EC verlangt, dass technische  
Ausrüstung, die direkt am Gerät und/oder an derVerpackung mit  
diesem Symbol versehen ist , nicht zusammen mit unsortiertem  
Gemeindeabfall entsorgt werden darf. Das Symbol weist darauf  
hin, dass das Produkt von regulärem Haushaltmüll getrennt  
entsorgt werden sollte. Es liegt in Ihrer Verantwortung, dieses  
Gerät und andere elektrische und elektronische Geräte über  
die dafür zuständigen und von der Regierung oder örtlichen  
Behörden dazu bestimmten Sammelstellen zu entsorgen.  
Ordnungsgemäßes Entsorgen und Recyceln trägt dazu bei,  
potentielle negative Folgen für Umwelt und die menschliche  
Gesundheit zu vermeiden. Wenn Sie weitere Informationen zur  
Entsorgung Ihrer Altgeräte benötigen, wenden Sie sich bitte an  
die örtlichen Behörden oder städtischen Entsorgungsdienste  
oder an den Händler, bei dem Sie das Produkt erworben haben.  
Български (Bulgarꢀan)  
-
Информация относно  
опазването на околната среда за потребители в  
Европейския съюз  
Европейска директива 2002/96/EC изисква уредите, носещи  
този символ върху изделието и/или опаковката му, да не  
се изхвърля т с несортирани битови отпадъци. Символът  
обозначава, че изделието трябва да се изхвърля отделно от  
сметосъбирането на обикновените битови отпадъци. Ваша  
е отговорността този и другите електрически и електронни  
уреди да се изхвърлят в предварително определени от  
държавните или общински органи специализирани пунктове  
за събиране. Правилното изхвърляне  
и
рециклиране  
ще спомогнат да се предотвратят евентуални вредни за  
околната среда и здравето на населението последствия. За  
по-подробна информация относно изхвърлянето на вашите  
стари уреди се обърнете към местните власти, службите за  
сметосъбиране или магазина, от който сте закупили уреда.  
Wꢀreless-G Router for Mobꢀle Broadband  
3ꢅ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Regulatory Information  
AppendixꢀD  
Eestꢀ (Estonꢀan)  
Euroopa Lꢀꢀdus asuvatele klꢀentꢀdele  
-
Keskkonnaalane ꢀnformatsꢀoon  
Françaꢀs (French) - Informatꢀons envꢀronnementales  
pour les clꢀents de l’Unꢀon européenne  
Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on  
La directive européenne 2002/96/CE exige que l’équipement  
sur lequel est apposé ce symbole sur le produit et/ou son  
emballage ne soit pas jeté avec les autres ordures ménagères. Ce  
symbole indique que le produit doit être éliminé dans un circuit  
distinct de celui pour les déchets des ménages. Il est de votre  
responsabilité de jeter ce matériel ainsi que tout autre matériel  
électrique ou électronique par les moyens de collecte indiqués  
par le gouvernement et les pouvoirs publics des collectivités  
territoriales. L’élimination et le recyclage en bonne et due forme  
ont pour but de lutter contre l’impact néfaste potentiel de ce  
type de produits sur l’environnement et la santé publique. Pour  
plus d’informations sur le mode d’élimination de votre ancien  
équipement, veuillez prendre contact avec les pouvoirs publics  
locaux, le service de traitement des déchets, ou l’endroit où vous  
avez acheté le produit.  
seadmeid, millel on tootel või pakendil käesolev sümbol  
,
keelatud kõrvaldada koos sorteerimata olmejäätmetega. See  
sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest  
olmejäätmevoogudest. Olete kohustatud kõrvaldama käesoleva  
ja ka muud elektri- ja elektroonikaseadmed riigi või kohalike  
ametiasutuste poolt ette nähtud kogumispunktide kaudu.  
Seadmete korrektne kõrvaldamine ja ringlussevõtt aitab vältida  
võimalikke negatiivseid tagajärgi keskkonnale ning inimeste  
tervisele. Vanade seadmete kõrvaldamise kohta täpsema  
informatsiooni saamiseks võtke palun ühendust kohalike  
ametiasutustega, jäätmekäitlusfirmaga või kauplusega, kust te  
toote ostsite.  
Español (Spanꢀsh) - Informacꢀón medꢀoambꢀental para  
clꢀentes de la Unꢀón Europea  
Italꢀano (Italꢀan) - Informazꢀonꢀ relatꢀve all’ambꢀente  
per ꢀ clꢀentꢀ resꢀdentꢀ nell’Unꢀone Europea  
La direttiva europea 2002/96/EC richiede che le apparecchiature  
La Directiva 2002/96/CE de la UE exige que los equipos que  
lleven este símbolo en el propio aparato y/o en su embalaje  
no deben eliminarse junto con otros residuos urbanos no  
seleccionados. El símbolo indica que el producto en cuestión  
debe separarse de los residuos domésticos convencionales con  
vistas a su eliminación. Es responsabilidad suya desechar este y  
cualesquiera otros aparatos eléctricos y electrónicos a través de  
los puntos de recogida que ponen a su disposición el gobierno y  
lasautoridadeslocales. Aldesecharyreciclarcorrectamenteestos  
aparatos estará contribuyendo a evitar posibles consecuencias  
negativas para el medio ambiente y la salud de las personas. Si  
desea obtener información más detallada sobre la eliminación  
segura de su aparato usado, consulte a las autoridades locales,  
al servicio de recogida y eliminación de residuos de su zona o  
pregunte en la tienda donde adquirió el producto.  
contrassegnate con questo simbolo  
sul prodotto e/o  
sull’imballaggio non siano smaltite insieme ai rifiuti urbani  
non differenziati. Il simbolo indica che questo prodotto non  
deve essere smaltito insieme ai normali rifiuti domestici. È  
responsabilità del proprietario smaltire sia questi prodotti sia  
le altre apparecchiature elettriche ed elettroniche mediante  
le specifiche strutture di raccolta indicate dal governo o dagli  
enti pubblici locali. Il corretto smaltimento ed il riciclaggio  
aiuteranno a prevenire conseguenze potenzialmente negative  
per l’ambiente e per la salute dell’essere umano. Per ricevere  
informazioni più dettagliate circa lo smaltimento delle vecchie  
apparecchiature in Vostro possesso, Vi invitiamo a contattare gli  
enti pubblici di competenza, il servizio di smaltimento rifiuti o il  
negozio nel quale avete acquistato il prodotto.  
ξλληνικά (Greek)  
-
Στοιχεία περιβαλλοντικής  
προστασίας για πελάτες εντός της Ευρωπαϊκής  
Ένωσης  
Latvꢀešu valoda (Latvꢀan) - Ekoloģꢀska ꢀnformācꢀja  
klꢀentꢀem Eꢀropas Savꢀenības jurꢀsdꢀkcꢀjā  
ΗΚοινοτικήΟδηγία2002/96/ECαπαιτείότιοεξοπλισμόςοοποίος  
φέρει αυτό το σύμβολο στο προϊόν και/ή στη συσκευασία  
του δεν πρέπει να απορρίπτεται μαζί με τα μικτά κοινοτικά  
απορρίμματα. Το σύμβολο υποδεικνύει ότι αυτό το προϊόν θα  
πρέπει να απορρίπτεται ξεχωριστά από τα συνήθη οικιακά  
απορρίμματα. Είστε υπεύθυνος για την απόρριψη του παρόντος  
και άλλου ηλεκτρικού και ηλεκτρονικού εξοπλισμού μέσω των  
καθορισμένων εγκαταστάσεων συγκέντρωσης απορριμμάτων οι  
οποίες παρέχονται από το κράτος ή τις αρμόδιες τοπικές αρχές.  
Η σωστή απόρριψη και ανακύκλωση συμβάλλει στην πρόληψη  
πιθανών αρνητικών συνεπειών για το περιβάλλον και την υγεία.  
Για περισσότερες πληροφορίες σχετικά με την απόρριψη του  
παλιού σας εξοπλισμού, παρακαλώ επικοινωνήστε με τις τοπικές  
αρχές, τις υπηρεσίες απόρριψης ή το κατάστημα από το οποίο  
αγοράσατε το προϊόν.  
Direktīvā 2002/96/EK ir prasība, ka aprīkojumu, kam pievienota  
zīme uz paša izstrādājuma vai uz tā iesaiņojuma, nedrīkst  
izmest nešķirotā veidā kopā ar komunālajiem atkritumiem  
(tiem, ko rada vietēji iedzīvotāji un uzņēmumi). Šī zīme nozīmē  
to, ka šī ierīce ir jāizmet atkritumos tā, lai tā nenonāktu kopā ar  
parastiem mājsaimniecības atkritumiem. Jūsu pienākums ir šo  
un citas elektriskas un elektroniskas ierīces izmest atkritumos,  
izmantojot īpašus atkritumu savākšanas veidus un līdzekļus, ko  
nodrošina valsts un pašvaldību iestādes. Ja izmešana atkritumos  
un pārstrāde tiek veikta pareizi, tad mazinās iespējamais  
kaitējums dabai un cilvēku veselībai. Sīkākas ziņas par  
novecojuša aprīkojuma izmešanu atkritumos jūs varat saņemt  
vietējā pašvaldībā, atkritumu savākšanas dienestā, kā arī veikalā,  
kur iegādājāties šo izstrādājumu.  
Wꢀreless-G Router for Mobꢀle Broadband  
39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Regulatory Information  
AppendixꢀD  
Lꢀetuvškaꢀ (Lꢀthuanꢀan) - Aplꢀnkosaugos ꢀnformacꢀja,  
skꢀrta Europos Sąjungos vartotojams  
Nederlands (Dutch) - Mꢀlꢀeu-ꢀnformatꢀe voor klanten  
ꢀn de Europese Unꢀe  
Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir  
kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį),  
negalima šalinti kartu su nerūšiuotomis komunalinėmis  
atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai  
nuo bendro buitinių atliekų srauto. Jūs privalote užtikrinti, kad  
ši ir kita elektros ar elektroninė įranga būtų šalinama per tam  
tikras nacionalinės ar vietinės valdžios nustatytas atliekų rinkimo  
sistemas. Tinkamai šalinant ir perdirbant atliekas, bus išvengta  
galimos žalos aplinkai ir žmonių sveikatai. Daugiau informacijos  
apie jūsų senos įrangos šalinimą gali pateikti vietinės valdžios  
institucijos, atliekų šalinimo tarnybos arba parduotuvės, kuriose  
įsigijote tą gaminį.  
De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die  
is voorzien van dit symbool op het product of de verpakking,  
niet mag worden ingezameld met niet-gescheiden huishoudelijk  
afval. Dit symbool geeft aan dat het product apart moet worden  
ingezameld. U bent zelf verantwoordelijk voor de vernietiging  
vandezeenandereelektrischeenelektronischeapparatuurviade  
daarvoor door de landelijke of plaatselijke overheid aangewezen  
inzamelingskanalen. De juiste vernietiging en recycling van  
deze apparatuur voorkomt mogelijke negatieve gevolgen voor  
het milieu en de gezondheid. Voor meer informatie over het  
vernietigen van uw oude apparatuur neemt u contact op met  
de plaatselijke autoriteiten of afvalverwerkingsdienst, of met de  
winkel waar u het product hebt aangeschaft.  
Maltꢀ (Maltese) - Informazzjonꢀ Ambjentalꢀ għal Klꢀjentꢀ  
fl-Unjonꢀ Ewropea  
Norsk (Norwegꢀan) - Mꢀljøꢀnformasjon for kunder ꢀ EU  
EU-direktiv 2002/96/EF krever at utstyr med følgende symbol  
avbildet på produktet og/eller pakningen, ikke må kastes  
sammen med usortert avfall. Symbolet indikerer at dette  
produktet skal håndteres atskilt fra ordinær avfallsinnsamling  
for husholdningsavfall. Det er ditt ansvar å kvitte deg med  
dette produktet og annet elektrisk og elektronisk avfall via egne  
innsamlingsordninger slik myndighetene eller kommunene  
bestemmer. Korrekt avfallshåndtering og gjenvinning vil  
være med på å forhindre mulige negative konsekvenser for  
miljø og helse. For nærmere informasjon om håndtering av  
det kasserte utstyret ditt, kan du ta kontakt med kommunen,  
en innsamlingsstasjon for avfall eller butikken der du kjøpte  
produktet.  
Id-Direttiva Ewropea 2002/96/KE titlob li t-tagħmir li jkun fih is-  
simbolu fuq il-prodott u/jew fuq l-ippakkjar ma jistax jintrema  
ma’ skart muniċipali li ma ġiex isseparat. Is-simbolu jindika  
li dan il-prodott għandu jintrema separatament minn ma’ l-  
iskart domestiku regolari. Hija responsabbiltà tiegħek li tarmi  
dan it-tagħmir u kull tagħmir ieħor ta’ l-elettriku u elettroniku  
permezz ta’ faċilitajiet ta’ ġbir appuntati apposta mill-gvern jew  
mill-awtoritajiet lokali. Ir-rimi b’mod korrett u r-riċiklaġġ jgħin  
jipprevjeni konsegwenzi negattivi potenzjali għall-ambjent u  
għas-saħħa tal-bniedem. Għal aktar informazzjoni dettaljata  
dwar ir-rimi tat-tagħmir antik tiegħek, jekk jogħġbok ikkuntattja  
lill-awtoritajiet lokali tiegħek, is-servizzi għar-rimi ta’ l-iskart, jew  
il-ħanut minn fejn xtrajt il-prodott.  
Polskꢀ (Polꢀsh) - Informacja dla klꢀentów w Unꢀꢀ  
Magyar (Hungarꢀan) - Környezetvédelmꢀ ꢀnformácꢀó az  
európaꢀ unꢀós vásárlók számára  
Europejskꢀej  
środowꢀska  
o
przepꢀsach dotyczących ochrony  
A 2002/96/EC számú európai uniós irányelv megkívánja, hogy  
azokat a termékeket, amelyeken, és/vagy amelyek csomagolásán  
az alábbi címke megjelenik, tilos a többi szelektálatlan lakossági  
hulladékkal együtt kidobni. A címke azt jelöli, hogy az adott  
termék kidobásakor a szokványos háztartási hulladékelszállítási  
rendszerektõl elkülönített eljárást kell alkalmazni. Az Ön  
felelõssége, hogy ezt, és más elektromos és elektronikus  
berendezéseit a kormányzati vagy a helyi hatóságok által  
kijelölt gyűjtõredszereken keresztül számolja fel. A megfelelõ  
hulladékfeldolgozás segít a környezetre és az emberi egészségre  
potenciálisan ártalmas negatív hatások megelõzésében. Ha  
elavult berendezéseinek felszámolásához további részletes  
információra van szüksége, kérjük, lépjen kapcsolatba a helyi  
hatóságokkal, a hulladékfeldolgozási szolgálattal, vagy azzal  
üzlettel, ahol a terméket vásárolta.  
Dyrektywa Europejska 2002/96/EC wymaga, aby sprzęt  
oznaczony symbolem znajdującym się na produkcie i/lub jego  
opakowaniu nie był wyrzucany razem z innymi niesortowanymi  
odpadami komunalnymi. Symbol ten wskazuje, że produkt  
nie powinien być usuwany razem ze zwykłymi odpadami z  
gospodarstw domowych. Na Państwu spoczywa obowiązek  
wyrzucania tego  
i
innych urządzeń elektrycznych oraz  
elektronicznychwpunktachodbioruwyznaczonychprzezwładze  
krajowe lub lokalne. Pozbywanie się sprzętu we właściwy sposób  
i jego recykling pomogą zapobiec potencjalnie negatywnym  
konsekwencjom dla środowiska i zdrowia ludzkiego. W celu  
uzyskania szczegółowych informacji o usuwaniu starego sprzętu,  
prosimy zwrócić się do lokalnych władz, służb oczyszczania  
miasta lub sklepu, w którym produkt został nabyty.  
Wꢀreless-G Router for Mobꢀle Broadband  
ꢁ0  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Regulatory Information  
AppendixꢀD  
Português (Portuguese) - Informação ambꢀental para  
clꢀentes da Unꢀão Europeꢀa  
Slovenčꢀna (Slovene) - Okoljske ꢀnformacꢀje za stranke  
v Evropskꢀ unꢀjꢀ  
A Directiva Europeia 2002/96/CE exige que o equipamento  
que exibe este símbolo no produto e/ou na sua embalagem  
não seja eliminado junto com os resíduos municipais não  
Evropska direktiva 2002/96/EC prepoveduje odlaganje opreme,  
označene s tem simbolom – na izdelku in/ali na embalaži – med  
običajne, nerazvrščene odpadke. Ta simbol opozarja, da je treba  
izdelek odvreči ločeno od preostalih gospodinjskih odpadkov.  
Vaša odgovornost je, da to in preostalo električno in elektronsko  
opremo odnesete na posebna zbirališča, ki jih določijo  
državne ustanove ali lokalna uprava. S pravilnim odlaganjem  
in recikliranjem boste preprečili morebitne škodljive vplive na  
okolje in zdravje ljudi. Če želite izvedeti več o odlaganju stare  
opreme, se obrnite na lokalno upravo, odpad ali trgovino, kjer  
ste izdelek kupili.  
separados.  
O
símbolo indica que este produto deve ser  
eliminado separadamente dos resíduos domésticos regulares.  
É da sua responsabilidade eliminar este e qualquer outro  
equipamento eléctrico e electrónico através das instalações  
de recolha designadas pelas autoridades governamentais ou  
locais. A eliminação e reciclagem correctas ajudarão a prevenir  
as consequências negativas para o ambiente e para a saúde  
humana. Para obter informações mais detalhadas sobre a  
forma de eliminar o seu equipamento antigo, contacte as  
autoridades locais, os serviços de eliminação de resíduos ou o  
estabelecimento comercial onde adquiriu o produto.  
Suomꢀ (Fꢀnnꢀsh) - Ympärꢀstöä koskevꢀa tꢀetoja EU-  
alueen asꢀakkaꢀlle  
EU-direktiivi 2002/96/EY edellyttää, että jos laitteistossa on tämä  
Română (Romanꢀan) - Informaţꢀꢀ de medꢀu pentru  
clꢀenţꢀꢀ dꢀn Unꢀunea Europeană  
symboli  
itse tuotteessa ja/tai sen pakkauksessa, laitteistoa  
ei saa hävittää lajittelemattoman yhdyskuntajätteen mukana.  
Symboli merkitsee sitä, että tämä tuote on hävitettävä erillään  
tavallisesta kotitalousjätteestä. Sinun vastuullasi on hävittää  
tämä elektroniikkatuote ja muut vastaavat elektroniikkatuotteet  
viemällä tuote tai tuotteet viranomaisten määräämään  
keräyspisteeseen. Laitteiston oikea hävittäminen estää  
mahdolliset kielteiset vaikutukset ympäristöön ja ihmisten  
terveyteen. Lisätietoja vanhan laitteiston oikeasta hävitystavasta  
saa paikallisilta viranomaisilta, jätteenhävityspalvelusta tai siitä  
myymälästä, josta ostit tuotteen.  
Directiva europeană 2002/96/CE impune ca echipamentele care  
prezintă acest simbol pe produs şi/sau pe ambalajul acestuia să  
nu fie casate împreună cu gunoiul menajer municipal. Simbolul  
indică faptul că acest produs trebuie să fie casat separat de  
gunoiul menajer obişnuit. Este responsabilitatea dvs. să casaţi  
acest produs şi alte echipamente electrice şi electronice prin  
intermediul unităţilor de colectare special desemnate de guvern  
sau de autorităţile locale. Casarea şi reciclarea corecte vor ajuta  
la prevenirea potenţialelor consecinţe negative asupra sănătăţii  
mediului şi a oamenilor. Pentru mai multe informaţii detaliate  
cu privire la casarea acestui echipament vechi, contactaţi  
autorităţile locale, serviciul de salubrizare sau magazinul de la  
care aţi achiziţionat produsul.  
Svenska (Swedꢀsh) - Mꢀljöꢀnformatꢀon för kunder ꢀ  
Europeꢀska unꢀonen  
Det europeiska direktivet 2002/96/EC kräver att utrustning med  
denna symbol på produkten och/eller förpackningen inte får  
kastas med osorterat kommunalt avfall. Symbolen visar att denna  
produktbörkastasefterattdenavskiljtsfrånvanligthushållsavfall.  
Det faller på ditt ansvar att kasta denna och annan elektrisk och  
elektronisk utrustning på fastställda insamlingsplatser utsedda  
av regeringen eller lokala myndigheter. Korrekt kassering och  
återvinning skyddar mot eventuella negativa konsekvenser  
för miljön och personhälsa. För mer detaljerad information om  
kassering av din gamla utrustning kontaktar du dina lokala  
myndigheter, avfallshanteringen eller butiken där du köpte  
produkten.  
Slovenčꢀna (Slovak) - Informácꢀe o ochrane žꢀvotného  
prostredꢀa pre zákazníkov v Európskej únꢀꢀ  
Podľa európskej smernice 2002/96/ES zariadenie  
s
týmto  
symbolom  
na produkte a/alebo jeho balení nesmie byť  
likvidované spolu  
s
netriedeným komunálnym odpadom.  
Symbol znamená, že produkt by sa mal likvidovať oddelene  
od bežného odpadu z domácností. Je vašou povinnosťou  
likvidovať toto i ostatné elektrické a elektronické zariadenia  
prostredníctvom špecializovaných zberných zariadení určených  
vládou alebo miestnymi orgánmi. Správna likvidácia a recyklácia  
pomôže zabrániť prípadným negatívnym dopadom na životné  
prostredie a zdravie ľudí. Ak máte záujem o podrobnejšie  
informácie o likvidácii starého zariadenia, obráťte sa, prosím, na  
miestne orgány, organizácie zaoberajúce sa likvidáciou odpadov  
alebo obchod, v ktorom ste si produkt zakúpili.  
WEB: For additional information, please visit  
Wꢀreless-G Router for Mobꢀle Broadband  
ꢁ1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Software License Agreement  
ChapterꢀNumber  
Schedule 1 - Linksys Software License Agreement  
Appendꢀx D: Software  
Lꢀcense Agreement  
THIS LICENSE AGREEMENT IS BETWEEN YOU AND  
CISCO-LINKSYS LLC OR ONE OF ITS AFFILIATES CISCO  
SYSTEMS-LINKSYS (ASIA) PTE LTD. OR CISCO-LINKSYS  
K.K. (“LINKSYS”) LICENSING THE SOFTWARE INSTEAD OF  
CISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLING  
THE SOFTWARE, OR USING THE PRODUCT CONTAINING  
THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY  
THIS AGREEMENT. IFYOU DO NOT AGREE TO ALL OF THESE  
TERMS, THEN YOU MAY NOT DOWNLOAD, INSTALL OR USE  
THE SOFTWARE. YOU MAY RETURN UNUSED SOFTWARE  
(OR, IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER  
PRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUND  
UP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO  
THE RETURN PROCESS AND POLICIES OF THE PARTY FROM  
WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE.  
Software in Linksys Products  
This product from Cisco-Linksys LLC or from one of its  
affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco-  
Linksys K.K. (“Linksys”) contains software (including  
firmware) originating from Linksys and its suppliers  
and may also contain software from the open source  
community. Any software originating from Linksys and its  
suppliers is licensed under the Linksys Software License  
Agreement contained at Schedule 1 below. You may also  
be prompted to review and accept that Linksys Software  
License Agreement upon installation of the software.  
License. Subject to the terms and conditions of this  
Agreement, Linksys grants the original end user purchaser  
of the Linksys product containing the Software (“You”)  
a nonexclusive license to use the Software solely as  
embedded in or (where authorized in the applicable  
documentation) for communication with such product.  
This license may not be sublicensed, and is not transferable  
except to a person or entity to which you transfer  
ownership of the complete Linksys product containing  
the Software, provided you permanently transfer all rights  
under this Agreement and do not retain any full or partial  
copies of the Software, and the recipient agrees to the  
terms of this Agreement.  
Any software from the open source community is licensed  
under the specific license terms applicable to that software  
made available by Linksys at www.lꢀnksys.com/gpl or as  
provided for in Schedules 2 and 3 below.  
Where such specific license terms entitle you to the source  
code of such software, that source code is upon request  
available at cost from Linksys for at least three years  
from the purchase date of this product and may also be  
available for download from www.lꢀnksys.com/gpl. For  
detailed license terms and additional information on  
open source software in Linksys products please look at  
the Linksys public web site at: www.lꢀnksys.com/gpl/ or  
Schedule 2 below as applicable.  
“Software” includes, and this Agreement will apply to (a)  
the software of Linksys or its suppliers provided in or with  
the applicable Linksys product, and (b) any upgrades,  
updates, bug fixes or modified versions (“Upgrades”) or  
backup copies of the Software supplied to You by Linksys  
or an authorized reseller, provided you already hold a  
valid license to the original software and have paid any  
applicable fee for the Upgrade.  
BY DOWNLOADING OR INSTALLING THE SOFTWARE,  
OR USING THE PRODUCT CONTAINING THE SOFTWARE,  
YOU ARE CONSENTING TO BE BOUND BY THE SOFTWARE  
LICENSE AGREEMENTS BELOW. IF YOU DO NOT AGREE TO  
ALL OF THESE TERMS, THEN YOU MAY NOT DOWNLOAD,  
INSTALL OR USE THE SOFTWARE. YOU MAY RETURN  
UNUSED SOFTWARE (OR, IF THE SOFTWARE IS SUPPLIED  
AS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT)  
FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL  
PURCHASE, SUBJECT TO THE RETURN PROCESS AND  
POLICIES OF THE PARTY FROM WHICH YOU PURCHASED  
SUCH PRODUCT OR SOFTWARE.  
Protection of Information. The Software and  
documentation contain trade secrets and/or copyrighted  
materials of Linksys or its suppliers. You will not copy  
or modify the Software or decompile, decrypt, reverse  
engineer or disassemble the Software (except to the  
extent expressly permitted by law notwithstanding this  
provision), and You will not disclose or make available  
such trade secrets or copyrighted material in any form  
to any third party. Title to and ownership of the Software  
and documentation and any portion thereof, will remain  
solely with Linksys or its suppliers.  
Software Licenses  
The software Licenses applicable to software from Linksys  
are made available at the Linksys public web site at:  
and  
respectively. For your convenience of reference, a copy  
of the Linksys Software License Agreement and the main  
open source code licenses used by Linksys in its products  
are contained in the Schedules below.  
Collection and Processing of Information. You agree that  
Linksys and/or its affiliates may, from time to time, collect  
and process information about your Linksys product  
and/or the Software and/or your use of either in order  
(i) to enable Linksys to offer you Upgrades; (ii) to ensure  
that your Linksys product and/or the Software is being  
Wꢀreless-G Router for Mobꢀle Broadband  
ꢁ2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Software License Agreement  
ChapterꢀNumber  
used in accordance with the terms of this Agreement;  
(iii) to provide improvements to the way Linksys delivers  
technology to you and to other Linksys customers; (iv) to  
enableLinksystocomplywiththetermsofanyagreements  
it has with any third parties regarding your Linksys  
product and/or Software and/or (v) to enable Linksys to  
comply with all applicable laws and/or regulations, or the  
requirements of any regulatory authority or government  
agency. Linksys and/ or its affiliates may collect and  
process this information provided that it does not identify  
you personally. Your use of your Linksys product and/or  
the Software constitutes this consent by you to Linksys  
and/or its affiliatescollection and use of such information  
and, for EEA customers, to the transfer of such information  
to a location outside the EEA.  
SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF  
THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILL  
LINKSYS’ LIABILITY EXCEED THE AMOUNT PAID BY YOU  
FOR THE PRODUCT. The foregoing limitations will apply  
even if any warranty or remedy under this Agreement fails  
of its essential purpose. Some jurisdictions do not allow  
the exclusion or limitation of incidental or consequential  
damages, so the above limitation or exclusion may not  
apply to You.  
Export. Software, including technical data, may be subject  
to U.S. export control laws and regulations and/or export  
or import regulations in other countries. You agree to  
comply strictly with all such laws and regulations.  
U.S. Government Users.The Software and documentation  
qualify as “commercial items” as defined at 48 C.F.R. 2.101  
and 48 C.F.R. 12.212. All Government users acquire the  
Software and documentation with only those rights  
herein that apply to non-governmental customers.  
Software Upgrades etc. If the Software enables you to  
receive Upgrades, you may elect at any time to receive  
these Upgrades either automatically or manually. If you  
elect to receive Upgrades manually or you otherwise  
elect not to receive or be notified of any Upgrades, you  
may expose your Linksys product and/or the Software  
to serious security threats and/or some features within  
your Linksys product and/or Software may become  
inaccessible. There may be circumstances where we  
apply an Upgrade automatically in order to comply with  
changes in legislation, legal or regulatory requirements  
or as a result of requirements to comply with the terms  
of any agreements Linksys has with any third parties  
regarding your Linksys product and/or the Software. You  
will always be notified of any Upgrades being delivered  
to you. The terms of this license will apply to any such  
Upgrade unless the Upgrade in question is accompanied  
by a separate license, in which event the terms of that  
license will apply.  
General Terms. This Agreement will be governed by and  
construed in accordance with the laws of the State of  
California, without reference to conflict of laws principles.  
The United Nations Convention on Contracts for the  
International Sale of Goods will not apply. If any portion  
of this Agreement is found to be void or unenforceable,  
the remaining provisions will remain in full force and  
effect. This Agreement constitutes the entire agreement  
between the parties with respect to the Software and  
supersedes any conflicting or additional terms contained  
in any purchase order or elsewhere.  
END OF SCHEDULE 1  
Schedule 2  
If this Linksys product contains open source software  
licensed under Version 2 of the “GNU General Public  
License” then the license terms below in this Schedule 2  
will apply to that open source software. The license terms  
below in this Schedule 2 are from the public web site at  
Open Source Software. The GPL or other open source  
code incorporated into the Software and the open source  
licenseforsuchsourcecodeareavailableforfreedownload  
at http://www.lꢀnksys.com/gpl. If You would like a copy  
of the GPL or other open source code in this Software on a  
CD, Linksys will mail to You a CD with such code for $9.99  
plus the cost of shipping, upon request.  
GNU GENERAL PUBLIC LICENSE  
Term and Termination. You may terminate this License  
at any time by destroying all copies of the Software  
and documentation. Your rights under this License will  
terminate immediately without notice from Linksys if You  
fail to comply with any provision of this Agreement.  
Version 2, June 1991  
Copyright © 1989, 1991 Free Software Foundation, Inc.  
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301,  
USA  
Limited Warranty. The warranty terms and period  
specified in the applicable Linksys Product User Guide  
shall also apply to the Software.  
Everyone is permitted to copy and distribute verbatim  
copies of this license document, but changing it is not  
allowed.  
Disclaimer of Liabilities. IN NO EVENT WILL LINKSYS OR  
ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA, REVENUE  
OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL,  
INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF  
CAUSE (INCLUDING NEGLIGENCE), ARISING OUT OF  
OR RELATED TO THE USE OF OR INABILITY TO USE THE  
Preamble  
The licenses for most software are designed to take away  
your freedom to share and change it. By contrast, the  
GNU General Public License is intended to guarantee your  
Wꢀreless-G Router for Mobꢀle Broadband  
ꢁ3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Software License Agreement  
ChapterꢀNumber  
freedom to share and change free software–to make sure  
the software is free for all its users. This General Public  
License applies to most of the Free Software Foundation’s  
software and to any other program whose authors  
commit to using it. (Some other Free Software Foundation  
software is covered by the GNU Lesser General Public  
License instead.) You can apply it to your programs, too.  
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND  
MODIFICATION  
0. This License applies to any program or other work  
which contains a notice placed by the copyright  
holder saying it may be distributed under the terms  
of this General Public License. The “Program, below,  
refers to any such program or work, and a “work  
based on the Program” means either the Program  
or any derivative work under copyright law: that is  
to say, a work containing the Program or a portion  
of it, either verbatim or with modifications and/  
or translated into another language. (Hereinafter,  
translation is included without limitation in the term  
“modification.) Each licensee is addressed as “you.  
When we speak of free software, we are referring to  
freedom, not price. Our General Public Licenses are  
designed to make sure that you have the freedom to  
distribute copies of free software (and charge for this  
service if you wish), that you receive source code or can  
get it if you want it, that you can change the software or  
use pieces of it in new free programs; and that you know  
you can do these things.  
To protect your rights, we need to make restrictions that  
forbid anyone to deny you these rights or to ask you to  
surrender the rights. These restrictions translate to certain  
responsibilities for you if you distribute copies of the  
software, or if you modify it.  
Activities other than copying, distribution and  
modification are not covered by this License; they  
are outside its scope. The act of running the Program  
is not restricted, and the output from the Program is  
covered only if its contents constitute a work based on  
the Program (independent of having been made by  
running the Program). Whether that is true depends  
on what the Program does.  
For example, if you distribute copies of such a program,  
whether gratis or for a fee, you must give the recipients  
all the rights that you have. You must make sure that they,  
too, receive or can get the source code. And you must  
show them these terms so they know their rights.  
1. You may copy and distribute verbatim copies of the  
Program’s source code as you receive it, in any medium,  
provided that you conspicuously and appropriately  
publish on each copy an appropriate copyright  
notice and disclaimer of warranty; keep intact all the  
notices that refer to this License and to the absence  
of any warranty; and give any other recipients of the  
Program a copy of this License along with the Program.  
We protect your rights with two steps: (1) copyright the  
software, and (2) offer you this license which gives you  
legal permission to copy, distribute and/or modify the  
software.  
Also, for each author’s protection and ours, we want to  
make certain that everyone understands that there is no  
warranty for this free software. If the software is modified  
by someone else and passed on, we want its recipients  
to know that what they have is not the original, so that  
any problems introduced by others will not reflect on the  
original authorsreputations.  
You may charge a fee for the physical act of transferring  
a copy, and you may at your option offer warranty  
protection in exchange for a fee.  
2. You may modify your copy or copies of the Program  
or any portion of it, thus forming a work based on the  
Program, and copy and distribute such modifications  
or work under the terms of Section 1 above, provided  
that you also meet all of these conditions:  
Finally, any free program is threatened constantly by  
software patents. We wish to avoid the danger that  
redistributors of a free program will individually obtain  
patent licenses, in effect making the program proprietary.  
To prevent this, we have made it clear that any patent must  
be licensed for everyone’s free use or not licensed at all.  
a. You must cause the modified files to carry  
prominent notices stating that you changed the  
files and the date of any change.  
The precise terms and conditions for copying, distribution  
and modification follow.  
b. You must cause any work that you distribute or  
publish, that in whole or in part contains or is  
derived from the Program or any part thereof, to be  
licensed as a whole at no charge to all third parties  
under the terms of this License.  
Wꢀreless-G Router for Mobꢀle Broadband  
ꢁꢁ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Software License Agreement  
ChapterꢀNumber  
c. If the modified program normally reads commands  
c. Accompany it with the information you received as  
totheoffertodistributecorrespondingsourcecode.  
(This alternative is allowed only for noncommercial  
distribution and only if you received the program  
in object code or executable form with such an  
offer, in accord with Subsection b above.)  
interactively when run, you must cause it, when  
started running for such interactive use in the most  
ordinary way, to print or display an announcement  
including an appropriate copyright notice and  
a notice that there is no warranty (or else, saying  
that you provide a warranty) and that users may  
redistribute the program under these conditions,  
and telling the user how to view a copy of  
this License. (Exception: if the Program itself is  
interactive but does not normally print such an  
announcement, your work based on the Program  
is not required to print an announcement.)  
The source code for a work means the preferred form  
of the work for making modifications to it. For an  
executable work, complete source code means all  
the source code for all modules it contains, plus any  
associated interface definition files, plus the scripts  
used to control compilation and installation of the  
executable. However, as a special exception, the source  
code distributed need not include anything that is  
normally distributed (in either source or binary form)  
with the major components (compiler, kernel, and so  
on) of the operating system on which the executable  
runs, unless that component itself accompanies the  
executable.  
These requirements apply to the modified work as  
a whole. If identifiable sections of that work are not  
derived from the Program, and can be reasonably  
considered independent and separate works in  
themselves, then this License, and its terms, do not  
apply to those sections when you distribute them as  
separate works. But when you distribute the same  
sections as part of a whole which is a work based on  
the Program, the distribution of the whole must be on  
the terms of this License, whose permissions for other  
licensees extend to the entire whole, and thus to each  
and every part regardless of who wrote it.  
If distribution of executable or object code is made  
by offering access to copy from a designated place,  
then offering equivalent access to copy the source  
code from the same place counts as distribution of  
the source code, even though third parties are not  
compelled to copy the source along with the object  
code.  
Thus, it is not the intent of this section to claim rights  
or contest your rights to work written entirely by you;  
rather, the intent is to exercise the right to control the  
distribution of derivative or collective works based on  
the Program.  
4. You may not copy, modify, sublicense, or distribute  
the Program except as expressly provided under  
this License. Any attempt otherwise to copy, modify,  
sublicense or distribute the Program is void, and will  
automatically terminate your rights under this License.  
However, parties who have received copies, or rights,  
from you under this License will not have their licenses  
terminated so long as such parties remain in full  
compliance.  
In addition, mere aggregation of another work not  
based on the Program with the Program (or with a  
work based on the Program) on a volume of a storage  
or distribution medium does not bring the other work  
under the scope of this License.  
5. You are not required to accept this License, since you  
have not signed it. However, nothing else grants you  
permission to modify or distribute the Program or its  
derivative works. These actions are prohibited by law if  
you do not accept this License.Therefore, by modifying  
or distributing the Program (or any work based on the  
Program), you indicate your acceptance of this License  
to do so, and all its terms and conditions for copying,  
distributing or modifying the Program or works based  
on it.  
3. You may copy and distribute the Program (or a  
work based on it, under Section 2) in object code or  
executable form under the terms of Sections 1 and 2  
above provided that you also do one of the following:  
a. Accompany it with the complete corresponding  
machine-readable source code, which must be  
distributed under the terms of Sections 1 and 2  
above on a medium customarily used for software  
interchange; or,  
b. Accompany it with a written offer, valid for at least  
three years, to give any third party, for a charge  
no more than your cost of physically performing  
source distribution, a complete machine-readable  
copy of the corresponding source code, to be  
distributed under the terms of Sections 1 and 2  
above on a medium customarily used for software  
interchange; or,  
6. Each time you redistribute the Program (or any work  
based on the Program), the recipient automatically  
receives a license from the original licensor to copy,  
distribute or modify the Program subject to these  
terms and conditions. You may not impose any further  
restrictions on the recipients’ exercise of the rights  
granted herein. You are not responsible for enforcing  
compliance by third parties to this License.  
Wꢀreless-G Router for Mobꢀle Broadband  
ꢁꢂ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Software License Agreement  
ChapterꢀNumber  
7. If, as a consequence of a court judgment or allegation  
of patent infringement or for any other reason (not  
limited to patent issues), conditions are imposed on  
you (whether by court order, agreement or otherwise)  
that contradict the conditions of this License, they do  
not excuse you from the conditions of this License. If  
you cannot distribute so as to satisfy simultaneously  
your obligations under this License and any other  
pertinent obligations, then as a consequence you  
may not distribute the Program at all. For example,  
if a patent license would not permit royalty-free  
redistribution of the Program by all those who receive  
copies directly or indirectly through you, then the only  
way you could satisfy both it and this License would be  
to refrain entirely from distribution of the Program.  
not specify a version number of this License, you  
may choose any version ever published by the Free  
Software Foundation.  
10. If you wish to incorporate parts of the Program into  
other free programs whose distribution conditions are  
different, write to the author to ask for permission. For  
software which is copyrighted by the Free Software  
Foundation, write to the Free Software Foundation; we  
sometimes make exceptions for this. Our decision will  
be guided by the two goals of preserving the free status  
of all derivatives of our free software and of promoting  
the sharing and reuse of software generally.  
NO WARRANTY  
11. BECAUSETHEPROGRAMISLICENSEDFREEOFCHARGE,  
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE  
EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT  
WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT  
HOLDERS AND/OR OTHER PARTIES PROVIDE THE  
PROGRAM “AS IS” WITHOUT WARRANTY OF ANY  
KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,  
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF  
MERCHANTABILITY AND FITNESS FOR A PARTICULAR  
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND  
PERFORMANCE OF THE PROGRAM IS WITH YOU.  
SHOULD THE PROGRAM PROVE DEFECTIVE, YOU  
ASSUME THE COST OF ALL NECESSARY SERVICING,  
REPAIR OR CORRECTION.  
If any portion of this section is held invalid or  
unenforceable under any particular circumstance,  
the balance of the section is intended to apply and  
the section as a whole is intended to apply in other  
circumstances.  
It is not the purpose of this section to induce you to  
infringe any patents or other property right claims or  
to contest validity of any such claims; this section has  
the sole purpose of protecting the integrity of the free  
software distribution system, which is implemented  
by public license practices. Many people have  
made generous contributions to the wide range of  
software distributed through that system in reliance  
on consistent application of that system; it is up to  
the author/donor to decide if he or she is willing to  
distribute software through any other system and a  
licensee cannot impose that choice.  
12. INNOEVENTUNLESSREQUIREDBYAPPLICABLELAWOR  
AGREEDTO INWRITINGWILL ANY COPYRIGHT HOLDER,  
OR ANY OTHER PARTY WHO MAY MODIFY AND/OR  
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE,  
BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY  
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL  
DAMAGES ARISING OUT OF THE USE OR INABILITY TO  
USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO  
LOSS OF DATA OR DATA BEING RENDERED INACCURATE  
OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR  
A FAILURE OF THE PROGRAM TO OPERATE WITH ANY  
OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER  
PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF  
SUCH DAMAGES.  
This section is intended to make thoroughly clear  
what is believed to be a consequence of the rest of this  
License.  
8. If the distribution and/or use of the Program is  
restricted in certain countries either by patents or by  
copyrighted interfaces, the original copyright holder  
who places the Program under this License may add an  
explicit geographical distribution limitation excluding  
those countries, so that distribution is permitted only  
in or among countries not thus excluded. In such case,  
this License incorporates the limitation as if written in  
the body of this License.  
END OF TERMS AND CONDITIONS  
END OF SCHEDULE 2  
9. The Free Software Foundation may publish revised  
and/or new versions of the General Public License  
from time to time. Such new versions will be similar in  
spirit to the present version, but may differ in detail to  
address new problems or concerns.  
Schedule 3  
If this Linksys product contains open source software  
licensed under the OpenSSL license:  
This product includes software developed by the  
OpenSSL Project for use in the OpenSSL Toolkit.  
Each version is given a distinguishing version number.  
If the Program specifies a version number of this  
License which applies to it and “any later version, you  
have the option of following the terms and conditions  
either of that version or of any later version published  
by the Free Software Foundation. If the Program does  
This product includes cryptographic software written by  
Eric Young ([email protected]).  
Wꢀreless-G Router for Mobꢀle Broadband  
ꢁꢃ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Software License Agreement  
ChapterꢀNumber  
This product includes software written by Tim Hudson  
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,  
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE  
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;  
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND  
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,  
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR  
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF  
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF  
SUCH DAMAGE.  
In addition, if this Linksys product contains open  
source software licensed under the OpenSSL license  
then the license terms below in this Schedule 3 will  
apply to that open source software. The license terms  
below in this Schedule 3 are from the public web site at  
The OpenSSL toolkit stays under a dual license, i.e. both  
the conditions of the OpenSSL License and the original  
SSLeay license apply to the toolkit. See below for the  
actual license texts. Actually both licenses are BSD-style  
Open Source licenses. In case of any license issues related  
to OpenSSL please contact [email protected].  
This product includes cryptographic software written by  
Eric Young ([email protected]). This product includes  
software written by Tim Hudson ([email protected]).  
Original SSLeay License  
Copyright © 1995-1998 EricYoung ([email protected])All  
rights reserved.  
OpenSSL License  
Copyright © 1998-2007 The OpenSSL Project. All rights  
reserved.  
This package is an SSL implementation written by Eric  
Young ([email protected]).  
Redistribution and use in source and binary forms, with  
or without modification, are permitted provided that the  
following conditions are met:  
The implementation was written so as to conform with  
Netscape’s SSL.  
This library is free for commercial and non-commercial  
use as long as the following conditions are adhered to.  
The following conditions apply to all code found in this  
distribution, be it the RC4, RSA, lhash, DES, etc., code; not  
just the SSL code. The SSL documentation included with  
this distribution is covered by the same copyright terms  
except that the holder is Tim Hudson (tjh@cryptsoft.  
com).  
1. Redistributions of source code must retain the above  
copyright notice, this list of conditions and the  
following disclaimer.  
2. Redistributions in binary form must reproduce the  
above copyright notice, this list of conditions and the  
following disclaimer in the documentation and/or  
other materials provided with the distribution.  
Copyright remains Eric Young’s, and as such any Copyright  
notices in the code are not to be removed.  
3. All advertising materials mentioning features or  
use of this software must display the following  
acknowledgment: “This product includes software  
developed by the OpenSSL Project for use in the  
OpenSSL Toolkit. (http://www.openssl.org/)”  
If this package is used in a product, Eric Young should be  
given attribution as the author of the parts of the library  
used. This can be in the form of a textual message at  
program startup or in documentation (online or textual)  
provided with the package.  
4. The names “OpenSSL Toolkit” and “OpenSSL Project”  
must not be used to endorse or promote products  
derived from this software without prior written  
permission. For written permission, please contact  
Redistribution and use in source and binary forms, with  
or without modification, are permitted provided that the  
following conditions are met:  
5. Products derived from this software may not be called  
“OpenSSLnor may “OpenSSLappear in their names  
without prior written permission of the OpenSSL  
Project.  
1. Redistributions of source code must retain the  
copyright notice, this list of conditions and the  
following disclaimer.  
2. Redistributions in binary form must reproduce the  
above copyright notice, this list of conditions and the  
following disclaimer in the documentation and/or  
other materials provided with the distribution.  
6. Redistributions of any form whatsoever must retain  
the following acknowledgment:“This product includes  
software developed by the OpenSSL Project for use in  
the OpenSSL Toolkit (http://www.openssl.org/)”  
3. All advertising materials mentioning features or  
use of this software must display the following  
acknowledgement:  
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT  
``AS IS’’ AND ANY EXPRESSED OR IMPLIED WARRANTIES,  
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED  
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR  
A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT  
SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE  
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,  
“This product includes cryptographic software written  
by Eric Young ([email protected])”  
Wꢀreless-G Router for Mobꢀle Broadband  
ꢁꢄ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Software License Agreement  
ChapterꢀNumber  
The word ‘cryptographic’ can be left out if the routines  
from the library being used are not cryptographic  
related.  
4. IfyouincludeanyWindowsspecificcode(oraderivative  
thereof) from the apps directory (application code)  
you must include an acknowledgement:“This product  
includes software written by Tim Hudson (tjh@  
cryptsoft.com)”  
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS’’  
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,  
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF  
MERCHANTABILITY AND FITNESS FOR A PARTICULAR  
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE  
AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY  
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,  
OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT  
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR  
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS  
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY  
OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,  
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)  
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,  
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.  
Thelicenseanddistributiontermsforanypubliclyavailable  
version or derivative of this code cannot be changed. i.e.  
this code cannot simply be copied and put under another  
distribution license [including the GNU Public License.]  
END OF SCHEDULE 3  
Wꢀreless-G Router for Mobꢀle Broadband  
ꢁꢅ  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Specifications  
AppendixꢀE  
Appendꢀx E:  
Contact Informatꢀon  
Sprint Online Resource  
Sprint Technical Support  
Contact Sprint at 1-888-211-4727.  
NOTE: Make sure you have the Sprint phone  
number of your mobile broadband connection  
card or USB adapter ready before calling.  
To get the Sprint phone number, start the  
Connection Manager, and then click Menu,  
Devꢀce Info & Dꢀagnostꢀcs.  
8041020A-DF  
Wꢀreless-G Router for Mobꢀle Broadband  
ꢁ9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 

Kyocera Cell Phone 82 K5483 1EN User Manual
Lennox International Inc Blower 10ACB User Manual
LG Electronics CD Player U8360 User Manual
Life Fitness Treadmill T35 User Manual
Lincoln Electric Welding System C2410 User Manual
Logitech Webcam c200 User Manual
LOREX Technology Security Camera LW1000 User Manual
Magnasonic Digital Photo Frame 07MF119 User Manual
Maytag Clothes Dryer MGD5600TQ1 User Manual
Midland Radio Radio CB 1 User Manual