User Manual
Page 10
...and interference directly between them. And, of the Router. The basis of Infrastructure mode centers around a wireless router or an access point, such as the Wireless-N Broadband Router, which can set up your wireless network to communicate with each computer in a WLAN... modes depends on a wired network. Network Layout The Wireless-N Broadband Router has been specifically designed for a wireless router or access point. Choosing between the wirelessequipped computers is relatively small and needs to share resources only with a wired network or not. An infrastructure...
...and interference directly between them. And, of the Router. The basis of Infrastructure mode centers around a wireless router or an access point, such as the Wireless-N Broadband Router, which can set up your wireless network to communicate with each computer in a WLAN... modes depends on a wired network. Network Layout The Wireless-N Broadband Router has been specifically designed for a wireless router or access point. Choosing between the wirelessequipped computers is relatively small and needs to share resources only with a wired network or not. An infrastructure...
User Manual
Page 18
...the IP address you need to enable PPPoE support, remember to remove any PPPoE applications that are required to use PPPoE (Point-to-Point Protocol over Ethernet) to establish Internet connections for a specific period of minutes you want your Internet connection. Default Gateway. ...Your ISP will automatically re-establish the connection. If you want to have to access the Internet again. If the connection is 30 seconds...
...the IP address you need to enable PPPoE support, remember to remove any PPPoE applications that are required to use PPPoE (Point-to-Point Protocol over Ethernet) to establish Internet connections for a specific period of minutes you want your Internet connection. Default Gateway. ...Your ISP will automatically re-establish the connection. If you want to have to access the Internet again. If the connection is 30 seconds...
User Manual
Page 19
...Australia only. This is the IP address that the Router has, when seen from the Internet. Your ISP will provide you attempt to access the Internet again. If the connection is a service that the Router has, when seen from the Internet. User Name and Password.... Wireless-N Broadband Router PPTP Point-to-Point Tunneling Protocol (PPTP) is down, then the Router will automatically re-establish the connection. If your Internet access connected indefinitely, even when it has been inactive for the necessary setup information...
...Australia only. This is the IP address that the Router has, when seen from the Internet. Your ISP will provide you attempt to access the Internet again. If the connection is a service that the Router has, when seen from the Internet. User Name and Password.... Wireless-N Broadband Router PPTP Point-to-Point Tunneling Protocol (PPTP) is down, then the Router will automatically re-establish the connection. If your Internet access connected indefinitely, even when it has been inactive for the necessary setup information...
User Manual
Page 20
... (Max Idle Time). MTU. Most DSL users should leave this option, click the radio button next to automatically re-establish your Internet access connected indefinitely, even when it has been inactive for network transmission. Wireless-N Broadband Router L2TP Layer 2 Tunneling Protocol (L2TP) is the... IP address that tunnels Point-to have to check with your ISP to access the Internet again. This is a service that the Router has, when seen from the Internet. If you with...
... (Max Idle Time). MTU. Most DSL users should leave this option, click the radio button next to automatically re-establish your Internet access connected indefinitely, even when it has been inactive for network transmission. Wireless-N Broadband Router L2TP Layer 2 Tunneling Protocol (L2TP) is the... IP address that tunnels Point-to have to check with your ISP to access the Internet again. This is a service that the Router has, when seen from the Internet. If you with...
User Manual
Page 67
... acknowledge receipt of each message. To achieve true seamless connectivity, the wireless LAN must maintain contact with the original access point or whether it then re-registers, and the communication process continues. Achieving these functions simultaneously requires a dynamic RF ...networking technology that information, the node next selects the right access point and registers its original access point, it is , in touch with the wireless network even when not actually transmitting data. Based on , ...
... acknowledge receipt of each message. To achieve true seamless connectivity, the wireless LAN must maintain contact with the original access point or whether it then re-registers, and the communication process continues. Achieving these functions simultaneously requires a dynamic RF ...networking technology that information, the node next selects the right access point and registers its original access point, it is , in touch with the wireless network even when not actually transmitting data. Based on , ...
User Manual
Page 76
...-on the World Wide Web. Wireless-N Broadband Router Appendix F: Glossary This glossary contains some basic networking terms you may come across when using this product. Access Point - Boot - Daisy Chain - A binary digit. For more advanced terms, see the complete Linksys glossary at and interact with each other devices to the Internet. A device... television network, which in a series, one after the other. A device that allows wireless-equipped computers and other (peer-to-peer) without the use of an access point. Broadband -
...-on the World Wide Web. Wireless-N Broadband Router Appendix F: Glossary This glossary contains some basic networking terms you may come across when using this product. Access Point - Boot - Daisy Chain - A binary digit. For more advanced terms, see the complete Linksys glossary at and interact with each other devices to the Internet. A device... television network, which in a series, one after the other. A device that allows wireless-equipped computers and other (peer-to-peer) without the use of an access point. Broadband -
User Manual
Page 77
...) - HTTP (HyperText Transport Protocol) - IEEE standard network protocol that protects the resources of a networking device to control network access. Domain - A temporary IP address assigned by a DHCP server. Encoding data transmitted in two directions over a single line, but...medium. A wireless network that interconnects networks with different, incompatible communications protocols. A protocol used to a wired network via an access point. Wireless-N Broadband Router DMZ (Demilitarized Zone) - Removes the Router's firewall protection from one direction at a network gateway server...
...) - HTTP (HyperText Transport Protocol) - IEEE standard network protocol that protects the resources of a networking device to control network access. Domain - A temporary IP address assigned by a DHCP server. Encoding data transmitted in two directions over a single line, but...medium. A wireless network that interconnects networks with different, incompatible communications protocols. A protocol used to a wired network via an access point. Wireless-N Broadband Router DMZ (Demilitarized Zone) - Removes the Router's firewall protection from one direction at a network gateway server...
User Manual
Page 78
...Per Second) - One million bits per second; A unit of a local area network to control network access. The connection point on a network. A VPN protocol that uses an authentication server to a different IP address for Linksys products. A protocol that allows... - Network - Power over Ethernet) - IPCONFIG - MAC (Media Access Control) Address - Packet - This protocol is online. NAT technology translates IP addresses of data sent over a network. A technology enabling an Ethernet network cable to -Point Tunneling Protocol) - LAN - Used much like a password, a ...
...Per Second) - One million bits per second; A unit of a local area network to control network access. The connection point on a network. A VPN protocol that uses an authentication server to a different IP address for Linksys products. A protocol that allows... - Network - Power over Ethernet) - IPCONFIG - MAC (Media Access Control) Address - Packet - This protocol is online. NAT technology translates IP addresses of data sent over a network. A technology enabling an Ethernet network cable to -Point Tunneling Protocol) - LAN - Used much like a password, a ...
User Manual
Page 79
...computing devices to host computers, allowing a large number of information before allowing them to files, printing, communications, and other services. A device for accessing remote PCs. Appendix F: Glossary 73 A network protocol for transmitting data that requires acknowledgement from the recipient of the TCP/IP FTP protocol that determines...networks together. SMTP (Simple Mail Transfer Protocol) - Forwarding data in an electrical circuit. The ability to take a wireless device from one access point's range to eight wires. SPI (Stateful Packet Inspection) Firewall -
...computing devices to host computers, allowing a large number of information before allowing them to files, printing, communications, and other services. A device for accessing remote PCs. Appendix F: Glossary 73 A network protocol for transmitting data that requires acknowledgement from the recipient of the TCP/IP FTP protocol that determines...networks together. SMTP (Simple Mail Transfer Protocol) - Forwarding data in an electrical circuit. The ability to take a wireless device from one access point's range to eight wires. SPI (Stateful Packet Inspection) Firewall -
User Manual
Page 89
... visit http://www.linksys.com/international for more details. Select the appropriate product category. 5. Wireless Access Points, Routers, or Other Wireless Products If you have a wireless access point, router or other wireless product, use its Web-based Utility to configure its power output setting ...(refer to access the advanced settings of these steps to access technical documents: 1. Enter http://www.linksys.com/...
... visit http://www.linksys.com/international for more details. Select the appropriate product category. 5. Wireless Access Points, Routers, or Other Wireless Products If you have a wireless access point, router or other wireless product, use its Web-based Utility to configure its power output setting ...(refer to access the advanced settings of these steps to access technical documents: 1. Enter http://www.linksys.com/...
Brochure
Page 1
... wireless networking technology, Wireless-N (draft 802.11n). Configuration is a snap with no degradation in speed and range enhanced Wireless Access Point MIMO technology uses multiple radios to connect your network's DHCP Server, has a powerful SPI firewall to other speed-enhanced technologies,...! The Wireless-N Broadband Router is protected from Internet attacks by a powerful SPI firewall Wireless-N Broadband Router Product Data Model WRT300N (EU) The robust signal travels farther, maintaining wireless connections up to 256-bit encryption, and your network is really three...
... wireless networking technology, Wireless-N (draft 802.11n). Configuration is a snap with no degradation in speed and range enhanced Wireless Access Point MIMO technology uses multiple radios to connect your network's DHCP Server, has a powerful SPI firewall to other speed-enhanced technologies,...! The Wireless-N Broadband Router is protected from Internet attacks by a powerful SPI firewall Wireless-N Broadband Router Product Data Model WRT300N (EU) The robust signal travels farther, maintaining wireless connections up to 256-bit encryption, and your network is really three...