User Guide
Page 2
...web browser, you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This... address. WARNING: This exclamation point indicates that there is a caution or warning and it . Wireless-N Home Router About This Guide i About This Guide Icon Descriptions While reading through the User Guide you may ...names are registered trademarks or trademarks of their respective holders. Resource Website Linksys Linksys International Glossary www.linksysbycisco.com www.linksysbycisco.com/international www.linksysbycisco.com/glossary Network Security ...
...web browser, you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This... address. WARNING: This exclamation point indicates that there is a caution or warning and it . Wireless-N Home Router About This Guide i About This Guide Icon Descriptions While reading through the User Guide you may ...names are registered trademarks or trademarks of their respective holders. Resource Website Linksys Linksys International Glossary www.linksysbycisco.com www.linksysbycisco.com/international www.linksysbycisco.com/glossary Network Security ...
User Guide
Page 3
... 4 Setup > DDNS 8 Setup > MAC Address Clone 9 Setup > Advanced Routing 9 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 12 Wireless > Wireless MAC Filter 14 Wireless > Advanced Wireless Settings 15 Security > Firewall 16 Security > VPN Passthrough 17 Access Restrictions > Internet Access ...Defaults 25 Administration > Firmware Upgrade 25 Status > Router 26 Status > Local Network 26 Status > Wireless Network 27 Appendix A: Troubleshooting 28 Appendix B: Specifications 29 Appendix C: Warranty Information 30 Limited Warranty 30 Wireless-N Home Router ii
... 4 Setup > DDNS 8 Setup > MAC Address Clone 9 Setup > Advanced Routing 9 Wireless > Basic Wireless Settings 10 Wireless > Wireless Security 12 Wireless > Wireless MAC Filter 14 Wireless > Advanced Wireless Settings 15 Security > Firewall 16 Security > VPN Passthrough 17 Access Restrictions > Internet Access ...Defaults 25 Administration > Firmware Upgrade 25 Status > Router 26 Status > Local Network 26 Status > Wireless Network 27 Appendix A: Troubleshooting 28 Appendix B: Specifications 29 Appendix C: Warranty Information 30 Limited Warranty 30 Wireless-N Home Router ii
User Guide
Page 7
...wireless devices with specific MAC addresses. For example, you can specify the MAC address of each computer in your home so that only those computers can be intercepted. Additional Security Tips •• Keep wireless routers, access points, or gateways away from connecting to your wireless...with WEP, because WPA/WPA2 uses dynamic key encryption. Linksys wireless products use linksys as your network equipment. Because wireless networking operates by the factory. With MAC address filtering enabled, wireless network access is an older encryption standard and may open ...
...wireless devices with specific MAC addresses. For example, you can specify the MAC address of each computer in your home so that only those computers can be intercepted. Additional Security Tips •• Keep wireless routers, access points, or gateways away from connecting to your wireless...with WEP, because WPA/WPA2 uses dynamic key encryption. Linksys wireless products use linksys as your network equipment. Because wireless networking operates by the factory. With MAC address filtering enabled, wireless network access is an older encryption standard and may open ...
User Guide
Page 13
...currently registered with your ISP to physical changes in order to reach a specific host or network. If another network destination. Dynamic Routing (RIP) Enabled/Disabled This feature enables the Router to automatically adjust to the Router with your ISP here. Chapter 3 TZO.com Setup > DDNS > ...changes. Click Save Settings to apply your changes, or click Cancel Changes to select the type(s) of hardware for identification. Wireless-N Home Router Advanced Configuration Click Save Settings to apply your changes, or click Cancel Changes to re-register the MAC address with the ...
...currently registered with your ISP to physical changes in order to reach a specific host or network. If another network destination. Dynamic Routing (RIP) Enabled/Disabled This feature enables the Router to automatically adjust to the Router with your ISP here. Chapter 3 TZO.com Setup > DDNS > ...changes. Click Save Settings to apply your changes, or click Cancel Changes to select the type(s) of hardware for identification. Wireless-N Home Router Advanced Configuration Click Save Settings to apply your changes, or click Cancel Changes to re-register the MAC address with the ...
User Guide
Page 15
... your changes, or click Cancel Changes to your client device or its documentation for further instructions. 11 Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) Wireless-N Home Router Wi-Fi Protected Setup > Congratulations Method #2 Use this method if your changes. Then refer back to...the Router. Click Register. 3. Chapter 3 Wireless-N channel. To broadcast the Router's SSID, keep the default, Auto. Method #1 Use this method if your wireless network. If you are three methods available. If you do not want to the client device you selected a specific channel ...
... your changes, or click Cancel Changes to your client device or its documentation for further instructions. 11 Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) Wireless-N Home Router Wi-Fi Protected Setup > Congratulations Method #2 Use this method if your changes. Then refer back to...the Router. Click Register. 3. Chapter 3 Wireless-N channel. To broadcast the Router's SSID, keep the default, Auto. Method #1 Use this method if your wireless network. If you are three methods available. If you do not want to the client device you selected a specific channel ...
User Guide
Page 20
...between 1 and 255, indicates the interval of 2347. Fragmentation Threshold This value specifies the maximum size for multiple transmissions to specific recipients at its default value of the Delivery Traffic Indication Message (DTIM). This option is disabled by default. This option is..., keep the default selection, Enabled. Denying Proxy will allow anonymous Internet requests. A DTIM field is recommended. Wireless-N Home Router Advanced Configuration Security > Firewall Firewall SPI Firewall Protection To use this option to disable it . Web Filter For...
...between 1 and 255, indicates the interval of 2347. Fragmentation Threshold This value specifies the maximum size for multiple transmissions to specific recipients at its default value of the Delivery Traffic Indication Message (DTIM). This option is disabled by default. This option is..., keep the default selection, Enabled. Denying Proxy will allow anonymous Internet requests. A DTIM field is recommended. Wireless-N Home Router Advanced Configuration Security > Firewall Firewall SPI Firewall Protection To use this option to disable it . Web Filter For...
User Guide
Page 21
... the default, Enabled. To allow PPTP tunnels to pass through an IP network. Wireless-N Home Router Access Restrictions > Internet Access Internet Access Policy Access Policy Access can be tunneled through the Router, keep the default, Enabled. Use the settings on this option to filter cookies. To delete ... exchange of Internet usage and traffic, such as Internet access, designated services, and websites during specific days and times. To allow IPSec tunnels to pass through the Router's firewall. Selecting a policy from the drop‑down menu will display that policy's number ...
... the default, Enabled. To allow PPTP tunnels to pass through an IP network. Wireless-N Home Router Access Restrictions > Internet Access Internet Access Policy Access Policy Access can be tunneled through the Router, keep the default, Enabled. Use the settings on this option to filter cookies. To delete ... exchange of Internet usage and traffic, such as Internet access, designated services, and websites during specific days and times. To allow IPSec tunnels to pass through the Router's firewall. Selecting a policy from the drop‑down menu will display that policy's number ...
User Guide
Page 22
...the appropriate option, Deny or Allow, depending on whether you want this policy, select Enabled. 4. You can block websites with specific URL addresses. Repeat these steps to clear your changes. Enter each URL in the field provided. 3. To remove an application from...You can block up to three applications per policy.) From the Applications list, select the application you want to the Blocked List. Wireless-N Home Router Internet Access PC List 5. Decide which the policy will be enforced. Chapter 3 Advanced Configuration Summary Status Policies are disabled by ...
...the appropriate option, Deny or Allow, depending on whether you want this policy, select Enabled. 4. You can block websites with specific URL addresses. Repeat these steps to clear your changes. Enter each URL in the field provided. 3. To remove an application from...You can block up to three applications per policy.) From the Applications list, select the application you want to the Blocked List. Wireless-N Home Router Internet Access PC List 5. Decide which the policy will be enforced. Chapter 3 Advanced Configuration Summary Status Policies are disabled by ...
User Guide
Page 24
.... To expose one network computer to be the source, select Any IP Address. Check with the Internet application documentation for specific port numbers. DMZ hosting forwards all the ports of one computer. Protocol Select the protocol(s) used by the server or Internet... application, enter the starting and ending port numbers of the forwarded port number range. Wireless-N Home Router Applications and Gaming > DMZ DMZ Any computer whose port is remembered by the Router, so that should have defined. Check with the Internet application documentation for use of ...
.... To expose one network computer to be the source, select Any IP Address. Check with the Internet application documentation for specific port numbers. DMZ hosting forwards all the ports of one computer. Protocol Select the protocol(s) used by the server or Internet... application, enter the starting and ending port numbers of the forwarded port number range. Wireless-N Home Router Applications and Gaming > DMZ DMZ Any computer whose port is remembered by the Router, so that should have defined. Check with the Internet application documentation for use of ...
User Guide
Page 27
...Changes to confirm. The default is the default. Re-enter to confirm Enter the password again to clear your entry. Wireless-N Home Router Advanced Configuration Local Management Access Access via HTTP (HyperText Transport Protocol) is the communications protocol used to connect to servers on... the utility. Access via a wired connection if you can disable wireless access to manage specific Router functions for various Internet applications, such as well.) Otherwise, keep the default, Disabled. Enter the Router's specific Internet IP address in place of xxx.xxx.xxx.xxx, and ...
...Changes to confirm. The default is the default. Re-enter to confirm Enter the password again to clear your entry. Wireless-N Home Router Advanced Configuration Local Management Access Access via HTTP (HyperText Transport Protocol) is the communications protocol used to connect to servers on... the utility. Access via a wired connection if you can disable wireless access to manage specific Router functions for various Internet applications, such as well.) Otherwise, keep the default, Disabled. Enter the Router's specific Internet IP address in place of xxx.xxx.xxx.xxx, and ...
User Guide
Page 32
...manually. Wireless-N Home Router Troubleshooting 4. Click OK. Connect your cable connection to the cable modem, and then insert the setup CD into your DSL modem in order to use the Router, you...connection. After you are used by both the computer and the Router. Click Setup and follow these steps are specific to Internet Explorer but are not addressed here, refer to ...Router. The DSL telephone line does not fit into your modem. Connect the telephone line to the Linksys website, www.linksysbycisco.com 28 Select Never dial a connection. The computer cannot connect wirelessly...
...manually. Wireless-N Home Router Troubleshooting 4. Click OK. Connect your cable connection to the cable modem, and then insert the setup CD into your DSL modem in order to use the Router, you...connection. After you are used by both the computer and the Router. Click Setup and follow these steps are specific to Internet Explorer but are not addressed here, refer to ...Router. The DSL telephone line does not fit into your modem. Connect the telephone line to the Linksys website, www.linksysbycisco.com 28 Select Never dial a connection. The computer cannot connect wirelessly...
User Guide
Page 33
Appendix B Appendix B: Specifications Model WRT120N Standards IEEE 802.3u, 802.11g, 802.11b, Draft 802.11n LEDs Power, Internet, Wireless, Wi-Fi Protected Setup™, Ethernet (1-4) Ports Internet, Ethernet (1-4), Power Buttons Reset, Wi-Fi Protected Setup™ Cabling Type Cat 5 # of Antennas 2 (internal) Detachable ...174;, Wi-Fi Protected Setup™ Operating Temp. 0 to 40°C (32 to 104°F) Storage Temp. -20 to 60°C (-4 to 140°F) Wireless-N Home Router Specifications Operating Humidity 10 to 80%, Noncondensing Storage Humidity 5 to 90% Noncondensing...
Appendix B Appendix B: Specifications Model WRT120N Standards IEEE 802.3u, 802.11g, 802.11b, Draft 802.11n LEDs Power, Internet, Wireless, Wi-Fi Protected Setup™, Ethernet (1-4) Ports Internet, Ethernet (1-4), Power Buttons Reset, Wi-Fi Protected Setup™ Cabling Type Cat 5 # of Antennas 2 (internal) Detachable ...174;, Wi-Fi Protected Setup™ Operating Temp. 0 to 40°C (32 to 104°F) Storage Temp. -20 to 60°C (-4 to 140°F) Wireless-N Home Router Specifications Operating Humidity 10 to 80%, Noncondensing Storage Humidity 5 to 90% Noncondensing...
User Guide
Page 34
...of original purchase. Any repaired or replacement products will be uninterrupted or error free. Without limiting the foregoing, Linksys does Wireless-N Home Router Warranty Information not warrant that any media on which the software may be provided will be free of vulnerability to... product User Guide and at its essential purpose. This limited warranty gives you specific legal rights, and you . The foregoing limitations will be found in accordance with instructions supplied by Linksys, (e) the product has been subjected to abnormal physical or electrical stress, misuse...
...of original purchase. Any repaired or replacement products will be uninterrupted or error free. Without limiting the foregoing, Linksys does Wireless-N Home Router Warranty Information not warrant that any media on which the software may be provided will be free of vulnerability to... product User Guide and at its essential purpose. This limited warranty gives you specific legal rights, and you . The foregoing limitations will be found in accordance with instructions supplied by Linksys, (e) the product has been subjected to abnormal physical or electrical stress, misuse...
User Guide
Page 36
... should be a remote risk of this equipment. This transmitter must not be co-located or operating in conjunction with the specifications for example, in a particular installation. There may cause undesired operation. Appendix D Appendix D: Regulatory Information FCC Statement This ...Industry Canada Statement This Class B digital apparatus complies with IC radiation exposure limits set forth for an uncontrolled environment. Wireless-N Home Router 32 Operation is 50 ohms. Industry Canada Radiation Exposure Statement: This equipment complies with Canadian ICES-003 and RSS210....
... should be a remote risk of this equipment. This transmitter must not be co-located or operating in conjunction with the specifications for example, in a particular installation. There may cause undesired operation. Appendix D Appendix D: Regulatory Information FCC Statement This ...Industry Canada Statement This Class B digital apparatus complies with IC radiation exposure limits set forth for an uncontrolled environment. Wireless-N Home Router 32 Operation is 50 ohms. Industry Canada Radiation Exposure Statement: This equipment complies with Canadian ICES-003 and RSS210....
User Guide
Page 42
... AS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO Wireless-N Home Router Software End User License Agreement THE RETURN PROCESS AND POLICIES OF THE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE. and ...shipping, upon installation of Cisco Systems, Inc. ("Cisco") contains software (including firmware) originating from www.linksysbycisco.com/gpl. Where such specific license terms entitle you have paid any upgrades, updates, bug fixes or modified versions ("Upgrades") or backup copies of the Software supplied...
... AS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO Wireless-N Home Router Software End User License Agreement THE RETURN PROCESS AND POLICIES OF THE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE. and ...shipping, upon installation of Cisco Systems, Inc. ("Cisco") contains software (including firmware) originating from www.linksysbycisco.com/gpl. Where such specific license terms entitle you have paid any upgrades, updates, bug fixes or modified versions ("Upgrades") or backup copies of the Software supplied...
User Guide
Page 43
... the Software or its affiliates may be subject to comply with any data or other information related to receive reports. All rights not specifically granted to you will automatically terminate, at which time you in Schedule 3. Third Party Services, Links and Advertising. Cisco makes no...licensed and not sold to servers at Cisco and/ or a third party at any third party. Other than as to the quality, Wireless-N Home Router Software End User License Agreement suitability, functionality, or legality of Cisco or its licensors retain all right, title and interest, including all copies...
... the Software or its affiliates may be subject to comply with any data or other information related to receive reports. All rights not specifically granted to you will automatically terminate, at which time you in Schedule 3. Third Party Services, Links and Advertising. Cisco makes no...licensed and not sold to servers at Cisco and/ or a third party at any third party. Other than as to the quality, Wireless-N Home Router Software End User License Agreement suitability, functionality, or legality of Cisco or its licensors retain all right, title and interest, including all copies...
User Guide
Page 44
... and use for the purpose of providing you may elect at Privacy Statement. Term and Termination. This limited warranty gives you specific legal rights, and you fail to intrusion or attack. Your rights under this License will be for Cisco, at any other...software or services are libelous, slanderous, defamatory or that are used will apply. Also, due to generate reports. As long as Wireless-N Home Router Software End User License Agreement part of the installation process or by requesting a change certain settings in accordance with any agreements Cisco...
... and use for the purpose of providing you may elect at Privacy Statement. Term and Termination. This limited warranty gives you specific legal rights, and you fail to intrusion or attack. Your rights under this License will be for Cisco, at any other...software or services are libelous, slanderous, defamatory or that are used will apply. Also, due to generate reports. As long as Wireless-N Home Router Software End User License Agreement part of the installation process or by requesting a change certain settings in accordance with any agreements Cisco...
User Guide
Page 55
.... this code cannot be copied and put under another distribution license [including the GNU Public License.] END OF SCHEDULE 3-C Software End User License Agreement Wireless-N Home Router 9042810NC-JL 51 i.e. LOSS OF USE, DATA, OR PROFITS; All advertising materials mentioning features or use of this list of this code cannot simply... Young ([email protected])" The word 'cryptographic' can be left out if the routines from the apps directory (application code) you include anyWindows specific code (or a derivative thereof ) from the library being used are not cryptographic related. 4.
.... this code cannot be copied and put under another distribution license [including the GNU Public License.] END OF SCHEDULE 3-C Software End User License Agreement Wireless-N Home Router 9042810NC-JL 51 i.e. LOSS OF USE, DATA, OR PROFITS; All advertising materials mentioning features or use of this list of this code cannot simply... Young ([email protected])" The word 'cryptographic' can be left out if the routines from the apps directory (application code) you include anyWindows specific code (or a derivative thereof ) from the library being used are not cryptographic related. 4.