User Guide
Page 7
...) firewall and Network Address Translation (NAT) technology. psk (pre-shared key): a wireless security protocol using the Setup Wizard on the Setup CD-ROM for choosing the Linksys Wireless-N Home Router. Wireless-N Home Router Chapter 1: Introduction Welcome Thank you need to an Internet connection over a network. A router is called a WLAN, or Wireless Local Area Network. PCs equipped with a RADIUS server. lan (local...
...) firewall and Network Address Translation (NAT) technology. psk (pre-shared key): a wireless security protocol using the Setup Wizard on the Setup CD-ROM for choosing the Linksys Wireless-N Home Router. Wireless-N Home Router Chapter 1: Introduction Welcome Thank you need to an Internet connection over a network. A router is called a WLAN, or Wireless Local Area Network. PCs equipped with a RADIUS server. lan (local...
User Guide
Page 15
... Utility: • Basic Setup. The Router's default password is admin. Use this screen. • Advanced Routing. Chapter 5: Configuring the Wireless-N Home Router 9 Overview Additional tabs will describe each page's key functions. If you can call your ISP... configure the Router's advanced settings through use of a computer connected to use this screen to configure the Router. Wireless-N Home Router Chapter 5: Configuring the Wireless-N Home Router Overview Linksys recommends using the Setup CD-ROM for your wireless network. The Utility can configure the Router. •...
... Utility: • Basic Setup. The Router's default password is admin. Use this screen. • Advanced Routing. Chapter 5: Configuring the Wireless-N Home Router 9 Overview Additional tabs will describe each page's key functions. If you can call your ISP... configure the Router's advanced settings through use of a computer connected to use this screen to configure the Router. Wireless-N Home Router Chapter 5: Configuring the Wireless-N Home Router Overview Linksys recommends using the Setup CD-ROM for your wireless network. The Utility can configure the Router. •...
User Guide
Page 17
...Wireless Network. How to undo your area. 11 Then click the OK button. The Setup Tab - Automatic Configuration - A screen will differ depending on a tab, click Help. DHCP, Static IP, PPPoE, PPTP, Telstra Cable, and L2TP. Basic Setup (Automatic Configuration - Press the Enter key... configures the Router for your ISP. This provides status information about the Router. • Local Network. When you access the Web-based Utility. Chapter 5: Configuring the Wireless-N Home Router How to Automatic Configuration - DHCP By default, the Router's Internet Connection...
...Wireless Network. How to undo your area. 11 Then click the OK button. The Setup Tab - Automatic Configuration - A screen will differ depending on a tab, click Help. DHCP, Static IP, PPPoE, PPTP, Telstra Cable, and L2TP. Basic Setup (Automatic Configuration - Press the Enter key... configures the Router for your ISP. This provides status information about the Router. • Local Network. When you access the Web-based Utility. Chapter 5: Configuring the Wireless-N Home Router How to Automatic Configuration - DHCP By default, the Router's Internet Connection...
User Guide
Page 29
... Chapter 5: Configuring the Wireless-N Home Router The Wireless Tab - Select the algorithm you do not want to "Appendix B: Wireless Security." Wireless-N Home Router The Wireless Tab - PSK-Personal ...Encryption. It must have 8-63 characters. WEP stands for Wired Equivalent Privacy, while RADIUS stands for Remote Authentication Dial-In User Service.) For details on configuring wireless security for the Router, turn to use , AES or TKIP or AES. (AES is a stronger encryption method than TKIP.) Pre-shared Key. Key...
... Chapter 5: Configuring the Wireless-N Home Router The Wireless Tab - Select the algorithm you do not want to "Appendix B: Wireless Security." Wireless-N Home Router The Wireless Tab - PSK-Personal ...Encryption. It must have 8-63 characters. WEP stands for Wired Equivalent Privacy, while RADIUS stands for Remote Authentication Dial-In User Service.) For details on configuring wireless security for the Router, turn to use , AES or TKIP or AES. (AES is a stronger encryption method than TKIP.) Pre-shared Key. Key...
User Guide
Page 30
... use , AES or TKIP or AES. (AES is a stronger encryption method than TKIP.) RADIUS Server. Enter the IP address of your RADIUS server. Key Renewal. Shared Key. RADIUS Port. Wireless-N Home Router PSK-Enterprise This option features PSK used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to...
... use , AES or TKIP or AES. (AES is a stronger encryption method than TKIP.) RADIUS Server. Enter the IP address of your RADIUS server. Key Renewal. Shared Key. RADIUS Port. Wireless-N Home Router PSK-Enterprise This option features PSK used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to...
User Guide
Page 31
... Then click the Generate button. Select the appropriate level of your passphrase. WEP Chapter 5: Configuring the Wireless-N Home Router 25 The Wireless Tab - To automatically generate keys, enter your RADIUS server. Then click the Generate button. TX Key. When you have finished making changes to this screen, click the Save Settings button to save the changes...
... Then click the Generate button. Select the appropriate level of your passphrase. WEP Chapter 5: Configuring the Wireless-N Home Router 25 The Wireless Tab - To automatically generate keys, enter your RADIUS server. Then click the Generate button. TX Key. When you have finished making changes to this screen, click the Save Settings button to save the changes...
User Guide
Page 33
...-Fallback feature. Basic Rate. You can select from each other . The Router will be used. Wireless-N Home Router The Wireless Tab - Other options are not able to transmit to the Router in your network, so they know which allows either Open System or Shared Key authentication to Auto, which rates will automatically use CTS Protection Mode when...
...-Fallback feature. Basic Rate. You can select from each other . The Router will be used. Wireless-N Home Router The Wireless Tab - Other options are not able to transmit to the Router in your network, so they know which allows either Open System or Shared Key authentication to Auto, which rates will automatically use CTS Protection Mode when...
User Guide
Page 57
Wireless-N Home Router B Open a command prompt. If you cannot open a webpage, try the ping command from a different computer to verify that your original computer is not the cause of your Internet or WAN IP address is 1.2.3.4, you would enter ping 1.2.3.4 and press the Enter key. • If you get a reply,... cable/DSL modem. Verify that your cable or DSL modem is not the cause of "Chapter 5: Configuring the Wireless-N Home Router" for details on the Router, cable/DSL modem, and computer. For Windows 2000 and XP: • Click Start and Run. C In the command prompt, type ...
Wireless-N Home Router B Open a command prompt. If you cannot open a webpage, try the ping command from a different computer to verify that your original computer is not the cause of your Internet or WAN IP address is 1.2.3.4, you would enter ping 1.2.3.4 and press the Enter key. • If you get a reply,... cable/DSL modem. Verify that your cable or DSL modem is not the cause of "Chapter 5: Configuring the Wireless-N Home Router" for details on the Router, cable/DSL modem, and computer. For Windows 2000 and XP: • Click Start and Run. C In the command prompt, type ...
User Guide
Page 61
... the firmware with the firmware and TFTP program, and follow the steps in "Appendix C: Upgrading Firmware." 13. Press the F5 key to the web browser, and enter http://192.168.1.1 or the IP address of reasons. Open the pdf that was downloaded along... to the Linksys website at http://www.linksys.com and download the latest firmware. 2. PPPoE is a setup option to the factory default settings. The DSL ISP can disconnect the service after a period of the Router's web-based utility. 14. Appendix A: Troubleshooting 55 Common Problems and Solutions Wireless-N Home Router 11.
... the firmware with the firmware and TFTP program, and follow the steps in "Appendix C: Upgrading Firmware." 13. Press the F5 key to the web browser, and enter http://192.168.1.1 or the IP address of reasons. Open the pdf that was downloaded along... to the Linksys website at http://www.linksys.com and download the latest firmware. 2. PPPoE is a setup option to the factory default settings. The DSL ISP can disconnect the service after a period of the Router's web-based utility. 14. Appendix A: Troubleshooting 55 Common Problems and Solutions Wireless-N Home Router 11.
User Guide
Page 64
... all else fails in the DMZ. Wireless-N Home Router I set the ListenPort to 8080 (to match the mapped port above) and ServerName to the IP assigned to the Router from your ISP. The web page hangs; Obtain and flash the latest firmware release that is 27005. All Linksys firmware upgrades are using another port. ....ini file, set up . How do I block corrupted FTP downloads? If you are get Half-Life: Team Fortress to work with the same CD key connect at the Network Control Panel in your cable or DSL modem by holding down the Reset button until the Power LED fully turns on...
... all else fails in the DMZ. Wireless-N Home Router I set the ListenPort to 8080 (to match the mapped port above) and ServerName to the IP assigned to the Router from your ISP. The web page hangs; Obtain and flash the latest firmware release that is 27005. All Linksys firmware upgrades are using another port. ....ini file, set up . How do I block corrupted FTP downloads? If you are get Half-Life: Team Fortress to work with the same CD key connect at the Network Control Panel in your cable or DSL modem by holding down the Reset button until the Power LED fully turns on...
User Guide
Page 68
Wireless-N Home Router What is called a chip (or chipping code). This bit pattern is DSSS? What is known to its default settings. If your environment. Even if one channel. Press the Reset button on the back panel for retransmission. Every obstacle placed between the Router and a wireless PC will reset the Router... computer logs onto the network, the MAC address of your region and/or country. There is no way to the Linksys website, www.linksys.com. The longer the chip, the greater the probability that allows the network to identify it a valuable identifier for ...
Wireless-N Home Router What is called a chip (or chipping code). This bit pattern is DSSS? What is known to its default settings. If your environment. Even if one channel. Press the Reset button on the back panel for retransmission. Every obstacle placed between the Router and a wireless PC will reset the Router... computer logs onto the network, the MAC address of your region and/or country. There is no way to the Linksys website, www.linksys.com. The longer the chip, the greater the probability that allows the network to identify it a valuable identifier for ...
User Guide
Page 69
... if it harder for a hacker to get that information. Here are stored in mind that network settings (SSID, WEP keys, etc.) are the steps you as possible. Change the default SSID. 2. Use the highest encryption algorithm possible. Your ... to "Chapter 5: Configuring the Wireless-N Home Router." Please note that this may reduce your wireless network. Hackers know that in mind whenever you use, keep the following is available. Appendix B: Wireless Security 63 Security Precautions Wireless-N Home Router Appendix B: Wireless Security Linksys wants to make it is a...
... if it harder for a hacker to get that information. Here are stored in mind that network settings (SSID, WEP keys, etc.) are the steps you as possible. Change the default SSID. 2. Use the highest encryption algorithm possible. Your ... to "Chapter 5: Configuring the Wireless-N Home Router." Please note that this may reduce your wireless network. Hackers know that in mind whenever you use, keep the following is available. Appendix B: Wireless Security 63 Security Precautions Wireless-N Home Router Appendix B: Wireless Security Linksys wants to make it is a...
User Guide
Page 70
... by the factory. (The Linksys default SSID is often looked upon as a cure-all for a hacker to provide protection against your wireless network MUST use . Wired Equivalent Privacy (WEP) is "linksys".) Hackers know these defaults and...wireless security concerns. Wireless networking products come with a random MAC Address. This makes it often Most wireless networking devices will allow you use the same security method and key, or else your wireless network will have gained access to your WEP key regularly PSK.Pre-Shared Key (PSK) is overstating WEP's ability. Wireless-N Home Router...
... by the factory. (The Linksys default SSID is often looked upon as a cure-all for a hacker to provide protection against your wireless network MUST use . Wired Equivalent Privacy (WEP) is "linksys".) Hackers know these defaults and...wireless security concerns. Wireless networking products come with a random MAC Address. This makes it often Most wireless networking devices will allow you use the same security method and key, or else your wireless network will have gained access to your WEP key regularly PSK.Pre-Shared Key (PSK) is overstating WEP's ability. Wireless-N Home Router...
User Guide
Page 71
... most flexible and convenient technology Linksys has to offer. Enter a Key Renewal period time between 0 and 99,999 seconds, which instructs the Router or other device how often it should be used. Then enter the key shared between the Router and its RADIUS server. Appendix B: Wireless Security 65 Security Threats Facing Wireless Networks Wireless-N Home Router PSK-Enterprise and PSK2...
... most flexible and convenient technology Linksys has to offer. Enter a Key Renewal period time between 0 and 99,999 seconds, which instructs the Router or other device how often it should be used. Then enter the key shared between the Router and its RADIUS server. Appendix B: Wireless Security 65 Security Threats Facing Wireless Networks Wireless-N Home Router PSK-Enterprise and PSK2...
User Guide
Page 74
... and/or MAC address cloning feature of your computer's Ethernet adapter. NOTE: The MAC address is used for the Router's filtering, forwarding, and/or DMZ features. Wireless-N Home Router Appendix E: Finding the MAC Address and IP Address for Your Ethernet Adapter This section describes how to find the MAC... MAC Address/Adapter Address Appendix E: Finding the MAC Address and IP Address for MAC address cloning or MAC filtering. Then press the Enter key or the OK button. 2. This IP address is also called the Adapter Address. Click Start and Run. You can use for Your Ethernet...
... and/or MAC address cloning feature of your computer's Ethernet adapter. NOTE: The MAC address is used for the Router's filtering, forwarding, and/or DMZ features. Wireless-N Home Router Appendix E: Finding the MAC Address and IP Address for Your Ethernet Adapter This section describes how to find the MAC... MAC Address/Adapter Address Appendix E: Finding the MAC Address and IP Address for MAC address cloning or MAC filtering. Then press the Enter key or the OK button. 2. This IP address is also called the Adapter Address. Click Start and Run. You can use for Your Ethernet...
User Guide
Page 75
...is what you will use for Your Ethernet Adapter Windows 2000 or XP Instructions Figure E-5: MAC Address Cloning 69 Wireless-N Home Router Windows 2000 or XP Instructions 1. Press the Enter key or click the OK button. 2. Your computer may show something different. In the Open field, enter cmd...a series of numbers and letters. This appears as shown on your Ethernet adapter. For more information, refer to "Chapter 5: Configuring the Wireless-N Home Router." it is also called the Physical Address. NOTE: The MAC address is the MAC address for your computer screen (Figure E-3); For MAC ...
...is what you will use for Your Ethernet Adapter Windows 2000 or XP Instructions Figure E-5: MAC Address Cloning 69 Wireless-N Home Router Windows 2000 or XP Instructions 1. Press the Enter key or click the OK button. 2. Your computer may show something different. In the Open field, enter cmd...a series of numbers and letters. This appears as shown on your Ethernet adapter. For more information, refer to "Chapter 5: Configuring the Wireless-N Home Router." it is also called the Physical Address. NOTE: The MAC address is the MAC address for your computer screen (Figure E-3); For MAC ...
User Guide
Page 78
.... LAN - The computers and networking products that displays the IP address for Linksys products. Mbps (MegaBits Per Second) - NAT technology translates IP addresses of ...data transport. PPTP (Point-to deliver both data and power. This protocol is online. Wireless-N Home Router IP Address - An Internet utility used on a network. A type of broadband connection...like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for a particular networking device. IPCONFIG - RADIUS (Remote Authentication Dial-In User Service) -...
.... LAN - The computers and networking products that displays the IP address for Linksys products. Mbps (MegaBits Per Second) - NAT technology translates IP addresses of ...data transport. PPTP (Point-to deliver both data and power. This protocol is online. Wireless-N Home Router IP Address - An Internet utility used on a network. A type of broadband connection...like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for a particular networking device. IPCONFIG - RADIUS (Remote Authentication Dial-In User Service) -...
User Guide
Page 80
Wireless-N Home Router TKIP (Temporal Key Integrity Protocol) - The physical layout of a file located on a wireless network for each other wirelessly. To replace existing software or firmware with a RADIUS server. The address of a network. VPN (Virtual Private Network) - WEP (Wired Equivalent Privacy) - Transmission Rate. a wireless...- The Internet. WPA (Wi-Fi Protected Access) - WLAN (Wireless Local Area Network) - URL (Uniform Resource Locator) - a wireless security protocol using TKIP (Temporal Key Integrity Protocol) encryption, which can be used in conjunction with a...
Wireless-N Home Router TKIP (Temporal Key Integrity Protocol) - The physical layout of a file located on a wireless network for each other wirelessly. To replace existing software or firmware with a RADIUS server. The address of a network. VPN (Virtual Private Network) - WEP (Wired Equivalent Privacy) - Transmission Rate. a wireless...- The Internet. WPA (Wi-Fi Protected Access) - WLAN (Wireless Local Area Network) - URL (Uniform Resource Locator) - a wireless security protocol using TKIP (Temporal Key Integrity Protocol) encryption, which can be used in conjunction with a...
User Guide
Page 81
Wireless-N Home Router Appendix G: Specifications Model Standards Ports Button Cabling Type LEDs # of Antennas RF Power Antenna Gain in dBi UPnP able/cert Security Features WEP Key Bits Dimensions (W x H x D) Unit Weight Power Certifications WRT150N 802.11g, 802.11b, 802.3, 802.3u Power, Internet, Ethernet Reset, Security CAT 5 Power, Internet, Ethernet (1-4), Wireless, Security 2 17 dBm (average), 23 dBm (peak) 1.8 able WEP, PSK, PSK2, RADIUS 64, 128 5.91" x 1.5" x 6.7" (150 mm x 38 mm x 170 mm) 13.05 oz. (0.37 kg) 12V, 1A FCC, CE, IC-03 Appendix G: Specifications 75
Wireless-N Home Router Appendix G: Specifications Model Standards Ports Button Cabling Type LEDs # of Antennas RF Power Antenna Gain in dBi UPnP able/cert Security Features WEP Key Bits Dimensions (W x H x D) Unit Weight Power Certifications WRT150N 802.11g, 802.11b, 802.3, 802.3u Power, Internet, Ethernet Reset, Security CAT 5 Power, Internet, Ethernet (1-4), Wireless, Security 2 17 dBm (average), 23 dBm (peak) 1.8 able WEP, PSK, PSK2, RADIUS 64, 128 5.91" x 1.5" x 6.7" (150 mm x 38 mm x 170 mm) 13.05 oz. (0.37 kg) 12V, 1A FCC, CE, IC-03 Appendix G: Specifications 75