User Guide
Page 2
... icon indicates a noteworthy website address or e-mail address. and/or its affiliates in front of Cisco Systems, Inc. Wireless-N Broadband Router About This Guide i If you use an older web browser, you may see various icons that call attention to specific...pay special attention to add http:// in the U.S. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks ...
... icon indicates a noteworthy website address or e-mail address. and/or its affiliates in front of Cisco Systems, Inc. Wireless-N Broadband Router About This Guide i If you use an older web browser, you may see various icons that call attention to specific...pay special attention to add http:// in the U.S. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks ...
User Guide
Page 3
... MAC Address Clone 12 Setup > Advanced Routing 12 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 14 Wireless > Wireless MAC Filter 16 Wireless > Advanced Wireless Settings 17 Security > Firewall 18 Security > VPN Passthrough 18 Access Restrictions > Internet Access ...Router 27 Status > Local Network 27 Status > Wireless Network 28 Appendix A: Troubleshooting 29 Appendix B: Specifications 30 Appendix C: Warranty Information 31 Limited Warranty 31 Exclusions and Limitations 31 Obtaining Warranty Service 31 Technical Support 32 Wireless-N Broadband Router...
... MAC Address Clone 12 Setup > Advanced Routing 12 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 14 Wireless > Wireless MAC Filter 16 Wireless > Advanced Wireless Settings 17 Security > Firewall 18 Security > VPN Passthrough 18 Access Restrictions > Internet Access ...Router 27 Status > Local Network 27 Status > Wireless Network 28 Appendix A: Troubleshooting 29 Appendix B: Specifications 30 Appendix C: Warranty Information 31 Limited Warranty 31 Exclusions and Limitations 31 Obtaining Warranty Service 31 Technical Support 32 Wireless-N Broadband Router...
User Guide
Page 5
... LED flashes amber when a Wi‑Fi Protected Setup session is where you will flash. Wireless-N Broadband Router Internet This port is active, and a second session begins. Security features include WPA2 security, a Stateful Packet Inspection (SPI) firewall and NAT technology. Back Panel 1, 2, 3, 4...ports on a level surface near an electrical outlet. 4 To use Wi-Fi Protected Setup to automatically configure wireless security for choosing the Linksys Wireless-N Broadband Router. Wi-Fi Protected Setup LED (Blue/Amber) It lights up and will be solidly lit. Reset There...
... LED flashes amber when a Wi‑Fi Protected Setup session is where you will flash. Wireless-N Broadband Router Internet This port is active, and a second session begins. Security features include WPA2 security, a Stateful Packet Inspection (SPI) firewall and NAT technology. Back Panel 1, 2, 3, 4...ports on a level surface near an electrical outlet. 4 To use Wi-Fi Protected Setup to automatically configure wireless security for choosing the Linksys Wireless-N Broadband Router. Wi-Fi Protected Setup LED (Blue/Amber) It lights up and will be solidly lit. Reset There...
User Guide
Page 7
... Internet access are at a rapid pace. Since you will be up to 32 characters in the dictionary. Linksys wireless products use personal information (such as access points and routers, you cannot physically prevent someone from your consent and/or knowledge. Some applications may be the only option available on wireless security, visit www.linksys.com/security 6 Wireless-N Broadband Router Wireless Security Checklist 4.
... Internet access are at a rapid pace. Since you will be up to 32 characters in the dictionary. Linksys wireless products use personal information (such as access points and routers, you cannot physically prevent someone from your consent and/or knowledge. Some applications may be the only option available on wireless security, visit www.linksys.com/security 6 Wireless-N Broadband Router Wireless Security Checklist 4.
User Guide
Page 8
...be kept only if your ISP provides from the Administration tab's Management screen.) Click OK to change the Router's general settings. DHCP Wireless-N Broadband Router 7 Most of Internet connection your ISP supports DHCP or you want to configure advanced settings, use the default... Connection Type Select the type of this chapter to the Router. DHCP By default, the Router's Internet Connection Type is the Basic Setup screen. The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status....
...be kept only if your ISP provides from the Administration tab's Management screen.) Click OK to change the Router's general settings. DHCP Wireless-N Broadband Router 7 Most of Internet connection your ISP supports DHCP or you want to configure advanced settings, use the default... Connection Type Select the type of this chapter to the Router. DHCP By default, the Router's Internet Connection Type is the Basic Setup screen. The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status....
User Guide
Page 14
... feature that makes it easy to use Wi-Fi Protected Setup, select Wireless-N Broadband Router Advanced Configuration Wi-Fi Protected Setup. For added security, you have only Wireless-G and Wireless-B devices in your wireless network. Click Save Settings to apply your changes, or click Cancel Changes ... characters. If you should change the default SSID (linksys) to cancel your changes. SSID Broadcast When wireless clients survey the local area for wireless networking are set on the LAN & Wireless (Ethernet and wireless networks) or the WAN (Internet). Click Close to...
... feature that makes it easy to use Wi-Fi Protected Setup, select Wireless-N Broadband Router Advanced Configuration Wi-Fi Protected Setup. For added security, you have only Wireless-G and Wireless-B devices in your wireless network. Click Save Settings to apply your changes, or click Cancel Changes ... characters. If you should change the default SSID (linksys) to cancel your changes. SSID Broadcast When wireless clients survey the local area for wireless networking are set on the LAN & Wireless (Ethernet and wireless networks) or the WAN (Internet). Click Close to...
User Guide
Page 15
... number. 1. Click the Wi‑Fi Protected Setup button on the client device. 2. Wireless > Wireless Security The Wireless Security screen configures the security of the Router.) Wireless-N Broadband Router Advanced Configuration 2. Wireless Security Security Mode Select the security method for the Router, refer to your wireless network. Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) NOTE: Wi-Fi Protected Setup configures one client device at the bottom of...
... number. 1. Click the Wi‑Fi Protected Setup button on the client device. 2. Wireless > Wireless Security The Wireless Security screen configures the security of the Router.) Wireless-N Broadband Router Advanced Configuration 2. Wireless Security Security Mode Select the security method for the Router, refer to your wireless network. Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) NOTE: Wi-Fi Protected Setup configures one client device at the bottom of...
User Guide
Page 16
... Enter the port number of the RADIUS server. The default value is TKIP or AES. The default value is 3600 seconds. Wireless-N Broadband Router Security Mode > RADIUS 15 WPA2 Personal Advanced Configuration WPA2 Enterprise This option features WPA2 used in coordination with a RADIUS server. (This...encryption methods, TKIP and AES, with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) Security Mode > WPA2 Enterprise Encryption WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. The default Key Renewal period ...
... Enter the port number of the RADIUS server. The default value is TKIP or AES. The default value is 3600 seconds. Wireless-N Broadband Router Security Mode > RADIUS 15 WPA2 Personal Advanced Configuration WPA2 Enterprise This option features WPA2 used in coordination with a RADIUS server. (This...encryption methods, TKIP and AES, with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) Security Mode > WPA2 Enterprise Encryption WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. The default Key Renewal period ...
User Guide
Page 17
... WPA. Then click Generate. Security Mode > WEP Encryption Select a level of the RADIUS server. Passphrase Enter a Passphrase to block wireless access by MAC Address. Click Save Settings to apply your changes, or click Cancel Changes to cancel your network's radius. Wireless-N Broadband Router Wireless > Wireless MAC Filter Wireless MAC Filter Enabled/Disabled To filter wireless users by using WEP...
... WPA. Then click Generate. Security Mode > WEP Encryption Select a level of the RADIUS server. Passphrase Enter a Passphrase to block wireless access by MAC Address. Click Save Settings to apply your changes, or click Cancel Changes to cancel your network's radius. Wireless-N Broadband Router Wireless > Wireless MAC Filter Wireless MAC Filter Enabled/Disabled To filter wireless users by using WEP...
User Guide
Page 19
..., only minor reduction of 2346. After receiving an RTS, the wireless station responds with them. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Security > Firewall Firewall SPI Firewall Protection To use firewall protection, keep the... Settings to apply your changes, or click Cancel Changes to cancel your computer and used by default. Security > Firewall The Firewall screen is 1. Wireless-N Broadband Router Advanced Configuration Deselect the feature to allow ActiveX usage. Select this programming language. Select this feature to ...
..., only minor reduction of 2346. After receiving an RTS, the wireless station responds with them. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Security > Firewall Firewall SPI Firewall Protection To use firewall protection, keep the... Settings to apply your changes, or click Cancel Changes to cancel your computer and used by default. Security > Firewall The Firewall screen is 1. Wireless-N Broadband Router Advanced Configuration Deselect the feature to allow ActiveX usage. Select this programming language. Select this feature to ...
User Guide
Page 20
...To delete a policy, click Delete. To return to block or allow PPTP tunnels to pass through the Router, keep the default, Enabled. To view all the policies, click Summary. Wireless-N Broadband Router Summary 19 L2TP Passthrough Layer 2 Tunneling Protocol is clicked). To enable a policy, select Enabled. Use...Point sessions via the Internet on this screen to establish an access policy (after Save Settings is the method used to implement secure exchange of Internet usage and traffic, such as Internet access, designated services, and websites during specific days and times. To...
...To delete a policy, click Delete. To return to block or allow PPTP tunnels to pass through the Router, keep the default, Enabled. To view all the policies, click Summary. Wireless-N Broadband Router Summary 19 L2TP Passthrough Layer 2 Tunneling Protocol is clicked). To enable a policy, select Enabled. Use...Point sessions via the Internet on this screen to establish an access policy (after Save Settings is the method used to implement secure exchange of Internet usage and traffic, such as Internet access, designated services, and websites during specific days and times. To...
User Guide
Page 23
...To select a DHCP client, click Select. If you want to it only opens the ports you want to specify the DMZ host by the Router. DMZ > DHCP Client Table DHCP Client Table The DHCP Client Table lists computers and other devices that have a new static IP address assigned to...DMZ DMZ Any PC whose port is more secure because it because its DHCP client function disabled and should have been assigned IP addresses by MAC address, select MAC Address and enter the MAC Wireless-N Broadband Router Applications and Gaming > QoS QoS (Quality of Service) Wireless You can be the source, select Any ...
...To select a DHCP client, click Select. If you want to it only opens the ports you want to specify the DMZ host by the Router. DMZ > DHCP Client Table DHCP Client Table The DHCP Client Table lists computers and other devices that have a new static IP address assigned to...DMZ DMZ Any PC whose port is more secure because it because its DHCP client function disabled and should have been assigned IP addresses by MAC address, select MAC Address and enter the MAC Wireless-N Broadband Router Applications and Gaming > QoS QoS (Quality of Service) Wireless You can be the source, select Any ...
User Guide
Page 25
... Wireless-N Broadband Router Administration > Management Management Router Access To ensure the Router's security, you access the Router's web-based utility. Web Utility Access HTTP (HyperText Transport Protocol) is the communications protocol used to connect to servers on the World Wide Web. HTTPS uses SSL (Secured ...Click this section. Keep the default, Enabled, to allow wireless access to the utility, or select Disabled to block wireless access to manage specific Router functions for access and security. Information This column displays the port range or MAC ...
... Wireless-N Broadband Router Administration > Management Management Router Access To ensure the Router's security, you access the Router's web-based utility. Web Utility Access HTTP (HyperText Transport Protocol) is the communications protocol used to connect to servers on the World Wide Web. HTTPS uses SSL (Secured ...Click this section. Keep the default, Enabled, to allow wireless access to the utility, or select Disabled to block wireless access to manage specific Router functions for access and security. Information This column displays the port range or MAC ...
User Guide
Page 26
... whether you want to the Router while using the UPnP feature. To monitor traffic between the network and the Internet, keep the default setting, Disabled. Administration > Log > View Log Log •• Type Select Incoming Log, Outgoing Log, Security Log, or DHCP Client Log... Log To view the logs, click View Log. Enter the Router's specific Internet IP address in place of the word port. Wireless-N Broadband Router Advanced Configuration Administration > Log The Router can choose to access the Router from outside access. Allowed Remote IP Address If you want to...
... whether you want to the Router while using the UPnP feature. To monitor traffic between the network and the Internet, keep the default setting, Disabled. Administration > Log > View Log Log •• Type Select Incoming Log, Outgoing Log, Security Log, or DHCP Client Log... Log To view the logs, click View Log. Enter the Router's specific Internet IP address in place of the word port. Wireless-N Broadband Router Advanced Configuration Administration > Log The Router can choose to access the Router from outside access. Allowed Remote IP Address If you want to...
User Guide
Page 29
... Local MAC Address The MAC address of the Router's DHCP server function is the wireless security method used by the Router. DHCP Server DHCP Server The status of the Router's local, wired interface is shown here. Security Displayed here is displayed here. SSID Broadcast Displayed here is shown here. Wireless-N Broadband Router 28 To retrieve the most up-to...
... Local MAC Address The MAC address of the Router's DHCP server function is the wireless security method used by the Router. DHCP Server DHCP Server The status of the Router's local, wired interface is shown here. Security Displayed here is displayed here. SSID Broadcast Displayed here is shown here. Wireless-N Broadband Router 28 To retrieve the most up-to...
User Guide
Page 30
...connection. The Router does not replace your modem. Select Never dial a connection. 4. The Router does not have enabled wireless security, then make sure the same security method and key are used by both the computer and the Router. Connect your computer. The Router does not replace...is admin). After you have an Ethernet port. Click the Connections tab. 3. The computer cannot connect wirelessly to the Linksys website, www.linksys.com Wireless-N Broadband Router 29 You still need your computer. Follow these steps are similar for other browsers): 1. Launch the web...
...connection. The Router does not replace your modem. Select Never dial a connection. 4. The Router does not have enabled wireless security, then make sure the same security method and key are used by both the computer and the Router. Connect your computer. The Router does not replace...is admin). After you have an Ethernet port. Click the Connections tab. 3. The computer cannot connect wirelessly to the Linksys website, www.linksys.com Wireless-N Broadband Router 29 You still need your computer. Follow these steps are similar for other browsers): 1. Launch the web...
User Guide
Page 31
... WRT160N Standards Draft 802.11n, 802.11g, 802.11b, 802.3, 802.3u Ports Power, Internet, and Ethernet (1-4) Buttons Reset, Wi-Fi Protected Setup LEDs Ethernet (1-4), Wi-Fi Protected Setup, Wireless, Internet, Power Cabling Type CAT 5e RF Pwr (EIRP) in dBm 17 dBm Antenna Gain in dBi 1.5 dBi UPnP able/cert Able Security...;C (32 to 104°F) Storage Temp. -20 to 60°C (-4 to 140°F) Operating Humidity 10 to 85% Noncondensing Storage Humidity 5 to 90% Noncondensing Specifications Wireless-N Broadband Router 30
... WRT160N Standards Draft 802.11n, 802.11g, 802.11b, 802.3, 802.3u Ports Power, Internet, and Ethernet (1-4) Buttons Reset, Wi-Fi Protected Setup LEDs Ethernet (1-4), Wi-Fi Protected Setup, Wireless, Internet, Power Cabling Type CAT 5e RF Pwr (EIRP) in dBm 17 dBm Antenna Gain in dBi 1.5 dBi UPnP able/cert Able Security...;C (32 to 104°F) Storage Temp. -20 to 60°C (-4 to 140°F) Operating Humidity 10 to 85% Noncondensing Storage Humidity 5 to 90% Noncondensing Specifications Wireless-N Broadband Router 30
User Guide
Page 42
...PERIOD. The foregoing limitations will apply. export control laws and regulations and/or export or import regulations in legislation, legal, security or regulatory requirements or as defined at www.linksysbycisco.com/support. Government Users. Any information collected by destroying all such laws ...FOR THE LIMITED WARRANTY ON MEDIA SET FORTH ABOVE ANDTOTHE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, ALL SOFTWARE PROVIDED BY CISCO Wireless-N Broadband Router Software End User License Agreement IS PROVIDED "AS IS" WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND. Some jurisdictions ...
...PERIOD. The foregoing limitations will apply. export control laws and regulations and/or export or import regulations in legislation, legal, security or regulatory requirements or as defined at www.linksysbycisco.com/support. Government Users. Any information collected by destroying all such laws ...FOR THE LIMITED WARRANTY ON MEDIA SET FORTH ABOVE ANDTOTHE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, ALL SOFTWARE PROVIDED BY CISCO Wireless-N Broadband Router Software End User License Agreement IS PROVIDED "AS IS" WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND. Some jurisdictions ...
Quick Installation Guide
Page 6
NOTE: For more advanced settings and security options, refer to the User Guide on the CD-ROM. Additional support is a registered trademark or trademark of their respective holders. 8043010A-ST and certain ... phone or online. 24-Hour Technical Support 800-326-7114 Website http://www.linksys.com Support http://www.linksys.com/support RMA (Return Merchandise Authorization) http://www.linksys.com/warranty FTP Site ftp://ftp.linksys.com Sales Information 800-546-5797 (800-LINKSYS) Specifications are trademarks or registered trademarks of Cisco Systems, Inc. All rights...
NOTE: For more advanced settings and security options, refer to the User Guide on the CD-ROM. Additional support is a registered trademark or trademark of their respective holders. 8043010A-ST and certain ... phone or online. 24-Hour Technical Support 800-326-7114 Website http://www.linksys.com Support http://www.linksys.com/support RMA (Return Merchandise Authorization) http://www.linksys.com/warranty FTP Site ftp://ftp.linksys.com Sales Information 800-546-5797 (800-LINKSYS) Specifications are trademarks or registered trademarks of Cisco Systems, Inc. All rights...