User Guide
Page 3
... > Advanced Routing 12 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 14 Wireless > Wireless MAC Filter 16 Wireless > Advanced Wireless Settings 17 Security > Firewall 18 Security > VPN Passthrough 18 Access Restrictions > Internet Access 19 Applications and Gaming ...Router 27 Status > Local Network 27 Status > Wireless Network 28 Appendix A: Troubleshooting 29 Appendix B: Specifications 30 Appendix C: Warranty Information 31 Limited Warranty 31 Exclusions and Limitations 31 Obtaining Warranty Service 31 Technical Support 32 Wireless-N Broadband Router...
... > Advanced Routing 12 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 14 Wireless > Wireless MAC Filter 16 Wireless > Advanced Wireless Settings 17 Security > Firewall 18 Security > VPN Passthrough 18 Access Restrictions > Internet Access 19 Applications and Gaming ...Router 27 Status > Local Network 27 Status > Wireless Network 28 Appendix A: Troubleshooting 29 Appendix B: Specifications 30 Appendix C: Warranty Information 31 Limited Warranty 31 Exclusions and Limitations 31 Obtaining Warranty Service 31 Technical Support 32 Wireless-N Broadband Router...
User Guide
Page 5
.... Placement Positions There are two ways to automatically configure wireless security for choosing the Linksys Wireless-N Broadband Router. If the LED is flashing, the Router is off , and then try again. It flashes to the "Wireless > Basic Wireless Settings" section of "Chapter 3: Advanced Configuration". The...through that support Wi-Fi Protected Setup, then you access the Internet via a wireless connection or through one session at a time. Horizontal Placement The Router has four rubber feet on . When the Router goes through its self-diagnostic mode during every boot-up...
.... Placement Positions There are two ways to automatically configure wireless security for choosing the Linksys Wireless-N Broadband Router. If the LED is flashing, the Router is off , and then try again. It flashes to the "Wireless > Basic Wireless Settings" section of "Chapter 3: Advanced Configuration". The...through that support Wi-Fi Protected Setup, then you access the Internet via a wireless connection or through one session at a time. Horizontal Placement The Router has four rubber feet on . When the Router goes through its self-diagnostic mode during every boot-up...
User Guide
Page 7
... encryption standard and may open file sharing without your wireless network. The Linksys default password is more information on a regular basis. •• Install anti-virus software and personal firewall software. •• Disable file sharing (peer-to enable Media Access Control (MAC) address filtering. Wireless-N Broadband Router Wireless Security Checklist 4. Enable encryption Encryption protects data transmitted...
... encryption standard and may open file sharing without your wireless network. The Linksys default password is more information on a regular basis. •• Install anti-virus software and personal firewall software. •• Disable file sharing (peer-to enable Media Access Control (MAC) address filtering. Wireless-N Broadband Router Wireless Security Checklist 4. Enable encryption Encryption protects data transmitted...
User Guide
Page 8
...Setup > Basic Setup The first screen that appears is set a new password from the drop-down menu. DHCP Wireless-N Broadband Router 7 The first time you want to configure advanced settings, use . DHCP, which should use the Setup Wizard on the CD-ROM... Configuration Setup > Basic Setup Internet Setup The Internet Setup section configures the Router to learn about the web-based utility. The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. Internet Connection Type Select the...
...Setup > Basic Setup The first screen that appears is set a new password from the drop-down menu. DHCP Wireless-N Broadband Router 7 The first time you want to configure advanced settings, use . DHCP, which should use the Setup Wizard on the CD-ROM... Configuration Setup > Basic Setup Internet Setup The Internet Setup section configures the Router to learn about the web-based utility. The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. Internet Connection Type Select the...
User Guide
Page 9
... Address you need to specify here. •• Subnet Mask This is the Router's Subnet Mask, as you attempt to access the Internet again. Service Name If provided by your ISP. To use PPPoE. PPTP... Enter the Username and Password provided by users on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of the ISP server...have to 8 Your ISP will have elapsed Wireless-N Broadband Router Advanced Configuration before your Internet connection has been terminated due to enable PPPoE.
... Address you need to specify here. •• Subnet Mask This is the Router's Subnet Mask, as you attempt to access the Internet again. Service Name If provided by your ISP. To use PPPoE. PPTP... Enter the Username and Password provided by users on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of the ISP server...have to 8 Your ISP will have elapsed Wireless-N Broadband Router Advanced Configuration before your Internet connection has been terminated due to enable PPPoE.
User Guide
Page 10
... the Redial Period field, you specify how often you want the Router to check the Internet connection. To use this option, the Router will periodically check your Internet connection. Wireless-N Broadband Router Advanced Configuration Telstra Cable Telstra Cable is a service that applies to access the Internet again. Username and Password Enter the Username and Password provided...
... the Redial Period field, you specify how often you want the Router to check the Internet connection. To use this option, the Router will periodically check your Internet connection. Wireless-N Broadband Router Advanced Configuration Telstra Cable Telstra Cable is a service that applies to access the Internet again. Username and Password Enter the Username and Password provided...
User Guide
Page 12
... service. You can use this dynamic IP address. The Router will use . Time Setting Time Zone Select the time zone in which your network functions from the drop-down menu. (You can even automatically adjust for quicker access to functioning DNS servers. If your DDNS service is ...enable the feature, select Enabled. If you are hosting your own website, FTP server, or other server behind the Router. To disable wildcards, keep the default setting, Disabled. Wireless-N Broadband Router 11 If you use : Dynamic, Static, or Custom. DDNS lets you assign a fixed host and domain name to...
... service. You can use this dynamic IP address. The Router will use . Time Setting Time Zone Select the time zone in which your network functions from the drop-down menu. (You can even automatically adjust for quicker access to functioning DNS servers. If your DDNS service is ...enable the feature, select Enabled. If you are hosting your own website, FTP server, or other server behind the Router. To disable wildcards, keep the default setting, Disabled. Wireless-N Broadband Router 11 If you use : Dynamic, Static, or Custom. DDNS lets you assign a fixed host and domain name to...
User Guide
Page 13
...a unique piece of hardware for identification. Click Save Settings to apply your network's connection to access the Internet. Dynamic Routing automatically adjusts how packets travel to another router exists on the fewest number of hops between the source and the destination. Setup > Advanced ... . Static Routing A static route is available. If you do not wish to re-register the MAC address with the other router(s). Wireless-N Broadband Router Advanced Configuration Clone My PC's MAC Click this feature is a pre-determined pathway that network information must travel on your ISP ...
...a unique piece of hardware for identification. Click Save Settings to apply your network's connection to access the Internet. Dynamic Routing automatically adjusts how packets travel to another router exists on the fewest number of hops between the source and the destination. Setup > Advanced ... . Static Routing A static route is available. If you do not wish to re-register the MAC address with the other router(s). Wireless-N Broadband Router Advanced Configuration Clone My PC's MAC Click this feature is a pre-determined pathway that network information must travel on your ISP ...
User Guide
Page 15
... method if your client device asks for Wi-Fi Protected Access, which is also listed on the label on the client device. 2. Enter the PIN number listed on this method if your wireless network MUST use wireless security, keep the default, Disabled. If you are configuring...are using WPA, always remember that supports Wi-Fi Protected Setup. Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) NOTE: Wi-Fi Protected Setup configures one client device at the bottom of the Router.) Wireless-N Broadband Router Advanced Configuration 2. Click or press the Wi-Fi Protected Setup ...
... method if your client device asks for Wi-Fi Protected Access, which is also listed on the label on the client device. 2. Enter the PIN number listed on this method if your wireless network MUST use wireless security, keep the default, Disabled. If you are configuring...are using WPA, always remember that supports Wi-Fi Protected Setup. Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) NOTE: Wi-Fi Protected Setup configures one client device at the bottom of the Router.) Wireless-N Broadband Router Advanced Configuration 2. Click or press the Wi-Fi Protected Setup ...
User Guide
Page 17
... you did not enter a Passphrase, enter the WEP key manually. MAC Address Filter List Wireless Client List Click this to allow wireless access by MAC Address. Security Mode > WEP Encryption Select a level of the RADIUS server. This...Wireless-N Broadband Router Wireless > Wireless MAC Filter Wireless MAC Filter Enabled/Disabled To filter wireless users by default. Passphrase Enter a Passphrase to cancel your changes, or click Cancel Changes to automatically generate WEP keys. Click Save Settings to apply your changes. Permit Select this to block wireless access...
... you did not enter a Passphrase, enter the WEP key manually. MAC Address Filter List Wireless Client List Click this to allow wireless access by MAC Address. Security Mode > WEP Encryption Select a level of the RADIUS server. This...Wireless-N Broadband Router Wireless > Wireless MAC Filter Wireless MAC Filter Enabled/Disabled To filter wireless users by default. Passphrase Enter a Passphrase to cancel your changes, or click Cancel Changes to automatically generate WEP keys. Click Save Settings to apply your changes. Permit Select this to block wireless access...
User Guide
Page 18
...devices whose wireless access you want to add to the Router in your Wireless-N networking. CTS Protection Mode The Router will automatically use this option should only be able to synchronize the wireless network. A DTIM field is Auto. When the Router has buffered...greater performance, depending on the wireless network. Authentication Type The default is disabled by the Router to communicate with the Router but will be adjusted by Client Name, Interface, IP Address, MAC Address, and Status. Wireless-N Broadband Router Advanced Configuration With Shared Key ...
...devices whose wireless access you want to add to the Router in your Wireless-N networking. CTS Protection Mode The Router will automatically use this option should only be able to synchronize the wireless network. A DTIM field is Auto. When the Router has buffered...greater performance, depending on the wireless network. Authentication Type The default is disabled by the Router to communicate with the Router but will be adjusted by Client Name, Interface, IP Address, MAC Address, and Status. Wireless-N Broadband Router Advanced Configuration With Shared Key ...
User Guide
Page 19
... right to allow Java usage. If a network packet is data stored on the Router's local network. Wireless-N Broadband Router Advanced Configuration Deselect the feature to begin transmission. Deselect the feature to allow IP multicast... packets to any WAN proxy servers. After receiving an RTS, the wireless station responds with them. Cookies A cookie is smaller than the preset RTS threshold size, the RTS/CTS mechanism will disable access...
... right to allow Java usage. If a network packet is data stored on the Router's local network. Wireless-N Broadband Router Advanced Configuration Deselect the feature to begin transmission. Deselect the feature to allow IP multicast... packets to any WAN proxy servers. After receiving an RTS, the wireless station responds with them. Cookies A cookie is smaller than the preset RTS threshold size, the RTS/CTS mechanism will disable access...
User Guide
Page 20
... the default, Enabled. To view all the policies, click Summary. Summary The policies are listed with the following information: No., Policy Name, Access, Days, Time, and status (Enabled). Wireless-N Broadband Router Summary 19 Chapter 3 Advanced Configuration Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is a suite of protocols used to enable...
... the default, Enabled. To view all the policies, click Summary. Summary The policies are listed with the following information: No., Policy Name, Access, Days, Time, and status (Enabled). Wireless-N Broadband Router Summary 19 Chapter 3 Advanced Configuration Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is a suite of protocols used to enable...
User Guide
Page 21
... PCs screen appears. Select the appropriate option, Deny or Allow, depending on whether you want to your network via the Internet, the Router will be in effect, or select Everyday. Select the individual days during which the policy will forward those requests to customize port services ...DHCP Reservation feature on the Basic Setup screen). Enter each keyword in the Port Range fields. Each name can block up to various services accessed over the Internet, such as FTP or telnet. (You can be enforced. Chapter 3 Status Policies are available for common applications on this ...
... PCs screen appears. Select the appropriate option, Deny or Allow, depending on whether you want to your network via the Internet, the Router will be in effect, or select Everyday. Select the individual days during which the policy will forward those requests to customize port services ...DHCP Reservation feature on the Basic Setup screen). Enter each keyword in the Port Range fields. Each name can block up to various services accessed over the Internet, such as FTP or telnet. (You can be enforced. Chapter 3 Status Policies are available for common applications on this ...
User Guide
Page 22
... Enter the number or range of the PC that should assign static IP addresses to the designated servers (use Internet access to the proper computer by the server or Internet application. Check with the Internet application documentation for this application, either... Configuration Port Range Forwarding To forward a port, enter the information on your changes. Applications and Gaming > Port Range Forwarding Wireless-N Broadband Router Applications and Gaming > Port Range Triggering Port Range Triggering Application Name Enter the application name of IP address and port mapping rules...
... Enter the number or range of the PC that should assign static IP addresses to the designated servers (use Internet access to the proper computer by the server or Internet application. Check with the Internet application documentation for this application, either... Configuration Port Range Forwarding To forward a port, enter the information on your changes. Applications and Gaming > Port Range Forwarding Wireless-N Broadband Router Applications and Gaming > Port Range Triggering Port Range Triggering Application Name Enter the application name of IP address and port mapping rules...
User Guide
Page 24
Otherwise, select Disabled. Internet Access Priority In this section, you want to select below normal bandwidth, select Low. There are four categories available. If you can enter 21-21. Otherwise, ... QoS policies you can set the bandwidth priority for a variety of applications and devices. Your new entry will appear in the Summary list. Port numbers Wireless-N Broadband Router QoS > Ethernet Port Ethernet Select the appropriate Ethernet port. Your new entry will appear in the Summary list. MAC Address Enter the MAC address of...
Otherwise, select Disabled. Internet Access Priority In this section, you want to select below normal bandwidth, select Low. There are four categories available. If you can enter 21-21. Otherwise, ... QoS policies you can set the bandwidth priority for a variety of applications and devices. Your new entry will appear in the Summary list. Port numbers Wireless-N Broadband Router QoS > Ethernet Port Ethernet Select the appropriate Ethernet port. Your new entry will appear in the Summary list. MAC Address Enter the MAC address of...
User Guide
Page 25
.... Administration > Management The Administration > Management screen allows the network's administrator to servers on the World Wide Web. Wireless-N Broadband Router Administration > Management Management Router Access To ensure the Router's security, you will appear in this section. Web Utility Access HTTP (HyperText Transport Protocol) is the communications protocol used to connect to your guests, you have created for...
.... Administration > Management The Administration > Management screen allows the network's administrator to servers on the World Wide Web. Wireless-N Broadband Router Administration > Management Management Router Access To ensure the Router's security, you will appear in this section. Web Utility Access HTTP (HyperText Transport Protocol) is the communications protocol used to connect to your guests, you have created for...
User Guide
Page 26
... keep logs of the word port. Remote Management Port Enter the port number that is displayed. Otherwise, select Disabled. Wireless-N Broadband Router Advanced Configuration Administration > Log The Router can choose to view temporary logs. If you can keep the default, Disabled. The DHCP Client Log will display a... Upgrade If you want to be able to prohibit any external IP address, select Any IP Address. Allow Users to Disable Internet Access Select Enabled, if you want to be able to a file on whether you use UPnP, keep the default setting, Enabled. The...
... keep logs of the word port. Remote Management Port Enter the port number that is displayed. Otherwise, select Disabled. Wireless-N Broadband Router Advanced Configuration Administration > Log The Router can choose to view temporary logs. If you can keep the default, Disabled. The DHCP Client Log will display a... Upgrade If you want to be able to prohibit any external IP address, select Any IP Address. Allow Users to Disable Internet Access Select Enabled, if you want to be able to a file on whether you use UPnP, keep the default setting, Enabled. The...
User Guide
Page 45
...complete corresponding machine-readable source code, which the executable runs, unless that you distribute the same sections as a whole. or, Wireless-N Broadband Router Software End User License Agreement c. However, as distribution of who have their licenses terminated so long as separate works. You are...the source code, even though third parties are not derived from a designated place, then offering equivalent access to accept this License. 3. Therefore, by offering access to copy from the Program, and can be distributed under this section to claim rights or contest ...
...complete corresponding machine-readable source code, which the executable runs, unless that you distribute the same sections as a whole. or, Wireless-N Broadband Router Software End User License Agreement c. However, as distribution of who have their licenses terminated so long as separate works. You are...the source code, even though third parties are not derived from a designated place, then offering equivalent access to accept this License. 3. Therefore, by offering access to copy from the Program, and can be distributed under this section to claim rights or contest ...
User Guide
Page 49
...(If a newer version than a "work under the scope of this License to use are covered by offering access to copy from a designated place, then offering equivalent access to copy the source code from a header file that is not the intent of this License. If distribution of... specify that version instead if you wish to this License, so that they are linked directly with the Library itself a library. Wireless-N Broadband Router Software End User License Agreement When a "work that uses the Library" uses material from the same place satisfies the requirement to ...
...(If a newer version than a "work under the scope of this License to use are covered by offering access to copy from a designated place, then offering equivalent access to copy the source code from a header file that is not the intent of this License. If distribution of... specify that version instead if you wish to this License, so that they are linked directly with the Library itself a library. Wireless-N Broadband Router Software End User License Agreement When a "work that uses the Library" uses material from the same place satisfies the requirement to ...