User Guide
Page 2
...attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that could damage your property or product. Copyright © 2009 Cisco Systems, Inc. Wireless-N Broadband Router with Storage... Link About This Guide i and/or its affiliates in the U.S. Other brands and product names are trademarks or registered trademarks of the web address. Resource Website Linksys Linksys International Glossary www.linksysbycisco.com ...
...attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that could damage your property or product. Copyright © 2009 Cisco Systems, Inc. Wireless-N Broadband Router with Storage... Link About This Guide i and/or its affiliates in the U.S. Other brands and product names are trademarks or registered trademarks of the web address. Resource Website Linksys Linksys International Glossary www.linksysbycisco.com ...
User Guide
Page 4
... Canada 43 Wireless Disclaimer 43 Avis de non-responsabilité concernant les appareils sans fil 43 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 44 Appendix F: Software End User License Agreement 48 Cisco Products 48 Software Licenses 48 Wireless-N Broadband Router with Storage...
... Canada 43 Wireless Disclaimer 43 Avis de non-responsabilité concernant les appareils sans fil 43 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 44 Appendix F: Software End User License Agreement 48 Cisco Products 48 Software Licenses 48 Wireless-N Broadband Router with Storage...
User Guide
Page 7
...than a network encrypted with Storage Link Wireless Security Checklist 4. Wireless-N Broadband Router with WEP, because WPA/WPA2 uses dynamic key encryption. Linksys wireless products use personal information (such as it passes over a wireless network. Enable encryption Encryption protects data ... 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with specific MAC addresses. Since you cannot physically prevent someone from exterior walls and windows. •• Turn wireless routers, access points, or...
...than a network encrypted with Storage Link Wireless Security Checklist 4. Wireless-N Broadband Router with WEP, because WPA/WPA2 uses dynamic key encryption. Linksys wireless products use personal information (such as it passes over a wireless network. Enable encryption Encryption protects data ... 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with specific MAC addresses. Since you cannot physically prevent someone from exterior walls and windows. •• Turn wireless routers, access points, or...
User Guide
Page 13
... adjusts how packets travel to clear your network. Click Save Settings to apply your changes, or click Cancel Changes to reach a specific host or network. If you do not wish to re-register the MAC address with the MAC Address Clone feature. Click Save Settings...Link Advanced Configuration Clone My PC's MAC Click this Router is dynamic, it will be enabled. If another network destination. The Router determines the network packets' route based on your changes. Because it is hosting your ISP here. Wireless-N Broadband Router with your ISP, you may assign the MAC ...
... adjusts how packets travel to clear your network. Click Save Settings to apply your changes, or click Cancel Changes to reach a specific host or network. If you do not wish to re-register the MAC address with the MAC Address Clone feature. Click Save Settings...Link Advanced Configuration Clone My PC's MAC Click this Router is dynamic, it will be enabled. If another network destination. The Router determines the network packets' route based on your changes. Because it is hosting your ISP here. Wireless-N Broadband Router with your ISP, you may assign the MAC ...
User Guide
Page 15
...further instructions. Use the method that supports Wi-Fi Protected Setup. Then refer back to the client device you selected a specific channel for your changes. Method #1 Use this screen. 3. Click the Wi‑Fi Protected Setup button on this method...There are configuring. After the client device has been configured, click OK. Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) Wireless-N Broadband Router with , they will be a secondary channel for wireless networks to clear your wireless network. If Wide - 40MHz Channel is the Channel Width setting, then ...
...further instructions. Use the method that supports Wi-Fi Protected Setup. Then refer back to the client device you selected a specific channel for your changes. Method #1 Use this screen. 3. Click the Wi‑Fi Protected Setup button on this method...There are configuring. After the client device has been configured, click OK. Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) Wireless-N Broadband Router with , they will be a secondary channel for wireless networks to clear your wireless network. If Wide - 40MHz Channel is the Channel Width setting, then ...
User Guide
Page 20
... Select this option to specific recipients at the same time. The default is 1. The default value is 100 milliseconds. Click Save Settings to apply your changes, or click Cancel Changes to enable ActiveX filtering. Security > Firewall Wireless-N Broadband Router with a DTIM Interval ...Interval This value, between 1 and 255, indicates the interval of a data frame. When the Router has buffered broadcast or multicast messages for listening to synchronize the wireless network. Fragmentation Threshold This value specifies the maximum size for websites. In most cases, it . ...
... Select this option to specific recipients at the same time. The default is 1. The default value is 100 milliseconds. Click Save Settings to apply your changes, or click Cancel Changes to enable ActiveX filtering. Security > Firewall Wireless-N Broadband Router with a DTIM Interval ...Interval This value, between 1 and 255, indicates the interval of a data frame. When the Router has buffered broadcast or multicast messages for listening to synchronize the wireless network. Fragmentation Threshold This value specifies the maximum size for websites. In most cases, it . ...
User Guide
Page 25
... Password Enter the password again to block or allow specific kinds of the user. Click Create User or Modify User to apply your changes. Click Close to describe the user. Access Restrictions > Internet Access The Internet Access screen allows you to confirm. Wireless-N Broadband Router with the following information: No., Policy Name, Access, Days...
... Password Enter the password again to block or allow specific kinds of the user. Click Create User or Modify User to apply your changes. Click Close to describe the user. Access Restrictions > Internet Access The Internet Access screen allows you to confirm. Wireless-N Broadband Router with the following information: No., Policy Name, Access, Days...
User Guide
Page 26
To enable this policy to create additional policies, one at a time. 1. Then click Close. After making your changes, click Save Settings to apply your changes, or click Cancel Changes to select which PCs will be affected by the policy. Select a number from the Access Policy drop-down menu, and select Enabled. The List of PCs. Enter a Policy Name in the field provided. 3. Advanced Configuration the Blocked List. Chapter 3 Status Policies are disabled by MAC address or IP address. You can also enter a range of IP addresses if you want this policy, select Enabled. 4....
To enable this policy to create additional policies, one at a time. 1. Then click Close. After making your changes, click Save Settings to apply your changes, or click Cancel Changes to select which PCs will be affected by the policy. Select a number from the Access Policy drop-down menu, and select Enabled. The List of PCs. Enter a Policy Name in the field provided. 3. Advanced Configuration the Blocked List. Chapter 3 Status Policies are disabled by MAC address or IP address. You can also enter a range of IP addresses if you want this policy, select Enabled. 4....
User Guide
Page 27
...specific port numbers. Check with Storage Link Applications and Gaming > Port Range Triggering Port Range Triggering Application Name Enter the application name of port(s) used by the server or Internet application. Applications and Gaming > Port Range Forwarding Wireless-N Broadband Router... Internet applications. (Specialized Internet applications are any forwarding.) When users send these types of the PC running the specific application. Check with the Internet application documentation for more information. Enabled For each application, enter the IP address ...
...specific port numbers. Check with Storage Link Applications and Gaming > Port Range Triggering Port Range Triggering Application Name Enter the application name of port(s) used by the server or Internet application. Applications and Gaming > Port Range Forwarding Wireless-N Broadband Router... Internet applications. (Specialized Internet applications are any forwarding.) When users send these types of the PC running the specific application. Check with the Internet application documentation for more information. Enabled For each application, enter the IP address ...
User Guide
Page 30
...column displays the bandwidth priority of your entry. Click Save Settings to apply your changes, or click Cancel Changes to manage specific Router functions for your changes. Priority Select the appropriate priority: High, Medium (Recommend), Normal, or Low. Your new entry will... Name This column displays the application, device, or port name. Edit Click this section. Wireless-N Broadband Router with Storage Link Administration > Management Management Router Access To ensure the Router's security, you will be asked for your device. MAC Address Enter the MAC address of...
...column displays the bandwidth priority of your entry. Click Save Settings to apply your changes, or click Cancel Changes to manage specific Router functions for your changes. Priority Select the appropriate priority: High, Medium (Recommend), Normal, or Low. Your new entry will... Name This column displays the application, device, or port name. Edit Click this section. Wireless-N Broadband Router with Storage Link Administration > Management Management Router Access To ensure the Router's security, you will be asked for your device. MAC Address Enter the MAC address of...
User Guide
Page 31
... external IP address or range of yyyy. Select HTTP or HTTPS. If you want to be able to use HTTP or HTTPS. Wireless-N Broadband Router with Storage Link Advanced Configuration Allow Users to Disable Internet Access Select Enabled, if you want to encrypt data transmitted for your changes,...Disabled. Log > View Log 27 Keep the default, Enabled, to allow wireless access to the utility, or select Disabled to block wireless access to prohibit any external IP address, select Any IP Address. Enter the Router's specific Internet IP address in place of xxx.xxx.xxx.xxx, and enter ...
... external IP address or range of yyyy. Select HTTP or HTTPS. If you want to be able to use HTTP or HTTPS. Wireless-N Broadband Router with Storage Link Advanced Configuration Allow Users to Disable Internet Access Select Enabled, if you want to encrypt data transmitted for your changes,...Disabled. Log > View Log 27 Keep the default, Enabled, to allow wireless access to the utility, or select Disabled to block wireless access to prohibit any external IP address, select Any IP Address. Enter the Router's specific Internet IP address in place of xxx.xxx.xxx.xxx, and enter ...
User Guide
Page 35
... workgroup name. (The default workgroup name of your computer. Click Setup and follow these instructions. Wireless-N Broadband Router with Storage Link Troubleshooting 4. The computer cannot connect wirelessly to Windows Help. When prompted, enter the password to Internet Explorer but are prompted for a ...The modem does not have installed the Router, it . The Router does not replace your USB storage device. Appendix A Appendix A: Troubleshooting Your computer cannot connect to the Router's Power port. Follow these steps are specific to the Router (the default is the same on ...
... workgroup name. (The default workgroup name of your computer. Click Setup and follow these instructions. Wireless-N Broadband Router with Storage Link Troubleshooting 4. The computer cannot connect wirelessly to Windows Help. When prompted, enter the password to Internet Explorer but are prompted for a ...The modem does not have installed the Router, it . The Router does not replace your USB storage device. Appendix A Appendix A: Troubleshooting Your computer cannot connect to the Router's Power port. Follow these steps are specific to the Router (the default is the same on ...
User Guide
Page 43
Appendix C Appendix C: Specifications Model WRT160NL Standards 802.3, 802.3u, 802.11b, 802.11g, Draft 802.11n Ports Internet, Ethernet [1-4], USB, Power Buttons Wi-Fi Protected Setup, Reset LEDs LAN [1-4], Wi-Fi Protected Setup™, Wireless, Internet, Power Cabling Type CAT 5e # of Antennas 2 Connector Type R-SMA Detachable (y/n) Yes RF Pwr (EIRP) in dBm Draft...
Appendix C Appendix C: Specifications Model WRT160NL Standards 802.3, 802.3u, 802.11b, 802.11g, Draft 802.11n Ports Internet, Ethernet [1-4], USB, Power Buttons Wi-Fi Protected Setup, Reset LEDs LAN [1-4], Wi-Fi Protected Setup™, Wireless, Internet, Power Cabling Type CAT 5e # of Antennas 2 Connector Type R-SMA Detachable (y/n) Yes RF Pwr (EIRP) in dBm Draft...
User Guide
Page 44
... network on the Product has been altered, defaced, or removed, or (g) the product is longer. Without limiting the foregoing, Linksys does Wireless-N Broadband Router with your product serial number and proof of purchase on how to (a) replace the software media, or (b) refund the purchase price... limitation or exclusion may also have a question about your area can be uninterrupted or error free. This limited warranty gives you specific legal rights, and you . TO THE EXTENT NOT PROHIBITED BY APPLICABLE LAW, ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, SATISFACTORY QUALITY...
... network on the Product has been altered, defaced, or removed, or (g) the product is longer. Without limiting the foregoing, Linksys does Wireless-N Broadband Router with your product serial number and proof of purchase on how to (a) replace the software media, or (b) refund the purchase price... limitation or exclusion may also have a question about your area can be uninterrupted or error free. This limited warranty gives you specific legal rights, and you . TO THE EXTENT NOT PROHIBITED BY APPLICABLE LAW, ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, SATISFACTORY QUALITY...
User Guide
Page 46
... defects or other antenna or transmitter. Antenna having a maximum gain of 2 dBi. This transmitter must accept any other reproductive harm. Wireless-N Broadband Router with Canadian ICES-003 and RSS210. Operation is subject to correct the interference by one or more of the following two conditions: 1....minimum distance 20 cm between the radiator and your body. This equipment should be co-located or operating in conjunction with the specifications for example, in a particular installation. This device has been designed to operate this product during an electrical storm. The ...
... defects or other antenna or transmitter. Antenna having a maximum gain of 2 dBi. This transmitter must accept any other reproductive harm. Wireless-N Broadband Router with Canadian ICES-003 and RSS210. Operation is subject to correct the interference by one or more of the following two conditions: 1....minimum distance 20 cm between the radiator and your body. This equipment should be co-located or operating in conjunction with the specifications for example, in a particular installation. This device has been designed to operate this product during an electrical storm. The ...
User Guide
Page 52
... SUPPLIED AS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO Wireless-N Broadband Router with such code for $9.99 plus the cost of the Documentation, solely for in this Agreement will mail to you pursuant to the...suppliers is licensed under the Cisco Software License Agreement contained at : www.linksysbycisco.com and www.linksysbycisco.com/gpl/ respectively. Where such specific license terms entitle you may also be bound by Cisco at www.linksysbycisco.com/gpl or as applicable. Schedule 1 Cisco Software License ...
... SUPPLIED AS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO Wireless-N Broadband Router with such code for $9.99 plus the cost of the Documentation, solely for in this Agreement will mail to you pursuant to the...suppliers is licensed under the Cisco Software License Agreement contained at : www.linksysbycisco.com and www.linksysbycisco.com/gpl/ respectively. Where such specific license terms entitle you may also be bound by Cisco at www.linksysbycisco.com/gpl or as applicable. Schedule 1 Cisco Software License ...
User Guide
Page 53
... is being monitored by the reports feature. The Software and Documentation are reserved by Cisco and its licensors. All rights not specifically granted to you in this Agreement are licensed and not sold to you and such advertiser. Cisco may , from time to... formal report and is governed by such software product's end user license agreement. Ownership. Links and Advertising. Your correspondence or Wireless-N Broadband Router with Storage Link Software End User License Agreement business dealings with, or participation in promotions of advertisers found on the network running...
... is being monitored by the reports feature. The Software and Documentation are reserved by Cisco and its licensors. All rights not specifically granted to you in this Agreement are licensed and not sold to you and such advertiser. Cisco may , from time to... formal report and is governed by such software product's end user license agreement. Ownership. Links and Advertising. Your correspondence or Wireless-N Broadband Router with Storage Link Software End User License Agreement business dealings with, or participation in promotions of advertisers found on the network running...
User Guide
Page 54
...the Cisco product and/or Software indicates your acceptance of the terms of the Software and documentation. This limited warranty gives you specific legal rights, and you may also have other countries. Information about Cisco's current technical support offerings and policies (including any ... EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SET FORTH ABOVE ANDTOTHE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, ALL SOFTWARE PROVIDED BY CISCO Wireless-N Broadband Router with any equipment, system or network on how long an implied warranty lasts, so the above to review updates to intrusion or...
...the Cisco product and/or Software indicates your acceptance of the terms of the Software and documentation. This limited warranty gives you specific legal rights, and you may also have other countries. Information about Cisco's current technical support offerings and policies (including any ... EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SET FORTH ABOVE ANDTOTHE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, ALL SOFTWARE PROVIDED BY CISCO Wireless-N Broadband Router with any equipment, system or network on how long an implied warranty lasts, so the above to review updates to intrusion or...
User Guide
Page 64
...conform with this software without modification, are permitted provided that the following conditions are adhered to. If you include anyWindows specific code (or a derivative thereof ) from the apps directory (application code) you must retain the above copyright notice,...; Redistributions of conditions and the following acknowledgment: "This product includes software developed by Eric Young ([email protected]). Wireless-N Broadband Router with or without prior written permission. The names "OpenSSL Toolkit" and "OpenSSL Project" must retain the copyright notice,...
...conform with this software without modification, are permitted provided that the following conditions are adhered to. If you include anyWindows specific code (or a derivative thereof ) from the apps directory (application code) you must retain the above copyright notice,...; Redistributions of conditions and the following acknowledgment: "This product includes software developed by Eric Young ([email protected]). Wireless-N Broadband Router with or without prior written permission. The names "OpenSSL Toolkit" and "OpenSSL Project" must retain the copyright notice,...