User Guide
Page 2
... something that you may see various icons that call attention to while using the product. Dual-Band Wireless-N Gigabit Router About This Guide i If you use an older web browser, you should pay special attention to specific items. ...This globe icon indicates a noteworthy website address or e-mail address. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are listed without http:// in the U.S. ...
... something that you may see various icons that call attention to while using the product. Dual-Band Wireless-N Gigabit Router About This Guide i If you use an older web browser, you should pay special attention to specific items. ...This globe icon indicates a noteworthy website address or e-mail address. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are listed without http:// in the U.S. ...
User Guide
Page 3
... Wireless Security Checklist 6 General Network Security Guidelines 6 Additional Security Tips 6 Chapter 3: Advanced Configuration 7 Setup > Basic Setup 7 Setup > DDNS 11 Setup > MAC Address Clone 12 Setup > Advanced Routing 12 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 14 Wireless...> Diagnostics 26 Administration > Factory Defaults 26 Administration > Firmware Upgrade 27 Status > Router 27 Status > Local Network 27 Status > Wireless Network 28 Appendix A: Troubleshooting 29 Appendix B: Specifications 30 Appendix C: Warranty Information 31 Limited...
... Wireless Security Checklist 6 General Network Security Guidelines 6 Additional Security Tips 6 Chapter 3: Advanced Configuration 7 Setup > Basic Setup 7 Setup > DDNS 11 Setup > MAC Address Clone 12 Setup > Advanced Routing 12 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 14 Wireless...> Diagnostics 26 Administration > Factory Defaults 26 Administration > Firmware Upgrade 27 Status > Router 27 Status > Local Network 27 Status > Wireless Network 28 Appendix A: Troubleshooting 29 Appendix B: Specifications 30 Appendix C: Warranty Information 31 Limited...
User Guide
Page 5
... Basic Wireless Settings" section of "Chapter 3: Advanced Configuration". A flashing LED indicates network activity over the network. When the Router goes through the Internet port. The LED is solidly lit when the Router is a connection made through its four switched ports. Make sure the client device supports... over the Internet port. You can use Wi-Fi Protected Setup to automatically configure wireless security for choosing the Linksys Dual-band Wireless-N Gigabit Router. If the LED is flashing, the Router is off , and then try again. Wi-Fi Protected Setup LED (Blue/Amber) ...
... Basic Wireless Settings" section of "Chapter 3: Advanced Configuration". A flashing LED indicates network activity over the network. When the Router goes through the Internet port. The LED is solidly lit when the Router is a connection made through its four switched ports. Make sure the client device supports... over the Internet port. You can use Wi-Fi Protected Setup to automatically configure wireless security for choosing the Linksys Dual-band Wireless-N Gigabit Router. If the LED is flashing, the Router is off , and then try again. Wi-Fi Protected Setup LED (Blue/Amber) ...
User Guide
Page 7
... from other wireless networks that do not use linksys as it will be more vulnerable to intruders than a network encrypted with WEP, because WPA/WPA2 uses dynamic key encryption. Linksys wireless products use personal information (such as access points and routers, you want to...computer in the dictionary. Hackers know these defaults and may be found in your home so that are at a rapid pace. General Network Security Guidelines Wireless network security is useless if the underlying network is more information on a regular basis. •• Install anti-virus software...
... from other wireless networks that do not use linksys as it will be more vulnerable to intruders than a network encrypted with WEP, because WPA/WPA2 uses dynamic key encryption. Linksys wireless products use personal information (such as access points and routers, you want to...computer in the dictionary. Hackers know these defaults and may be found in your home so that are at a rapid pace. General Network Security Guidelines Wireless network security is useless if the underlying network is more information on a regular basis. •• Install anti-virus software...
User Guide
Page 8
...3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will see a similar screen.) Leave the User name field blank. The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, ...Administration, and Status. NOTE: When first installing the Router, you 'd like to learn about the web-based utility. Then, press Enter. Login Screen...
...3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will see a similar screen.) Leave the User name field blank. The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, ...Administration, and Status. NOTE: When first installing the Router, you 'd like to learn about the web-based utility. Then, press Enter. Login Screen...
User Guide
Page 14
...from the drop-down menu, you want to set up a static route between the Router and the remote network or host. Proceed to delete a static route. To use , or select 20 MHz...any wireless devices in your wireless network. If you selected Wide - 40MHz Channel for all points in the wireless network. Make sure this screen. For added security, you do not have client ...your network, select BG-Mixed. If you can select the wireless standards running on this setting is the IP address of 25 alphanumeric characters. If you should change the default SSID (linksys) ...
...from the drop-down menu, you want to set up a static route between the Router and the remote network or host. Proceed to delete a static route. To use , or select 20 MHz...any wireless devices in your wireless network. If you selected Wide - 40MHz Channel for all points in the wireless network. Make sure this screen. For added security, you do not have client ...your network, select BG-Mixed. If you can select the wireless standards running on this setting is the IP address of 25 alphanumeric characters. If you should change the default SSID (linksys) ...
User Guide
Page 15
... default setting, Enabled. After the client device has been configured, click OK. Then refer back to "Chapter 2: Wireless Security." Enter the PIN number listed on configuring wireless security for the Router, refer to your wireless network. For detailed instructions on this method if your client device asks for your client device or its documentation...
... default setting, Enabled. After the client device has been configured, click OK. Then refer back to "Chapter 2: Wireless Security." Enter the PIN number listed on configuring wireless security for the Router, refer to your wireless network. For detailed instructions on this method if your client device asks for your client device or its documentation...
User Guide
Page 16
...used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) Dual-Band Wireless-N Gigabit Router Security Mode > WPA Enterprise RADIUS Server Enter the IP Address of the RADIUS server. Shared Secret Enter the key shared ... Passphrase of the RADIUS server. Key Renewal Enter a Key Renewal period, which instructs the Router how often it should change the encryption keys. The default is connected to the Router.) Security Mode > WPA2 Enterprise Encryption WPA2 supports two encryption methods, TKIP and AES, with dynamic ...
...used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) Dual-Band Wireless-N Gigabit Router Security Mode > WPA Enterprise RADIUS Server Enter the IP Address of the RADIUS server. Shared Secret Enter the key shared ... Passphrase of the RADIUS server. Key Renewal Enter a Key Renewal period, which instructs the Router how often it should change the encryption keys. The default is connected to the Router.) Security Mode > WPA2 Enterprise Encryption WPA2 supports two encryption methods, TKIP and AES, with dynamic ...
User Guide
Page 17
... Settings to apply your changes, or click Cancel Changes to the Router.) Security Mode > RADIUS IMPORTANT: If you are using the MAC addresses of the wireless devices transmitting within your network's radius. Passphrase Enter a Passphrase to automatically generate WEP keys. Advanced Configuration Security Mode > WEP Encryption Select a level of WEP encryption, 40/64 bits...
... Settings to apply your changes, or click Cancel Changes to the Router.) Security Mode > RADIUS IMPORTANT: If you are using the MAC addresses of the wireless devices transmitting within your network's radius. Passphrase Enter a Passphrase to automatically generate WEP keys. Advanced Configuration Security Mode > WEP Encryption Select a level of WEP encryption, 40/64 bits...
User Guide
Page 19
... forwarding to block access to filter multicasting. Select this feature to local servers from local networked computers. If you deny Java, you may compromise the Gateway's security. You can select from being scanned by default. When the Router has buffered broadcast or multicast messages for listening to begin transmission. Click Save Settings to...
... forwarding to block access to filter multicasting. Select this feature to local servers from local networked computers. If you deny Java, you may compromise the Gateway's security. You can select from being scanned by default. When the Router has buffered broadcast or multicast messages for listening to begin transmission. Click Save Settings to...
User Guide
Page 20
... Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is clicked). PPTP Passthrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to pass through the Router, keep the default, Enabled. To allow specific kinds of Internet ... Policy Access Policy Access can be tunneled through the Router's firewall. To view all the policies, click Summary. To return to enable ActiveX filtering. Select this feature to pass through an IP network. Security > VPN Passthrough The VPN Passthrough screen allows you interact...
... Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is clicked). PPTP Passthrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to pass through the Router, keep the default, Enabled. To allow specific kinds of Internet ... Policy Access Policy Access can be tunneled through the Router's firewall. To view all the policies, click Summary. To return to enable ActiveX filtering. Select this feature to pass through an IP network. Security > VPN Passthrough The VPN Passthrough screen allows you interact...
User Guide
Page 23
...be sorted by MAC address, select MAC Address and enter the MAC Dual-Band Wireless-N Gigabit Router Applications and Gaming > QoS QoS (Quality of Service) Wireless You can configure the support ..., select and complete the IP address range fields. The Port Range Forwarding feature is more secure because it because its DHCP client function disabled and should have a new static IP address .... To retrieve this section. 22 Click Save Settings to apply your changes. To expose one network computer to cancel your changes, or click Cancel Changes to ‑date information, click Refresh. ...
...be sorted by MAC address, select MAC Address and enter the MAC Dual-Band Wireless-N Gigabit Router Applications and Gaming > QoS QoS (Quality of Service) Wireless You can configure the support ..., select and complete the IP address range fields. The Port Range Forwarding feature is more secure because it because its DHCP client function disabled and should have a new static IP address .... To retrieve this section. 22 Click Save Settings to apply your changes. To expose one network computer to cancel your changes, or click Cancel Changes to ‑date information, click Refresh. ...
User Guide
Page 25
... cancel your password when you are giving wireless access to your changes. Remove Click this button to manage specific Router functions for access and security. Administration > Management The Administration > Management screen allows the network's administrator to remove an entry. Web Utility Access HTTP (HyperText Transport Protocol) is the default. Select HTTP or HTTPS...
... cancel your password when you are giving wireless access to your changes. Remove Click this button to manage specific Router functions for access and security. Administration > Management The Administration > Management screen allows the network's administrator to remove an entry. Web Utility Access HTTP (HyperText Transport Protocol) is the default. Select HTTP or HTTPS...
User Guide
Page 26
... or range of all traffic for your changes. Otherwise, keep the default, Enabled. Backup and Restore Backup Configurations To back up the Router's configuration settings, click this button and follow the onscreen instructions. With logging enabled, you can keep the default, Disabled. The Outgoing...Remote Management feature enabled as gaming and videoconferencing. To monitor traffic between the network and the Internet, keep the default setting, Disabled. View Log To view the logs, click View Log. The Security log will display a temporary log of the word port. The DHCP ...
... or range of all traffic for your changes. Otherwise, keep the default, Enabled. Backup and Restore Backup Configurations To back up the Router's configuration settings, click this button and follow the onscreen instructions. With logging enabled, you can keep the default, Disabled. The Outgoing...Remote Management feature enabled as gaming and videoconferencing. To monitor traffic between the network and the Internet, keep the default setting, Disabled. View Log To view the logs, click View Log. The Security log will display a temporary log of the word port. The DHCP ...
User Guide
Page 29
... Settings screen. Start IP Address For the range of the Router's local, wired interface is the wireless mode used by the Router. Mode Displayed here is displayed here. Channel Width Shown here is the wireless security method used by Client Name, Interface, IP Address, MAC ...computers and other devices that are using the Router as it appears on your local network, the starting IP address is left for the current IP address). Status > Wireless Network The Wireless Network screen displays information about your local network. DHCP Clients Table Click this screen and ...
... Settings screen. Start IP Address For the range of the Router's local, wired interface is the wireless mode used by the Router. Mode Displayed here is displayed here. Channel Width Shown here is the wireless security method used by Client Name, Interface, IP Address, MAC ...computers and other devices that are using the Router as it appears on your local network, the starting IP address is left for the current IP address). Status > Wireless Network The Wireless Network screen displays information about your local network. DHCP Clients Table Click this screen and ...
User Guide
Page 30
...questions are not addressed here, refer to the Linksys website, www.linksys.com Dual-Band Wireless-N Gigabit Router 29 Select Never dial a connection. 4. You still need a cable/DSL modem and high-speed Internet connection. Make sure the wireless network name or SSID is flashing, then power off... modem, and then insert the setup CD into your network devices, including the modem, Router, and computers. WEB: If your modem. Follow these instructions. The modem does not have enabled wireless security, then make sure the same security method and key are specific to the cable modem,...
...questions are not addressed here, refer to the Linksys website, www.linksys.com Dual-Band Wireless-N Gigabit Router 29 Select Never dial a connection. 4. You still need a cable/DSL modem and high-speed Internet connection. Make sure the wireless network name or SSID is flashing, then power off... modem, and then insert the setup CD into your network devices, including the modem, Router, and computers. WEB: If your modem. Follow these instructions. The modem does not have enabled wireless security, then make sure the same security method and key are specific to the cable modem,...
User Guide
Page 31
Appendix B Appendix B: Specifications Model WRT320N Standards Draft 802.11n, 802.11a, 802.11g, 802.11b, 802.3, 802.3u, 802.... Pwr (EIRP) in dBm 17 dBm Antenna Gain in dBi Main Antenna*: 1.5 dBi Third Antenna: 2.2 dBi UPnP able/cert Able Security Features WEP, WPA, WPA2 Security Key Bits 128-Bit Environmental Dimensions 7.95" x 6.3" x 1.34" (202 x 160 x 34 mm) Weight 10.58 oz ... Operating Humidity 10 to 85% Noncondensing Storage Humidity 5 to change without notice. Dual-Band Wireless-N Gigabit Router Specifications 30 Specifications are subject to 90% Noncondensing * The...
Appendix B Appendix B: Specifications Model WRT320N Standards Draft 802.11n, 802.11a, 802.11g, 802.11b, 802.3, 802.3u, 802.... Pwr (EIRP) in dBm 17 dBm Antenna Gain in dBi Main Antenna*: 1.5 dBi Third Antenna: 2.2 dBi UPnP able/cert Able Security Features WEP, WPA, WPA2 Security Key Bits 128-Bit Environmental Dimensions 7.95" x 6.3" x 1.34" (202 x 160 x 34 mm) Weight 10.58 oz ... Operating Humidity 10 to 85% Noncondensing Storage Humidity 5 to change without notice. Dual-Band Wireless-N Gigabit Router Specifications 30 Specifications are subject to 90% Noncondensing * The...
User Guide
Page 41
..., REGARDLESS OF CAUSE (INCLUDING NEGLIGENCE), ARISING OUT OF Dual-Band Wireless-N Gigabit Router Software License Agreement OR RELATED TO THE USE OF OR INABILITY TO USE THE SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. If any portion of this...Version 2 of Liabilities. The license terms below in any third parties regarding your Linksys product and/or Software and/or (v) to enable Linksys to serious security threats and/or some features within your Linksys product and/or the Software to comply with any purchase order or elsewhere. ...
..., REGARDLESS OF CAUSE (INCLUDING NEGLIGENCE), ARISING OUT OF Dual-Band Wireless-N Gigabit Router Software License Agreement OR RELATED TO THE USE OF OR INABILITY TO USE THE SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. If any portion of this...Version 2 of Liabilities. The license terms below in any third parties regarding your Linksys product and/or Software and/or (v) to enable Linksys to serious security threats and/or some features within your Linksys product and/or the Software to comply with any purchase order or elsewhere. ...