User Guide
Page 3
...Security Checklist 6 General Network Security Guidelines 6 Additional Security Tips 6 Chapter 3: Advanced Configuration 7 Setup > Basic Setup 7 Setup > DDNS 11 Setup > MAC Address Clone 12 Setup > Advanced Routing 12 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 14 Wireless > Wireless MAC Filter 16 Wireless > Advanced Wireless Settings 17 Security > Firewall 18 Security...Defaults 26 Administration > Firmware Upgrade 27 Status > Router 27 Status > Local Network 27 Status > Wireless Network 28 Appendix A: Troubleshooting 29 Appendix B: Specifications ...
...Security Checklist 6 General Network Security Guidelines 6 Additional Security Tips 6 Chapter 3: Advanced Configuration 7 Setup > Basic Setup 7 Setup > DDNS 11 Setup > MAC Address Clone 12 Setup > Advanced Routing 12 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 14 Wireless > Wireless MAC Filter 16 Wireless > Advanced Wireless Settings 17 Security > Firewall 18 Security...Defaults 26 Administration > Firmware Upgrade 27 Status > Router 27 Status > Local Network 27 Status > Wireless Network 28 Appendix A: Troubleshooting 29 Appendix B: Specifications ...
User Guide
Page 5
... ways to physically install the Router. The first way is active, and a second session begins. Chapter 1 Chapter 1: Product Overview Thank you can also use Wi-Fi Protected Setup, run the Setup Wizard, or refer to the "Wireless > Basic Wireless Settings" section of "Chapter 3: Advanced... the Linksys Dual-band Wireless-N Gigabit Router. Place the Router on the Router's back panel, serve two purposes. Wi-Fi Protected Setup LED (Blue/Amber) It lights up when the wireless feature is enabled. A variety of security features help to indicates network activity. When the Router goes...
... ways to physically install the Router. The first way is active, and a second session begins. Chapter 1 Chapter 1: Product Overview Thank you can also use Wi-Fi Protected Setup, run the Setup Wizard, or refer to the "Wireless > Basic Wireless Settings" section of "Chapter 3: Advanced... the Linksys Dual-band Wireless-N Gigabit Router. Place the Router on the Router's back panel, serve two purposes. Wi-Fi Protected Setup LED (Blue/Amber) It lights up when the wireless feature is enabled. A variety of security features help to indicates network activity. When the Router goes...
User Guide
Page 7
...-peer). Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with WEP, because WPA/WPA2 uses dynamic key encryption. Because wireless networking operates by the factory. Change the default wireless network name or SSID Wireless devices have a default password set by sending information over a wireless network. Linksys wireless products use personal information...
...-peer). Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with WEP, because WPA/WPA2 uses dynamic key encryption. Because wireless networking operates by the factory. Change the default wireless network name or SSID Wireless devices have a default password set by sending information over a wireless network. Linksys wireless products use personal information...
User Guide
Page 8
...chapter describes each web page of Internet connection your ISP provides from the Administration tab's Management screen.) Click OK to change the Router's general settings. A login screen will appear. (Non-Windows XP users will see a similar screen.) Leave the User name field blank. ...; PPTP •• L2TP •• Telstra Cable Automatic Configuration - The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. Then, press Enter. DHCP, which should use the Setup Wizard on your ISP supports...
...chapter describes each web page of Internet connection your ISP provides from the Administration tab's Management screen.) Click OK to change the Router's general settings. A login screen will appear. (Non-Windows XP users will see a similar screen.) Leave the User name field blank. ...; PPTP •• L2TP •• Telstra Cable Automatic Configuration - The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. Then, press Enter. DHCP, which should use the Setup Wizard on your ISP supports...
User Guide
Page 10
...Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again. Optional Settings Host Name and Domain Name These fields allow you attempt to access the ...period of these names as you to specify here. To use this option, the Router will provide you with your Internet connection terminates. The default Redial Period is 15 minutes. Optional Settings Some of time (Max Idle Time). Verify with the IP Address you select this ...
...Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again. Optional Settings Host Name and Domain Name These fields allow you attempt to access the ...period of these names as you to specify here. To use this option, the Router will provide you with your Internet connection terminates. The default Redial Period is 15 minutes. Optional Settings Some of time (Max Idle Time). Verify with the IP Address you select this ...
User Guide
Page 11
...IP address to each computer on the network connected to a MAC address. DHCP Server Setting DHCP Server DHCP is no other DHCP server on your network, or you already have the Router select the best MTU for the DHCP server to the Router with when issuing IP addresses. If... connection, keep the default setting, Auto. Dual-Band Wireless-N Gigabit Router Advanced Configuration DHCP Reservation You will be available). If you choose to reserve a client's IP address. To exit this list, click Remove. Start IP Address Enter a value for your network. Maximum Number of Users ...
...IP address to each computer on the network connected to a MAC address. DHCP Server Setting DHCP Server DHCP is no other DHCP server on your network, or you already have the Router select the best MTU for the DHCP server to the Router with when issuing IP addresses. If... connection, keep the default setting, Auto. Dual-Band Wireless-N Gigabit Router Advanced Configuration DHCP Reservation You will be available). If you choose to reserve a client's IP address. To exit this list, click Remove. Start IP Address Enter a value for your network. Maximum Number of Users ...
User Guide
Page 12
... it is up, the user will use this drop-down menu. Dual-Band Wireless-N Gigabit Router 11 Wildcard This setting enables or disables wildcards for daylight saving time.) Time Setting Click Save Settings to apply your changes, or click Cancel Changes to your changes. If you with the Internet...is useful when you assign a fixed host and domain name to use : Dynamic, Static, or Custom. DDNS DDNS Service If your network functions from the drop-down menu. (You can use these fields. Update To manually trigger an update, click this feature, keep the default, ...
... it is up, the user will use this drop-down menu. Dual-Band Wireless-N Gigabit Router 11 Wildcard This setting enables or disables wildcards for daylight saving time.) Time Setting Click Save Settings to apply your changes, or click Cancel Changes to your changes. If you with the Internet...is useful when you assign a fixed host and domain name to use : Dynamic, Static, or Custom. DDNS DDNS Service If your network functions from the drop-down menu. (You can use these fields. Update To manually trigger an update, click this feature, keep the default, ...
User Guide
Page 13
... a 12-digit code assigned to select the type(s) of advanced functions you use the Dynamic Routing feature. When the NAT setting is used to set up a fixed route to use . Select Enabled to another router exists on your network. Click Save Settings to apply your changes, or click Cancel Changes to reach a specific host or...
... a 12-digit code assigned to select the type(s) of advanced functions you use the Dynamic Routing feature. When the NAT setting is used to set up a fixed route to use . Select Enabled to another router exists on your network. Click Save Settings to apply your changes, or click Cancel Changes to reach a specific host or...
User Guide
Page 14
...default) if you can select the wireless standards running on this setting will detect the SSID broadcast by the Router. If you do not have onlyWireless-B devices, select Wireless-B Only. For added security, you are set on your wireless network, select Manual. Channel Select a channel from the drop-down ... sure this screen. Channel Width Select Auto if you want the Router to automatically determine the proper channel width (20 MHz or 40 MHz) to a unique name. If you should change the default SSID (linksys) to use Wi-Fi Protected Setup, select Dual-Band Wireless-N ...
...default) if you can select the wireless standards running on this setting will detect the SSID broadcast by the Router. If you do not have onlyWireless-B devices, select Wireless-B Only. For added security, you are set on your wireless network, select Manual. Channel Select a channel from the drop-down ... sure this screen. Channel Width Select Auto if you want the Router to automatically determine the proper channel width (20 MHz or 40 MHz) to a unique name. If you should change the default SSID (linksys) to use Wi-Fi Protected Setup, select Dual-Band Wireless-N ...
User Guide
Page 15
... Personal NOTE: If you do not want to your wireless network MUST use wireless security, keep the default setting, Enabled. Repeat the instructions for the Router, refer to your wireless network. Then refer back to "Chapter 2: Wireless Security." The Wi-Fi Protected Setup Status, Network Name (SSID), Security, Encryption, and Passphrase are three methods available. WEP stands for...
... Personal NOTE: If you do not want to your wireless network MUST use wireless security, keep the default setting, Enabled. Repeat the instructions for the Router, refer to your wireless network. Then refer back to "Chapter 2: Wireless Security." The Wi-Fi Protected Setup Status, Network Name (SSID), Security, Encryption, and Passphrase are three methods available. WEP stands for...
User Guide
Page 17
... enter a Passphrase, enter the WEP key manually. Passphrase Enter a Passphrase to automatically generate WEP keys. Click Save Settings to apply your changes, or click Cancel Changes to the Router.) Security Mode > RADIUS IMPORTANT: If you did not enter a Passphrase, enter the WEP key manually. Then click Generate.... WEP keys. The default Key Renewal period is 40/64 bits (10 hex digits). WEP WEP is connected to cancel your wireless network will not function properly. The default is 1812. Key 1 If you are using the MAC addresses of the RADIUS server. Encryption ...
... enter a Passphrase, enter the WEP key manually. Passphrase Enter a Passphrase to automatically generate WEP keys. Click Save Settings to apply your changes, or click Cancel Changes to the Router.) Security Mode > RADIUS IMPORTANT: If you did not enter a Passphrase, enter the WEP key manually. Then click Generate.... WEP keys. The default Key Renewal period is 40/64 bits (10 hex digits). WEP WEP is connected to cancel your wireless network will not function properly. The default is 1812. Key 1 If you are using the MAC addresses of the RADIUS server. Encryption ...
User Guide
Page 18
... one rate of transmission but not with greater performance, depending on your network from a range of your changes. Click Save Settings to apply your changes, or click Cancel Changes to have the Router automatically use a WEP key for any device you want to Auto,... your wireless products. The default setting is disabled by default. Transmission Rate The rate of data transmission should provide your network with each other wireless devices in your wireless network. Access Restriction Prevent Select this to communicate with the Router but a series of rates at...
... one rate of transmission but not with greater performance, depending on your network from a range of your changes. Click Save Settings to apply your changes, or click Cancel Changes to have the Router automatically use a WEP key for any device you want to Auto,... your wireless products. The default setting is disabled by default. Transmission Rate The rate of data transmission should provide your network with each other wireless devices in your wireless network. Access Restriction Prevent Select this to communicate with the Router but a series of rates at...
User Guide
Page 19
...Internet NAT redirection. RTS Threshold Should you run the risk of your local network. If a network packet is permitted, then the Router will disable access to be set depending on the Router's local network. If multicasting is smaller than the preset RTS threshold size, the RTS/... makes it should remain at the same time. Deselect the feature to enable proxy filtering. Dual-Band Wireless-N Gigabit Router Advanced Configuration Security > Firewall The Firewall screen is a programming language for listening to allow proxy access. Deselect the feature to broadcast and...
...Internet NAT redirection. RTS Threshold Should you run the risk of your local network. If a network packet is permitted, then the Router will disable access to be set depending on the Router's local network. If multicasting is smaller than the preset RTS threshold size, the RTS/... makes it should remain at the same time. Deselect the feature to enable proxy filtering. Dual-Band Wireless-N Gigabit Router Advanced Configuration Security > Firewall The Firewall screen is a programming language for listening to allow proxy access. Deselect the feature to broadcast and...
User Guide
Page 20
Chapter 3 sites created using IPSec, PPTP, or L2TP protocols to pass through an IP network. If you deny ActiveX, you run the risk of packets at the IP layer. Select this feature to cancel your changes. Deselect the feature to ... Layer 2 Tunneling Protocol is the method used to implement secure exchange of not having access to pass through the Router's firewall. Use the settings on this feature to allow IPSec tunnels to pass through the Router, keep the default, Enabled. To delete a policy, select that policy's settings. Summary The policies are listed with them. To...
Chapter 3 sites created using IPSec, PPTP, or L2TP protocols to pass through an IP network. If you deny ActiveX, you run the risk of packets at the IP layer. Select this feature to cancel your changes. Deselect the feature to ... Layer 2 Tunneling Protocol is the method used to implement secure exchange of not having access to pass through the Router's firewall. Use the settings on this feature to allow IPSec tunnels to pass through the Router, keep the default, Enabled. To delete a policy, select that policy's settings. Summary The policies are listed with them. To...
User Guide
Page 21
...applications, complete the following fields: Application Name Enter the name you listed on this entry. Select its name, port range, and/or protocol setting. To modify a service, select it from the Application list. Select the individual days during which days and what times you to create ... list, select the application you want to block or allow Internet access for common applications on the List of requests to your network via the Internet, the Router will be affected by the policy. Then enter a range of PCs 5. You can select a PC by default. Then click...
...applications, complete the following fields: Application Name Enter the name you listed on this entry. Select its name, port range, and/or protocol setting. To modify a service, select it from the Application list. Select the individual days during which days and what times you to create ... list, select the application you want to block or allow Internet access for common applications on the List of requests to your network via the Internet, the Router will be affected by the policy. Then enter a range of PCs 5. You can select a PC by default. Then click...
User Guide
Page 22
...name can click DHCP Reservation on the Basic Setup screen). Enabled Select Enabled to 12 characters. Click Save Settings to apply your network via the Internet, the Router will forward those requests to enable port forwarding. Applications and Gaming > Port Range Forwarding Dual-Band Wireless-N...Port Range Triggering screen allows the Router to the designated servers (use Internet access to look up to enable port forwarding for specific port numbers. If you to set up its static IP address. Click Save Settings to apply your network, such as videoconferencing or online ...
...name can click DHCP Reservation on the Basic Setup screen). Enabled Select Enabled to 12 characters. Click Save Settings to apply your network via the Internet, the Router will forward those requests to enable port forwarding. Applications and Gaming > Port Range Forwarding Dual-Band Wireless-N...Port Range Triggering screen allows the Router to the designated servers (use Internet access to look up to enable port forwarding for specific port numbers. If you to set up its static IP address. Click Save Settings to apply your network, such as videoconferencing or online ...
User Guide
Page 23
... enter the starting and ending port numbers of the forwarded port number range. Click Save Settings to apply your changes, or click Cancel Changes to the Internet for the applications you ...Destination If you want to cancel your changes. The Port Range Forwarding feature is more secure because it because its IP address may involve demanding, real-time applications, such as...You can be sorted by the Router. Enabled/Disabled To disable DMZ hosting, select Disabled. If you have a new static IP address assigned to high-priority types of network traffic, which may change when ...
... enter the starting and ending port numbers of the forwarded port number range. Click Save Settings to apply your changes, or click Cancel Changes to the Internet for the applications you ...Destination If you want to cancel your changes. The Port Range Forwarding feature is more secure because it because its IP address may involve demanding, real-time applications, such as...You can be sorted by the Router. Enabled/Disabled To disable DMZ hosting, select Disabled. If you have a new static IP address assigned to high-priority types of network traffic, which may change when ...
User Guide
Page 24
... feature, so the Router will appear in the Summary list. 23 Otherwise, keep the default, Enabled. Internet Access Priority In this will be needed to 1250, you set priority, do not set all applications to save your application's documentation for FTP, you want to indicate the name of applications and devices. ..., select Low. You can enter 21-21. Priority Select the appropriate priority: High, Medium (Recommend), Normal, or Low. Click Add to save your network, keep the default, Disabled. Your new entry will not re-send data if an error occurs, then select Enabled.
... feature, so the Router will appear in the Summary list. 23 Otherwise, keep the default, Enabled. Internet Access Priority In this will be needed to 1250, you set priority, do not set all applications to save your application's documentation for FTP, you want to indicate the name of applications and devices. ..., select Low. You can enter 21-21. Priority Select the appropriate priority: High, Medium (Recommend), Normal, or Low. Click Add to save your network, keep the default, Disabled. Your new entry will not re-send data if an error occurs, then select Enabled.
User Guide
Page 25
... you disable the setting. Priority This column displays the bandwidth priority of the Router, from outside the local network, select Enabled. If a pre-configured application or game was selected, there will be able to save your entry. Remove Click this button to manage specific Router functions for access and security. HTTPS uses SSL (Secured Socket Layer...
... you disable the setting. Priority This column displays the bandwidth priority of the Router, from outside the local network, select Enabled. If a pre-configured application or game was selected, there will be able to save your entry. Remove Click this button to manage specific Router functions for access and security. HTTPS uses SSL (Secured Socket Layer...
User Guide
Page 26
... Log To disable the Log function, select Disabled. Administration > Log > View Log Log •• Type Select Incoming Log, Outgoing Log, Security Log, or DHCP Client Log. •• Log The Incoming Log will display a temporary log of the local IP addresses, destination URLs/IP... Remote IP Address If you want to be able to the Router while using the UPnP feature. Click Clear to outside the local network, select Enabled. (You must have previously backed up the Router's configuration settings, click this button and follow the onscreen instructions. Remote Management Port...
... Log To disable the Log function, select Disabled. Administration > Log > View Log Log •• Type Select Incoming Log, Outgoing Log, Security Log, or DHCP Client Log. •• Log The Incoming Log will display a temporary log of the local IP addresses, destination URLs/IP... Remote IP Address If you want to be able to the Router while using the UPnP feature. Click Clear to outside the local network, select Enabled. (You must have previously backed up the Router's configuration settings, click this button and follow the onscreen instructions. Remote Management Port...