User Guide
Page 2
... to specific items. Below is a description of these icons: NOTE: This check mark indicates that could damage your property or product. and/or its affiliates in the U.S. and certain other countries. Dual-Band Wireless-N Gigabit Router About This...of interest and is a caution or warning and it . Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are trademarks or registered trademarks of Cisco...
... to specific items. Below is a description of these icons: NOTE: This check mark indicates that could damage your property or product. and/or its affiliates in the U.S. and certain other countries. Dual-Band Wireless-N Gigabit Router About This...of interest and is a caution or warning and it . Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are trademarks or registered trademarks of Cisco...
User Guide
Page 3
... 2: Wireless Security Checklist 6 General Network Security Guidelines 6 Additional Security Tips 6 Chapter 3: Advanced Configuration 7 Setup > Basic Setup 7 Setup > DDNS 11 Setup > MAC Address Clone 12 Setup > Advanced Routing 12 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 14 Wireless... > Factory Defaults 26 Administration > Firmware Upgrade 27 Status > Router 27 Status > Local Network 27 Status > Wireless Network 28 Appendix A: Troubleshooting 29 Appendix B: Specifications 30 Appendix C: Warranty Information 31 Limited Warranty 31 Exclusions and ...
... 2: Wireless Security Checklist 6 General Network Security Guidelines 6 Additional Security Tips 6 Chapter 3: Advanced Configuration 7 Setup > Basic Setup 7 Setup > DDNS 11 Setup > MAC Address Clone 12 Setup > Advanced Routing 12 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 14 Wireless... > Factory Defaults 26 Administration > Firmware Upgrade 27 Status > Router 27 Status > Local Network 27 Status > Wireless Network 28 Appendix A: Troubleshooting 29 Appendix B: Specifications 30 Appendix C: Warranty Information 31 Limited Warranty 31 Exclusions and ...
User Guide
Page 7
... password is provided solely for wireless networks. 2. Enable MAC address filtering Linksys routers give you should change the wireless network name to something unique to distinguish your wireless network from your Social Security number) because this information may be more secure than a traditional wired network. With MAC address filtering enabled, wireless network access is admin. Enable encryption Encryption protects...
... password is provided solely for wireless networks. 2. Enable MAC address filtering Linksys routers give you should change the wireless network name to something unique to distinguish your wireless network from your Social Security number) because this information may be more secure than a traditional wired network. With MAC address filtering enabled, wireless network access is admin. Enable encryption Encryption protects...
User Guide
Page 13
... destination. Static Routing sets up the Router's advanced functions. Select Enabled to another router exists on your network. Static Routing A static route is available. Dynamic Routing automatically adjusts how packets travel to set up a new static route. 12 Enter the information described below to reach a specific host or network. Update To manually trigger an update...
... destination. Static Routing sets up the Router's advanced functions. Select Enabled to another router exists on your network. Static Routing A static route is available. Dynamic Routing automatically adjusts how packets travel to set up a new static route. 12 Enter the information described below to reach a specific host or network. Update To manually trigger an update...
User Guide
Page 19
...heavy 802.11b traffic. RTS Threshold Should you may slightly increase the Fragmentation Threshold. If a network packet is permitted, then the Router will severely decrease performance. Internet Filter Filter Anonymous Internet Requests This feature makes it . Filter ...security. The RTS Threshold value should remain at its default value of not having access to synchronize the wireless network. Deselect the feature to disable it more difficult for listening to catch all WirelessN and Wireless-G transmissions but will allow IP multicast packets to be forwarded to specific...
...heavy 802.11b traffic. RTS Threshold Should you may slightly increase the Fragmentation Threshold. If a network packet is permitted, then the Router will severely decrease performance. Internet Filter Filter Anonymous Internet Requests This feature makes it . Filter ...security. The RTS Threshold value should remain at its default value of not having access to synchronize the wireless network. Deselect the feature to disable it more difficult for listening to catch all WirelessN and Wireless-G transmissions but will allow IP multicast packets to be forwarded to specific...
User Guide
Page 20
... Router, keep the default, Enabled. To allow IPSec tunnels to establish an access policy (after Save Settings is clicked). Use the settings on this feature to implement secure exchange of Internet usage and traffic, such as Internet access, designated services, and websites during specific days...changes, or click Cancel Changes to -Point sessions via the Internet on your changes. To allow PPTP tunnels to pass through an IP network. ActiveX ActiveX is data stored on the Layer 2 level. L2TP Passthrough Layer 2 Tunneling Protocol is a suite of protocols used by a...
... Router, keep the default, Enabled. To allow IPSec tunnels to establish an access policy (after Save Settings is clicked). Use the settings on this feature to implement secure exchange of Internet usage and traffic, such as Internet access, designated services, and websites during specific days...changes, or click Cancel Changes to -Point sessions via the Internet on your changes. To allow PPTP tunnels to pass through an IP network. ActiveX ActiveX is data stored on the Layer 2 level. L2TP Passthrough Layer 2 Tunneling Protocol is a suite of protocols used by a...
User Guide
Page 21
... the Blocked List, select it and click the Single Port Forwarding Single Port Forwarding Common applications are disabled by the policy. Before using specific keywords. List of PCs screen appears. To enable a policy, select the policy number from the Protocol drop-down menu, and select Enabled... by MAC address or IP address. Click Edit List to select which the policy will forward those requests to cancel your network via the Internet, the Router will be enforced. After making your changes, click Save Settings to apply your changes, or click Cancel Changes to the ...
... the Blocked List, select it and click the Single Port Forwarding Single Port Forwarding Common applications are disabled by the policy. Before using specific keywords. List of PCs screen appears. To enable a policy, select the policy number from the Protocol drop-down menu, and select Enabled... by MAC address or IP address. Click Edit List to select which the policy will forward those requests to cancel your network via the Internet, the Router will be enforced. After making your changes, click Save Settings to apply your changes, or click Cancel Changes to the ...
User Guide
Page 22
... and Gaming > Port Range Forwarding Dual-Band Wireless-N Gigabit Router Applications and Gaming > Port Range Triggering Port Range Triggering Application Name Enter the application name of requests to your network, such as videoconferencing or online gaming. Check with the Internet application documentation for specific port numbers. Advanced Configuration Port Range Forwarding To forward...
... and Gaming > Port Range Forwarding Dual-Band Wireless-N Gigabit Router Applications and Gaming > Port Range Triggering Port Range Triggering Application Name Enter the application name of requests to your network, such as videoconferencing or online gaming. Check with the Internet application documentation for specific port numbers. Advanced Configuration Port Range Forwarding To forward...
User Guide
Page 25
...World Wide Web. Administration > Management The Administration > Management screen allows the network's administrator to confirm. Re-enter to confirm Enter the password again to manage specific Router functions for your guests, you disable the setting. Remote Access Remote Management ...device, or port name. Remove Click this section. Dual-Band Wireless-N Gigabit Router Administration > Management Management Router Access To ensure the Router's security, you have created for your changes. Router Password Enter a new password for your voice device. Web Access Web Utility Access...
...World Wide Web. Administration > Management The Administration > Management screen allows the network's administrator to confirm. Re-enter to confirm Enter the password again to manage specific Router functions for your guests, you disable the setting. Remote Access Remote Management ...device, or port name. Remove Click this section. Dual-Band Wireless-N Gigabit Router Administration > Management Management Router Access To ensure the Router's security, you have created for your changes. Router Password Enter a new password for your voice device. Web Access Web Utility Access...
User Guide
Page 26
...Select Enabled, if you can keep the default setting, Enabled. To monitor traffic between the network and the Internet, keep the default setting, Disabled. Enter the Router's specific Internet IP address in place of , and enter the Remote Management Port number in a ...Router Advanced Configuration Administration > Log The Router can choose to view temporary logs. With logging enabled, you want to be able to prohibit any external IP address, select Any IP Address. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. The Security...
...Select Enabled, if you can keep the default setting, Enabled. To monitor traffic between the network and the Internet, keep the default setting, Disabled. Enter the Router's specific Internet IP address in place of , and enter the Remote Management Port number in a ...Router Advanced Configuration Administration > Log The Router can choose to view temporary logs. With logging enabled, you want to be able to prohibit any external IP address, select Any IP Address. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. The Security...
User Guide
Page 30
... prompt, follow these instructions. To use the Router. The modem is a dial-up service. Cable or DSL modem 2. After you have enabled wireless security, then make sure the same security method and key are prompted for the cable ...linksys.com Dual-Band Wireless-N Gigabit Router 29 Appendix A Appendix A: Troubleshooting Your computer cannot connect to the Internet port on the Router. Follow these steps are specific to Internet Explorer but are not addressed here, refer to the cable modem, and then insert the setup CD into your network devices, including the modem, Router...
... prompt, follow these instructions. To use the Router. The modem is a dial-up service. Cable or DSL modem 2. After you have enabled wireless security, then make sure the same security method and key are prompted for the cable ...linksys.com Dual-Band Wireless-N Gigabit Router 29 Appendix A Appendix A: Troubleshooting Your computer cannot connect to the Internet port on the Router. Follow these steps are specific to Internet Explorer but are not addressed here, refer to the cable modem, and then insert the setup CD into your network devices, including the modem, Router...
User Guide
Page 31
Dual-Band Wireless-N Gigabit Router Specifications 30 Specifications are subject to 90% Noncondensing * The Router has two main antennas. Appendix B Appendix B: Specifications Model WRT320N Standards Draft 802.11n, 802.11a, 802.11g, 802.11b, 802.3, 802.3u, 802.3ab Ports Power, Internet, and ...Antennas 3 RF Pwr (EIRP) in dBm 17 dBm Antenna Gain in dBi Main Antenna*: 1.5 dBi Third Antenna: 2.2 dBi UPnP able/cert Able Security Features WEP, WPA, WPA2 Security Key Bits 128-Bit Environmental Dimensions 7.95" x 6.3" x 1.34" (202 x 160 x 34 mm) Weight 10.58 oz (0.30 kg) ...
Dual-Band Wireless-N Gigabit Router Specifications 30 Specifications are subject to 90% Noncondensing * The Router has two main antennas. Appendix B Appendix B: Specifications Model WRT320N Standards Draft 802.11n, 802.11a, 802.11g, 802.11b, 802.3, 802.3u, 802.3ab Ports Power, Internet, and ...Antennas 3 RF Pwr (EIRP) in dBm 17 dBm Antenna Gain in dBi Main Antenna*: 1.5 dBi Third Antenna: 2.2 dBi UPnP able/cert Able Security Features WEP, WPA, WPA2 Security Key Bits 128-Bit Environmental Dimensions 7.95" x 6.3" x 1.34" (202 x 160 x 34 mm) Weight 10.58 oz (0.30 kg) ...
User Guide
Page 32
...ANY IMPLIED WARRANTY OF NON-INFRINGEMENT, ARE DISCLAIMED. This limited warranty gives you specific legal rights, and you may not apply to return your product. Some ... only to the continual development of new techniques for intruding upon and attacking networks, Linksys does not warrant that the product, software or any rebates. Have your ... software or Dual-Band Wireless-N Gigabit Router Warranty Information service offerings. Appendix C Appendix C: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and...
...ANY IMPLIED WARRANTY OF NON-INFRINGEMENT, ARE DISCLAIMED. This limited warranty gives you specific legal rights, and you may not apply to return your product. Some ... only to the continual development of new techniques for intruding upon and attacking networks, Linksys does not warrant that the product, software or any rebates. Have your ... software or Dual-Band Wireless-N Gigabit Router Warranty Information service offerings. Appendix C Appendix C: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and...
User Guide
Page 34
... 1. Wash hands after handling. This transmitter must not be co-located or operating in a residential installation. Dual-Band Wireless-N Gigabit Router 33 However, there is 50 ohms. To reduce potential radio interference to the following measures: •• Reorient or relocate the receiving...the interference by one or more than required for an uncontrolled environment. This product has been tested and complies with the specifications for compliance could void the user's authority to Part 15 of electric shock from lightning. If this equipment does cause ...
... 1. Wash hands after handling. This transmitter must not be co-located or operating in a residential installation. Dual-Band Wireless-N Gigabit Router 33 However, there is 50 ohms. To reduce potential radio interference to the following measures: •• Reorient or relocate the receiving...the interference by one or more than required for an uncontrolled environment. This product has been tested and complies with the specifications for compliance could void the user's authority to Part 15 of electric shock from lightning. If this equipment does cause ...
User Guide
Page 40
... or from one of this product and may also be available for download from www.linksys.com/gpl. Where such specific license terms entitle you already hold a valid license to review and accept that source code is not transferable except to a ...source community is licensed under the specific license terms applicable to software from the open source community. Software Licenses The software Licenses applicable to that 39 Dual-Band Wireless-N Gigabit Router Software License Agreement Schedule 1 - Protection of the software Any software from Linksys are contained in any form to...
... or from one of this product and may also be available for download from www.linksys.com/gpl. Where such specific license terms entitle you already hold a valid license to review and accept that source code is not transferable except to a ...source community is licensed under the specific license terms applicable to software from the open source community. Software Licenses The software Licenses applicable to that 39 Dual-Band Wireless-N Gigabit Router Software License Agreement Schedule 1 - Protection of the software Any software from Linksys are contained in any form to...
User Guide
Page 50
...ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Dual-Band Wireless-N Gigabit Router Software License Agreement Original SSLeay License Copyright © 1995-1998 Eric Young ([email protected])All rights reserved. The following acknowledgment:"...; This product includes software written by Eric Young ([email protected]). Products derived from the apps directory (application code) you include anyWindows specific code (or a derivative thereof ) from this distribution is covered by Eric Young ([email protected]). not just the SSL code. For...
...ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Dual-Band Wireless-N Gigabit Router Software License Agreement Original SSLeay License Copyright © 1995-1998 Eric Young ([email protected])All rights reserved. The following acknowledgment:"...; This product includes software written by Eric Young ([email protected]). Products derived from the apps directory (application code) you include anyWindows specific code (or a derivative thereof ) from this distribution is covered by Eric Young ([email protected]). not just the SSL code. For...