hit counter script
Linksys WRT120N User Manual

Linksys WRT120N User Manual

Linksys wrt120n network router user manual
Hide thumbs Also See for WRT120N:
Table of Contents

Advertisement

USER GUIDE
Wireless-N Home Router
WRT120N
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WRT120N

  • Page 1 USER GUIDE Wireless-N Home Router WRT120N Model:...
  • Page 2: About This Guide

    Glossary www.linksysbycisco.com/glossary Network Security www.linksysbycisco.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Other brands and product names are trademarks or registered trademarks of their respective holders.
  • Page 3: Table Of Contents

    Chapter 1: Product Overview Front Panel..........1 Back Panel .
  • Page 4 Warranty Information Limited Warranty ..........31 Exclusions and Limitations .
  • Page 5: Chapter 1: Product Overview

    Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys by Cisco Wireless-N Home Router. The Router lets you access the Internet via a wireless connection or through one of its four switched ports. You can also use the Router to share resources such as computers, printers and files.
  • Page 6: Wall-Mounting Placement/Template

    Note: Mounting hardware illustrations are not † true to scale. NOTE: Linksys is not responsible for damages incurred by insecure wall-mounting hardware. Follow these instructions: 1. Determine where you want to mount the Router. Make sure that the wall you use is smooth, flat, dry, and sturdy.
  • Page 7: Wireless Security Checklist

    3. Enable MAC address filtering Linksys routers give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device.
  • Page 8: Advanced Configuration

    Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you want to change its advanced settings, use the Router’s browser-based utility. This chapter describes each web page of the utility and each page’s key functions.
  • Page 9 Chapter 3 Automatic Configuration - DHCP By default, the Router’s Internet Connection Type is set to Automatic configuration - DHCP, which should be kept only if your ISP supports DHCP or you are connecting through a dynamic IP address. (This option usually applies to cable connections.) Internet Connection Type >...
  • Page 10 Chapter 3 DNS 1-3 Your ISP will provide you with at least one • DNS (Domain Name System) server IP address. PPTP Server IP Address Your ISP will provide you with the IP address of the PPTP server. Username and Password Enter the Username and Password provided by your ISP.
  • Page 11 Chapter 3 Host Name and Domain Name These fields allow you to supply a host and domain name for the Router. Some ISPs, usually cable ISPs, require these names as identification. You may have to check with your ISP to see if your broadband Internet service has been configured with a host and domain name.
  • Page 12: Setup > Ddns

    Chapter 3 addresses to. This number cannot be greater than 253. The default is 50. IP Address Range Displayed here is the range of available IP addresses. Client Lease Time The Client Lease Time is the amount of time a network user will be allowed connection to the Router with their current dynamic IP address.
  • Page 13: Setup > Mac Address Clone

    Chapter 3 TZO.com Setup > DDNS > TZO E-mail Address, TZO Key, and Domain Name settings of the account you set up with TZO. Internet IP Address The Router’s Internet IP address is displayed here. Because it is dynamic, it will change. Status The status of the DDNS service connection is displayed here.
  • Page 14: Wireless > Basic Wireless Settings

    32 characters (use any of the characters on the keyboard). Make sure this setting is the same for all points in your wireless network. For added security, you should change the default SSID (linksys) to a unique name. Channel Width For best performance in a Wireless-N network, select 40MHz only.
  • Page 15 Chapter 3 Wireless-N channel. Select any channel from the drop- down menu. If you are not sure which channel to select, keep the default, Auto. Standard Channel If 20MHz only is the Channel Width setting, then select the appropriate channel for your wireless network.
  • Page 16: Wireless > Wireless Security

    Chapter 3 Method #3 Use this method if your client device asks for the Router’s PIN number. 1. Enter the PIN number listed on this screen. (It is also listed on the label on the bottom of the Router.) 2. After the client device has been configured, click OK.
  • Page 17 Chapter 3 WPA Enterprise This option features WPA used with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) Security Mode > WPA Enterprise RADIUS Server Enter the IP address of the server. RADIUS Port Enter the port number of the server.
  • Page 18: Wireless > Wireless Mac Filter

    Chapter 3 WEP is a basic encryption method, which is not as secure as WPA. IMPORTANT: If you are using WEP encryption, then each device in your wireless network MUST use the same WEP encryption method and key, or else the network will not function properly. Security Mode >...
  • Page 19: Wireless > Advanced Wireless Settings

    Chapter 3 Wireless Client List Wireless Client List This screen shows computers and other devices on the wireless network. The list can be sorted by Client Name, IP Address, MAC Address, and Status. Select Save to MAC Address Filter List for any device you want to add to the MAC Address Filter List.
  • Page 20: Security > Firewall

    Chapter 3 Wireless-G devices are experiencing severe problems and are not able to transmit to the Router in an environment with heavy 802.11b traffic. This option boosts the Router’s ability to catch all Wireless-N and Wireless-G transmissions but severely decreases performance. To use this option, keep the default, Auto.
  • Page 21: Security > Vpn Passthrough

    Chapter 3 this option to enable Java filtering. This option is disabled by default. ActiveX ActiveX is a programming language for websites. If you deny ActiveX, you run the risk of not having access to Internet sites created using this programming language. Select this option to enable ActiveX filtering.
  • Page 22 Chapter 3 Summary Status Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu, and select Enabled. To create a policy, follow steps 1-11. Repeat these steps to create additional policies, one at a time. 1.
  • Page 23: Applications And Gaming > Single Port Forwarding

    Chapter 3 To delete a service, select it from the Application list. Then click Delete. 11. Click Save Settings to save the policy’s settings, or click Cancel Changes to clear the changes. Applications and Gaming > Single Port Forwarding The Single Port Forwarding screen allows you to customize port services for common applications on this screen.
  • Page 24: Applications & Gaming > Port Range Triggering

    Chapter 3 Start~End Port Enter the number or range of port(s) used by the server or Internet applications. Check with the Internet application documentation for more information. Protocol Select the protocol(s) used for this application, TCP, UDP, or Both. To IP Address For each application, enter the IP address of the computer that should receive the requests.
  • Page 25: Applications And Gaming > Qos

    Chapter 3 by MAC address, select MAC Address and enter the MAC address in the field provided. To retrieve this information, click DHCP Client Table. DMZ > DHCP Client Table DHCP Client Table The DHCP Client Table lists computers and other devices that have been assigned IP addresses by the Router.
  • Page 26 Chapter 3 Port Range Enter the port range that the application will be using. For example, if you want to allocate bandwidth for FTP, you can enter 21-21. If you need services for an application that uses from 1000 to 1250, you enter 1000- 1250 as your settings.
  • Page 27: Administration > Management

    Chapter 3 Priority This column displays the bandwidth priority of High, Medium, Normal, or Low. Name This column displays the application, device, or port name. Information This column displays the port range or MAC address entered for your entry. If a pre-configured application or game was selected, there will be no valid entry shown in this section.
  • Page 28: Administration > Log

    Chapter 3 UPnP Universal Plug and Play (UPnP) allows the appropriate Windows operating system to automatically configure the Router for various Internet applications, such as gaming and videoconferencing. UPnP To use UPnP, keep the default, Enabled. Otherwise, select Disabled. Allow Users to Configure Keep the default, Enabled, if you want to be able to make manual changes to the Router while using the UPnP feature.
  • Page 29: Administration > Factory Defaults

    Chapter 3 Diagnostics Ping Test Ping checks the status of a connection. IP or URL Address Enter the address of the computer whose connection you wish to test. Packet Size Enter the packet size you want to use. The default is 32 bytes. Number to Ping Enter the number of times you wish to test the connection.
  • Page 30: Status > Router

    Chapter 3 Firmware Upgrade Before upgrading the firmware, download the Router’s firmware upgrade file from the Linksys website, www.linksysbycisco.com. Please select a file to upgrade To select the firmware upgrade file, click Browse and follow the on-screen instructions. Start to Upgrade...
  • Page 31: Status > Wireless Network

    Chapter 3 DHCP Clients Table DHCP Client Table The DHCP Client Table lists computers and other devices that have been assigned IP addresses by the Router. The list can be sorted by IP Address, MAC Address, Interface, and Client Name. To remove a DHCP client, click Delete.
  • Page 32: Appendix A: Troubleshooting

    Firefox), and enter the Router’s IP address in the address field (the default IP address is 192.168.1.1). When prompted, enter the password to the Router (the default is admin). Click the appropriate tab to change the settings. WEB: If your questions are not addressed here, refer Linksys www.linksysbycisco.com website,...
  • Page 33 Troubleshooting Appendix A Wireless-N Home Router...
  • Page 34: Appendix B: Specifications

    Appendix B Appendix B: Specifications Model WRT120N Standards IEEE 802.3u, 802.11g, 802.11b, Draft 802.11n LEDs Power, Internet, Wireless, Wi-Fi Protected Setup™, Ethernet (1-4) Ports Internet, Ethernet (1-4), Power Buttons Reset, Wi-Fi Protected Setup™ Cabling Type Cat 5 # of Antennas...
  • Page 35: Warranty Information

    Your exclusive remedy and Linksys’ entire liability under this limited warranty will be for Linksys, at its option, to (a) repair the product with new or refurbished parts, (b) replace the product with a reasonably available equivalent new or refurbished Linksys product, or (c) refund the purchase price of the product less any rebates.
  • Page 36: Technical Support

    If any portion of this limited warranty is found to be void or unenforceable, its remaining provisions shall remain in full force and effect. Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623. For more information, please contact us www.linksys.com...
  • Page 37: Appendix D Regulatory Information

    Appendix D Appendix D: Regulatory Information FCC Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
  • Page 38: Industry Canada Statement

    Appendix D Industry Canada Statement This Class B digital apparatus complies with Canadian ICES-003 and RSS210. Operation is subject to the following two conditions: 1. This device may not cause interference and 2. This device must accept any interference, including interference that may cause undesired operation of the device.
  • Page 39: Declaration Of Conformity With Regard To Eu Directive 1999/5/Ec (R&Tte Directive)

    Appendix D Declaration of Conformity with Regard to EU Directive 1999/5/EC (R&TTE Directive) Compliance Information for 2,4-GHz and 5-GHz Wireless Products Relevant to the EU and Other Countries Following the EU Directive 1999/5/EC (R&TTE Directive) Това оборудване отговаря на съществените Б...
  • Page 40: Wireless Equipment (Wireless-N/G/A/B Products)

    3 dB or more below the applicable limit. As such, TPC is not required. CE Marking For the Linksys Wireless-N, -G, -B, and/or -A products, the following CE mark, notified body number (where applicable), and class 2 identifier are added to the equipment.
  • Page 41: Product Usage Restrictions

    100 mW EIRP are illegal. Third-Party Software or Firmware The use of software or firmware not supported/provided by Linksys may result that the equipment is no longer compliant with the regulatory requirements. Technical Documents on www.linksysbycisco.com/international Follow these steps to access technical documents: 1.
  • Page 42: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products. Consumers are required to comply with this notice for all electronic products bearing the following symbol: English - Environmental Information for Customers in...
  • Page 43 Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
  • Page 44 Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių...
  • Page 45 Appendix D Português (Portuguese) - Informação ambiental para clientes da União Europeia A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
  • Page 46: Appendix E: Software End User License Agreement

    Appendix E Appendix E: Software End User License Agreement Cisco Products This product from Cisco Systems, Inc. or its subsidiary licensing the Software instead of Cisco Systems, Inc. (“Cisco”) contains software (including firmware) originating from Cisco and its suppliers and may also contain software from the open source community.
  • Page 47 Appendix E of the Software or its related Documentation, or electronically transfer the Software or Documentation from one computer to another or over a network; (ii) alter, merge, modify, adapt, decrypt or translate the Software or related Documentation, or decompile, reverse engineer, disassemble, or otherwise reduce the Software to a human-perceivable form (except to the extent expressly permitted by law notwithstanding this provision);...
  • Page 48 Appendix E In addition, Cisco may collect and store detailed information regarding your network configuration and usage for the purpose of providing you technical networking support. The information is associated with you only when you provide a unique ID number to the support representative while you are receiving help.
  • Page 49 Software and supersedes any conflicting or additional terms contained in any purchase order or elsewhere. Linksys, Cisco and the Cisco Logo and other trademarks contained in the Software and Documentation are trademarks or registered trademarks of Linksys, Cisco, its licensors and third parties, as the case may be.
  • Page 50 Appendix E Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.
  • Page 51 Appendix E c. If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions,...
  • Page 52 Appendix E 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
  • Page 53 Appendix E GNU LESSER GENERAL PUBLIC LICENSE This is an unofficial translation of the GNU Lesser General Public License into [language]. It was not published by the Free Software Foundation, and does not legally state the distribution terms for software that uses the GNU LGPL— only the original English text of the GNU LGPL does that.
  • Page 54 Appendix E In other cases, permission to use a particular library in non- free programs enables a greater number of people to use a large body of free software. For example, permission to use the GNU C Library in non-free programs enables many more people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system.
  • Page 55 Appendix E permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you;...
  • Page 56 Appendix E b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user’s computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the...
  • Page 57 Appendix E software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
  • Page 58 Appendix E The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.
  • Page 59 Software End User License Agreement Appendix E BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...

Table of Contents