hit counter script
Linksys WRT310N - Wireless-N Gigabit Router Wireless User Manual

Linksys WRT310N - Wireless-N Gigabit Router Wireless User Manual

Wireless-n gigabit router
Hide thumbs Also See for WRT310N - Wireless-N Gigabit Router Wireless:
Table of Contents

Advertisement

Quick Links

USER GUIDE
Wireless-N Gigabit Router
WRT310N
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WRT310N - Wireless-N Gigabit Router Wireless

  • Page 1 USER GUIDE Wireless-N Gigabit Router WRT310N Model:...
  • Page 2: About This Guide

    Network www.linksysbycisco.com/security Security Copyright and Trademarks Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Other brands and product names are trademarks or registered trademarks of their respective holders.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview Front Panel..........4 Back Panel .
  • Page 4 Table of Contents Appendix A: Troubleshooting Appendix B: Specifications Appendix C: Warranty Information Limited Warranty ..........31 Appendix D: Regulatory Information FCC Statement .
  • Page 5: Chapter 1: Product Overview

    Product Overview is flashing, the Router is actively sending or receiving data over the network. Thank you for choosing the Linksys by Cisco Wireless-N Internet (Blue) The Internet LED lights up Gigabit Router. The Router lets you access the Internet via...
  • Page 6 Product Overview Chapter 1 Wall-Mounting Placement Follow these instructions: 1. Determine where you want to mount the Router. Make The Router has two wall-mount slots on its bottom sure that the wall you use is smooth, flat, dry, and panel. The distance between the slots is 152 mm sturdy.
  • Page 7: Wireless Security Checklist

    WEB: For more information on wireless security, visit www.linksysbycisco.com/security Linksys routers give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device. With MAC address filtering enabled, wireless network access is provided solely for wireless devices with specific MAC addresses.
  • Page 8: Advanced Configuration

    Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you’d like to change its advanced settings, use the Router’s web-based utility. This chapter describes each web page of the utility and each page’s key functions.
  • Page 9 Advanced Configuration Chapter 3 Static IP before your Internet connection terminates. The default Max Idle Time is 15 minutes. If you are required to use a permanent IP address to Keep Alive: Redial Period If you select this option, connect to the Internet, select Static IP. the Router will periodically check your Internet connection.
  • Page 10 Advanced Configuration Chapter 3 inactivity, Connect on Demand enables the Router to Telstra Cable automatically re-establish your connection as soon as you Telstra Cable is a service that applies to connections in attempt to access the Internet again. To use this option, Australia only.
  • Page 11 Advanced Configuration Chapter 3 host and domain name. In most cases, leaving these fields DHCP Reservation Click this button if you want to assign blank will work. a fixed local IP address to a MAC address. MTU is the Maximum Transmission Unit. It specifies DHCP Reservation the largest packet size permitted for Internet transmission.
  • Page 12: Setup > Ddns

    Advanced Configuration Chapter 3 Client Lease Time The Client Lease Time is the amount DynDNS.org of time a network user will be allowed connection to the Router with their current dynamic IP address. Enter the amount of time, in minutes, that the user will be “leased” this dynamic IP address.
  • Page 13: Setup > Mac Address Clone

    Advanced Configuration Chapter 3 Clone My PC’s MAC TZO.com Click this button to clone the MAC address of the computer you are using. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Setup > Advanced Routing This screen is used to set up the Router’s advanced functions.
  • Page 14: Wireless > Basic Wireless Settings

    For each route, the Destination LAN IP address, Subnet wireless network. For added security, you should change Mask, Gateway, and Interface are displayed. Click the default SSID (linksys) to a unique name. Refresh to update the information. Click Close to exit this screen.
  • Page 15: Wireless > Wireless Security

    Advanced Configuration Chapter 3 Wi-Fi Protected Setup 2. After the client device has been configured, click OK. Then refer back to your client device or its There are three methods available. Use the method that documentation for further instructions. applies to the client device you are configuring. The Wi-Fi Protected Setup Status, Network Name (SSID), Security, Encryption, and Passphrase are displayed at the bottom of the screen.
  • Page 16 Advanced Configuration Chapter 3 Key Renewal Enter a Key Renewal period, which instructs WPA2 Enterprise the Router how often it should change the encryption keys. This option features WPA2 used in coordination with a The default Group Key Renewal period is 3600 seconds. RADIUS server.
  • Page 17: Wireless > Wireless Mac Filter

    Advanced Configuration Chapter 3 IMPORTANT: If you are using WEP encryption, always remember that each device in your wireless network MUST use the same WEP encryption method and encryption key, or else your wireless network will not function properly. RADIUS Server Enter the IP Address of the RADIUS server.
  • Page 18: Wireless > Advanced Wireless Settings

    Advanced Configuration Chapter 3 Wireless Client List With Shared Key authentication, the sender and recipient use a WEP key for authentication. Select Shared Key to This screen shows computers and other devices on only use Shared Key authentication. the wireless network. The list can be sorted by Client Name, Interface, IP Address, MAC Address, and Status.
  • Page 19: Security > Firewall

    Advanced Configuration Chapter 3 hear the beacons and awaken to receive the broadcast Deselect the feature to allow anonymous Internet and multicast messages. The default value is 1. requests. Fragmentation Threshold Filter Multicast This value specifies the Multicasting allows multiple maximum size for a packet before data is fragmented transmissions to specific recipients at the same time.
  • Page 20: Access Restrictions > Internet Access

    Advanced Configuration Chapter 3 Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, keep the default, Enabled. PPTP Passthrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be...
  • Page 21: Applications And Gaming > Single Port Forwarding

    Advanced Configuration Chapter 3 Status Policies are disabled by default. To enable a policy, 10. If the application you want to block is not listed or you select the policy number from the drop-down menu, and want to edit a service’s settings, enter the application’s select Enabled.
  • Page 22: Applications And Gaming > Port Range Forwarding

    Advanced Configuration Chapter 3 Port Range Forwarding External Port Enter the external port number used by the server or Internet application. Check with the Internet To forward a port, enter the information on each line for application documentation for more information. the criteria required.
  • Page 23: Applications And Gaming > Dmz

    Advanced Configuration Chapter 3 Triggered Range For each application, enter the starting address in the field provided. To retrieve this information, click DHCP Client Table. and ending port numbers of the triggered port number range. Check with the Internet application documentation for the port number(s) needed.
  • Page 24 Advanced Configuration Chapter 3 WMM Support If you have other devices that support Wi- can range from 1 to 65535. Check your application’s Fi Multimedia (WMM) on your network, keep the default, documentation for details on the service ports used. Enabled.
  • Page 25: Administration > Management

    Advanced Configuration Chapter 3 Voice Device QoS > Voice Device Enter a Name Enter a name for your voice device. MAC Address Enter the MAC address of your voice device. Priority High Select appropriate priority: (Recommend), Medium, Normal, or Low. Click Add to save your changes.
  • Page 26: Administration > Log

    Advanced Configuration Chapter 3 Administration > Log Remote Upgrade If you want to be able to upgrade the Router remotely, from outside the local network, select Enabled. (You must have the Remote Management The Router can keep logs of all traffic for your Internet feature enabled as well.) Otherwise, keep the default, connection.
  • Page 27: Administration > Diagnostics

    Advanced Configuration Chapter 3 Administration > Diagnostics Traceroute Test The Traceroute test tests the performance of a The diagnostic tests (Ping and Traceroute) allow you to connection. check the connections of your network devices, including connection to the Internet. This screen also allows you to IP or URL Address Enter the address of the PC whose reset the router.
  • Page 28: Administration > Firmware Upgrade

    This is the Router’s MAC Address, as seen by your ISP. Before upgrading the firmware, download the Router’s firmware upgrade file from the Linksys website, Host Name If required by your ISP, this was entered on www.linksysbycisco.com. Then extract the file.
  • Page 29: Status > Wireless Network

    Advanced Configuration Chapter 3 date information, click Refresh. To exit this screen and return to the Local Network screen, click Close. Status > Wireless Network The Wireless Network screen displays information about your wireless network. Status > Local Network Local Network Local MAC Address The MAC address of the Router’s local, wired interface is displayed here.
  • Page 30: Appendix A: Troubleshooting

    WEB: If your questions are not addressed The DSL telephone line does not fit into the Router’s here, refer Linksys website, Internet port. www.linksysbycisco.com The Router does not replace your modem. You still need your DSL modem in order to use the Router. Connect the telephone line to the DSL modem, and then insert the setup CD into your computer.
  • Page 31: Appendix B: Specifications

    Specifications Appendix B Appendix B: Specifications Model WRT310N Standards Draft 802.11n, 802.11g, 802.11b, 802.3, 802.3u, 802.3ab Ports Power, Internet, and Ethernet Buttons Reset, Wi-Fi Protected Setup LEDs Ethernet (1-4), Wi-Fi Protected Setup, Wireless, Internet, Power Cabling Type CAT 5e Number of Antennas 3 Max.
  • Page 32: Appendix C: Warranty Information

    Your exclusive remedy and Linksys’ entire liability under OF MERCHANTABILITY, SATISFACTORY QUALITY OR this limited warranty will be for Linksys, at its option, to FITNESS FOR A PARTICULAR PURPOSE ARE LIMITED TO (a)  repair the product with new or refurbished parts, THE DURATION OF THE WARRANTY PERIOD.
  • Page 33 This limited warranty is governed by the laws of the jurisdiction in which the Product was purchased by you. Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623. Wireless-N Gigabit Router...
  • Page 34: Appendix D: Regulatory Information

    Regulatory Information Appendix D Appendix D: Safety Notices Regulatory Information WARNING: Do not use this product near water, for example, in a wet basement or near a swimming pool. FCC Statement This device complies with Part 15 of the FCC Rules. WARNING: Avoid using this product during an Operation is subject to the following two conditions: (1)
  • Page 35: Industry Canada Statement

    Regulatory Information Appendix D Industry Canada Statement Wireless Disclaimer This Class B digital apparatus complies with Canadian The maximum performance for wireless is derived from ICES-003 and RSS210. IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, Operation is subject to the following two conditions: data throughput rate, range and coverage.
  • Page 36: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    úřady. Správná likvidace a recyklace pomáhá předcházet Linksys products. Consumers are required to comply with potenciálním negativním dopadům na životní prostředí a lidské this notice for all electronic products bearing the following zdraví.
  • Page 37 Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 38 Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 39 Regulatory Information Appendix D Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
  • Page 40: Appendix E: Software End User License Agreement

    Software End User License Agreement Appendix E Appendix E: UP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO THE RETURN PROCESS AND POLICIES OF THE PARTY FROM Software End User License WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE. IN THE EVENT THAT YOU HAVE ELECTED TO OBTAIN A Agreement SUBSCRIPTION LICENSE, AS INDICATED IN YOUR ORDER, YOU ADDITIONALLY AGREE TO BE BOUND BY THE “TERMS...
  • Page 41 Software End User License Agreement Appendix E License Restrictions. Other than as set forth in this suitability, functionality, or legality of any sites or products Agreement, you may not (i) make or distribute copies to which links may be provided or third party services, and of the Software or its related Documentation, or you hereby waive any claim you might have against Cisco electronically transfer the Software or Documentation...
  • Page 42 Software End User License Agreement Appendix E Software can enable any other computer (on the same part of the installation process or by requesting a change primary network) to generate reports. When a computer to your software settings in the error process. Installing is enabled, that computer shows a notification that it is the software and changing these software settings may being monitored.
  • Page 43 BY APPLICABLE LAW, IN NO EVENT WILL CISCO BE LIABLE in any purchase order or elsewhere. FOR ANY LOST DATA, REVENUE OR PROFIT, OR FOR SPECIAL, Linksys, Cisco and the Cisco Logo and other trademarks INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE contained in the Software and Documentation are...
  • Page 44 Software End User License Agreement Appendix E send you Service related email messages as long as you For example, if you distribute copies of such a program, are a subscriber to the Service. If you wish to opt-out whether gratis or for a fee, you must give the recipients of receiving Service related email messages, you may all the rights that you have.
  • Page 45 Software End User License Agreement Appendix E 1. You may copy and distribute verbatim copies of the distribution of derivative or collective works based on Program’s source code as you receive it, in any medium, the Program. provided that you conspicuously and appropriately In addition, mere aggregation of another work not publish on each copy an appropriate copyright notice based on the Program with the Program (or with a...
  • Page 46 Software End User License Agreement Appendix E 4. You may not copy, modify, sublicense, or distribute on consistent application of that system; it is up to the Program except as expressly provided under the author/donor to decide if he or she is willing to this License.
  • Page 47 Software End User License Agreement Appendix E 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR When we speak of free software, we are referring to AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, freedom of use, not price. Our General Public Licenses OR ANY OTHER PARTY WHO MAY MODIFY AND/OR are designed to make sure that you have the freedom REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE,...
  • Page 48 Software End User License Agreement Appendix E Public License permits more lax criteria for linking other either verbatim or with modifications and/or translated code with the library. straightforwardly into another language. (Hereinafter, translation is included without limitation in the term We call this license the “Lesser”...
  • Page 49 Software End User License Agreement Appendix E (For example, a function in a library to compute square If distribution of object code is made by offering roots has a purpose that is entirely well-defined access to copy from a designated place, then offering independent of the application.
  • Page 50 Software End User License Agreement Appendix E a) Accompany work with complete 7. You may place library facilities that are a work based corresponding machine-readable source code on the Library side-by-side in a single library together for the Library including whatever changes were with other library facilities not covered by this License, used in the work (which must be distributed and distribute such a combined library, provided that...
  • Page 51 Software End User License Agreement Appendix E 11. If, as a consequence of a court judgment or allegation license version number, you may choose any version of patent infringement or for any other reason (not ever published by the Free Software Foundation. limited to patent issues), conditions are imposed on 14.
  • Page 52 Software End User License Agreement Appendix E Schedule 3-C 6. Redistributions of any form whatsoever must retain the following acknowledgment: “This product includes OPENSSL LICENSE software developed by the OpenSSL Project for use in If this Cisco product contains open source software the OpenSSL Toolkit (http://www.openssl.org/)”...
  • Page 53 Software End User License Agreement Appendix E 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes cryptographic software written...

Table of Contents