hit counter script
Cisco WRT610N - Simultaneous Dual-N Band Wireless Router User Manual
Cisco WRT610N - Simultaneous Dual-N Band Wireless Router User Manual

Cisco WRT610N - Simultaneous Dual-N Band Wireless Router User Manual

Simultaneous dual-band wireless-n gigabit router
Hide thumbs Also See for WRT610N - Simultaneous Dual-N Band Wireless Router:
Table of Contents

Advertisement

Quick Links

USER GUIDE
Simultaneous Dual-Band
Wireless-N Gigabit Router
WRT610N
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Cisco WRT610N - Simultaneous Dual-N Band Wireless Router

  • Page 1 USER GUIDE Simultaneous Dual-Band Wireless-N Gigabit Router WRT610N Model:...
  • Page 2: About This Guide

    Network Security www.linksysbycisco.com/security Copyright and Trademarks © 2009 Cisco Systems, Inc. All rights reserved. Cisco, the Cisco logo, and Linksys are trademarks or registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview Front Panel..........3 Back Panel .
  • Page 4 Table of Contents Appendix C: Specifications Appendix D: Warranty Information Limited Warranty ..........44 Appendix E: Regulatory Information FCC Statement .
  • Page 5: Chapter 1: Product Overview

    Product Overview Chapter 1 Chapter 1: Wi-Fi Protected Setup LED (Blue/Amber) The LED flashes blue for two minutes during the Wi-Fi Product Overview Protected Setup process and lights up blue when the Wi-Fi Protected Setup process is successful. Thank you for choosing the Simultaneous Dual-Band The LED lights up amber if there is an error Wireless-N Gigabit Router.
  • Page 6 Power Switch Press I the end to power on the Router. Press the O end to power off the Router. NOTE: Linksys is not responsible for damages Power The Power port is where you connect incurred unsecured wall-mounting the power adapter.
  • Page 7: Chapter 2: Wireless Security Checklist

    3. Enable MAC address filtering WEB: For more information on wireless security, Linksys routers give you the ability to enable Media Access visit www.linksysbycisco.com/security Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device.
  • Page 8: Chapter 3: Advanced Configuration

    Advanced Configuration Chapter 3 Setup > Basic Setup Chapter 3: Advanced Configuration The first screen that appears is the Basic Setup screen. This allows you to change the Router’s general settings. After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use.
  • Page 9 Advanced Configuration Chapter 3 Automatic Configuration - DHCP Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has The default Internet Connection Type is set to Automatic been inactive for a specified period of time (Max Idle Configuration - DHCP.
  • Page 10 Advanced Configuration Chapter 3 Your ISP will provide you with at least one DNS Keep Alive: Redial Period If you select this option, the (Domain Name System) Server IP address. Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically Server IP Address Your ISP will provide you with the re-establish your connection.
  • Page 11 Advanced Configuration Chapter 3 Size When Manual is selected in the MTU field, this option is enabled. Leave this value in the 1200 to 1500 range. The default size depends on the Internet Connection Type: DHCP, Static IP, or Telstra: 1500 •...
  • Page 12 Advanced Configuration Chapter 3 DynDNS.org the lease will be renewed. The default is 0 minutes, which means one day. Static DNS (1-3) The Domain Name System (DNS) is how the Internet translates domain or website names into Internet addresses or URLs. Your ISP will provide you with at least one DNS Server IP Address.
  • Page 13: Setup > Mac Address Clone

    Advanced Configuration Chapter 3 Update To manually trigger an update, click Update. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Setup > MAC Address Clone Some ISPs will require you to register a MAC address in order to access the Internet.
  • Page 14: Wireless > Basic Wireless Settings

    Advanced Configuration Chapter 3 Gateway This is the IP address of the gateway device that Decide which computers and other wireless devices allows for contact between the Router and the remote should join which network. Wireless-N devices support network or host. both the 5 GHz and 2.4 GHz bands, so they can join either the 5 GHz or 2.4 GHz network.
  • Page 15 Advanced Configuration Chapter 3 devices, select Wireless-N Only. If you do not have any detect the SSID broadcast by the Router. To broadcast the Wireless-A and Wireless-N (5GHz) devices in your network, Router’s SSID, keep the default, Enabled. If you do not select Disabled.
  • Page 16: Wireless > Wireless Security

    Advanced Configuration Chapter 3 3. After the client device has been configured, click OK on the Router’s Wi-Fi Protected Setup screen. Then refer back to your client device or its documentation for further instructions. Method #3 Use this method if your client device asks for the Router’s PIN number.
  • Page 17 Advanced Configuration Chapter 3 WPA2 Enterprise WPA Enterprise This option features WPA2 used in coordination with a This option features WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) server is connected to the Router.) WPA Enterprise...
  • Page 18 Advanced Configuration Chapter 3 RADIUS This option features WEP used in coordination with a WEP is a basic encryption method, which is not as secure RADIUS server. (This should only be used when a RADIUS as WPA. server is connected to the Router.) IMPORTANT: If you are using WEP encryption, IMPORTANT:...
  • Page 19: Wireless > Wireless Mac Filter

    Advanced Configuration Chapter 3 Wireless > Wireless MAC Filter Wireless Client List This screen shows computers and other devices on Wireless access can be filtered (restricted) by specifying the wireless network. The list can be sorted by Client the MAC addresses of the devices in your wireless network. Name, Interface, IP Address, MAC Address, and Status.
  • Page 20 Advanced Configuration Chapter 3 with each other. To use this function, select Enabled. AP Beacon Interval A beacon is a packet broadcast by the Isolation is disabled by default. Router to synchronize the wireless network. Enter a value between 20 and 1000 milliseconds. The Beacon Interval Frame Burst Enabling this option should provide your value indicates the frequency interval of the beacon.
  • Page 21: Security > Firewall

    Advanced Configuration Chapter 3 Security > Firewall ActiveX ActiveX is a programming language for websites. If you deny ActiveX, you run the risk of not having access to The Firewall screen is used to configure a firewall that can Internet sites created using this programming language. filter out various types of unwanted traffic on the Router’s Select this option to enable ActiveX filtering.
  • Page 22: Storage > Disk

    Advanced Configuration Chapter 3 Storage > Disk Edit To change the access settings of a shared folder, click this option, and the Shared Folder screen appears. Proceed The storage options are available when a USB storage to Create or Edit a Shared Folder, page 20. device is connected to the USB port of the Router.
  • Page 23: Storage > Media Server

    Advanced Configuration Chapter 3 Current Folder The current folder is displayed. For example, if you have a digital media adapter that sends content to your entertainment system, then the digital Folder Name The available folders are listed by Folder media adapter can locate the Router using the UPnP AV Name.
  • Page 24: Storage > Ftp Server

    Advanced Configuration Chapter 3 Storage > FTP Server Add a Media Folder Use this screen to add a media folder. The storage options are available when a USB storage device is connected to the USB port of the Router. The FTP Server tab creates an FTP server that can be accessed from the Internet or your local network.
  • Page 25: Storage > Administration

    Advanced Configuration Chapter 3 Access Delete To delete an FTP folder, click this option. Create or Edit an FTP Folder Specify which user groups have read-and-write or read- only access to the folder. (To create user groups, refer to Use this screen to add an FTP folder. Create or Edit a Group Account, page 24.) Available Groups To allow a group access to the folder,...
  • Page 26 Advanced Configuration Chapter 3 User Management Confirm Password Enter the password again to confirm. Group Member Select the appropriate user group. By default the Router creates two users, admin and guest. Account Disabled To temporarily disable an account, The users are listed by User Name and Group. select this option.
  • Page 27: Access Restrictions > Internet Access

    Advanced Configuration Chapter 3 Access Restrictions > Internet Access 2. Enter a Policy Name in the field provided. 3. To enable this policy, select Enabled. The Internet Access screen allows you to deny or allow 4. Click Edit List to select which PCs will be affected by the specific kinds of Internet usage and traffic, such as Internet policy.
  • Page 28: Applications And Gaming > Port Range Forwarding

    Advanced Configuration Chapter 3 To modify a service, select it from the Application list. Internal Port Enter the internal port number used by Change its name, port range, and/or protocol setting. the server or Internet application. Check with the Internet Then click Modify.
  • Page 29: Applications & Gaming > Port Range Triggering

    Advanced Configuration Chapter 3 Application Name In this field, enter the name you port number range. Check with the Internet application wish to give the application. Each name can be up to 12 documentation for the port number(s) needed. characters. Enabled Select Enabled to enable port triggering.
  • Page 30: Applications And Gaming > Qos

    Advanced Configuration Chapter 3 Applications and Gaming > QoS Category Select one of the following categories: Applications, Quality of Service (QoS) ensures better service to Online Games, MAC Address, Ethernet Port, or Voice high-priority types of network traffic, which may Device.
  • Page 31 Advanced Configuration Chapter 3 MAC Address Priority Select the appropriate priority: High, Medium (Recommended), Normal, or Low. Click Apply to save your changes. Your new entry will appear in the Summary list. Online Games MAC Address The MAC address of the computer you are using is displayed.
  • Page 32: Administration > Management

    Advanced Configuration Chapter 3 Administration > Management Priority Select the appropriate priority: High, Medium (Recommended), Normal, or Low. Management screen allows network’s Click Apply to save your changes. Your new entry will administrator to manage specific Router functions for appear in the Summary list. access and security.
  • Page 33: Administration > Log

    Advanced Configuration Chapter 3 Administration > Log on the World Wide Web. HTTPS uses SSL (Secure Socket Layer) to encrypt data transmitted for higher security. Select HTTP or HTTPS. HTTP is the default. The Router can keep logs of all traffic for your Internet connection.
  • Page 34: Administration > Factory Defaults

    Advanced Configuration Chapter 3 Administration > Factory Defaults Diagnostics Ping Test The Factory Defaults screen allows you to restore the Router’s configuration to its factory default settings. Ping checks the status of a connection. Factory Defaults IP or URL Address Enter the address of the PC whose connection you wish to test.
  • Page 35: Status > Router

    Internet Connection Before upgrading the firmware, download the Router’s This section shows the current network information firmware upgrade file from the Linksys website, stored in the Router. The information varies depending on www.linksysbycisco.com. the Internet connection type selected on the Setup > Basic Setup screen.
  • Page 36: Status > Wireless Network

    Advanced Configuration Chapter 3 Status > Wireless Network The Wireless Network screen displays the status information of your 5 GHz and/or 2.4 GHz wireless network(s). Status > Wireless Network 5GHz/2.4GHz Wireless Network MAC Address The MAC address of the Router’s local, wireless interface is displayed.
  • Page 37: Appendix A: Troubleshooting

    Troubleshooting Appendix A Appendix A: When you double-click the web browser, you are prompted for a username and password. If you want to Troubleshooting get rid of the prompt, follow these instructions. Launch the web browser and perform the following steps (these steps are specific to Internet Explorer but are similar Your computer cannot connect to the Internet.
  • Page 38 WEB: If your questions are not addressed device, then remove the power adapter from the Router’s here, refer to the Linksys by Cisco website, Power port. Wait five seconds, and then re-connect the www.linksysbycisco.com power adapter to the Router’s Power port.
  • Page 39: Appendix B: How To Install And Access Usb Storage

    How to Install and Access USB Storage Appendix B Appendix B: How to Install 3. On the login screen, enter your account user name and password. (For the admin account, admin is both the and Access USB Storage default user name and password.) Overview This appendix explains how to do the following: •...
  • Page 40: Create A Shortcut To A Shared Folder

    How to Install and Access USB Storage Appendix B 3. Enter your account user name and password. (For the 2. In the Address field, enter \\WRT610N (the server admin account, admin is both the default user name name of the Router). and password.) Enter Server Name of Router NOTE:...
  • Page 41 How to Install and Access USB Storage Appendix B Access Mapped Drive NOTE: Another option is to use the IP address of the Router. In the Address field, enter the local 1. On your desktop, double-click the Computer icon. IP address of the Router: \\xxx.xxx.xxx.xxx The default is 192.168.1.1.
  • Page 42: Advanced Configuration (Advanced Users Only)

    How to Install and Access USB Storage Appendix B Advanced Configuration (Advanced 5. From the Drive drop-down menu, select an available drive letter. Users Only) To manage access to the USB storage device, you can create shared folders, user groups, and user accounts. Access the Browser-Based Utility To access the browser-based utility, launch the web browser on your computer, and enter the Router’s default...
  • Page 43 How to Install and Access USB Storage Appendix B Create a User Group Account 3. To create a shared folder, click Create Share. 1. Click the Storage tab. 2. Click the Administration tab. Storage > Administration 3. In the Group Management section, click Create New Group.
  • Page 44 How to Install and Access USB Storage Appendix B Create a User Account NOTE: To temporarily disable an account, select Account Disabled. 1. Click the Storage tab. 2. Click the Administration tab. 9. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes.
  • Page 45: Appendix C: Specifications

    Specifications Appendix C Appendix C: Receive Sensitivity 2.4 GHz 11 Mbps: -87 dBm @ Typical Specifications 54 Mbps: -77 dBm @ Typical MCS15 (20 MHz): -71 dBm @ Typical MCS15 (40 MHz): -68 dBm @ Typical Model WRT610N 5 GHz Standards Draft 802.11n, 802.11a, 802.11g, 54 Mbps: -74 dBm @ Typical...
  • Page 46: Appendix D: Warranty Information

    Your exclusive remedy and Linksys’ entire liability under TO THE EXTENT NOT PROHIBITED BY APPLICABLE this limited warranty will be for Linksys, at its option, to LAW, ALL IMPLIED WARRANTIES AND CONDITIONS (a) repair the product with new or refurbished parts,...
  • Page 47 The telephone number for Linksys Technical Support in your area can be found by clicking the “Contact Us” link on the home page of www.linksysbycisco.com. Have your product serial number and proof of purchase on hand when calling.
  • Page 48: Appendix E: Regulatory Information

    Regulatory Information Appendix E Safety Notices Appendix E: Regulatory Information WARNING: Do not use this product near water, for example, in a wet basement or near a swimming pool. FCC Statement This device complies with Part 15 of the FCC Rules. WARNING: Avoid using this product during an Operation is subject to the following two conditions: (1)
  • Page 49: Avis D'industrie Canada

    Regulatory Information Appendix E Wireless Disclaimer Because high power radars are allocated as primary users (meaning they have priority) in 5250-5350 MHz and 5650-5850 MHz, these radars could cause interference The maximum performance for wireless is derived from and/or damage to licensed exempt LAN devices. IEEE Standard 802.11 specifications.
  • Page 50: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    úřady. Správná likvidace a recyklace pomáhá předcházet Linksys products. Consumers are required to comply with potenciálním negativním dopadům na životní prostředí a lidské this notice for all electronic products bearing the following zdraví.
  • Page 51 Regulatory Information Appendix E Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 52 Regulatory Information Appendix E Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 53 Regulatory Information Appendix E Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
  • Page 54: Appendix F: Software End User License Agreement

    Software End User License Agreement Appendix F Appendix F: Software End THE RETURN PROCESS AND POLICIES OF THE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE. User License Agreement IN THE EVENT THAT YOU HAVE ELECTED TO OBTAIN A SUBSCRIPTION LICENSE, AS INDICATED IN YOUR ORDER, YOU ADDITIONALLY AGREE TO BE BOUND BY THE “TERMS Cisco Products...
  • Page 55 Software End User License Agreement Appendix F License Restrictions. Other than as set forth in this suitability, functionality, or legality of any sites or products Agreement, you may not (i) make or distribute copies to which links may be provided or third party services, and of the Software or its related Documentation, or you hereby waive any claim you might have against Cisco electronically transfer the Software or Documentation...
  • Page 56 Software End User License Agreement Appendix F Software can enable any other computer (on the same part of the installation process or by requesting a change primary network) to generate reports. When a computer to your software settings in the error process. Installing is enabled, that computer shows a notification that it is the software and changing these software settings may being monitored.
  • Page 57 BY APPLICABLE LAW, IN NO EVENT WILL CISCO BE LIABLE in any purchase order or elsewhere. FOR ANY LOST DATA, REVENUE OR PROFIT, OR FOR SPECIAL, Linksys, Cisco and the Cisco Logo and other trademarks INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE contained in the Software and Documentation are...
  • Page 58 Software End User License Agreement Appendix F send you Service related email messages as long as you For example, if you distribute copies of such a program, are a subscriber to the Service. If you wish to opt-out whether gratis or for a fee, you must give the recipients of receiving Service related email messages, you may all the rights that you have.
  • Page 59 Software End User License Agreement Appendix F 1. You may copy and distribute verbatim copies of the distribution of derivative or collective works based on Program’s source code as you receive it, in any medium, the Program. provided that you conspicuously and appropriately In addition, mere aggregation of another work not publish on each copy an appropriate copyright notice based on the Program with the Program (or with a...
  • Page 60 Software End User License Agreement Appendix F 4. You may not copy, modify, sublicense, or distribute on consistent application of that system; it is up to the Program except as expressly provided under the author/donor to decide if he or she is willing to this License.
  • Page 61 Software End User License Agreement Appendix F 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR When we speak of free software, we are referring to AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, freedom of use, not price. Our General Public Licenses OR ANY OTHER PARTY WHO MAY MODIFY AND/OR are designed to make sure that you have the freedom REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE,...
  • Page 62 Software End User License Agreement Appendix F Public License permits more lax criteria for linking other either verbatim or with modifications and/or translated code with the library. straightforwardly into another language. (Hereinafter, translation is included without limitation in the term We call this license the “Lesser”...
  • Page 63 Software End User License Agreement Appendix F (For example, a function in a library to compute square If distribution of object code is made by offering roots has a purpose that is entirely well-defined access to copy from a designated place, then offering independent of the application.
  • Page 64 Software End User License Agreement Appendix F a) Accompany work with complete 7. You may place library facilities that are a work based corresponding machine-readable source code on the Library side-by-side in a single library together for the Library including whatever changes were with other library facilities not covered by this License, used in the work (which must be distributed and distribute such a combined library, provided that...
  • Page 65 Software End User License Agreement Appendix F 11. If, as a consequence of a court judgment or allegation license version number, you may choose any version of patent infringement or for any other reason (not ever published by the Free Software Foundation. limited to patent issues), conditions are imposed on 14.
  • Page 66 Software End User License Agreement Appendix F Schedule 3-C 6. Redistributions of any form whatsoever must retain the following acknowledgment: “This product includes OPENSSL LICENSE software developed by the OpenSSL Project for use in If this Cisco product contains open source software the OpenSSL Toolkit (http://www.openssl.org/)”...
  • Page 67 Software End User License Agreement Appendix F 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes cryptographic software written...

This manual is also suitable for:

Linksys wrt610n

Table of Contents