Product Overview Chapter 1 Chapter 1: Wi-Fi Protected Setup LED (Blue/Amber) The LED flashes blue for two minutes during the Wi-Fi Product Overview Protected Setup process and lights up blue when the Wi-Fi Protected Setup process is successful. Thank you for choosing the Simultaneous Dual-Band The LED lights up amber if there is an error Wireless-N Gigabit Router.
Page 6
Power Switch Press I the end to power on the Router. Press the O end to power off the Router. NOTE: Linksys is not responsible for damages Power The Power port is where you connect incurred unsecured wall-mounting the power adapter.
3. Enable MAC address filtering WEB: For more information on wireless security, Linksys routers give you the ability to enable Media Access visit www.linksysbycisco.com/security Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device.
Advanced Configuration Chapter 3 Setup > Basic Setup Chapter 3: Advanced Configuration The first screen that appears is the Basic Setup screen. This allows you to change the Router’s general settings. After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use.
Page 9
Advanced Configuration Chapter 3 Automatic Configuration - DHCP Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has The default Internet Connection Type is set to Automatic been inactive for a specified period of time (Max Idle Configuration - DHCP.
Page 10
Advanced Configuration Chapter 3 Your ISP will provide you with at least one DNS Keep Alive: Redial Period If you select this option, the (Domain Name System) Server IP address. Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically Server IP Address Your ISP will provide you with the re-establish your connection.
Page 11
Advanced Configuration Chapter 3 Size When Manual is selected in the MTU field, this option is enabled. Leave this value in the 1200 to 1500 range. The default size depends on the Internet Connection Type: DHCP, Static IP, or Telstra: 1500 •...
Page 12
Advanced Configuration Chapter 3 DynDNS.org the lease will be renewed. The default is 0 minutes, which means one day. Static DNS (1-3) The Domain Name System (DNS) is how the Internet translates domain or website names into Internet addresses or URLs. Your ISP will provide you with at least one DNS Server IP Address.
Advanced Configuration Chapter 3 Update To manually trigger an update, click Update. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Setup > MAC Address Clone Some ISPs will require you to register a MAC address in order to access the Internet.
Advanced Configuration Chapter 3 Gateway This is the IP address of the gateway device that Decide which computers and other wireless devices allows for contact between the Router and the remote should join which network. Wireless-N devices support network or host. both the 5 GHz and 2.4 GHz bands, so they can join either the 5 GHz or 2.4 GHz network.
Page 15
Advanced Configuration Chapter 3 devices, select Wireless-N Only. If you do not have any detect the SSID broadcast by the Router. To broadcast the Wireless-A and Wireless-N (5GHz) devices in your network, Router’s SSID, keep the default, Enabled. If you do not select Disabled.
Advanced Configuration Chapter 3 3. After the client device has been configured, click OK on the Router’s Wi-Fi Protected Setup screen. Then refer back to your client device or its documentation for further instructions. Method #3 Use this method if your client device asks for the Router’s PIN number.
Page 17
Advanced Configuration Chapter 3 WPA2 Enterprise WPA Enterprise This option features WPA2 used in coordination with a This option features WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) server is connected to the Router.) WPA Enterprise...
Page 18
Advanced Configuration Chapter 3 RADIUS This option features WEP used in coordination with a WEP is a basic encryption method, which is not as secure RADIUS server. (This should only be used when a RADIUS as WPA. server is connected to the Router.) IMPORTANT: If you are using WEP encryption, IMPORTANT:...
Advanced Configuration Chapter 3 Wireless > Wireless MAC Filter Wireless Client List This screen shows computers and other devices on Wireless access can be filtered (restricted) by specifying the wireless network. The list can be sorted by Client the MAC addresses of the devices in your wireless network. Name, Interface, IP Address, MAC Address, and Status.
Page 20
Advanced Configuration Chapter 3 with each other. To use this function, select Enabled. AP Beacon Interval A beacon is a packet broadcast by the Isolation is disabled by default. Router to synchronize the wireless network. Enter a value between 20 and 1000 milliseconds. The Beacon Interval Frame Burst Enabling this option should provide your value indicates the frequency interval of the beacon.
Advanced Configuration Chapter 3 Security > Firewall ActiveX ActiveX is a programming language for websites. If you deny ActiveX, you run the risk of not having access to The Firewall screen is used to configure a firewall that can Internet sites created using this programming language. filter out various types of unwanted traffic on the Router’s Select this option to enable ActiveX filtering.
Advanced Configuration Chapter 3 Storage > Disk Edit To change the access settings of a shared folder, click this option, and the Shared Folder screen appears. Proceed The storage options are available when a USB storage to Create or Edit a Shared Folder, page 20. device is connected to the USB port of the Router.
Advanced Configuration Chapter 3 Current Folder The current folder is displayed. For example, if you have a digital media adapter that sends content to your entertainment system, then the digital Folder Name The available folders are listed by Folder media adapter can locate the Router using the UPnP AV Name.
Advanced Configuration Chapter 3 Storage > FTP Server Add a Media Folder Use this screen to add a media folder. The storage options are available when a USB storage device is connected to the USB port of the Router. The FTP Server tab creates an FTP server that can be accessed from the Internet or your local network.
Advanced Configuration Chapter 3 Access Delete To delete an FTP folder, click this option. Create or Edit an FTP Folder Specify which user groups have read-and-write or read- only access to the folder. (To create user groups, refer to Use this screen to add an FTP folder. Create or Edit a Group Account, page 24.) Available Groups To allow a group access to the folder,...
Page 26
Advanced Configuration Chapter 3 User Management Confirm Password Enter the password again to confirm. Group Member Select the appropriate user group. By default the Router creates two users, admin and guest. Account Disabled To temporarily disable an account, The users are listed by User Name and Group. select this option.
Advanced Configuration Chapter 3 Access Restrictions > Internet Access 2. Enter a Policy Name in the field provided. 3. To enable this policy, select Enabled. The Internet Access screen allows you to deny or allow 4. Click Edit List to select which PCs will be affected by the specific kinds of Internet usage and traffic, such as Internet policy.
Advanced Configuration Chapter 3 To modify a service, select it from the Application list. Internal Port Enter the internal port number used by Change its name, port range, and/or protocol setting. the server or Internet application. Check with the Internet Then click Modify.
Advanced Configuration Chapter 3 Application Name In this field, enter the name you port number range. Check with the Internet application wish to give the application. Each name can be up to 12 documentation for the port number(s) needed. characters. Enabled Select Enabled to enable port triggering.
Advanced Configuration Chapter 3 Applications and Gaming > QoS Category Select one of the following categories: Applications, Quality of Service (QoS) ensures better service to Online Games, MAC Address, Ethernet Port, or Voice high-priority types of network traffic, which may Device.
Page 31
Advanced Configuration Chapter 3 MAC Address Priority Select the appropriate priority: High, Medium (Recommended), Normal, or Low. Click Apply to save your changes. Your new entry will appear in the Summary list. Online Games MAC Address The MAC address of the computer you are using is displayed.
Advanced Configuration Chapter 3 Administration > Management Priority Select the appropriate priority: High, Medium (Recommended), Normal, or Low. Management screen allows network’s Click Apply to save your changes. Your new entry will administrator to manage specific Router functions for appear in the Summary list. access and security.
Advanced Configuration Chapter 3 Administration > Log on the World Wide Web. HTTPS uses SSL (Secure Socket Layer) to encrypt data transmitted for higher security. Select HTTP or HTTPS. HTTP is the default. The Router can keep logs of all traffic for your Internet connection.
Advanced Configuration Chapter 3 Administration > Factory Defaults Diagnostics Ping Test The Factory Defaults screen allows you to restore the Router’s configuration to its factory default settings. Ping checks the status of a connection. Factory Defaults IP or URL Address Enter the address of the PC whose connection you wish to test.
Internet Connection Before upgrading the firmware, download the Router’s This section shows the current network information firmware upgrade file from the Linksys website, stored in the Router. The information varies depending on www.linksysbycisco.com. the Internet connection type selected on the Setup > Basic Setup screen.
Advanced Configuration Chapter 3 Status > Wireless Network The Wireless Network screen displays the status information of your 5 GHz and/or 2.4 GHz wireless network(s). Status > Wireless Network 5GHz/2.4GHz Wireless Network MAC Address The MAC address of the Router’s local, wireless interface is displayed.
Troubleshooting Appendix A Appendix A: When you double-click the web browser, you are prompted for a username and password. If you want to Troubleshooting get rid of the prompt, follow these instructions. Launch the web browser and perform the following steps (these steps are specific to Internet Explorer but are similar Your computer cannot connect to the Internet.
Page 38
WEB: If your questions are not addressed device, then remove the power adapter from the Router’s here, refer to the Linksys by Cisco website, Power port. Wait five seconds, and then re-connect the www.linksysbycisco.com power adapter to the Router’s Power port.
How to Install and Access USB Storage Appendix B Appendix B: How to Install 3. On the login screen, enter your account user name and password. (For the admin account, admin is both the and Access USB Storage default user name and password.) Overview This appendix explains how to do the following: •...
How to Install and Access USB Storage Appendix B 3. Enter your account user name and password. (For the 2. In the Address field, enter \\WRT610N (the server admin account, admin is both the default user name name of the Router). and password.) Enter Server Name of Router NOTE:...
Page 41
How to Install and Access USB Storage Appendix B Access Mapped Drive NOTE: Another option is to use the IP address of the Router. In the Address field, enter the local 1. On your desktop, double-click the Computer icon. IP address of the Router: \\xxx.xxx.xxx.xxx The default is 192.168.1.1.
How to Install and Access USB Storage Appendix B Advanced Configuration (Advanced 5. From the Drive drop-down menu, select an available drive letter. Users Only) To manage access to the USB storage device, you can create shared folders, user groups, and user accounts. Access the Browser-Based Utility To access the browser-based utility, launch the web browser on your computer, and enter the Router’s default...
Page 43
How to Install and Access USB Storage Appendix B Create a User Group Account 3. To create a shared folder, click Create Share. 1. Click the Storage tab. 2. Click the Administration tab. Storage > Administration 3. In the Group Management section, click Create New Group.
Page 44
How to Install and Access USB Storage Appendix B Create a User Account NOTE: To temporarily disable an account, select Account Disabled. 1. Click the Storage tab. 2. Click the Administration tab. 9. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes.
Your exclusive remedy and Linksys’ entire liability under TO THE EXTENT NOT PROHIBITED BY APPLICABLE this limited warranty will be for Linksys, at its option, to LAW, ALL IMPLIED WARRANTIES AND CONDITIONS (a) repair the product with new or refurbished parts,...
Page 47
The telephone number for Linksys Technical Support in your area can be found by clicking the “Contact Us” link on the home page of www.linksysbycisco.com. Have your product serial number and proof of purchase on hand when calling.
Regulatory Information Appendix E Safety Notices Appendix E: Regulatory Information WARNING: Do not use this product near water, for example, in a wet basement or near a swimming pool. FCC Statement This device complies with Part 15 of the FCC Rules. WARNING: Avoid using this product during an Operation is subject to the following two conditions: (1)
Regulatory Information Appendix E Wireless Disclaimer Because high power radars are allocated as primary users (meaning they have priority) in 5250-5350 MHz and 5650-5850 MHz, these radars could cause interference The maximum performance for wireless is derived from and/or damage to licensed exempt LAN devices. IEEE Standard 802.11 specifications.
úřady. Správná likvidace a recyklace pomáhá předcházet Linksys products. Consumers are required to comply with potenciálním negativním dopadům na životní prostředí a lidské this notice for all electronic products bearing the following zdraví.
Page 51
Regulatory Information Appendix E Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
Page 52
Regulatory Information Appendix E Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
Page 53
Regulatory Information Appendix E Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
Software End User License Agreement Appendix F Appendix F: Software End THE RETURN PROCESS AND POLICIES OF THE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE. User License Agreement IN THE EVENT THAT YOU HAVE ELECTED TO OBTAIN A SUBSCRIPTION LICENSE, AS INDICATED IN YOUR ORDER, YOU ADDITIONALLY AGREE TO BE BOUND BY THE “TERMS Cisco Products...
Page 55
Software End User License Agreement Appendix F License Restrictions. Other than as set forth in this suitability, functionality, or legality of any sites or products Agreement, you may not (i) make or distribute copies to which links may be provided or third party services, and of the Software or its related Documentation, or you hereby waive any claim you might have against Cisco electronically transfer the Software or Documentation...
Page 56
Software End User License Agreement Appendix F Software can enable any other computer (on the same part of the installation process or by requesting a change primary network) to generate reports. When a computer to your software settings in the error process. Installing is enabled, that computer shows a notification that it is the software and changing these software settings may being monitored.
Page 57
BY APPLICABLE LAW, IN NO EVENT WILL CISCO BE LIABLE in any purchase order or elsewhere. FOR ANY LOST DATA, REVENUE OR PROFIT, OR FOR SPECIAL, Linksys, Cisco and the Cisco Logo and other trademarks INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE contained in the Software and Documentation are...
Page 58
Software End User License Agreement Appendix F send you Service related email messages as long as you For example, if you distribute copies of such a program, are a subscriber to the Service. If you wish to opt-out whether gratis or for a fee, you must give the recipients of receiving Service related email messages, you may all the rights that you have.
Page 59
Software End User License Agreement Appendix F 1. You may copy and distribute verbatim copies of the distribution of derivative or collective works based on Program’s source code as you receive it, in any medium, the Program. provided that you conspicuously and appropriately In addition, mere aggregation of another work not publish on each copy an appropriate copyright notice based on the Program with the Program (or with a...
Page 60
Software End User License Agreement Appendix F 4. You may not copy, modify, sublicense, or distribute on consistent application of that system; it is up to the Program except as expressly provided under the author/donor to decide if he or she is willing to this License.
Page 61
Software End User License Agreement Appendix F 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR When we speak of free software, we are referring to AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, freedom of use, not price. Our General Public Licenses OR ANY OTHER PARTY WHO MAY MODIFY AND/OR are designed to make sure that you have the freedom REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE,...
Page 62
Software End User License Agreement Appendix F Public License permits more lax criteria for linking other either verbatim or with modifications and/or translated code with the library. straightforwardly into another language. (Hereinafter, translation is included without limitation in the term We call this license the “Lesser”...
Page 63
Software End User License Agreement Appendix F (For example, a function in a library to compute square If distribution of object code is made by offering roots has a purpose that is entirely well-defined access to copy from a designated place, then offering independent of the application.
Page 64
Software End User License Agreement Appendix F a) Accompany work with complete 7. You may place library facilities that are a work based corresponding machine-readable source code on the Library side-by-side in a single library together for the Library including whatever changes were with other library facilities not covered by this License, used in the work (which must be distributed and distribute such a combined library, provided that...
Page 65
Software End User License Agreement Appendix F 11. If, as a consequence of a court judgment or allegation license version number, you may choose any version of patent infringement or for any other reason (not ever published by the Free Software Foundation. limited to patent issues), conditions are imposed on 14.
Page 66
Software End User License Agreement Appendix F Schedule 3-C 6. Redistributions of any form whatsoever must retain the following acknowledgment: “This product includes OPENSSL LICENSE software developed by the OpenSSL Project for use in If this Cisco product contains open source software the OpenSSL Toolkit (http://www.openssl.org/)”...
Page 67
Software End User License Agreement Appendix F 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes cryptographic software written...