Product Overview is flashing, the Router is actively sending or receiving data over the network. Thank you for choosing the Linksys Wireless-N Broadband Internet (Blue) The Internet LED lights up Router. The Router lets you access the Internet via a...
Page 6
Router down until the screws fit snugly into the true to scale. wall-mount slots. NOTE: Linksys is not responsible for damages incurred by insecure wall-mounting hardware. 152 mm Print this page at 100% size. Cut along the dotted line, and place on the wall to drill precise spacing.
3. Enable MAC address filtering WEB: For more information on wireless Linksys routers give you the ability to enable Media Access security, visit www.linksys.com/security Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device.
Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you’d like to change its advanced settings, use the Router’s web-based utility. This chapter describes each web page of the utility and each page’s key functions.
Page 9
Advanced Configuration Chapter 3 Static IP before your Internet connection terminates. The default Max Idle Time is 15 minutes. If you are required to use a permanent IP address to Keep Alive: Redial Period If you select this option, connect to the Internet, select Static IP. the Router will periodically check your Internet connection.
Page 10
Advanced Configuration Chapter 3 inactivity, Connect on Demand enables the Router to Telstra Cable automatically re-establish your connection as soon as you Telstra Cable is a service that applies to connections in attempt to access the Internet again. To use this option, Australia only.
Page 11
Advanced Configuration Chapter 3 host and domain name. In most cases, leaving these fields DHCP Reservation blank will work. You will see a list of DHCP clients with the following MTU is the Maximum Transmission Unit. It specifies information: Client Name, Interface, IP Address, and the largest packet size permitted for Internet transmission.
Advanced Configuration Chapter 3 amount of time, in minutes, that the user will be “leased” DynDNS.org this dynamic IP address. After the time is up, the user will be automatically assigned a new dynamic IP address. The default is 0 minutes, which means one day. Static DNS 1-3 The Domain Name System (DNS) is how the Internet translates domain or website names into...
Advanced Configuration Chapter 3 Clone My PC’s MAC TZO.com Click this button to clone the MAC address of the computer you are using. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Setup > Advanced Routing This screen is used to set up the Router’s advanced functions.
For each route, the Destination LAN IP address, Subnet wireless network. For added security, you should change Mask, Gateway, and Interface are displayed. Click the default SSID (linksys) to a unique name. Refresh to update the information. Click Close to exit this screen.
Advanced Configuration Chapter 3 Wi-Fi Protected Setup After the client device has been configured, click OK. Then refer back to your client device or its There are three methods available. Use the method that documentation for further instructions. applies to the client device you are configuring. The Wi-Fi Protected Setup Status, Network Name (SSID), Security, Encryption, and Passphrase are displayed at the bottom of the screen.
Page 16
Advanced Configuration Chapter 3 Key Renewal Enter a Key Renewal period, which instructs WPA2 Enterprise the Router how often it should change the encryption keys. This option features WPA2 used in coordination with a The default Group Key Renewal period is 3600 seconds. RADIUS server.
Advanced Configuration Chapter 3 IMPORTANT: If you are using WEP encryption, always remember that each device in your wireless network MUST use the same WEP encryption method and encryption key, or else your wireless network will not function properly. RADIUS Server Enter the IP Address of the RADIUS server.
Advanced Configuration Chapter 3 Wireless Client List With Shared Key authentication, the sender and recipient use a WEP key for authentication. Select Shared Key to This screen shows computers and other devices on only use Shared Key authentication. the wireless network. The list can be sorted by Client Name, Interface, IP Address, MAC Address, and Status.
Advanced Configuration Chapter 3 hear the beacons and awaken to receive the broadcast Deselect the feature to allow anonymous Internet and multicast messages. The default value is 1. requests. Fragmentation Threshold Filter Multicast This value specifies the Multicasting allows multiple maximum size for a packet before data is fragmented transmissions to specific recipients at the same time.
Advanced Configuration Chapter 3 Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, keep the default, Enabled. PPTP Passthrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be...
Advanced Configuration Chapter 3 Status Policies are disabled by default. To enable a policy, If the application you want to block is not listed or you select the policy number from the drop-down menu, and want to edit a service’s settings, enter the application’s select Enabled.
Advanced Configuration Chapter 3 Port Range Forwarding External Port Enter the external port number used by the server or Internet application. Check with the Internet To forward a port, enter the information on each line for application documentation for more information. the criteria required.
Advanced Configuration Chapter 3 Triggered Range For each application, enter the starting address in the field provided. To retrieve this information, click DHCP Client Table. and ending port numbers of the triggered port number range. Check with the Internet application documentation for the port number(s) needed.
Page 24
Advanced Configuration Chapter 3 WMM Support If you have other devices that support Wi- can range from 1 to 65535. Check your application’s Fi Multimedia (WMM) on your network, keep the default, documentation for details on the service ports used. Enabled.
Advanced Configuration Chapter 3 Voice Device QoS > Voice Device Enter a Name Enter a name for your voice device. MAC Address Enter the MAC address of your voice device. Priority High Select appropriate priority: (Recommend), Medium, Normal, or Low. Click Add to save your changes.
Advanced Configuration Chapter 3 Administration > Log Remote Upgrade If you want to be able to upgrade the Router remotely, from outside the local network, select Enabled. (You must have the Remote Management The Router can keep logs of all traffic for your Internet feature enabled as well.) Otherwise, keep the default, connection.
Advanced Configuration Chapter 3 Administration > Diagnostics Traceroute Test The Traceroute test tests the performance of a The diagnostic tests (Ping and Traceroute) allow you to connection. check the connections of your network devices, including connection to the Internet. This screen also allows you to IP or URL Address Enter the address of the PC whose reset the router.
This is the Router’s MAC Address, as seen by your ISP. Before upgrading the firmware, download the Router’s firmware upgrade file from the Linksys website, Host Name If required by your ISP, this was entered on www.linksys.com. Then extract the file.
Advanced Configuration Chapter 3 date information, click Refresh. To exit this screen and return to the Local Network screen, click Close. Status > Wireless Network The Wireless Network screen displays information about your wireless network. Status > Local Network Local Network Local MAC Address The MAC address of the Router’s local, wired interface is displayed here.
WEB: If your questions are not addressed here, The DSL telephone line does not fit into the Router’s refer to the Linksys website, www.linksys.com Internet port. The Router does not replace your modem. You still need your DSL modem in order to use the Router. Connect the telephone line to the DSL modem, and then insert the setup CD into your computer.
Linksys’ entire liability under this limited warranty jurisdiction. will be for Linksys, at its option, to (a) repair the product TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT with new or refurbished parts, (b) replace the product...
This limited warranty is governed by the laws of the jurisdiction in which the Product was purchased by you. Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623. Wireless-N Broadband Router...
Regulatory Information Appendix D Appendix D: Safety Notices Regulatory Information Caution: To reduce the risk of fire, use only No.26 AWG • or larger telecommunication line cord. Do not use this product near water, for example, in a • FCC Statement wet basement or near a swimming pool.
Regulatory Information Appendix D Avis d’Industrie Canada Avis de non-responsabilité concernant les appareils sans fil Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. Les performances maximales pour les réseaux sans fil L’utilisation de ce dispositif est autorisée seulement aux sont tirées des spécifications de la norme IEEE 802.11.
úřady. Správná likvidace a recyklace pomáhá předcházet Linksys products. Consumers are required to comply with potenciálním negativním dopadům na životní prostředí a lidské this notice for all electronic products bearing the following zdraví.
Page 37
Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
Page 38
Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
Page 39
ľudí. Ak máte záujem o podrobnejšie WEB: For additional information, please visit informácie o likvidácii starého zariadenia, obráťte sa, prosím, na www.linksys.com miestne orgány, organizácie zaoberajúce sa likvidáciou odpadov alebo obchod, v ktorom ste si produkt zakúpili. 09011310-ST...
Software End User License Agreement Appendix E Appendix E: Software End THE RETURN PROCESS AND POLICIES OF THE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE. User License Agreement IN THE EVENT THAT YOU HAVE ELECTED TO OBTAIN A SUBSCRIPTION LICENSE, AS INDICATED IN YOUR ORDER, YOU ADDITIONALLY AGREE TO BE BOUND BY THE “TERMS Cisco Products...
Page 41
Software End User License Agreement Appendix E of the Software or its related Documentation, or business dealings with, or participation in promotions electronically transfer the Software or Documentation of advertisers found through the Software and any from one computer to another or over a network; (ii) alter, other terms, conditions, warranties, or representations merge, modify, adapt, decrypt or translate the Software or associated with such dealings, are solely between you and...
Page 42
Software End User License Agreement Appendix E In addition, Cisco may collect and store detailed IS PROVIDED “AS IS” WITH ALL FAULTS AND WITHOUT information regarding your network configuration WARRANTY OF ANY KIND. Without limiting the foregoing, and usage for the purpose of providing you technical Cisco does not warrant that the operation of the product networking support.
Page 43
Service. in any purchase order or elsewhere. 4. WARRANTY DISCLAIMER FOR SERVICES. TO THE Linksys, Cisco and the Cisco Logo and other trademarks EXTENT NOT PROHIBITED BY APPLICABLE LAW THE contained in the Software and Documentation are SERVICES ARE PROVIDED ON AN “AS-IS”...
Page 44
Software End User License Agreement Appendix E freedom to share and change free software--to make sure TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND the software is free for all its users. This General Public MODIFICATION License applies to most of the Free Software Foundation’s This License applies to any program or other work software and to any other program whose authors which contains a notice placed by the copyright...
Page 45
Software End User License Agreement Appendix E If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
Page 46
Software End User License Agreement Appendix E If, as a consequence of a court judgment or allegation not specify a version number of this License, you of patent infringement or for any other reason (not may choose any version ever published by the Free limited to patent issues), conditions are imposed on Software Foundation.
Page 47
Software End User License Agreement Appendix E GNU LESSER GENERAL PUBLIC LICENSE To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the Version 2.1, February 1999 library is modified by someone else and passed on, the recipients should know that what they have is not the Copyright (C) 1991, 1999 Free Software Foundation, Inc.
Page 48
Software End User License Agreement Appendix E freedom and the wherewithal to run that program using a You may copy and distribute verbatim copies of the modified version of the Library. Library’s complete source code as you receive it, in any medium, provided that you conspicuously and The precise terms and conditions for copying, distribution appropriately publish on each copy an appropriate...
Page 49
Software End User License Agreement Appendix E Thus, it is not the intent of this section to claim When a “work that uses the Library” uses material from rights or contest your rights to work written entirely a header file that is part of the Library, the object code by you;...
Page 50
Software End User License Agreement Appendix E Use a suitable shared library mechanism for linking You may not copy, modify, sublicense, link with, or with the Library. A suitable mechanism is one that distribute the Library except as expressly provided (1) uses at run time a copy of the library already under this License.
Page 51
Software End User License Agreement Appendix E software distributed through that system in reliance NO WARRANTY on consistent application of that system; it is up to BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, the author/donor to decide if he or she is willing to THERE IS NO WARRANTY FOR THE LIBRARY, TO THE distribute software through any other system and a EXTENT PERMITTED BY APPLICABLE LAW.
Page 52
Software End User License Agreement Appendix E The OpenSSL toolkit stays under a dual license, i.e. both This product includes cryptographic software written by the conditions of the OpenSSL License and the original Eric Young (eay@cryptsoft.com). This product includes SSLeay license apply to the toolkit. See below for the software written by Tim Hudson (tjh@cryptsoft.com).
Page 53
Software End User License Agreement Appendix E BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...