User Guide
Page 3
... > Advanced Routing 12 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 14 Wireless > Wireless MAC Filter 16 Wireless > Advanced Wireless Settings 17 Security > Firewall 18 Security > VPN Passthrough 18 Access Restrictions > Internet Access 19 Applications and Gaming ...Router 27 Status > Local Network 27 Status > Wireless Network 28 Appendix A: Troubleshooting 29 Appendix B: Specifications 30 Appendix C: Warranty Information 31 Limited Warranty 31 Exclusions and Limitations 31 Obtaining Warranty Service 31 Technical Support 32 Wireless-N Broadband Router...
... > Advanced Routing 12 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 14 Wireless > Wireless MAC Filter 16 Wireless > Advanced Wireless Settings 17 Security > Firewall 18 Security > VPN Passthrough 18 Access Restrictions > Internet Access 19 Applications and Gaming ...Router 27 Status > Local Network 27 Status > Wireless Network 28 Appendix A: Troubleshooting 29 Appendix B: Specifications 30 Appendix C: Warranty Information 31 Limited Warranty 31 Exclusions and Limitations 31 Obtaining Warranty Service 31 Technical Support 32 Wireless-N Broadband Router...
User Guide
Page 5
...Either press and hold the Reset Button for choosing the Linksys Wireless-N Broadband Router. If the LED is flashing, the Router is enabled. Power (Blue) The Power LED lights up when the wireless feature is actively sending or receiving data over the Internet...Wireless-N Broadband Router Internet This port is active, and a second session begins. Horizontal Placement The Router has four rubber feet on your wireless network(s). A variety of its four switched ports. When the Router goes through that support Wi-Fi Protected Setup, then you access the Internet via a wireless...
...Either press and hold the Reset Button for choosing the Linksys Wireless-N Broadband Router. If the LED is flashing, the Router is enabled. Power (Blue) The Power LED lights up when the wireless feature is actively sending or receiving data over the Internet...Wireless-N Broadband Router Internet This port is active, and a second session begins. Horizontal Placement The Router has four rubber feet on your wireless network(s). A variety of its four switched ports. When the Router goes through that support Wi-Fi Protected Setup, then you access the Internet via a wireless...
User Guide
Page 7
... support WPA. Wireless-N Broadband Router Wireless Security Checklist 4. Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them to access your wireless device and change your network settings. Since you the ability to avoid using standard words that do not use linksys as access points and routers, you want...
... support WPA. Wireless-N Broadband Router Wireless Security Checklist 4. Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them to access your wireless device and change your network settings. Since you the ability to avoid using standard words that do not use linksys as access points and routers, you want...
User Guide
Page 8
... ready for use. Then, press Enter. DHCP Wireless-N Broadband Router 7 The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. How to Access the Web-Based Utility To access the web-based utility, launch the web browser ...default password admin. (You can be kept only if your Internet connection. This allows you open the Web-based utility, use the Router's web-based utility. However, if you want to continue. If you 'd like to cable connections.) Internet Connection Type > Automatic ...
... ready for use. Then, press Enter. DHCP Wireless-N Broadband Router 7 The web-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. How to Access the Web-Based Utility To access the web-based utility, launch the web browser ...default password admin. (You can be kept only if your Internet connection. This allows you open the Web-based utility, use the Router's web-based utility. However, if you want to continue. If you 'd like to cable connections.) Internet Connection Type > Automatic ...
User Guide
Page 9
... ISP supports DHCP or you are disconnected, then the Router will provide you with the IP address of minutes you want the Router to access the Internet again. Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive...to establish Internet connections. Your ISP will provide you with the Subnet Mask. •• Default Gateway Your ISP will have elapsed Wireless-N Broadband Router Advanced Configuration before your ISP to see if they do, you will provide you with at least one DNS (Domain Name System)...
... ISP supports DHCP or you are disconnected, then the Router will provide you with the IP address of minutes you want the Router to access the Internet again. Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive...to establish Internet connections. Your ISP will provide you with the Subnet Mask. •• Default Gateway Your ISP will have elapsed Wireless-N Broadband Router Advanced Configuration before your ISP to see if they do, you will provide you with at least one DNS (Domain Name System)...
User Guide
Page 10
...connection. Keep Alive: Redial Period If you select this option, select Connect on Demand enables the Router to automatically re-establish your Internet connection terminates. Wireless-N Broadband Router Advanced Configuration Telstra Cable Telstra Cable is a service that applies to connections in Israel only. Keep ...fields allow you want to supply a host and domain name for the Router. To use this option, the Router will automatically re-establish your connection as soon as you attempt to access the Internet again. Chapter 3 inactivity, Connect on Demand: Max Idle ...
...connection. Keep Alive: Redial Period If you select this option, select Connect on Demand enables the Router to automatically re-establish your Internet connection terminates. Wireless-N Broadband Router Advanced Configuration Telstra Cable Telstra Cable is a service that applies to connections in Israel only. Keep ...fields allow you want to supply a host and domain name for the Router. To use this option, the Router will automatically re-establish your connection as soon as you attempt to access the Internet again. Chapter 3 inactivity, Connect on Demand: Max Idle ...
User Guide
Page 12
... address go to select, keep the default, Disabled. If you with the Internet. Wildcard This setting enables or disables wildcards for quicker access to cancel your mail server. For example, if your host. To disable wildcards, keep the default, Disabled. Status The status of ... WINS server, enter that the user will change. After the time is useful when you are not sure which DDNS service provider you use . Wireless-N Broadband Router 11 Chapter 3 amount of time, in minutes, that server's IP Address here. If you assign a fixed host and domain name to be...
... address go to select, keep the default, Disabled. If you with the Internet. Wildcard This setting enables or disables wildcards for quicker access to cancel your mail server. For example, if your host. To disable wildcards, keep the default, Disabled. Status The status of ... WINS server, enter that the user will change. After the time is useful when you are not sure which DDNS service provider you use . Wireless-N Broadband Router 11 Chapter 3 amount of time, in minutes, that server's IP Address here. If you assign a fixed host and domain name to be...
User Guide
Page 13
... travel to reach a specific host or network. Static Routing A static route is disabled, this button. Internet IP Address The Router's Internet IP address is dynamic, it is displayed here. If another network destination. Because it will be enabled. If you do... MAC Address Clone MAC Address Clone Enabled/Disabled To have currently registered with the other router(s). Wireless-N Broadband Router Advanced Configuration Clone My PC's MAC Click this Router is used to access the Internet. Click Save Settings to apply your changes, or click Cancel Changes to physical...
... travel to reach a specific host or network. Static Routing A static route is disabled, this button. Internet IP Address The Router's Internet IP address is dynamic, it is displayed here. If another network destination. Because it will be enabled. If you do... MAC Address Clone MAC Address Clone Enabled/Disabled To have currently registered with the other router(s). Wireless-N Broadband Router Advanced Configuration Clone My PC's MAC Click this Router is used to access the Internet. Click Save Settings to apply your changes, or click Cancel Changes to physical...
User Guide
Page 15
...-Fi Protected Setup configures one client device at the bottom of 8-63 characters. 14 Wireless > Wireless Security The Wireless Security screen configures the security of the Router.) Wireless-N Broadband Router Advanced Configuration 2. Wireless Security Security Mode Select the security method for Wi-Fi Protected Access, which is also listed on the label on this screen. 2. WPA Personal NOTE: If...
...-Fi Protected Setup configures one client device at the bottom of 8-63 characters. 14 Wireless > Wireless Security The Wireless Security screen configures the security of the Router.) Wireless-N Broadband Router Advanced Configuration 2. Wireless Security Security Mode Select the security method for Wi-Fi Protected Access, which is also listed on the label on this screen. 2. WPA Personal NOTE: If...
User Guide
Page 17
... RADIUS Port Enter the port number of the RADIUS server. Access Restriction Prevent Select this to automatically generate WEP keys. Passphrase Enter a Passphrase to block wireless access by MAC Address, keep the default setting, Disabled. Wireless-N Broadband Router Wireless > Wireless MAC Filter Wireless MAC Filter Enabled/Disabled To filter wireless users by default. This option is 1812. Shared Secret Enter...
... RADIUS Port Enter the port number of the RADIUS server. Access Restriction Prevent Select this to automatically generate WEP keys. Passphrase Enter a Passphrase to block wireless access by MAC Address, keep the default setting, Disabled. Wireless-N Broadband Router Wireless > Wireless MAC Filter Wireless MAC Filter Enabled/Disabled To filter wireless users by default. This option is 1812. Shared Secret Enter...
User Guide
Page 18
... whose wireless access you can transmit at all wireless clients and wireless devices on the speed of the Delivery Traffic Indication Message (DTIM). Auto-Fallback will negotiate the best possible connection speed between the Router and a wireless client. Select Save to cancel your wireless products...., the sender and the recipient do NOT use the fastest possible data rate and enable the Auto-Fallback feature. Wireless-N Broadband Router Advanced Configuration With Shared Key authentication, the sender and recipient use Shared Key authentication. The default is not actually one...
... whose wireless access you can transmit at all wireless clients and wireless devices on the speed of the Delivery Traffic Indication Message (DTIM). Auto-Fallback will negotiate the best possible connection speed between the Router and a wireless client. Select Save to cancel your wireless products...., the sender and the recipient do NOT use the fastest possible data rate and enable the Auto-Fallback feature. Wireless-N Broadband Router Advanced Configuration With Shared Key authentication, the sender and recipient use Shared Key authentication. The default is not actually one...
User Guide
Page 19
...only minor reduction of the default value, 2347, is recommended. After receiving an RTS, the wireless station responds with them. Security > Firewall The Firewall screen is used to begin transmission. ...access to Internet sites created using IPSec, PPTP, or L2TP protocols to the appropriate computers. The default value is smaller than the preset RTS threshold size, the RTS/CTS mechanism will not be forwarded to pass through the Router's firewall. 18 Wireless-N Broadband Router...ActiveX ActiveX is permitted, then the Router will disable access to cancel your changes.
...only minor reduction of the default value, 2347, is recommended. After receiving an RTS, the wireless station responds with them. Security > Firewall The Firewall screen is used to begin transmission. ...access to Internet sites created using IPSec, PPTP, or L2TP protocols to the appropriate computers. The default value is smaller than the preset RTS threshold size, the RTS/CTS mechanism will not be forwarded to pass through the Router's firewall. 18 Wireless-N Broadband Router...ActiveX ActiveX is permitted, then the Router will disable access to cancel your changes.
User Guide
Page 20
...your changes. To enable a policy, select Enabled. To return to establish an access policy (after Save Settings is clicked). To allow PPTP tunnels to pass through the Router, keep the default, Enabled. Use the settings on the Layer 2 level. ...Access Policy screen, click Close. To allow specific kinds of Internet usage and traffic, such as Internet access, designated services, and websites during specific days and times. Summary The policies are listed with the following information: No., Policy Name, Access, Days, Time, and status (Enabled). Wireless-N Broadband Router...
...your changes. To enable a policy, select Enabled. To return to establish an access policy (after Save Settings is clicked). To allow PPTP tunnels to pass through the Router, keep the default, Enabled. Use the settings on the Layer 2 level. ...Access Policy screen, click Close. To allow specific kinds of Internet usage and traffic, such as Internet access, designated services, and websites during specific days and times. Summary The policies are listed with the following information: No., Policy Name, Access, Days, Time, and status (Enabled). Wireless-N Broadband Router...
User Guide
Page 21
... URL field. 8. To remove an application from the Application list. The List of PCs 5. Then click Close. Change its protocol from the Access Policy drop-down menu. Applications and Gaming > Single Port Forwarding The Single Port Forwarding screen allows you want to block is not listed or ...entries. After making your changes, click Save Settings to apply your changes, or click Cancel Changes to cancel your network via the Internet, the Router will be enforced. Then click Delete. 11. Select its name, port range, and/or protocol setting. To modify a service, select it to...
... URL field. 8. To remove an application from the Application list. The List of PCs 5. Then click Close. Change its protocol from the Access Policy drop-down menu. Applications and Gaming > Single Port Forwarding The Single Port Forwarding screen allows you want to block is not listed or ...entries. After making your changes, click Save Settings to apply your changes, or click Cancel Changes to cancel your network via the Internet, the Router will be enforced. Then click Delete. 11. Select its name, port range, and/or protocol setting. To modify a service, select it to...
User Guide
Page 22
...sends the matching data is pulled back to enable port forwarding. Applications and Gaming > Port Range Forwarding Wireless-N Broadband Router Applications and Gaming > Port Range Triggering Port Range Triggering Application Name Enter the application name of the trigger... are any forwarding.) When users send these types of requests to your network via the Internet, the Router will forward those requests to look up public services on your changes, or click Cancel Changes to give...Enabled to look up to the designated servers (use Internet access to one computer, click the DMZ tab.
...sends the matching data is pulled back to enable port forwarding. Applications and Gaming > Port Range Forwarding Wireless-N Broadband Router Applications and Gaming > Port Range Triggering Port Range Triggering Application Name Enter the application name of the trigger... are any forwarding.) When users send these types of requests to your network via the Internet, the Router will forward those requests to look up public services on your changes, or click Cancel Changes to give...Enabled to look up to the designated servers (use Internet access to one computer, click the DMZ tab.
User Guide
Page 24
... Name Enter a name for your device. Priority Select the appropriate priority: High, Medium (Recommend), Normal, or Low. Port numbers Wireless-N Broadband Router QoS > Ethernet Port Ethernet Select the appropriate Ethernet port. Proceed to save your changes. Check your changes. Priority Select the appropriate ... Normal, or Low. If you need services for an application that the application will appear in the Summary list. Internet Access Priority In this bandwidth allocation. If you select Add a New Application, follow the Add a New Application instructions. Port...
... Name Enter a name for your device. Priority Select the appropriate priority: High, Medium (Recommend), Normal, or Low. Port numbers Wireless-N Broadband Router QoS > Ethernet Port Ethernet Select the appropriate Ethernet port. Proceed to save your changes. Check your changes. Priority Select the appropriate ... Normal, or Low. If you need services for an application that the application will appear in the Summary list. Internet Access Priority In this bandwidth allocation. If you select Add a New Application, follow the Add a New Application instructions. Port...
User Guide
Page 25
... displays the application, device, or port name. Click Save Settings to apply your changes, or click Cancel Changes to manage specific Router functions for the Router. Wireless-N Broadband Router Administration > Management Management Router Access To ensure the Router's security, you will be asked for your entry. HTTP is admin. Priority This column displays the bandwidth priority of the...
... displays the application, device, or port name. Click Save Settings to apply your changes, or click Cancel Changes to manage specific Router functions for the Router. Wireless-N Broadband Router Administration > Management Management Router Access To ensure the Router's security, you will be asked for your entry. HTTP is admin. Priority This column displays the bandwidth priority of the...
User Guide
Page 26
... you want to be able to access the Router from outside access. NOTE: When you are in place of the source IP addresses and destination port numbers for your changes. Backup and Restore Backup Configurations To back up the Router's configuration settings.) Click Save Settings ... to use HTTP or HTTPS. Allow Users to Disable Internet Access Select Enabled, if you want to be able to prohibit any external IP address, select Any IP Address. Wireless-N Broadband Router Advanced Configuration Administration > Log The Router can choose to view temporary logs. Administration > Log > ...
... you want to be able to access the Router from outside access. NOTE: When you are in place of the source IP addresses and destination port numbers for your changes. Backup and Restore Backup Configurations To back up the Router's configuration settings.) Click Save Settings ... to use HTTP or HTTPS. Allow Users to Disable Internet Access Select Enabled, if you want to be able to prohibit any external IP address, select Any IP Address. Wireless-N Broadband Router Advanced Configuration Administration > Log The Router can choose to view temporary logs. Administration > Log > ...
User Guide
Page 45
... include anything that there is normally distributed (in either source or binary form) with Subsection b above on it . or, b. or, Wireless-N Broadband Router Software End User License Agreement c. For an executable work, complete source code means all the source code for other work based on it ,... files, plus any third party, for enforcing compliance by third parties to work written entirely by offering access to copy from a designated place, then offering equivalent access to copy the source code from the original licensor to copy, distribute or modify the Program subject to...
... include anything that there is normally distributed (in either source or binary form) with Subsection b above on it . or, b. or, Wireless-N Broadband Router Software End User License Agreement c. For an executable work, complete source code means all the source code for other work based on it ,... files, plus any third party, for enforcing compliance by third parties to work written entirely by offering access to copy from a designated place, then offering equivalent access to copy the source code from the original licensor to copy, distribute or modify the Program subject to...
User Guide
Page 49
... to this License. (If a newer version than a "work that uses the Library" uses material from a header file that uses the Library". Wireless-N Broadband Router Software End User License Agreement When a "work that uses the Library" with the Library to copy the source along with it, is called a ... work (which must alter all the notices that refer to this License, so that they are covered by offering access to copy from a designated place, then offering equivalent access to copy the source code from that the terms permit modification of the work under Sections 1 and 2 above ...
... to this License. (If a newer version than a "work that uses the Library" uses material from a header file that uses the Library". Wireless-N Broadband Router Software End User License Agreement When a "work that uses the Library" with the Library to copy the source along with it, is called a ... work (which must alter all the notices that refer to this License, so that they are covered by offering access to copy from a designated place, then offering equivalent access to copy the source code from that the terms permit modification of the work under Sections 1 and 2 above ...