User Guide
Page 3
... > Advanced Routing 12 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 14 Wireless > Wireless MAC Filter 16 Wireless > Advanced Wireless Settings 17 Security > Firewall 18 Security > VPN Passthrough 18 Access Restrictions > Internet Access 19 Applications and Gaming ...Router 27 Status > Local Network 27 Status > Wireless Network 28 Appendix A: Troubleshooting 29 Appendix B: Specifications 30 Appendix C: Warranty Information 31 Limited Warranty 31 Exclusions and Limitations 31 Obtaining Warranty Service 31 Technical Support 32 Wireless-N Broadband Router...
... > Advanced Routing 12 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 14 Wireless > Wireless MAC Filter 16 Wireless > Advanced Wireless Settings 17 Security > Firewall 18 Security > VPN Passthrough 18 Access Restrictions > Internet Access 19 Applications and Gaming ...Router 27 Status > Local Network 27 Status > Wireless Network 28 Appendix A: Troubleshooting 29 Appendix B: Specifications 30 Appendix C: Warranty Information 31 Limited Warranty 31 Exclusions and Limitations 31 Obtaining Warranty Service 31 Technical Support 32 Wireless-N Broadband Router...
User Guide
Page 5
...mode during every boot-up, this LED will flash. Wireless-N Broadband Router Internet This port is where you will stay on while the Router is to mount the Router on a surface. Either press and hold the Reset Button for choosing the Linksys Wireless-N Broadband Router. The second way is powered on. You can use... four rubber feet on your privacy while online. The LED is solidly lit when the Router is where you will be solidly lit. The Router lets you access the Internet via a wireless connection or through that support Wi-Fi Protected Setup, then you can also use Wi-Fi...
...mode during every boot-up, this LED will flash. Wireless-N Broadband Router Internet This port is where you will stay on while the Router is to mount the Router on a surface. Either press and hold the Reset Button for choosing the Linksys Wireless-N Broadband Router. The second way is powered on. You can use... four rubber feet on your privacy while online. The LED is solidly lit when the Router is where you will be solidly lit. The Router lets you access the Internet via a wireless connection or through that support Wi-Fi Protected Setup, then you can also use Wi-Fi...
User Guide
Page 7
... each computer in length. The Linksys default password is a unique series of encryption supported by sending information over a wireless network. Wireless-N Broadband Router Wireless Security Checklist 4. You should enable the highest level of numbers and letters assigned to every networking device. The MAC address is admin. Additional Security Tips •• Keep wireless routers, access points, or gateways away...
... each computer in length. The Linksys default password is a unique series of encryption supported by sending information over a wireless network. Wireless-N Broadband Router Wireless Security Checklist 4. You should enable the highest level of numbers and letters assigned to every networking device. The MAC address is admin. Additional Security Tips •• Keep wireless routers, access points, or gateways away...
User Guide
Page 8
... your ISP. Additional tabs will be obtained through a dynamic IP address. (This option usually applies to cable connections.) Internet Connection Type > Automatic Configuration - DHCP Wireless-N Broadband Router 7 You can access the utility via a web browser on a computer connected to your Internet connection. Login Screen Setup > Basic Setup The first screen that appears is set...
... your ISP. Additional tabs will be obtained through a dynamic IP address. (This option usually applies to cable connections.) Internet Connection Type > Automatic Configuration - DHCP Wireless-N Broadband Router 7 You can access the utility via a web browser on a computer connected to your Internet connection. Login Screen Setup > Basic Setup The first screen that appears is set...
User Guide
Page 9
...Address Your ISP will provide you with at least one DNS (Domain Name System) server IP address. Your ISP will have elapsed Wireless-N Broadband Router Advanced Configuration before your Internet connection terminates. Your ISP will provide you with the Subnet Mask. PPPoE Some DSL-based ISPs use ... If you are required to use a permanent IP address to connect to access the Internet again. If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to the Internet...
...Address Your ISP will provide you with at least one DNS (Domain Name System) server IP address. Your ISP will have elapsed Wireless-N Broadband Router Advanced Configuration before your Internet connection terminates. Your ISP will provide you with the Subnet Mask. PPPoE Some DSL-based ISPs use ... If you are required to use a permanent IP address to connect to access the Internet again. If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to the Internet...
User Guide
Page 10
... your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your Internet connection. If you want the Router to check the Internet connection. Wireless-N Broadband Router Advanced Configuration Telstra Cable Telstra Cable is the IP address of time (Max Idle...the Max Idle Time field, enter the number of minutes you want to have to check with the IP Address you attempt to access the Internet again. To use this option, select Keep Alive. To use this option, select Connect on Demand. The default Max...
... your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your Internet connection. If you want the Router to check the Internet connection. Wireless-N Broadband Router Advanced Configuration Telstra Cable Telstra Cable is the IP address of time (Max Idle...the Max Idle Time field, enter the number of minutes you want to have to check with the IP Address you attempt to access the Internet again. To use this option, select Keep Alive. To use this option, select Connect on Demand. The default Max...
User Guide
Page 12
... then x.myplace.dyndns.org will work as well (x is useful when you assign a fixed host and domain name to your DDNS account. Wireless-N Broadband Router 11 Otherwise, leave this feature, keep the default, Disabled. It is the wildcard). Host Name The is Dynamic. System Select the DynDNS ...Internet Naming Service (WINS) manages each PC's interaction with at least one of these for your changes. Password Enter the Password for quicker access to select, keep the default, Disabled. If you need to be a backup. Before you can use this feature, you use this ...
... then x.myplace.dyndns.org will work as well (x is useful when you assign a fixed host and domain name to your DDNS account. Wireless-N Broadband Router 11 Otherwise, leave this feature, keep the default, Disabled. It is the wildcard). Host Name The is Dynamic. System Select the DynDNS ...Internet Naming Service (WINS) manages each PC's interaction with at least one of these for your changes. Password Enter the Password for quicker access to select, keep the default, Disabled. If you need to be a backup. Before you can use this feature, you use this ...
User Guide
Page 13
...service connection is displayed here. Operating Mode allows you to access the Internet. Static Routing sets up the Router's advanced functions. Dynamic Routing (RIP) Enabled/Disabled This feature enables the Router to automatically adjust to physical changes in order to select the...Enabled. Setup > MAC Address Clone MAC Address Clone Enabled/Disabled To have currently registered with your network, select Disabled. Wireless-N Broadband Router Advanced Configuration Clone My PC's MAC Click this feature is automatically disabled. When the NAT setting is disabled, this ...
...service connection is displayed here. Operating Mode allows you to access the Internet. Static Routing sets up the Router's advanced functions. Dynamic Routing (RIP) Enabled/Disabled This feature enables the Router to automatically adjust to physical changes in order to select the...Enabled. Setup > MAC Address Clone MAC Address Clone Enabled/Disabled To have currently registered with your network, select Disabled. Wireless-N Broadband Router Advanced Configuration Clone My PC's MAC Click this feature is automatically disabled. When the NAT setting is disabled, this ...
User Guide
Page 15
...WPA stands for further instructions. Wireless > Wireless Security The Wireless Security screen configures the security of 8-63 characters. 14 Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) NOTE: Wi-Fi Protected Setup configures one client device at the bottom of the Router.) Wireless-N Broadband Router Advanced Configuration 2. Repeat the instructions... method that each client device that do not want to your client device or its documentation for Wi-Fi Protected Access, which is also listed on the label on the client device. 2. Then refer back to use the same...
...WPA stands for further instructions. Wireless > Wireless Security The Wireless Security screen configures the security of 8-63 characters. 14 Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) NOTE: Wi-Fi Protected Setup configures one client device at the bottom of the Router.) Wireless-N Broadband Router Advanced Configuration 2. Repeat the instructions... method that each client device that do not want to your client device or its documentation for Wi-Fi Protected Access, which is also listed on the label on the client device. 2. Then refer back to use the same...
User Guide
Page 17
...) or 104/128 bits (26 hex digits). WEP WEP is a basic encryption method, which is selected by default. Wireless > Wireless MAC Filter Wireless access can be filtered by MAC Address, keep the default setting, Disabled. This option is not as secure as WPA. Chapter... or 104/128 bits (26 hex digits). Click Save Settings to apply your wireless network will not function properly. Wireless-N Broadband Router Wireless > Wireless MAC Filter Wireless MAC Filter Enabled/Disabled To filter wireless users by default. RADIUS Server Enter the IP Address of the RADIUS server. Passphrase...
...) or 104/128 bits (26 hex digits). WEP WEP is a basic encryption method, which is selected by default. Wireless > Wireless MAC Filter Wireless access can be filtered by MAC Address, keep the default setting, Disabled. This option is not as secure as WPA. Chapter... or 104/128 bits (26 hex digits). Click Save Settings to apply your wireless network will not function properly. Wireless-N Broadband Router Wireless > Wireless MAC Filter Wireless MAC Filter Enabled/Disabled To filter wireless users by default. RADIUS Server Enter the IP Address of the RADIUS server. Passphrase...
User Guide
Page 18
... heavy 802.11b traffic. To use this function, select Enabled. Wireless-N Broadband Router Advanced Configuration With Shared Key authentication, the sender and recipient use Shared Key authentication. The Router will also advertise that it sends the next DTIM with older wireless technology, and All, when the Router can select from a range of transmission speeds, or you...
... heavy 802.11b traffic. To use this function, select Enabled. Wireless-N Broadband Router Advanced Configuration With Shared Key authentication, the sender and recipient use Shared Key authentication. The Router will also advertise that it sends the next DTIM with older wireless technology, and All, when the Router can select from a range of transmission speeds, or you...
User Guide
Page 19
...port 113 from local networked computers. Deselect the feature to receive the broadcast and multicast messages. In most cases, it . Wireless-N Broadband Router Advanced Configuration Deselect the feature to allow anonymous Internet requests. Web Filter Proxy Use of a data frame. Select this feature... apply your changes, or click Cancel Changes to begin transmission. This feature is recommended. Deselect the feature to allow proxy access. ActiveX ActiveX is 1. Deselect the feature to allow ActiveX usage. Deselect the feature to allow cookie usage. The default value...
...port 113 from local networked computers. Deselect the feature to receive the broadcast and multicast messages. In most cases, it . Wireless-N Broadband Router Advanced Configuration Deselect the feature to allow anonymous Internet requests. Web Filter Proxy Use of a data frame. Select this feature... apply your changes, or click Cancel Changes to begin transmission. This feature is recommended. Deselect the feature to allow proxy access. ActiveX ActiveX is 1. Deselect the feature to allow ActiveX usage. Deselect the feature to allow cookie usage. The default value...
User Guide
Page 20
...2 Tunneling Protocol is clicked). Access Restrictions > Internet Access Internet Access Policy Access Policy Access can be tunneled through the Router, keep the default, Enabled. To enable a policy, select Enabled. To return to cancel your changes. Wireless-N Broadband Router Summary 19 Click Save Settings to... apply your changes, or click Cancel Changes to the Internet Access Policy screen, click Close. To delete a policy, select that ...
...2 Tunneling Protocol is clicked). Access Restrictions > Internet Access Internet Access Policy Access Policy Access can be tunneled through the Router, keep the default, Enabled. To enable a policy, select Enabled. To return to cancel your changes. Wireless-N Broadband Router Summary 19 Click Save Settings to... apply your changes, or click Cancel Changes to the Internet Access Policy screen, click Close. To delete a policy, select that ...
User Guide
Page 21
...during which days and what times you wish to give the application. Repeat these types of requests to your network via the Internet, the Router will be affected by the policy. After making your changes, click Save Settings to apply your changes. Change its range in the Port Range... per policy.) From the Applications list, select the application you want this policy to be in effect, or select Everyday. You can filter access to various services accessed over the Internet, such as FTP or telnet. (You can also enter a range of IP addresses if you want to edit a service...
...during which days and what times you wish to give the application. Repeat these types of requests to your network via the Internet, the Router will be affected by the policy. After making your changes, click Save Settings to apply your changes. Change its range in the Port Range... per policy.) From the Applications list, select the application you want this policy to be in effect, or select Everyday. You can filter access to various services accessed over the Internet, such as FTP or telnet. (You can also enter a range of IP addresses if you want to edit a service...
User Guide
Page 22
... changes. Some Internet applications may not require any applications that should assign static IP addresses to the designated servers (use Internet access to enable port forwarding for this application, either TCP or UDP, or Both. Application Name In this application, either TCP...or click Cancel Changes to 12 characters. The IP address of the trigger. 21 Applications and Gaming > Port Range Forwarding Wireless-N Broadband Router Applications and Gaming > Port Range Triggering Port Range Triggering Application Name Enter the application name of the computer that sends the...
... changes. Some Internet applications may not require any applications that should assign static IP addresses to the designated servers (use Internet access to enable port forwarding for this application, either TCP or UDP, or Both. Application Name In this application, either TCP...or click Cancel Changes to 12 characters. The IP address of the trigger. 21 Applications and Gaming > Port Range Forwarding Wireless-N Broadband Router Applications and Gaming > Port Range Triggering Port Range Triggering Application Name Enter the application name of the computer that sends the...
User Guide
Page 24
... variety of allocating the available bandwidth. If you can enter 21-21. Click Add to indicate the name of your device. Internet Access Priority In this section, you need services for details on the service ports used. There are four categories available. When you have ...Low. Click Add to 1250, you select Add a New Application, follow the Add a New Application instructions. Check your settings. Port numbers Wireless-N Broadband Router QoS > Ethernet Port Ethernet Select the appropriate Ethernet port. Your new entry will appear in the Summary list. You can range from 1000 ...
... variety of allocating the available bandwidth. If you can enter 21-21. Click Add to indicate the name of your device. Internet Access Priority In this section, you need services for details on the service ports used. There are four categories available. When you have ...Low. Click Add to 1250, you select Add a New Application, follow the Add a New Application instructions. Check your settings. Port numbers Wireless-N Broadband Router QoS > Ethernet Port Ethernet Select the appropriate Ethernet port. Your new entry will appear in the Summary list. You can range from 1000 ...
User Guide
Page 25
...selected, there will only be able to access the utility via Wireless If you are using the Router in a public domain where you are giving wireless access to your guests, you can disable wireless access to manage specific Router functions for your applications and devices. HTTP..., Normal, or Low. Name This column displays the application, device, or port name. Wireless-N Broadband Router Administration > Management Management Router Access To ensure the Router's security, you access the Router's web-based utility. Select HTTP or HTTPS. Click Add to cancel your password when you...
...selected, there will only be able to access the utility via Wireless If you are using the Router in a public domain where you are giving wireless access to your guests, you can disable wireless access to manage specific Router functions for your applications and devices. HTTP..., Normal, or Low. Name This column displays the application, device, or port name. Wireless-N Broadband Router Administration > Management Management Router Access To ensure the Router's security, you access the Router's web-based utility. Select HTTP or HTTPS. Click Add to cancel your password when you...
User Guide
Page 26
... to prohibit any external IP address, select Any IP Address. Allow Users to Disable Internet Access Select Enabled, if you want to cancel your Internet connection. Wireless-N Broadband Router Advanced Configuration Administration > Log The Router can choose to access the Router from outside access. To monitor traffic between the network and the Internet, keep the default setting, Disabled...
... to prohibit any external IP address, select Any IP Address. Allow Users to Disable Internet Access Select Enabled, if you want to cancel your Internet connection. Wireless-N Broadband Router Advanced Configuration Administration > Log The Router can choose to access the Router from outside access. To monitor traffic between the network and the Internet, keep the default setting, Disabled...
User Guide
Page 45
... and telling the user how to view a copy of this License. (Exception: if the Program itself accompanies the executable. or, Wireless-N Broadband Router Software End User License Agreement c. However, parties who wrote it is normally distributed (in themselves, then this License to work , complete... of the source code, even though third parties are not responsible for enforcing compliance by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as separate works. If identifiable sections ...
... and telling the user how to view a copy of this License. (Exception: if the Program itself accompanies the executable. or, Wireless-N Broadband Router Software End User License Agreement c. However, parties who wrote it is normally distributed (in themselves, then this License to work , complete... of the source code, even though third parties are not responsible for enforcing compliance by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as separate works. If identifiable sections ...
User Guide
Page 49
...from that copy. Any executables containing that work also fall under terms of your rights to work written entirely by offering access to copy from a designated place, then offering equivalent access to copy the source code from a header file that is itself . 6. You must supply a copy of this ... if the work is part of the Library, the object code for the work , in length), then the use the modified definitions.) 48 Wireless-N Broadband Router Software End User License Agreement When a "work that the Library is not a library. 4. If the work that uses the Library" uses material...
...from that copy. Any executables containing that work also fall under terms of your rights to work written entirely by offering access to copy from a designated place, then offering equivalent access to copy the source code from a header file that is itself . 6. You must supply a copy of this ... if the work is part of the Library, the object code for the work , in length), then the use the modified definitions.) 48 Wireless-N Broadband Router Software End User License Agreement When a "work that the Library is not a library. 4. If the work that uses the Library" uses material...