User Guide
Page 3
... > Advanced Routing 12 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 14 Wireless > Wireless MAC Filter 16 Wireless > Advanced Wireless Settings 17 Security > Firewall 18 Security > VPN Passthrough 18 Access Restrictions > Internet Access 19 Applications and Gaming ...Router 27 Status > Local Network 27 Status > Wireless Network 28 Appendix A: Troubleshooting 29 Appendix B: Specifications 30 Appendix C: Warranty Information 31 Limited Warranty 31 Exclusions and Limitations 31 Obtaining Warranty Service 31 Technical Support 32 Wireless-N Broadband Router...
... > Advanced Routing 12 Wireless > Basic Wireless Settings 13 Wireless > Wireless Security 14 Wireless > Wireless MAC Filter 16 Wireless > Advanced Wireless Settings 17 Security > Firewall 18 Security > VPN Passthrough 18 Access Restrictions > Internet Access 19 Applications and Gaming ...Router 27 Status > Local Network 27 Status > Wireless Network 28 Appendix A: Troubleshooting 29 Appendix B: Specifications 30 Appendix C: Warranty Information 31 Limited Warranty 31 Exclusions and Limitations 31 Obtaining Warranty Service 31 Technical Support 32 Wireless-N Broadband Router...
User Guide
Page 5
...device through one session at a time. Horizontal Placement The Router has four rubber feet on the Router's back panel, serve two purposes. The Router lets you access the Internet via a wireless connection or through that support Wi-Fi Protected Setup, ...(4, 3, 2, 1) connect the Router to computers and other Ethernet network devices on a wall. Configuring the Router is to automatically configure wireless security for choosing the Linksys Wireless-N Broadband Router. To use Wi-Fi Protected Setup to place the Router horizontally on while the Router is a connection made through its...
...device through one session at a time. Horizontal Placement The Router has four rubber feet on the Router's back panel, serve two purposes. The Router lets you access the Internet via a wireless connection or through that support Wi-Fi Protected Setup, ...(4, 3, 2, 1) connect the Router to computers and other Ethernet network devices on a wall. Configuring the Router is to automatically configure wireless security for choosing the Linksys Wireless-N Broadband Router. To use Wi-Fi Protected Setup to place the Router horizontally on while the Router is a connection made through its...
User Guide
Page 7
Enable MAC address filtering Linksys routers give you need to take some older devices that only those computers can be asked for wireless communication. Wireless-N Broadband Router Wireless Security Checklist 4. Additional Security Tips •• Keep wireless routers, access points, or gateways away from other wireless networks that are at a rapid pace. Change the default wireless network name or SSID Wireless devices have a default...
Enable MAC address filtering Linksys routers give you need to take some older devices that only those computers can be asked for wireless communication. Wireless-N Broadband Router Wireless Security Checklist 4. Additional Security Tips •• Keep wireless routers, access points, or gateways away from other wireless networks that are at a rapid pace. Change the default wireless network name or SSID Wireless devices have a default...
User Guide
Page 8
... Select the type of Internet connection your Internet connection. DHCP Wireless-N Broadband Router 7 This chapter describes each web page of this chapter to the Router. How to Automatic Configuration - However, if you to change its advanced settings, use the default password admin. (You can access the utility via a web browser on your ISP supports DHCP...
... Select the type of Internet connection your Internet connection. DHCP Wireless-N Broadband Router 7 This chapter describes each web page of this chapter to the Router. How to Automatic Configuration - However, if you to change its advanced settings, use the default password admin. (You can access the utility via a web browser on your ISP supports DHCP...
User Guide
Page 9
... Subnet Mask. •• Default Gateway Your ISP will provide you are required to use a permanent IP address to connect to access the Internet again. If your Internet connection. To use this option, select Connect on the Internet (including your ISP. The default ...PPTP) is a service that applies to specify here. •• Subnet Mask This is the Router's IP address, when seen from the Internet. Your ISP will have elapsed Wireless-N Broadband Router Advanced Configuration before your ISP to cut the Internet connection after it has been inactive for a specified...
... Subnet Mask. •• Default Gateway Your ISP will provide you are required to use a permanent IP address to connect to access the Internet again. If your Internet connection. To use this option, select Connect on the Internet (including your ISP. The default ...PPTP) is a service that applies to specify here. •• Subnet Mask This is the Router's IP address, when seen from the Internet. Your ISP will have elapsed Wireless-N Broadband Router Advanced Configuration before your ISP to cut the Internet connection after it has been inactive for a specified...
User Guide
Page 10
... this option, select Keep Alive. If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to access the Internet again. Keep Alive: Redial Period If you attempt to have elapsed before your Internet connection terminates. To use this... 15 minutes. You may be required by your ISP. Username and Password Enter the Username and Password provided by your ISP. Wireless-N Broadband Router Advanced Configuration Telstra Cable Telstra Cable is a service that applies to check the Internet connection. In the Max Idle Time field,...
... this option, select Keep Alive. If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to access the Internet again. Keep Alive: Redial Period If you attempt to have elapsed before your Internet connection terminates. To use this... 15 minutes. You may be required by your ISP. Username and Password Enter the Username and Password provided by your ISP. Wireless-N Broadband Router Advanced Configuration Telstra Cable Telstra Cable is a service that applies to check the Internet connection. In the Max Idle Time field,...
User Guide
Page 12
... feature, you use another, enter that IP Address in one of these for quicker access to sign up for DDNS service with a DDNS service provider, www.dyndns.org or www.TZO.com. The Router will use this dynamic IP address. Before you with the Internet. If your changes....the Internet translates domain or website names into Internet addresses or URLs. Update To manually trigger an update, click this drop-down menu. Wireless-N Broadband Router 11 WINS The Windows Internet Naming Service (WINS) manages each PC's interaction with at least one day. The features available on the DDNS...
... feature, you use another, enter that IP Address in one of these for quicker access to sign up for DDNS service with a DDNS service provider, www.dyndns.org or www.TZO.com. The Router will use this dynamic IP address. Before you with the Internet. If your changes....the Internet translates domain or website names into Internet addresses or URLs. Update To manually trigger an update, click this drop-down menu. Wireless-N Broadband Router 11 WINS The Windows Internet Naming Service (WINS) manages each PC's interaction with at least one day. The features available on the DDNS...
User Guide
Page 13
..., or click Cancel Changes to cancel your network's connection to access the Internet. Setup > Advanced Routing Advanced Routing NAT Enabled/Disabled If this button to use . If another network destination. The Router determines the network packets' route based on your network. Setup ...of hardware for identification. Select Enabled to clone the MAC address of the computer you are using. Wireless-N Broadband Router Advanced Configuration Clone My PC's MAC Click this Router is disabled, dynamic routing will require you to register a MAC address in the network's layout ...
..., or click Cancel Changes to cancel your network's connection to access the Internet. Setup > Advanced Routing Advanced Routing NAT Enabled/Disabled If this button to use . If another network destination. The Router determines the network packets' route based on your network. Setup ...of hardware for identification. Select Enabled to clone the MAC address of the computer you are using. Wireless-N Broadband Router Advanced Configuration Clone My PC's MAC Click this Router is disabled, dynamic routing will require you to register a MAC address in the network's layout ...
User Guide
Page 15
...a time. Then refer back to your client device or its documentation for Wi-Fi Protected Access, which is also listed on the label on configuring wireless security for your wireless network. Method #2 Use this screen. 3. NOTE: If you do not support Wi-Fi...the PIN number listed on this screen. 2. Security Mode > WPA Personal Passphrase Enter a Passphrase of the Router.) Wireless-N Broadband Router Advanced Configuration 2. Then refer back to "Chapter 2: Wireless Security." For detailed instructions on the bottom of 8-63 characters. 14 WPA Personal NOTE: If you are three...
...a time. Then refer back to your client device or its documentation for Wi-Fi Protected Access, which is also listed on the label on configuring wireless security for your wireless network. Method #2 Use this screen. 3. NOTE: If you do not support Wi-Fi...the PIN number listed on this screen. 2. Security Mode > WPA Personal Passphrase Enter a Passphrase of the Router.) Wireless-N Broadband Router Advanced Configuration 2. Then refer back to "Chapter 2: Wireless Security." For detailed instructions on the bottom of 8-63 characters. 14 WPA Personal NOTE: If you are three...
User Guide
Page 17
.../128 bits (26 hex digits). Wireless-N Broadband Router Wireless > Wireless MAC Filter Wireless MAC Filter Enabled/Disabled To filter wireless users by MAC Address. The default is not selected by default. The default value is selected by default. This option is 1812. Then click Generate. Access Restriction Prevent Select this to allow wireless access by MAC Address, either permitting or...
.../128 bits (26 hex digits). Wireless-N Broadband Router Wireless > Wireless MAC Filter Wireless MAC Filter Enabled/Disabled To filter wireless users by MAC Address. The default is not selected by default. The default value is selected by default. This option is 1812. Then click Generate. Access Restriction Prevent Select this to allow wireless access by MAC Address, either permitting or...
User Guide
Page 18
... Rate The Basic Rate setting is Auto. If you want to catch all standard wireless rates (1-2Mbps, 5.5Mbps, 11Mbps, 18Mbps, and 24Mbps). Wireless-N Broadband Router Advanced Configuration With Shared Key authentication, the sender and recipient use with a DTIM Interval... value. The default is not actually one rate of data transmission. The Beacon Interval value indicates the frequency interval of the devices whose wireless access ...
... Rate The Basic Rate setting is Auto. If you want to catch all standard wireless rates (1-2Mbps, 5.5Mbps, 11Mbps, 18Mbps, and 24Mbps). Wireless-N Broadband Router Advanced Configuration With Shared Key authentication, the sender and recipient use with a DTIM Interval... value. The default is not actually one rate of data transmission. The Beacon Interval value indicates the frequency interval of the devices whose wireless access ...
User Guide
Page 19
...may slightly increase the Fragmentation Threshold. After receiving an RTS, the wireless station responds with them. Security > Firewall The Firewall screen is permitted, then the Router will disable access to disable it. If multicasting is used by default. This feature ... allow ActiveX usage. Select this feature to allow proxy access. Deselect the feature to enable Java filtering. In most cases, it more difficult for multiple transmissions to be enabled. Wireless-N Broadband Router Advanced Configuration Deselect the feature to allow anonymous Internet requests...
...may slightly increase the Fragmentation Threshold. After receiving an RTS, the wireless station responds with them. Security > Firewall The Firewall screen is permitted, then the Router will disable access to disable it. If multicasting is used by default. This feature ... allow ActiveX usage. Select this feature to allow proxy access. Deselect the feature to enable Java filtering. In most cases, it more difficult for multiple transmissions to be enabled. Wireless-N Broadband Router Advanced Configuration Deselect the feature to allow anonymous Internet requests...
User Guide
Page 20
... kinds of Internet usage and traffic, such as Internet access, designated services, and websites during specific days and times. Access Restrictions > Internet Access The Internet Access screen allows you to pass through the Router, keep the default, Enabled. To allow L2TP tunnels ... Enabled. To delete a policy, select that policy's settings. Click Save Settings to save your changes. Wireless-N Broadband Router Summary 19 To allow PPTP tunnels to the Internet Access Policy screen, click Close. Selecting a policy from the dropdown menu will display that policy's number and ...
... kinds of Internet usage and traffic, such as Internet access, designated services, and websites during specific days and times. Access Restrictions > Internet Access The Internet Access screen allows you to pass through the Router, keep the default, Enabled. To allow L2TP tunnels ... Enabled. To delete a policy, select that policy's settings. Click Save Settings to save your changes. Wireless-N Broadband Router Summary 19 To allow PPTP tunnels to the Internet Access Policy screen, click Close. Selecting a policy from the dropdown menu will display that policy's number and ...
User Guide
Page 21
... policy will be in effect, or select Everyday. Then enter the IP address of requests to your network via the Internet, the Router will be up to three applications per policy.) From the Applications list, select the application you want to give the application. The ...it and click the Single Port Forwarding Single Port Forwarding Common applications are disabled by MAC address or IP address. You can filter access to various services accessed over the Internet, such as FTP or telnet. (You can block websites with specific URL addresses. To delete a service, select...
... policy will be in effect, or select Everyday. Then enter the IP address of requests to your network via the Internet, the Router will be up to three applications per policy.) From the Applications list, select the application you want to give the application. The ...it and click the Single Port Forwarding Single Port Forwarding Common applications are disabled by MAC address or IP address. You can filter access to various services accessed over the Internet, such as FTP or telnet. (You can block websites with specific URL addresses. To delete a service, select...
User Guide
Page 22
... Gaming > Port Range Forwarding The Port Range Forwarding screen allows you have defined. Applications and Gaming > Port Range Forwarding Wireless-N Broadband Router Applications and Gaming > Port Range Triggering Port Range Triggering Application Name Enter the application name of requests to your changes. ... DMZ tab. Chapter 3 External Port Enter the external port number used by the Router, so that should assign static IP addresses to the designated servers (use Internet access to perform functions such as videoconferencing or online gaming. Click Save Settings to apply...
... Gaming > Port Range Forwarding The Port Range Forwarding screen allows you have defined. Applications and Gaming > Port Range Forwarding Wireless-N Broadband Router Applications and Gaming > Port Range Triggering Port Range Triggering Application Name Enter the application name of requests to your changes. ... DMZ tab. Chapter 3 External Port Enter the external port number used by the Router, so that should assign static IP addresses to the designated servers (use Internet access to perform functions such as videoconferencing or online gaming. Click Save Settings to apply...
User Guide
Page 24
... Range Enter the port range that the application will appear in the Summary list. 23 Click Add to indicate the name of the entry. Internet Access Priority In this section, you can enter 21-21. Category There are four levels priority: High, Medium, Normal, or Low. If you want to 1250.... Your new entry will appear in the Summary list. Chapter 3 WMM Support If you have set, keep the default, Enabled. Otherwise, select Disabled. Port numbers Wireless-N Broadband Router QoS > Ethernet Port Ethernet Select the appropriate Ethernet port.
... Range Enter the port range that the application will appear in the Summary list. 23 Click Add to indicate the name of the entry. Internet Access Priority In this section, you can enter 21-21. Category There are four levels priority: High, Medium, Normal, or Low. If you want to 1250.... Your new entry will appear in the Summary list. Chapter 3 WMM Support If you have set, keep the default, Enabled. Otherwise, select Disabled. Port numbers Wireless-N Broadband Router QoS > Ethernet Port Ethernet Select the appropriate Ethernet port.
User Guide
Page 25
... protocol used to connect to servers on the World Wide Web. HTTPS uses SSL (Secured Socket Layer) to servers on the World Wide Web. Web Access Web Utility Access HTTP (HyperText Transport Protocol) is the default. 24 Wireless-N Broadband Router Administration > Management Management Router Access To ensure the Router's security, you access the Router's web-based utility.
... protocol used to connect to servers on the World Wide Web. HTTPS uses SSL (Secured Socket Layer) to servers on the World Wide Web. Web Access Web Utility Access HTTP (HyperText Transport Protocol) is the default. 24 Wireless-N Broadband Router Administration > Management Management Router Access To ensure the Router's security, you access the Router's web-based utility.
User Guide
Page 26
... connections. Allow Users to Configure Keep the default, Enabled, if you want to be able to access the Router from outside access. Wireless-N Broadband Router Advanced Configuration Administration > Log The Router can choose to clear all traffic for various Internet applications, such as well.) Otherwise, keep logs ...IP Address If you use UPnP, keep the default setting, Enabled. Allow Users to Disable Internet Access Select Enabled, if you want to be able to the Router while using the UPnP feature. Administration > Log Log Log To disable the Log function, select...
... connections. Allow Users to Configure Keep the default, Enabled, if you want to be able to access the Router from outside access. Wireless-N Broadband Router Advanced Configuration Administration > Log The Router can choose to clear all traffic for various Internet applications, such as well.) Otherwise, keep logs ...IP Address If you use UPnP, keep the default setting, Enabled. Allow Users to Disable Internet Access Select Enabled, if you want to be able to the Router while using the UPnP feature. Administration > Log Log Log To disable the Log function, select...
User Guide
Page 45
...cause it with Subsection b above provided that you also do so, and all its terms and conditions for software interchange; or, Wireless-N Broadband Router Software End User License Agreement c. For an executable work under this License. You are not derived from the Program, and can ...that is a work based on the terms of this License, whose permissions for enforcing compliance by offering access to copy from a designated place, then offering equivalent access to copy the source code from you redistribute the Program (or any associated interface definition files, plus the...
...cause it with Subsection b above provided that you also do so, and all its terms and conditions for software interchange; or, Wireless-N Broadband Router Software End User License Agreement c. For an executable work under this License. You are not derived from the Program, and can ...that is a work based on the terms of this License, whose permissions for enforcing compliance by offering access to copy from a designated place, then offering equivalent access to copy the source code from you redistribute the Program (or any associated interface definition files, plus the...
User Guide
Page 49
... 1 and 2 above on a volume of this License. However, linking a "work that uses the Library" with the Library itself a library. Wireless-N Broadband Router Software End User License Agreement When a "work that uses the Library" uses material from the same place satisfies the requirement to distribute the source code...it and that the terms permit modification of the work for the customer's own use are covered by offering access to copy from a designated place, then offering equivalent access to copy the source code from a header file that uses the library". and, if the work is ...
... 1 and 2 above on a volume of this License. However, linking a "work that uses the Library" with the Library itself a library. Wireless-N Broadband Router Software End User License Agreement When a "work that uses the Library" uses material from the same place satisfies the requirement to distribute the source code...it and that the terms permit modification of the work for the customer's own use are covered by offering access to copy from a designated place, then offering equivalent access to copy the source code from a header file that uses the library". and, if the work is ...