Linksys WRT320N User Manual

Linksys WRT320N User Manual

Dual-band wireless-n gigabit router
Hide thumbs Also See for WRT320N:
Table of Contents

Advertisement

USER GUIDE
Dual-Band Wireless-N
Gigabit Router
WRT320N
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WRT320N

  • Page 1 USER GUIDE Dual-Band Wireless-N Gigabit Router WRT320N Model:...
  • Page 2: About This Guide

    Linksys, Cisco and the Cisco Logo registered trademarks trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2009 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks their respective holders.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview Front Panel..........4 Back Panel .
  • Page 4 Cisco Products ........
  • Page 5: Chapter 1: Product Overview

    Product Overview Chapter 1 Chapter 1: Wireless (Blue) The Wireless LED lights up when the wireless feature is enabled. If the LED Product Overview is flashing, the Router is actively sending or receiving data over the network. Thank you for choosing the Linksys Dual-band Wireless-N Internet (Blue) The Internet LED lights up Gigabit Router.
  • Page 6 Product Overview Chapter 1 Wall-Mounting Placement Follow these instructions: Determine where you want to mount the Router. Make The Router has two wall-mount slots on its bottom sure that the wall you use is smooth, flat, dry, and panel. The distance between the slots is 152 mm sturdy.
  • Page 7: Chapter 2: Wireless Security Checklist

    Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalent Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
  • Page 8: Chapter 3: Advanced Configuration

    Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you’d like to change its advanced settings, use the Router’s web-based utility. This chapter describes each web page of the utility and each page’s key functions.
  • Page 9 Advanced Configuration Chapter 3 Static IP before your Internet connection terminates. The default Max Idle Time is 15 minutes. If you are required to use a permanent IP address to Keep Alive: Redial Period If you select this option, connect to the Internet, select Static IP. the Router will periodically check your Internet connection.
  • Page 10 Advanced Configuration Chapter 3 inactivity, Connect on Demand enables the Router to Telstra Cable automatically re-establish your connection as soon as you Telstra Cable is a service that applies to connections in attempt to access the Internet again. To use this option, Australia only.
  • Page 11 Advanced Configuration Chapter 3 host and domain name. In most cases, leaving these fields DHCP Reservation blank will work. You will see a list of DHCP clients with the following MTU is the Maximum Transmission Unit. It specifies information: Client Name, Interface, IP Address, and the largest packet size permitted for Internet transmission.
  • Page 12: Setup > Ddns

    Advanced Configuration Chapter 3 amount of time, in minutes, that the user will be “leased” DynDNS.org this dynamic IP address. After the time is up, the user will be automatically assigned a new dynamic IP address. The default is 0 minutes, which means one day. Static DNS 1-3 The Domain Name System (DNS) is how the Internet translates domain or website names into...
  • Page 13: Setup > Mac Address Clone

    Advanced Configuration Chapter 3 Clone My PC’s MAC TZO.com Click this button to clone the MAC address of the computer you are using. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Setup > Advanced Routing This screen is used to set up the Router’s advanced functions.
  • Page 14: Wireless > Basic Wireless Settings

    Advanced Configuration Chapter 3 Route Entries To set up a static route between the Router Wi-Fi Protected Setup. Proceed to the “Wi-Fi Protected and another network, select a number from the drop- Setup” section. down list. Click Delete This Entry to delete a static route. Basic Wireless Settings Enter Route Name Enter a name for the Route here,...
  • Page 15: Wireless > Wireless Security

    Advanced Configuration Chapter 3 Router’s SSID, keep the default setting, Enabled. If you Method #3 do not want to broadcast the Router’s SSID, then select Use this method if your client device asks for the Router’s Disabled. PIN number. Click Save Settings to apply your changes, or click Cancel Enter the PIN number listed on this screen.
  • Page 16 Advanced Configuration Chapter 3 Security Mode > WPA Personal Security Mode > WPA Enterprise Passphrase Enter a Passphrase of 8-63 characters. RADIUS Server Enter the IP Address of the RADIUS Key Renewal Enter a Key Renewal period, which instructs server. the Router how often it should change the encryption keys.
  • Page 17: Wireless > Wireless Mac Filter

    Advanced Configuration Chapter 3 Key Renewal Enter a Key Renewal period, which instructs the Router how often it should change the encryption keys. The default Key Renewal period is 3600 seconds. RADIUS This option features WEP used in coordination with a RADIUS server.
  • Page 18: Wireless > Advanced Wireless Settings

    Advanced Configuration Chapter 3 Wireless MAC Filter Enabled/Disabled To filter wireless users by MAC Address, either permitting or blocking access, select Enabled. If you do not wish to filter users by MAC Address, keep the default setting, Disabled. Access Restriction Prevent Select this to block wireless access by MAC Address.
  • Page 19: Security > Firewall

    Advanced Configuration Chapter 3 Security > Firewall connection speed between the Router and a wireless client. The default is Auto. The Firewall screen is used to configure a firewall that can N Transmission Rate The rate of data transmission filter out various types of unwanted traffic on the Router’s should be set depending on the speed of your Wireless-N local network.
  • Page 20: Security > Vpn Passthrough

    Advanced Configuration Chapter 3 sites created using this programming language. Select this feature to enable Java filtering. Deselect the feature to allow Java usage. ActiveX ActiveX is a programming language for websites. If you deny ActiveX, you run the risk of not having access to Internet sites created using this programming language.
  • Page 21: Applications And Gaming > Single Port Forwarding

    Advanced Configuration Chapter 3 Status Policies are disabled by default. To enable a policy, If the application you want to block is not listed or you select the policy number from the drop-down menu, and want to edit a service’s settings, enter the application’s select Enabled.
  • Page 22: Applications And Gaming > Port Range Forwarding

    Advanced Configuration Chapter 3 Port Range Forwarding External Port Enter the external port number used by the server or Internet application. Check with the Internet To forward a port, enter the information on each line for application documentation for more information. the criteria required.
  • Page 23: Applications And Gaming > Dmz

    Advanced Configuration Chapter 3 Triggered Range For each application, enter the starting address in the field provided. To retrieve this information, click DHCP Client Table. and ending port numbers of the triggered port number range. Check with the Internet application documentation for the port number(s) needed.
  • Page 24 Advanced Configuration Chapter 3 WMM Support If you have other devices that support Wi- can range from 1 to 65535. Check your application’s Fi Multimedia (WMM) on your network, keep the default, documentation for details on the service ports used. Enabled.
  • Page 25: Administration > Management

    Advanced Configuration Chapter 3 Voice Device QoS > Voice Device Enter a Name Enter a name for your voice device. MAC Address Enter the MAC address of your voice device. Priority High Select appropriate priority: (Recommend), Medium, Normal, or Low. Click Add to save your changes.
  • Page 26: Administration > Log

    Advanced Configuration Chapter 3 Administration > Log Remote Upgrade If you want to be able to upgrade the Router remotely, from outside the local network, select Enabled. (You must have the Remote Management The Router can keep logs of all traffic for your Internet feature enabled as well.) Otherwise, keep the default, connection.
  • Page 27: Administration > Diagnostics

    Advanced Configuration Chapter 3 Administration > Diagnostics Traceroute Test The Traceroute test tests the performance of a The diagnostic tests (Ping and Traceroute) allow you to connection. check the connections of your network devices, including connection to the Internet. This screen also allows you to IP or URL Address Enter the address of the PC whose reset the router.
  • Page 28: Administration > Firmware Upgrade

    Advanced Configuration Chapter 3 Administration > Firmware Upgrade The Firmware Upgrade screen allows you to upgrade the Router’s firmware. Do not upgrade the firmware unless you are experiencing problems with the Router or the new firmware has a feature you want to use. Status >...
  • Page 29: Status > Wireless Network

    Advanced Configuration Chapter 3 date information, click Refresh. To exit this screen and return to the Local Network screen, click Close. Status > Wireless Network The Wireless Network screen displays information about your wireless network. Status > Local Network Local Network Local MAC Address The MAC address of the Router’s local, wired interface is displayed here.
  • Page 30: Appendix A: Troubleshooting

    Troubleshooting Appendix A Appendix A: When you double-click the web browser, you are prompted for a username and password. If you want to Troubleshooting get rid of the prompt, follow these instructions. Launch the web browser and perform the following steps (these steps are specific to Internet Explorer but are similar Your computer cannot connect to the Internet.
  • Page 31: Appendix B: Specifications

    Specifications Appendix B Appendix B: Specifications Model WRT320N Standards Draft 802.11n, 802.11a, 802.11g, 802.11b, 802.3, 802.3u, 802.3ab Ports Power, Internet, and Ethernet Buttons Reset, Wi-Fi Protected Setup LEDs Ethernet (1-4), Wi-Fi Protected Setup, Wireless, Internet, Power Cabling Type CAT 5e...
  • Page 32: Appendix C: Warranty Information

    Warranty Information Appendix C Appendix C: service offerings. This limited warranty shall not apply to such third party software or service offerings. This limited Warranty Information warranty does not guarantee any continued availability of a third party’s service for which this product’s use or operation may require.
  • Page 33: Technical Support

    Warranty Information Appendix C rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
  • Page 34: Appendix D: Regulatory Information

    Regulatory Information Appendix D Appendix D: Safety Notices Regulatory Information WARNINGS: Do not use this product near water, for • FCC Statement example, in a wet basement or near a swimming pool. This device complies with Part 15 of the FCC Rules. Avoid using this product during an electrical •...
  • Page 35: Avis D'industrie Canada

    Regulatory Information Appendix D The maximum antenna gain (please see the élevé sont strictement interdites par Industrie Canada. table below) permitted (for devices in the bands L’impédance d’antenne requise est de 50 ohms. 5250-5350 MHz and 5470-5725 MHz) to comply with Le tableau ci-dessous indique le gain d’antenne maximal the E.I.R.P.
  • Page 36: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    Regulatory Information Appendix D User Information for Consumer Products Čeština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno Waste Electric and Electronic Equipment s netříděným komunálním odpadem.
  • Page 37 Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 38 Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 39 Regulatory Information Appendix D Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
  • Page 40: Appendix E: Software End User License Agreement

    If you would like a copy of the GPL or certain to a person or entity to which you transfer ownership of other open source code in this Software on a CD, Cisco will the complete Cisco product containing the Software or mail to you a CD with such code for $9.99 plus the cost of...
  • Page 41 Software and/or your use of either in order you must reproduce all copyright notices and any other (i) to enable Cisco to offer you Upgrades; (ii) to provide proprietary legends found on the original Software and support and assistance with your product and/or the Documentation;...
  • Page 42 TO THE EXTENT NOT PROHIBITED BY APPLICABLE Cisco product and/or Software indicates your acceptance LAW, ALL IMPLIED WARRANTIES AND CONDITIONS of the terms of the Cisco Privacy Policy, so please review OF MERCHANTABILITY, SATISFACTORY QUALITY OR the policy carefully and check the Web site above to FITNESS FOR A PARTICULAR PURPOSE ARE LIMITED TO review updates to it.
  • Page 43 1. Network Magic Cancellation. You may cancel the Copyright © 1989, 1991 Free Software Foundation, Inc. Services at any time. If you cancel the Services, Cisco will not be obligated to provide you any Network Magic product 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, Upgrades.
  • Page 44 Software End User License Agreement Appendix E freedom to share and change free software--to make sure TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND the software is free for all its users. This General Public MODIFICATION License applies to most of the Free Software Foundation’s This License applies to any program or other work software and to any other program whose authors which contains a notice placed by the copyright...
  • Page 45 Software End User License Agreement Appendix E If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
  • Page 46 General Public License from time to time. Such new versions will be similar in If this Cisco product contains open source software licensed spirit to the present version, but may differ in detail to under Version 2.1 of the “GNU Lesser General Public address new problems or concerns.
  • Page 47 Software End User License Agreement Appendix E GNU LESSER GENERAL PUBLIC LICENSE To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the Version 2.1, February 1999 library is modified by someone else and passed on, the recipients should know that what they have is not the Copyright (C) 1991, 1999 Free Software Foundation, Inc.
  • Page 48 Software End User License Agreement Appendix E freedom and the wherewithal to run that program using a You may copy and distribute verbatim copies of the modified version of the Library. Library’s complete source code as you receive it, in any medium, provided that you conspicuously and The precise terms and conditions for copying, distribution appropriately publish on each copy an appropriate...
  • Page 49 Software End User License Agreement Appendix E Thus, it is not the intent of this section to claim When a “work that uses the Library” uses material from rights or contest your rights to work written entirely a header file that is part of the Library, the object code by you;...
  • Page 50 Software End User License Agreement Appendix E Use a suitable shared library mechanism for linking You may not copy, modify, sublicense, link with, or with the Library. A suitable mechanism is one that distribute the Library except as expressly provided (1) uses at run time a copy of the library already under this License.
  • Page 51 Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com). In addition, if this Cisco product contains open source software licensed under the OpenSSL license then the license terms below in this Schedule 3-C will apply to that open source software.
  • Page 52 Software End User License Agreement Appendix E The OpenSSL toolkit stays under a dual license, i.e. both This product includes cryptographic software written by the conditions of the OpenSSL License and the original Eric Young (eay@cryptsoft.com). This product includes SSLeay license apply to the toolkit. See below for the software written by Tim Hudson (tjh@cryptsoft.com).
  • Page 53 Software End User License Agreement Appendix E BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...

Table of Contents