Cisco WRT610N User Manual

Cisco WRT610N User Manual

Simultaneous dual-n band wireless router
Hide thumbs Also See for WRT610N:
Table of Contents

Advertisement

USER GUIDE
Simultaneous Dual-N Band
Wireless Router
Model: WRT610N (EU)

Advertisement

Table of Contents
loading

Summary of Contents for Cisco WRT610N

  • Page 1 USER GUIDE Simultaneous Dual-N Band Wireless Router Model: WRT610N (EU)
  • Page 2: About This Guide

    Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved. Other brands and product...
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview Front Panel..........3 Back Panel .
  • Page 4 Software in Linksys Products ........
  • Page 5: Chapter 1: Product Overview

    Ethernet network devices. Reset There are two ways to reset the Router’s To use Wi-Fi Protected Setup, run the Linksys factory defaults. Either press and hold the Reset Easy Link Advisor (LELA) , or refer to the “Wireless Button for approximately five seconds, or restore >...
  • Page 6 Two screws are needed to mount the Router. Suggested Mounting Hardware 4-5 mm 1-1.5 mm Note: Mounting hardware illustrations are not † true to scale. NOTE: Linksys is not responsible for damages incurred by unsecure wall-mounting hardware. 175.56 mm Simultaneous Dual-N Band Wireless Router...
  • Page 7: Chapter 2: Wireless Security Checklist

    WEB: For more information on wireless security, visit www.linksys.com/security Linksys routers give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device. With MAC address filtering enabled, wireless network access is provided solely for wireless devices with specific MAC addresses.
  • Page 8: Chapter 3: Advanced Configuration

    To access the web-based utility, launch the web browser on Setup > Basic Setup your computer, and enter the Router’s default IP address, Language 192.168.1.1 or http://wrt610n.com in the Address field. Then, press Enter. Language To use a different language, select one from A password request screen will appear.
  • Page 9 Advanced Configuration Chapter 3 Automatic Configuration - DHCP Service Name (optional) If provided by your ISP, enter the Service Name. By default, the Router’s Internet Connection Type is set Connect on Demand: Max Idle Time You can configure to Automatic Configuration - DHCP, which should be the Router to cut the Internet connection after it has been kept only if your ISP supports DHCP or you are connecting inactive for a specified period of time (Max Idle Time).
  • Page 10 Advanced Configuration Chapter 3 User Name and Password Enter the User Name and Keep Alive: Redial Period If you select this option, Password provided by your ISP. the Router will periodically check your Internet connection. If you are disconnected, then the Router Connect on Demand: Max Idle Time You can configure will automatically re-establish your connection.
  • Page 11 Router IP address is 192.168.1.1 and URL address is Internet addresses or URLs. Your ISP will provide you with at http://WRT610N.com. least one DNS Server IP Address. If you wish to use another, enter that IP Address in one of these fields. You can enter up to three DNS Server IP Addresses here.
  • Page 12 Advanced Configuration Chapter 3 When you finish your changes, click Save Settings to Password Enter the Password for your DDNS account. save your changes. Click Cancel Changes to cancel your Host Name The is the DDNS URL assigned by the DDNS changes.
  • Page 13: Setup > Mac Address Clone

    Advanced Configuration Chapter 3 Setup > Advanced Routing Setup > MAC Address Clone This screen is used to set up the Router’s advanced Every computere hardware device, including the network functions. Operating Mode allows you to select the adapter of your computer has a unique code called a MAC type(s) of advanced functions you use.
  • Page 14: Wireless > Basic Wireless Settings

    Advanced Configuration Chapter 3 Gateway This is the IP address of the gateway device that Network Mode (5 GHz) From this drop-down menu, you allows for contact between the Router and the remote can select the wireless standards running on your network. network or host.
  • Page 15 Advanced Configuration Chapter 3 Method #1 Standard Channel (2.4 GHz) Select the channel for Wireless-B, Wireless-G and Wireless-N (2.4GHz) networking. Use this method if your client device has a Wi-Fi Protected If you selected Wide – 40MHz Channel for the Radio Band Setup button.
  • Page 16 Advanced Configuration Chapter 3 Wireless > Wireless Security WPA Enterprise This option features WPA used in coordination with a The Wireless Security settings configure the security of RADIUS server. (This should only be used when a RADIUS your wireless network. There are six wireless security server is connected to the Router.) mode options supported by the Router: WPA Personal, WPA Enterprise, WPA2 Personal, WPA2 Enterprise, RADIUS,...
  • Page 17 Advanced Configuration Chapter 3 RADIUS Encryption WPA2 supports two encryption methods with dynamic encryption keys; AES or WPA-TKIP/WPA2- This option features WEP used in coordination with a AES. You must select WPA-TKIP or WPA2-AES to connect RADIUS server. (This should only be used when a RADIUS to the Router.
  • Page 18: Wireless > Wireless Mac Filter

    Advanced Configuration Chapter 3 Wireless > Wireless MAC Filter WEP is a basic encryption method that is not as secure as Wireless access can be filtered by using the MAC addresses WPA. of the wireless devices transmitting within your network’s radius.
  • Page 19: Wireless > Advanced Wireless Settings

    Advanced Configuration Chapter 3 Frame Burst Enabling this option should provide your network with greater performance, depending on the manufacturer of your wireless products. To use the Frame Burst option, select Enabled. The default is Disabled. Authentication Type The default is set to Auto, which allows either Open System or Shared Key authentication to be used.
  • Page 20: Security > Firewall

    Advanced Configuration Chapter 3 Fragmentation Threshold This value specifies the Filter Multicast Multicasting allows multiple maximum size for a packet before data is fragmented transmissions to specific recipients at the same time. If into multiple packets. If you experience a high packet multicasting is permitted, then the Router will allow IP error rate, you may slightly increase the Fragmentation multicast packets to be forwarded to the appropriate...
  • Page 21: Storage > Disk

    Advanced Configuration Chapter 3 Storage > Disk An external USB hard drive or USB disk must be connected to the USB Port of the Router to use the storage feature. The Disk screen describes the disk currently attached to the Router. Using this screen, you can format a blank disk, safely remove a disk, or erase a disk.
  • Page 22: Storage > Media Server

    Advanced Configuration Chapter 3 Shared Folder Database Each Display Name you created on the Shared Folder This section lets you select content to add to the database screen will be listed with its partition and shared folder, of the Router’s media server. Click Specify Folder to Scan which you can edit or delete.
  • Page 23: Storage> Ftp Server

    Advanced Configuration Chapter 3 Storage > FTP Server An external USB hard drive or USB disk must be connected to the USB Port of the Router to use the storage feature. The FTP Server tab creates an FTP Server that can be accessed from the Internet or your local network.
  • Page 24: Storage > Administration

    Advanced Configuration Chapter 3 User Management If you click Edit, the FTP Folder screen appears. Refer to the “FTP Folder Screen” section above. The available users are listed in the User Management Click Save Settings to apply your changes, or click Cancel table.
  • Page 25: Access Restrictions > Internet Access

    Advanced Configuration Chapter 3 Access Restrictions > Internet Access Group Management The groups are listed in the Group Management table. The Access Restrictions > Internet Access screen allows you There are two default groups, Admin and Guest; these to deny or allow specific kinds of Internet usage and traffic, cannot be deleted.
  • Page 26 Advanced Configuration Chapter 3 Click Edit List of PCs to select which PCs will be affected Click Save Settings to apply your changes, or click Cancel by the policy. The List of PCs screen appears. You can Changes to cancel your changes. select a PC by MAC Address or IP Address.
  • Page 27: Applications And Gaming > Port Range Forwarding

    Advanced Configuration Chapter 3 Applications and Gaming > Port Range Applications & Gaming > Port Triggering Forwarding The Applications & Gaming > Port Triggering screen allows the Router to watch outgoing data for specific port The Applications & Gaming > Port Range Forwarding screen numbers.
  • Page 28: Applications And Gaming > Dmz

    Advanced Configuration Chapter 3 Applications and Gaming > DMZ Applications and Gaming > QoS The DMZ feature allows one network computer to be Quality of Service (QoS) ensures better service to exposed to the Internet for use of a special-purpose high-priority types of network traffic, which may service such as Internet gaming or videoconferencing.
  • Page 29 Advanced Configuration Chapter 3 Category Online Games There are four categories available. Select one of the following: Applications, Online Games, MAC Address, Ethernet Port, or Voice Device. Proceed to the instructions for your selection. Applications Applications Select the appropriate application. If you select Add a New Application, follow the instructions in the “Add a New Application “section.
  • Page 30 Advanced Configuration Chapter 3 MAC Address Voice Device MAC Address Voice Device Enter a Name Enter a name for your device. Enter a Name Enter a name for your voice device. MAC Address Enter the MAC address of your device. MAC Address.
  • Page 31: Administration > Management

    Advanced Configuration Chapter 3 Administration > Management Allowed Remote IP Address Select Any IP Address or manually enter an Internet IP address to allow remote The Administration > Management screen allows the access to the web-based utility from the Internet. network’s administrator to manage specific Router Remote Management Port Enter the port number that...
  • Page 32: Administration > Diagnostics

    Advanced Configuration Chapter 3 Traceroute Test When you wish to view the logs, click View Log. Click Save the Log to save your log, click Refresh to Traceroute To test the performance of a connection, refresh the screen, or click Clear to clear the screen. click Traceroute to open the Traceroute Test screen.
  • Page 33: Status > Router

    Administration > Firmware Upgrade Connection Type Before upgrading the firmware, download the Router’s firmware upgrade file from the Linksys website, This section shows the current network information www.linksys.com. Then extract the file. stored in the Router. The information varies depending on the Internet connection type selected on the Setup >...
  • Page 34: Status > Wireless Network

    Advanced Configuration Chapter 3 End IP Address For the range of IP addresses used by SSID Broadcast The status of the SSID Broadcast feature devices on your local network, the ending IP address is is displayed here. shown here. For more information, click Help. DHCP Client Table Click DHCP Client Table to view the DHCP Client Table.
  • Page 35: Appendix A: Troubleshooting

    WEB: If your questions are not addressed here, The DSL telephone line does not fit into the Router’s refer to the Linksys website, www.linksys.com Internet port. The Router does not replace your modem. You still need your DSL modem in order to use the Router. Connect the telephone line to the DSL modem, and then insert the setup CD into your computer.
  • Page 36: Appendix B: How To Install And Access Usb Storage

    Computer name field, enter the server name In the that you created on the Storage > Administration screen. The default server name is WRT610N. See the Advanced Configuration section later in this Appendix for information on how to change the server name.
  • Page 37 In the Name column, double-click Wrt610n. To map the Default shared folder to your computer, right-click Default. Click Map Network Drive. Double-Click WRT610N User name and Password fields enter the default In the User name and password, admin. If you want to...
  • Page 38 How to Install and Access USB Storage Appendix B On your desktop, double-click My Computer. The You will be notified if file sharing is turned off. Click the Default shared folder of your USB storage is listed message. under Network Drives. Click the Message Click Turn on network discovery and file sharing.
  • Page 39 WRT610N listed in the Network Infrastructure category). If you do not see the WRT610N listed in the Computer category, then enter the default server name, WRT610N in the Search field, and press the Enter key. See the Advanced Configuration section later in this Appendix for information on how to change the server name.
  • Page 40: Advanced Configuration (Advanced Users Only)

    Storage > Disk To access the web-based utility, launch the web browser on your computer, and enter the Router’s default IP address, 192.168.1.1 or http://wrt610n.com, in the Address field. Then, press Enter. A password request screen will appear. (Non-Windows XP users will see a similar screen.) Leave the User name field...
  • Page 41 How to Install and Access USB Storage Appendix B How to Create a User Group Storage tab. Click the Click the Administration tab. In the Group Management section, click Create New Group. Shared Folder Screen Storage > Administration Display Name Enter a display name that will appear in the Shared Folder table of the Disk screen.
  • Page 42 How to Install and Access USB Storage Appendix B How to Create a User Account Click the Administration tab. Information, Server Name field enter a new Server In the Storage tab. Click the name. Click the Administration tab. Click Save Settings to apply your changes, or click Cancel In the User Management section, click Create New Changes to cancel your changes.
  • Page 43: Appendix C: Specifications

    4dBi (Typical) Specifications 5GHz: RIFA 1 & RIFA 2 & RIFA 3 ≤ 3,5dBi (Typical) UPnP Supported Model WRT610N Security Features WEP, WPA, WPA2 Standards Draft 802.11n, 802.11a, 802.11g, 802.11b, 802.3, 802.3u, 802.3ab WEP Key Bits Up to 128-Bit Encryption...
  • Page 44: Appendix D: Warranty Information

    Linksys’ entire liability under this limited warranty an implied warranty lasts, so the above limitation may not will be for Linksys, at its option, to (a) repair the product apply to you. This limited warranty gives you specific legal...
  • Page 45 If any portion of this limited warranty is found to be void or unenforceable, its remaining provisions shall remain in full force and effect. Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623. For more information, please contact us www.linksys.com...
  • Page 46: Appendix E: Regulatory Information

    Regulatory Information Appendix E Industry Canada Statement Appendix E: Regulatory Information This Class B digital apparatus complies with Canadian ICES-003 and RSS210. Operation is subject to the following two conditions: FCC Statement This device may not cause interference and This product has been tested and complies with the This device must accept any interference, including specifications for a Class B digital device, pursuant to Part interference that may cause undesired operation...
  • Page 47: Wireless Disclaimer

    Regulatory Information Appendix E Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, data throughput rate, range and coverage. Performance depends on many factors, conditions and variables, including distance from the access point, volume of network traffic, building materials and construction, operating system used, mix of wireless products used,...
  • Page 48: Declaration Of Conformity With Regard To Eu Directive 1999/5/Ec (R&Tte Directive)

    A pdf file is available on the product’s webpage. Šī iekārta atbilst Direktīvas 1999/5/EK Visit www.linksys.com/international and select your Latviski būtiskajām prasībām un citiem ar to country or region. Then select your product. [Latvian]: saistītajiem noteikumiem. If you need any other technical documentation, see the “Technical Documents on www.linksys.com/international”...
  • Page 49: Wireless Equipment (Wireless-N/G/A/B Products)

    Wireless LANs” provides an overview of the regulatory CE Marking requirements applicable for the 2,4- and 5-GHz bands. For the Linksys Wireless-N, -G, -B, and/or -A products, Later in this document you will find an overview of the following CE mark, notified body number (where...
  • Page 50: Product Usage Restrictions

    The use of software or firmware not supported/provided Allocation Table for Italy. Unless this 2,4-GHz wireless LAN by Linksys may result that the equipment is no longer product is operating within the boundaries of the owner’s compliant with the regulatory requirements.
  • Page 51: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    úřady. Správná likvidace a recyklace pomáhá předcházet Linksys products. Consumers are required to comply with potenciálním negativním dopadům na životní prostředí a lidské this notice for all electronic products bearing the following zdraví.
  • Page 52 Regulatory Information Appendix E Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 53 Regulatory Information Appendix E Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 54 ľudí. Ak máte záujem o podrobnejšie WEB: For additional information, please visit informácie o likvidácii starého zariadenia, obráťte sa, prosím, na www.linksys.com/international miestne orgány, organizácie zaoberajúce sa likvidáciou odpadov alebo obchod, v ktorom ste si produkt zakúpili. 8040410A-ST...
  • Page 55: Appendix F: Software License Agreement

    Schedules 2, 3 or 4 below as applicable. “Software” includes, and this Agreement will apply to BY DOWNLOADING OR INSTALLING THE SOFTWARE, (a) the software of Linksys or its suppliers provided in or OR USING THE PRODUCT CONTAINING THE SOFTWARE, with the applicable Linksys product, excluding technology...
  • Page 56 Schedule 2 are from the public web site at of the GPL or other open source code in this Software on a http://www.gnu.org/copyleft/gpl.html CD, Linksys will mail to You a CD with such code for $9.99 plus the cost of shipping, upon request. GNU GENERAL PUBLIC LICENSE Term and Termination.
  • Page 57 Software License Agreement Appendix F TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND GNU General Public License is intended to guarantee your freedom to share and change free software–to make sure MODIFICATION the software is free for all its users. This General Public This License applies to any program or other work License applies to most of the Free Software Foundation’s which contains a notice placed by the copyright...
  • Page 58 Software License Agreement Appendix F If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
  • Page 59 General Public License from time to time. Such new versions will be similar in If this Linksys product contains open source software spirit to the present version, but may differ in detail to licensed under Version 2.1 of the “GNU Lesser General Public address new problems or concerns.
  • Page 60 Software License Agreement Appendix F GNU LESSER GENERAL PUBLIC LICENSE To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the Version 2.1, February 1999 library is modified by someone else and passed on, the recipients should know that what they have is not the Copyright (C) 1991, 1999 Free Software Foundation, Inc.
  • Page 61 Software License Agreement Appendix F freedom and the wherewithal to run that program using a You may copy and distribute verbatim copies of the modified version of the Library. Library’s complete source code as you receive it, in any medium, provided that you conspicuously and The precise terms and conditions for copying, distribution appropriately publish on each copy an appropriate and modification follow.
  • Page 62 Software License Agreement Appendix F Thus, it is not the intent of this section to claim When a “work that uses the Library” uses material from rights or contest your rights to work written entirely a header file that is part of the Library, the object code by you;...
  • Page 63 Software License Agreement Appendix F Use a suitable shared library mechanism for linking You may not copy, modify, sublicense, link with, or with the Library. A suitable mechanism is one that distribute the Library except as expressly provided (1) uses at run time a copy of the library already under this License.
  • Page 64 Schedule 4 incompatible with these, write to the author to ask for permission. For software which is copyrighted by the If this Linksys product contains open source software Free Software Foundation, write to the Free Software licensed under the OpenSSL license: Foundation;...
  • Page 65 Software License Agreement Appendix F Original SSLeay License Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org. Copyright © 1995-1998 Eric Young (eay@cryptsoft.com)All OpenSSL License rights reserved. This package is an SSL implementation written by Eric Copyright ©...
  • Page 66 Software License Agreement Appendix F DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

This manual is also suitable for:

Linksys wrt610n

Table of Contents