Linksys WRT110 User Manual

Rangeplus wireless router
Hide thumbs Also See for WRT110:
Table of Contents

Advertisement

USER GUIDE
RangePlus Wireless Router
WRT110 (EU)
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WRT110

  • Page 1 USER GUIDE RangePlus Wireless Router WRT110 (EU) Model:...
  • Page 2: About This Guide

    Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview Front Panel..........4 Back Panel .
  • Page 4 Table of Contents Avis d’Industrie Canada......... .33 Wireless Disclaimer .
  • Page 5: Chapter 1: Product Overview

    Product Overview Chapter 1 Chapter 1: Wireless (Blue) The Wireless LED lights up when the wireless feature is enabled. If the LED Product Overview is flashing, the Router is actively sending or receiving data over the network. Thank you for choosing the Linksys RangePlus Wireless Internet (Blue) The Internet LED lights up Router.
  • Page 6 Product Overview Chapter 1 Wall-Mounting Placement Follow these instructions: Determine where you want to mount the Router. Make The Router has two wall-mount slots on its bottom sure that the wall you use is smooth, flat, dry, and panel. The distance between the slots is 152 mm sturdy.
  • Page 7: Chapter 2: Wireless Security Checklist

    Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalency Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
  • Page 8: Chapter 3: Advanced Configuration

    Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you’d like to change its advanced settings, use the Router’s web-based utility. This chapter describes each web page of the utility and each page’s key functions.
  • Page 9 Advanced Configuration Chapter 3 Static IP before your Internet connection terminates. The default Max Idle Time is 15 minutes. If you are required to use a permanent IP address to Keep Alive: Redial Period If you select this option, connect to the Internet, select Static IP. the Router will periodically check your Internet connection.
  • Page 10 Advanced Configuration Chapter 3 L2TP Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been L2TP is a service that applies to connections in Israel only. inactive for a specified period of time (Max Idle Time). If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you...
  • Page 11 Advanced Configuration Chapter 3 Router IP This presents both the Router’s IP Address and Subnet Mask as seen by your network. Router IP DHCP Server Setting The settings allow you to configure the Router’s Dynamic Host Configuration Protocol (DHCP) server function. The Router can be used as a DHCP server for your network.
  • Page 12: Setup > Ddns

    Advanced Configuration Chapter 3 DynDNS.org be automatically assigned a new dynamic IP address. The default is 0 minutes, which means one day. Static DNS 1-3 The Domain Name System (DNS) is how the Internet translates domain or website names into Internet addresses or URLs.
  • Page 13: Setup > Mac Address Clone

    Advanced Configuration Chapter 3 E-mail Address, TZO Key, and Domain Name Enter the settings of the account you set up with TZO. Internet IP Address The Router’s Internet IP address is displayed here. Because it is dynamic, it will change. Status The status of the DDNS service connection is displayed here.
  • Page 14: Wireless > Basic Wireless Settings

    Advanced Configuration Chapter 3 Gateway This is the IP address of the gateway device that devices, select Wireless-G Only. If you have only Wireless- allows for contact between the Router and the remote B devices, select Wireless-B Only. If you do not have any network or host.
  • Page 15 Advanced Configuration Chapter 3 on configuring wireless security for the Router, refer to type of algorithm, AES or AES or TKIP. The default is AES “Chapter 2: Wireless Security Checklist. ” or TKIP. Passphrase Enter a Passphrase of 8-63 characters. Wireless Security Key Renewal Enter a Key Renewal period, which instructs...
  • Page 16 Advanced Configuration Chapter 3 IMPORTANT: If you are using WEP encryption, always remember that each device in your wireless network MUST use the same WEP encryption method and encryption key, or else your wireless network will not function properly. RADIUS Server Enter the IP address of the RADIUS server.
  • Page 17: Wireless > Wireless Mac Filter

    Advanced Configuration Chapter 3 Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Wireless > Wireless MAC Filter Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network’s radius. Wireless Client List Wireless Client List This screen shows computers and other devices on...
  • Page 18: Security > Firewall

    Advanced Configuration Chapter 3 Advanced Wireless N and Wireless-G transmissions but will severely decrease performance. The default is Auto. AP Isolation This isolates all wireless clients and wireless Beacon Interval Enter a value between 20 and 999 devices on your network from each other. Wireless devices milliseconds.
  • Page 19: Security > Vpn Passthrough

    Advanced Configuration Chapter 3 Internet sites created using this programming language. Select this feature to enable ActiveX filtering. Deselect the feature to allow ActiveX usage. Cookies A cookie is data stored on your computer and used by Internet sites when you interact with them. Select this feature to filter cookies.
  • Page 20 Advanced Configuration Chapter 3 Summary Status Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu, and select Enabled. To create a policy, follow steps 1-11. Repeat these steps to create additional policies, one at a time. Access Policy drop-down Select a number from the menu.
  • Page 21: Applications And Gaming > Single Port Forwarding

    Advanced Configuration Chapter 3 Decide which days and what times you want this policy to be enforced. Select the individual days during which the policy will be in effect, or select Everyday. Then enter a range of hours and minutes during which the policy will be in effect, or select 24 Hours.
  • Page 22: Applications & Gaming > Port Range Triggering

    Advanced Configuration Chapter 3 Applications & Gaming > Port Range ftp servers, e-mail servers, or other specialized Internet applications. (Specialized Internet applications are any Triggering applications that use Internet access to perform functions such as videoconferencing or online gaming. Some Internet The Port Range Triggering screen allows the Router to applications may not require any forwarding.) watch outgoing data for specific port numbers.
  • Page 23: Applications And Gaming > Qos

    Advanced Configuration Chapter 3 Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Applications and Gaming > QoS Quality of Service (QoS) ensures better service to high-priority types of network traffic, which may involve demanding, real-time applications, such as videoconferencing.
  • Page 24 Advanced Configuration Chapter 3 Category Priority Select the appropriate priority: High, Medium (Recommend), Normal, or Low. There are four categories available. Select one of the Click Add to save your changes. Your new entry will appear following: Applications, Online Games, MAC Address, in the Summary list.
  • Page 25: Administration > Management

    Advanced Configuration Chapter 3 Summary Web Access This lists the QoS entries you have created for your Web Utility Access HTTP (HyperText Transport Protocol) applications and devices. is the communications protocol used to connect to servers on the World Wide Web. HTTPS uses SSL (Secured Socket Priority This column displays the bandwidth priority of Layer) to encrypt data transmitted for higher security.
  • Page 26: Administration > Log

    Advanced Configuration Chapter 3 UPnP Universal Plug and Play (UPnP) allows Windows Me and XP to automatically configure the Router for various Internet applications, such as gaming and videoconferencing. UPnP If you want to use UPnP, keep the default setting, Enabled.
  • Page 27: Administration > Factory Defaults

    Advanced Configuration Chapter 3 Administration > Factory Defaults Diagnostics The Administration > Factory Defaults screen allows you Ping Test to restore the Router’s configuration to its factory default The Ping test checks the status of a connection. settings. IP or URL Address Enter the address of the PC whose connection you wish to test.
  • Page 28: Status > Router

    Advanced Configuration Chapter 3 Internet Connection NOTE: The Router may lose the settings you have customized. Before you upgrade its This section shows the current network information firmware, write down all of your custom settings. stored in the Router. The information varies depending on After you upgrade its firmware, you will have to the Internet connection type selected on the Basic Setup re-enter all of your configuration settings.
  • Page 29: Status > Wireless Network

    Advanced Configuration Chapter 3 Standard Channel Shown here is the Standard Channel setting selected on the Basic Wireless Settings screen. Security Displayed here is the wireless security method used by the Router. SSID Broadcast Displayed here is the status of the SSID Broadcast feature.
  • Page 30: Appendix A: Troubleshooting

    Troubleshooting Appendix A Appendix A: When you double-click the web browser, you are prompted for a username and password. If you want to Troubleshooting get rid of the prompt, follow these instructions. Launch the web browser and perform the following steps (these steps are specific to Internet Explorer but are similar Your computer cannot connect to the Internet.
  • Page 31: Appendix B: Specifications

    Specifications Appendix B Appendix B: Specifications Model WRT110 Standards IEEE 802.11g, IEEE 802.11b, IEEE 802.3, IEEE 802.3u Ports Internet: One 10/100 RJ-45 Port Ethernet: Four 10/100 RJ-45 Ports One Power Port Buttons One Reset Button One Wi-Fi Protected Setup Button...
  • Page 32: Appendix C: Warranty Information

    Warranty Information Appendix C Appendix C: network on which the product or software is used will be free of vulnerability to intrusion or attack. The product Warranty Information may include or be bundled with third party software or service offerings. This limited warranty shall not apply to such third party software or service offerings.
  • Page 33 Warranty Information Appendix C and a copy of your dated proof of original purchase when returning your product. Products received without a RMA number and dated proof of original purchase will be rejected. Do not include any other items with the product you are returning to Linksys.
  • Page 34: Appendix D: Regulatory Information

    Regulatory Information Appendix D Industry Canada Statement Appendix D: Regulatory Information This Class B digital apparatus complies with Canadian ICES-003 and RSS210. Operation is subject to the following two conditions: FCC Statement This device may not cause interference and This product has been tested and complies with the This device must accept any interference, including specifications for a Class B digital device, pursuant to Part interference that may cause undesired operation...
  • Page 35: Wireless Disclaimer

    Regulatory Information Appendix D Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, data throughput rate, range and coverage. Performance depends on many factors, conditions and variables, including distance from the access point, volume of network traffic, building materials and construction, operating system used, mix of wireless products used,...
  • Page 36: Declaration Of Conformity With Regard To Eu Directive 1999/5/Ec (R&Tte Directive)

    Regulatory Information Appendix D Declaration of Conformity with Regard to Dit apparaat voldoet aan de essentiele eisen Nederlands EU Directive 1999/5/EC (R&TTE Directive) en andere van toepassing zijnde bepalingen [Dutch]: van de Richtlijn 1999/5/EC. Compliance Information for 2,4-GHz and 5-GHz Wireless Dan l-apparat huwa konformi mal-ħtiġiet Products Relevant to the EU and Other Countries Following Malti...
  • Page 37: Wireless Equipment (Wireless-N/G/A/B Products)

    Regulatory Information Appendix D Wireless Equipment National Restrictions (Wireless-N/G/A/B Products) This product may be used in all EU countries (and other countries following the EU directive 1999/5/EC) without The following standards were applied during the any limitation except for the countries mentioned below: assessment of the product against the requirements of Ce produit peut être utilisé...
  • Page 38: Product Usage Restrictions

    Regulatory Information Appendix D Product Usage Restrictions France For 2,4 GHz, the product should not be used outdoors This product is designed for indoor usage only. Outdoor in the band 2454 - 2483,5 MHz. There are no restrictions usage is not recommended, unless otherwise noted. when used in other parts of the 2,4 GHz band when used 2,4 GHz Restrictions indoors.
  • Page 39: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    Regulatory Information Appendix D User Information for Consumer Products Čeština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené Waste Electric and Electronic Equipment tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem.
  • Page 40 Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 41 Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 42 Regulatory Information Appendix D Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
  • Page 43: Appendix E: Software License Agreement

    CISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR USING THE PRODUCT CONTAINING This product from Cisco-Linksys LLC or from one of its THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco- THIS AGREEMENT.
  • Page 44 Software License Agreement Appendix E your Linksys product and/or the Software is being used in OR RELATED TO THE USE OF OR INABILITY TO USE THE accordance with the terms of this Agreement; (iii) to provide SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF improvements to the way Linksys delivers technology to THE POSSIBILITY OF SUCH DAMAGES.
  • Page 45 Software License Agreement Appendix E TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND GNU General Public License is intended to guarantee your freedom to share and change free software–to make sure MODIFICATION the software is free for all its users. This General Public This License applies to any program or other work License applies to most of the Free Software Foundation’s which contains a notice placed by the copyright...
  • Page 46 Software License Agreement Appendix E If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
  • Page 47 Software License Agreement Appendix E If, as a consequence of a court judgment or allegation not specify a version number of this License, you of patent infringement or for any other reason (not may choose any version ever published by the Free limited to patent issues), conditions are imposed on Software Foundation.
  • Page 48 Software License Agreement Appendix E GNU LESSER GENERAL PUBLIC LICENSE To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the Version 2.1, February 1999 library is modified by someone else and passed on, the recipients should know that what they have is not the Copyright (C) 1991, 1999 Free Software Foundation, Inc.
  • Page 49 Software License Agreement Appendix E freedom and the wherewithal to run that program using a You may copy and distribute verbatim copies of the modified version of the Library. Library’s complete source code as you receive it, in any medium, provided that you conspicuously and The precise terms and conditions for copying, distribution appropriately publish on each copy an appropriate and modification follow.
  • Page 50 Software License Agreement Appendix E Thus, it is not the intent of this section to claim When a “work that uses the Library” uses material from rights or contest your rights to work written entirely a header file that is part of the Library, the object code by you;...
  • Page 51 Software License Agreement Appendix E Use a suitable shared library mechanism for linking You may not copy, modify, sublicense, link with, or with the Library. A suitable mechanism is one that distribute the Library except as expressly provided (1) uses at run time a copy of the library already under this License.
  • Page 52 Software License Agreement Appendix E software distributed through that system in reliance BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, on consistent application of that system; it is up to THERE IS NO WARRANTY FOR THE LIBRARY, TO THE the author/donor to decide if he or she is willing to EXTENT PERMITTED BY APPLICABLE LAW.
  • Page 53 Software License Agreement Appendix E OpenSSL License Original SSLeay License Copyright © 1998-2007 The OpenSSL Project. All rights Copyright © 1995-1998 Eric Young (eay@cryptsoft.com)All reserved. rights reserved. Redistribution and use in source and binary forms, with This package is an SSL implementation written by Eric or without modification, are permitted provided that the Young (eay@cryptsoft.com).
  • Page 54 Software License Agreement Appendix E DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

This manual is also suitable for:

Wrt110-rm - refurb rp wireless router

Table of Contents