Linksys WRT160NL User Manual

Linksys wireless-n broadband router with storage link
Hide thumbs Also See for WRT160NL:
Table of Contents

Advertisement

Quick Links

USER GUIDE
Wireless-N Broadband Router
with Storage Link
WRT160NL
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WRT160NL

  • Page 1 USER GUIDE Wireless-N Broadband Router with Storage Link WRT160NL Model:...
  • Page 2: About This Guide

    Glossary www.linksysbycisco.com/glossary Network Security www.linksysbycisco.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2009 Cisco Systems, Inc. All rights reserved.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview Front Panel..........1 Back Panel .
  • Page 4 Cisco Products ........
  • Page 5: Chapter 1: Product Overview

    Wi-Fi Protected Setup. Thank you for choosing the Linksys by Cisco Wireless-N The LED lights up amber if there is an error Broadband Router with Storage Link. The Router lets you during the Wi-Fi Protected Setup process. Make access the Internet via a wireless connection or through sure the client device supports Wi-Fi Protected one of its four switched ports.
  • Page 6: Bottom Panel

    Product Overview Chapter 1 Bottom Panel Wall-Mounting Placement The Router has two wall-mount slots on its bottom panel. The distance between the slots is 152 mm (6 inches). Two screws are needed to mount the Router. Suggested Mounting Hardware 4–5 mm 1–1.5 mm Note: Mounting hardware illustrations are not †...
  • Page 7: Chapter 2: Wireless Security Checklist

    Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalent Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
  • Page 8: Chapter 3: Advanced Configuration

    Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you want to change its advanced settings, use the Router’s web-based utility. This chapter describes each web page of the utility and each page's key functions.
  • Page 9 Advanced Configuration Chapter 3 Automatic Configuration - DHCP Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been By default, the Router's Internet Connection Type is set inactive for a specified period of time (Max Idle Time). If to Automatic Configuration - DHCP, which should be your Internet connection has been terminated due to kept only if your ISP supports DHCP or you are connecting...
  • Page 10 Advanced Configuration Chapter 3 PPTP Server IP Address Your ISP will provide you with this option, select Keep Alive. In the Redial Period field, the IP address of the PPTP server. you specify how often you want the Router to check the Internet connection.
  • Page 11 Advanced Configuration Chapter 3 broadband Internet service has been configured with a DHCP Reservation Click this button if you want to assign host and domain name. In most cases, leaving these fields a fixed local IP address to a MAC address. blank will work.
  • Page 12: Setup > Ddns

    Advanced Configuration Chapter 3 amount of time, in minutes, that the user will be "leased" DynDNS.org this dynamic IP address. After the time has elapsed, the user will be automatically assigned a new dynamic IP address. The default setting is 0 minutes, which means one day.
  • Page 13: Setup > Mac Address Clone

    Advanced Configuration Chapter 3 Clone My PC's MAC TZO.com Click this button to clone the MAC address of the computer you are using. Click Save Settings to apply your changes or click Cancel Changes to cancel your changes. Setup > Advanced Routing This screen is used to set up the Router's advanced functions.
  • Page 14: Wireless > Basic Wireless Settings

    Advanced Configuration Chapter 3 Route Entries To set up a static route between the Router select Wi-Fi Protected Setup. Proceed to Wi-Fi Protected Setup, page 11. and another network, select a number from the drop- down list. Click Delete This Entry to delete a static route. Basic Wireless Settings Enter Route Name Enter a name for the Route here,...
  • Page 15 Advanced Configuration Chapter 3 Standard Channel If Standard - 20 MHz Channel is the Channel Width setting, then this setting will be available. Select the appropriate channel for your wireless network. If you are not sure which channel to select, keep the default setting of Auto.
  • Page 16: Wireless > Wireless Security

    Advanced Configuration Chapter 3 After the client device has been configured, click WPA Personal OK. Then refer back to your client device or its documentation for further instructions. NOTE: If you are using WPA, then each device in your wireless network MUST use the same WPA Method #3 method and shared key, or else the network will Use this method if your client device asks for the Router's...
  • Page 17 Advanced Configuration Chapter 3 WPA Enterprise RADIUS Server Enter the IP address of the server. RADIUS Port Enter the port number of the server. The This option features WPA used with a RADIUS server. (This default value is 1812. should only be used when a RADIUS server is connected to the Router).
  • Page 18: Wireless > Wireless Mac Filter

    Advanced Configuration Chapter 3 Wireless > Wireless MAC Filter WEP is a basic encryption method, which is not as secure Wireless access can be filtered by using the MAC addresses of as WPA. the wireless devices transmitting within your network’s radius. IMPORTANT: If you are using WEP encryption, then each device in your wireless network MUST...
  • Page 19: Wireless > Advanced Wireless Settings

    Advanced Configuration Chapter 3 with each other. To use this function, select Enabled. AP Isolation is disabled by default. Authentication Type The Authentication Type setting is available if the Security Mode is RADIUS or WEP. The default is set to Auto, which allows either Open System or Shared Key authentication to be used.
  • Page 20: Security > Firewall

    Advanced Configuration Chapter 3 Firewall Beacon Interval Enter a value between 1 and 65,535 milliseconds. The Beacon Interval value indicates the SPI Firewall Protection To use firewall protection, keep frequency interval of the beacon. A beacon is a packet the default selection of Enabled. To turn off firewall broadcast by the Router to synchronise the wireless protection, select Disabled.
  • Page 21: Security > Vpn Passthrough

    Advanced Configuration Chapter 3 Security > VPN Passthrough The VPN Passthrough screen allows you to enable VPN tunnels using IPSec, PPTP or L2TP protocols to pass through the Router's firewall. Security > VPN Passthrough Storage > Disk VPN Passthrough Disk Management IPSec Passthrough Internet Protocol Security (IPSec) is If a formatted disk is connected to the Router, then its...
  • Page 22 Advanced Configuration Chapter 3 Shared Folders Summary The Shared Folders Summary screen displays the following information: Display Name, Partition, Shared Folder and Groups with Access. Summary To exit the Shared Folders Summary screen and return to the Disk Management screen, click Close. Format Disk Disk To format a disk and create a new partition, select...
  • Page 23 The default server name of the Router is Current Folder The current folder is displayed. WRT160NL. You can change this name on the Storage > Administration screen. Please refer to Storage > Folder The available folders are listed by Folder name.
  • Page 24: Storage > Administration

    Enter the server name for the Router; it will be used for the disk and media server features. Use only alphanumeric characters (letters A to Z and numbers 0 to 9) in the server name. The default setting is WRT160NL. Group Account Workgroup Name...
  • Page 25: Access Restrictions > Internet Access

    Advanced Configuration Chapter 3 Create or Edit a User Account User Account User Account Name Create a name for the user. Full Name Enter the actual name of the user. Access Restrictions > Internet Access Description Enter keywords to describe the user. Password Enter the password that the user will use for Internet Access Policy...
  • Page 26: Applications And Gaming > Single Port Forwarding

    Advanced Configuration Chapter 3 Status Policies are disabled by default. To enable a policy, the Blocked List. To remove an application from the Blocked List, select it and click the << button. select the policy number from the drop-down menu and select Enabled.
  • Page 27: Applications And Gaming > Port Range Forwarding

    Advanced Configuration Chapter 3 Port Range Forwarding External Port Enter the external port number used by the server or Internet application. Check with the Internet To forward a port, enter the information on each line for application documentation for more information. the criteria required.
  • Page 28: Applications And Gaming > Dmz

    Advanced Configuration Chapter 3 Triggered Range For each application, enter the starting address in the field provided. To retrieve this information, click DHCP Client Table. and ending port numbers of the triggered port number range. Check with the Internet application documentation for the port number(s) needed.
  • Page 29 Advanced Configuration Chapter 3 No Acknowledgement If you want to disable the Router's application that uses from 1000 to 1250, you enter 1000- Acknowledgement feature, so the Router will not re-send 1250 as your settings. You can have up to three ranges data if an error occurs, then select Enabled.
  • Page 30: Administration > Management

    Advanced Configuration Chapter 3 MAC Address Name This column displays the application, device or port name. Information This column displays the port range or MAC address entered for your entry. If a pre-configured application or game was selected, there will be no valid entry shown in this section.
  • Page 31: Administration > Log

    Advanced Configuration Chapter 3 Access via Wireless If you are using the Router in a public Allow Users to Disable Internet Access Select Enabled, domain where you are giving wireless access to your if you want to be able to prohibit any and all Internet guests, you can disable wireless access to the Router’s connections.
  • Page 32: Administration > Diagnostics

    Advanced Configuration Chapter 3 Type Select Incoming Log, Outgoing Log, Security • Log or DHCP Client Log. <Type> Log The Incoming Log displays a temporary • log of the source IP addresses and destination port numbers for the incoming Internet traffic. The Outgoing Log displays a temporary log of the local IP addresses, destination URLs/IP addresses and service/ Diagnostics >...
  • Page 33: Administration > Firmware Upgrade

    Advanced Configuration Chapter 3 Administration > Firmware Upgrade The Firmware Upgrade screen allows you to upgrade the Router's firmware. Do not upgrade the firmware unless you are experiencing problems with the Router or the new firmware has a feature you want to use. Status >...
  • Page 34: Status > Local Network

    Advanced Configuration Chapter 3 Status > Local Network DHCP Client Table The DHCP Client Table lists computers and other devices The Local Network screen displays information about the that have been assigned IP addresses by the Router. local, wired network. The list can be sorted by IP Address, MAC Address, Interface and Client Name.
  • Page 35: Appendix A: Troubleshooting

    Troubleshooting Appendix A Appendix A: Click The Router does not have a coaxial port for the cable Troubleshooting connection. The Router does not replace your modem. You still need Your computer cannot connect to the Internet. your cable modem in order to use the Router. Connect your cable connection to the cable modem, and then Follow these instructions until your computer can connect insert the setup CD into your computer.
  • Page 36 Troubleshooting Appendix A system settings. Click the Computer Name tab. The workgroup name is displayed.) If they differ, then change the workgroup name of the Router. Follow these instructions: Access the web-based utility of the Router. (Refer to Chapter 3: Advanced Configuration, page 4.) Storage tab.
  • Page 37: Appendix B: How To Install And Access Usb Storage

    The default server name of the Router is The default server name of the Router is WRT160NL. You can change this name on the WRT160NL. You can change this name on the Storage > Administration screen; refer to Storage >...
  • Page 38: Create A Shortcut To A Shared Folder

    Setup > Basic Setup, page 4. The default server name of the Router is WRT160NL. You can change this name on the Storage > Administration screen; refer to Storage > Enter your account username and password. (For the Administration, page 20.
  • Page 39 Enter Server Name of Router On your desktop, double-click the Computer icon. The default server name of the Router is WRT160NL. You can change this name on the Storage > Administration screen; refer to Storage > Administration, page 20. Computer Icon...
  • Page 40: Advanced Configuration (Advanced Users Only)

    How to Install and Access USB Storage Appendix B Right-click the folder you want to share and click In the Network Drives section, double-click the mapped Network Drive. (The default shared folder is named drive to access it. Public.) Double-Click Mapped Drive Advanced Configuration (Advanced Map Network Drive Users Only)
  • Page 41 How to Install and Access USB Storage Appendix B Create a Shared Folder Select the appropriate folder. To display sub-folders, click Enter into Folder. To return to the previous Storage tab. Click the folder, click Return to Upper Folder. Disk tab. Click the To allow a group access to the shared folder, select it from the Available Groups column and then click the...
  • Page 42 How to Install and Access USB Storage Appendix B In the Group Name field, create a name for the group. In the Description field, enter keywords to describe the user. In the Description field, enter keywords to describe the group. In the Password and Confirm Password fields, enter the password that the user will use to login.
  • Page 43: Appendix C: Specifications

    0 to 40°C (32 to 104°F) Storage Temp. -20 to 60°C (-4 to 140°F) Specifications Operating Humidity 10 to 80%, Relative Humidity, Non-condensing Model WRT160NL Storage Humidity 5 to 90% Non-condensing Standards 802.3, 802.3u, 802.11b, 802.11g, Draft 802.11n Specifications are subject to change without notice.
  • Page 44: Appendix D: Warranty Information

    Warranty Information Appendix D Appendix D: network on which the product or software is used will be free of vulnerability to intrusion or attack. The product Warranty Information may include or be bundled with third party software or service offerings. This limited warranty shall not apply to such third party software or service offerings.
  • Page 45: Technical Support

    Warranty Information Appendix D at your cost and risk. You must include the RMA number and a copy of your dated proof of original purchase when returning your product. Products received without a RMA number and dated proof of original purchase will be rejected.
  • Page 46: Appendix E: Regulatory Information

    Regulatory Information Appendix E Appendix E: Safety Notices Regulatory Information WARNING: Do not use this product near water, for example, in a wet basement or near a swimming pool. FCC Statement This device complies with Part 15 of the FCC Rules. WARNING: Avoid using this product during an Operation is subject to the following two conditions: (1)
  • Page 47: Industry Canada Statement

    Regulatory Information Appendix E Industry Canada Statement Wireless Disclaimer This Class B digital apparatus complies with Canadian The maximum performance for wireless is derived from ICES-003 and RSS210. IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, Operation is subject to the following two conditions: data throughput rate, range and coverage.
  • Page 48: Declaration Of Conformity With Regard To Eu Directive 1999/5/Ec (R&Tte Directive)

    Regulatory Information Appendix E Declaration of Conformity with Regard to Dit apparaat voldoet aan de essentiele eisen Nederlands EU Directive 1999/5/EC (R&TTE Directive) en andere van toepassing zijnde bepalingen [Dutch]: van de Richtlijn 1999/5/EC. Compliance Information for 2.4-GHz and 5-GHz Wireless Dan l-apparat huwa konformi mal-ħtiġiet Products Relevant to the EU and Other Countries Following Malti...
  • Page 49: Wireless Equipment (Wireless-N/G/A/B Products)

    Regulatory Information Appendix E Wireless Equipment (Wireless-N/G/A/B In the majority of the EU and other European countries, the 2.4- and 5-GHz bands have been made available Products) for the use of wireless local area networks (LANs). The table labelled “Overview of Regulatory Requirements for The following standards were applied during the Wireless LANs”...
  • Page 50: Product Usage Restrictions

    Regulatory Information Appendix E 2.4 GHz Restrictions puissance PIRE de à 100 mW (20 dBm) maximum. Consultez http://www.arcep.fr/ pour de plus amples détails. This product is designed for use with the standard, integral or dedicated (external) antenna(s) that is/are shipped Applicable Power Levels in France together with the equipment.
  • Page 51: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    Regulatory Information Appendix E User Information for Consumer Products Čeština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno Waste Electric and Electronic Equipment s netříděným komunálním odpadem.
  • Page 52 Regulatory Information Appendix E Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 53 Regulatory Information Appendix E Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 54 Regulatory Information Appendix E Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
  • Page 55: Appendix F: Software End User Licence Agreement

    If you would like a copy of the GPL or certain to a person or entity to which you transfer ownership of other open source code in this Software on a CD, Cisco will the complete Cisco product containing the Software or mail to you a CD with such code for $9.99 plus the cost of...
  • Page 56 Software or You agree that Cisco is not responsible or liable for any related Documentation, or decompile, reverse engineer, loss or damage of any sort incurred as the result of any...
  • Page 57 TO THE EXTENT NOT PROHIBITED BY APPLICABLE Cisco product and/or Software indicates your acceptance LAW, ALL IMPLIED WARRANTIES AND CONDITIONS of the terms of the Cisco Privacy Policy, so please review OF MERCHANTABILITY, SATISFACTORY QUALITY OR the policy carefully and check the Web site above to FITNESS FOR A PARTICULAR PURPOSE ARE LIMITED TO review updates to it.
  • Page 58 1. Network Magic Cancellation. You may cancel the Licence into [language]. It was not published by the Services at any time. If you cancel the Services, Cisco will not Free Software Foundation and does not legally state the be obligated to provide you any Network Magic product distribution terms for software that uses the GNU GPL—...
  • Page 59 Software End User Licence Agreement Appendix F Everyone is permitted to copy and distribute verbatim TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND copies of this licence document, but changing it is not MODIFICATION allowed. This Licence applies to any program or other work Preamble which contains a notice placed by the copyright holder saying it may be distributed under the terms...
  • Page 60 Software End User Licence Agreement Appendix F If the modified program normally reads commands Accompany it with the information you received interactively when run, you must cause it, when as to the offer to distribute corresponding source it has started running for such interactive use code.
  • Page 61 General Public Licence from time to time. Such new versions will be similar in If this Cisco product contains open source software licensed spirit to the present version, but may differ in detail to under Version 2.1 of the “GNU Lesser General Public address new problems or concerns.
  • Page 62 Software End User Licence Agreement Appendix F GNU LESSER GENERAL PUBLIC LICENCE with the library after making changes to the library and recompiling it. And you must show them these terms so This is an unofficial translation of the GNU Lesser General they know their rights.
  • Page 63 Software End User Licence Agreement Appendix F In other cases, permission to use a particular library in non- true depends on what the Library does and what the free programs enables a greater number of people to use program that uses the Library does. a large body of free software.
  • Page 64 Software End User Licence Agreement Appendix F permissions for other licensees extend to the entire Library), rather than a "work that uses the library". The whole and thus to each and every part regardless executable is therefore covered by this Licence. Section of who wrote it.
  • Page 65 Software End User Licence Agreement Appendix F Use a suitable shared library mechanism for linking You may not copy, modify, sublicense, link with or with the Library. A suitable mechanism is one that distribute the Library except as expressly provided (1) uses at run time a copy of the library already under this Licence.
  • Page 66 Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com). In addition, if this Cisco product contains open source software licensed under the OpenSSL licence then the licence terms below in this Schedule 3-C will apply to that open source software.
  • Page 67 Software End User Licence Agreement Appendix F The OpenSSL toolkit stays under a dual licence, i.e. both This product includes cryptographic software written by the conditions of the OpenSSL Licence and the original Eric Young (eay@cryptsoft.com). This product includes SSLeay licence apply to the toolkit. See below for the software written by Tim Hudson (tjh@cryptsoft.com).
  • Page 68 Software End User Licence Agreement Appendix F BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...

Table of Contents