Linksys WRP400 User Manual

Linksys WRP400 User Manual

Wireless-g broadband router with 2 phone ports
Hide thumbs Also See for WRP400:
Table of Contents

Advertisement

USER GUIDE
Wireless-G Broadband Router
with 2 Phone Ports
WRP400
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WRP400

  • Page 1 USER GUIDE Wireless-G Broadband Router with 2 Phone Ports WRP400 Model:...
  • Page 2: About This Guide

    Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/ or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview Front Panel..........4 Back Panel .
  • Page 4 Table of Contents Chapter 4: Interactive Voice Response Menu Overview ...........36 Menu Commands .
  • Page 5: Chapter 1: Product Overview

    Product Overview Chapter 1 Chapter 1: Wireless (Green) The Wireless LED lights up when the wireless feature is enabled. It flashes Product Overview when the Router is actively sending or receiving data over the network. Thank you for choosing the Linksys Wireless-G Broadband Ethernet 1-4 (Green) These numbered LEDs, Router with 2 Phone Ports.
  • Page 6: Side Panel

    Product Overview Chapter 1 Side Panel Vertical Placement The Router has a stand on the panel opposite to the antenna. Rotate the stand 90 degrees, and place the Router on a level surface near an electrical outlet. Reset There are two ways to reset the Router’s factory defaults.
  • Page 7 Product Overview Chapter 1 Insert a screw into each hole and leave 3 mm (0.12 inches) of its head exposed. Maneuver the Router so two of the wall-mount slots line up with the two screws. Place the wall-mount slots over the screws and slide the Router down until the screws fit snugly into the wall-mount slots.
  • Page 8: Chapter 2: Wireless Security Checklist

    Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalency Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
  • Page 9: Chapter 3: Advanced Configuration

    Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you’d like to change its advanced settings, use the Router’s web-based utility. This chapter describes each web page of the utility and each page’s key functions.
  • Page 10 Advanced Configuration Chapter 3 Static IP this option, select Keep Alive. In the Redial Period field, you specify how often you want the Router to check If you are required to use a permanent IP address to the Internet connection. The default Redial Period is connect to the Internet, select Static IP.
  • Page 11 Advanced Configuration Chapter 3 L2TP inactive for a specified period of time (Max Idle Time). If your Internet connection has been terminated due to L2TP is a service that applies to connections in Europe and inactivity, Connect on Demand enables the Router to Israel.
  • Page 12 Advanced Configuration Chapter 3 Internet addresses or URLs. Enter the IP address of the DNS server, which is provided by your service provider. If you wish to use a different DNS server, enter its IP address in one of these fields. You can enter up to three DNS server IP addresses here.
  • Page 13: Setup > Ddns

    Advanced Configuration Chapter 3 Router with their current dynamic IP address. Enter the www.dyndns.org or www.TZO.com. If you do not want to use this feature, keep the default setting, Disabled. amount of time, in minutes, that the user will be “leased” this dynamic IP address.
  • Page 14: Setup > Mac Address Clone

    Advanced Configuration Chapter 3 MAC Address Clone Status The status of the DDNS service connection is displayed here. Enabled/Disabled To have the MAC address cloned, Update To manually trigger an update, click this button. select Enabled. Click Save Settings to apply your changes, or click Cancel MAC Address Enter the MAC address registered with Changes to cancel your changes.
  • Page 15: Wireless > Basic Wireless Settings

    Advanced Configuration Chapter 3 Enabled/Disabled If this Router is hosting your network’s connection to the Internet, keep the default, Enabled. If another router exists on your network, select Disabled. When the NAT setting is disabled, dynamic routing will be enabled. Dynamic Routing (RIP) Advanced Routing >...
  • Page 16 Advanced Configuration Chapter 3 “Wi-Fi Protected Setup” section. To manually configure your wireless network, select Manual. Proceed to the “Wireless Network” section. NOTE: Wi-Fi Protected Setup is available your primary wireless network (SSID1) only. To configure your second wireless network (SSID2), select Manual. If you are unable to configure the second wireless network, contact your service provider for more information (these settings may be controlled by...
  • Page 17: Wireless > Wireless Security

    Advanced Configuration Chapter 3 Enter the PIN number listed on this screen. (It is also To create a second wireless network, select Network listed on the label on the bottom of the Router.) Enabled for the SSID2 setting. Then enter a unique After the client device has been configured, click Wireless Network Name.
  • Page 18 Advanced Configuration Chapter 3 Wireless Security WPA Algorithms WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. Select a SSID Select the appropriate SSID. (If you enabled Select the type of algorithm, AES or TKIP + AES. The the second wireless network on the Basic Wireless Settings default is TKIP + AES.
  • Page 19: Wireless > Wireless Mac Filter

    Advanced Configuration Chapter 3 Key 1-4 If you did not enter a Passphrase, enter the WEP key(s) manually. TX Key Select which TX (Transmit) Key to use. The default is 1. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes.
  • Page 20: Wireless > Advanced Wireless Settings

    Advanced Configuration Chapter 3 Advanced Wireless MAC Address Filter List Wireless Client List Click this to open the Wireless Client Authentication Type The default is set to Auto, which List screen. allows either Open System or Shared Key authentication to be used. With Open System authentication, the sender and the recipient do NOT use a WEP key for authentication.
  • Page 21: Security > Firewall

    Advanced Configuration Chapter 3 Security > Firewall ActiveX ActiveX is a programming language for websites. If you deny ActiveX, you run the risk of not having access to The Firewall screen is used to configure a firewall that can Internet sites created using this programming language. filter out various types of unwanted traffic on the Router’s Select this feature to enable ActiveX filtering.
  • Page 22 Advanced Configuration Chapter 3 Summary Status Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu, and select Enabled. To create a policy, follow steps 1-11. Repeat these steps to create additional policies, one at a time. Select a number from the Access Policy drop-down menu.
  • Page 23: Applications And Gaming > Single Port Forwarding

    Advanced Configuration Chapter 3 Decide which days and what times you want this policy to be enforced. Select the individual days during which the policy will be in effect, or select Everyday. Then enter a range of hours and minutes during which the policy will be in effect, or select 24 Hours.
  • Page 24: Applications & Gaming > Port Range Triggering

    Advanced Configuration Chapter 3 Applications & Gaming > Port Range that use Internet access to perform functions such as videoconferencing or online gaming. Some Internet Triggering applications may not require any forwarding.) When users send these types of requests to your network via The Port Range Triggering screen allows the Router to the Internet, the Router will forward those requests to the watch outgoing data for specific port numbers.
  • Page 25: Applications And Gaming > Qos

    Advanced Configuration Chapter 3 Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Applications and Gaming > QoS Quality of Service (QoS) ensures better service to high-priority types of network traffic, which may involve demanding, real-time applications, such as videoconferencing.
  • Page 26 Advanced Configuration Chapter 3 select Manual, and enter the appropriate number in the Game Select the appropriate game. If you select Add a field provided. New Game, follow the Add a New Game instructions. Priority Select the appropriate priority: High, Medium Category (Recommend), Normal, or Low.
  • Page 27: Administration > Management

    Advanced Configuration Chapter 3 Ethernet Port QoS > Ethernet Port Ethernet Select the appropriate Ethernet port. Priority Select the appropriate priority: High, Medium (Recommend), Normal, or Low. Click Add to save your changes. Your new entry will appear in the Summary list. Summary This lists the QoS entries you have created for your applications and devices.
  • Page 28: Administration > Log

    Advanced Configuration Chapter 3 Remote Access Multimedia Streaming Remote Management To permit remote access of the RTSP Support If you are experience issues with video- Router, from outside the local network, select Enabled. on-demand applications, select Enabled to improve Otherwise, keep the default, Disabled. multimedia transmissions.
  • Page 29: Administration > Diagnostics

    Advanced Configuration Chapter 3 Diagnostics View Log To view the logs, click View Log. Ping Test The Ping test checks the status of a connection. IP or URL Address Enter the address of the PC whose connection you wish to test. Packet Size Enter the packet size you want to use.
  • Page 30: Administration > Factory Defaults

    Advanced Configuration Chapter 3 Administration > Factory Defaults NOTE: Restoring factory defaults deletes custom settings. Note your custom settings before restoring the factory defaults. Factory Defaults Diagnostics > Traceroute Restore Router Factory Defaults To reset the Router settings to the default values, select Yes. Then click Save Detect Active LAN Client(s) Settings.
  • Page 31: Administration > Config Management

    Advanced Configuration Chapter 3 Administration > Username & Password Administration > Config Management NOTE: The Router may lose the settings you Backup Configuration have customized. Before you upgrade its firmware, use the Config Management screen Backup To save the Router’s settings in a configuration file, to back up the Router’s settings.
  • Page 32: Status > Local Network

    Advanced Configuration Chapter 3 Current Time The time set on the Router is displayed. End IP Address For the range of IP addresses used by devices on your local network, the ending IP address is Internet MAC Address The Router’s MAC address, as displayed.
  • Page 33: Access To The Voice Screens

    Advanced Configuration Chapter 3 Wireless Network 1-2 Status information for each wireless network is displayed. Wireless MAC Address The wireless MAC address of the Router’s local, wireless interface is displayed. Network Name (SSID) The network name, which is also called the SSID, is displayed. Security The wireless security method is displayed.
  • Page 34 Advanced Configuration Chapter 3 Elapsed Time The amount of time elapsed since the last Call 1/2 Encoder The codec used for encoding is reboot of the Router is displayed. displayed. RTP Packets Sent Call 1/2 Decoder The number of RTP packets sent by the The codec used for decoding is Router is displayed.
  • Page 35: Voice > System

    Advanced Configuration Chapter 3 Voice > System Call Forward Settings Enter the call forwarding numbers you want to use. The System screen displays the User Password setting. Cfwd All Dest Enter the number for the Call Forward All Service feature (when you want to forward all calls). Cfwd Busy Dest Enter the number for the Call Forward Busy feature (when the line is busy).
  • Page 36: Voice > Admin Login

    Advanced Configuration Chapter 3 Dist Ring Setting Select whether you want to use the Distinctive Ring feature, yes or no. The default is yes. Message Waiting Select whether you want to use the Message Waiting feature, yes or no. The default is no. Distinctive Ring Settings Ring1-8 Caller Enter the caller number pattern to play...
  • Page 37: Chapter 4: Interactive Voice Response Menu

    Interactive Voice Response Menu Chapter 4 Chapter 4: Action Command Choices Description Interactive Voice Use this command to enter the IVR Response Menu Menu. Ignore Special Information Tones (SITs) or other Overview Enter IVR tones until you **** Menu hear, “Configuration This chapter explains how to use the Interactive Voice menu.
  • Page 38: Appendix A: Troubleshooting

    Troubleshooting Appendix A Appendix A: When you are on an Internet phone call, words are dropped intermittently. Troubleshooting Follow these instructions until your problem is solved: If you are using the Router’s wireless function and • Your computer cannot connect to the Internet. a cordless phone, they may be using the same frequency and may interfere with each other.
  • Page 39 Troubleshooting Appendix A When you double-click the web browser, you are You cannot configure the settings for the second wireless prompted for a username and password. If you want to network because the SSID2 settings are grayed out. get rid of the prompt, follow these instructions. Your service provider may control the settings for the Launch the web browser and perform the following steps second wireless network (SSID2);...
  • Page 40: Appendix B: Specifications

    Please see the SPA ATA G.723.1 (6.3 kbps, 5.3 kbps) Administration Guide for details. The target configuration Call Forwarding: profile is uploaded to the WRP400 at the time of No Answer/Busy/Unconditional provisioning. Support for Two Simultaneous Calls Data Networking MAC Address (IEEE 802.3)
  • Page 41 Specifications Appendix B Physical Interfaces 4 100Base-T RJ-45 Ethernet Port Indicator Lights/ (IEEE 802.3) LEDs Power, Ethernet, Wireless, Phone 1, Phone 2, Internet, WPS 2 RJ-11 FXS Phone Ports - For Analog Circuit Telephone Device Documentation Quick Installation and User Guide are Downloaded from www.linksys.com USB 2.0 (reserved for future use via firmware upgrade)
  • Page 42: Appendix C: Warranty Information

    Warranty Information Appendix C Appendix C: service offerings. This limited warranty shall not apply to such third party software or service offerings. This limited Warranty Information warranty does not guarantee any continued availability of a third party’s service for which this product’s use or operation may require.
  • Page 43: Technical Support

    Warranty Information Appendix C of original purchase (if applicable) when returning your product. Products received without a RMA number and dated proof of original purchase (if applicable) will be rejected. Do not include any other items with the product you are returning. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge.
  • Page 44: Appendix D: Regulatory Information

    WRP400 should be no closer Reorient or relocate the receiving antenna • than 20 cm from the body during use.
  • Page 45: Avis D'industrie Canada

    Regulatory Information Appendix D Avis d’Industrie Canada Avis de non-responsabilité concernant les appareils sans fil Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. Les performances maximales pour les réseaux sans fil L’utilisation de ce dispositif est autorisée seulement aux sont tirées des spécifications de la norme IEEE 802.11.
  • Page 46: Declaration Of Conformity With Regard To Eu Directive 1999/5/Ec (R&Tte Directive)

    Regulatory Information Appendix D Declaration of Conformity with Regard to Dit apparaat voldoet aan de essentiele eisen Nederlands EU Directive 1999/5/EC (R&TTE Directive) en andere van toepassing zijnde bepalingen [Dutch]: van de Richtlijn 1999/5/EC. Compliance Information for 2,4-GHz and 5-GHz Wireless Dan l-apparat huwa konformi mal-ħtiġiet Products Relevant to the EU and Other Countries Following Malti...
  • Page 47: Ce Marking

    Regulatory Information Appendix D National Restrictions The following standards were applied during the assessment of the product against the requirements of the Directive 1999/5/EC: This product may be used in all EU countries (and other countries following the EU directive 1999/5/EC) without Radio: EN 300 328 and/or EN 301 893 as applicable •...
  • Page 48: Product Usage Restrictions

    Regulatory Information Appendix D Product Usage Restrictions France For 2,4 GHz, the product should not be used outdoors This product is designed for indoor usage only. Outdoor in the band 2454 - 2483,5 MHz. There are no restrictions usage is not recommended, unless otherwise noted. when used in other parts of the 2,4 GHz band when used 2,4 GHz Restrictions indoors.
  • Page 49: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    Regulatory Information Appendix D User Information for Consumer Products Ceština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno Waste Electric and Electronic Equipment s netříděným komunálním odpadem.
  • Page 50 Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 51 Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 52 Regulatory Information Appendix D Português (Portuguese) - Informação ambiental para Slovenčina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/EC prepoveduje odlaganje opreme, que exibe este símbolo no produto e/ou na sua embalagem označene s tem simbolom –...
  • Page 53: Appendix E: Software License Agreement

    CISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR USING THE PRODUCT CONTAINING This product from Cisco-Linksys LLC or from one of its THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco- THIS AGREEMENT.
  • Page 54 Software License Agreement Appendix E used in accordance with the terms of this Agreement; SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF (iii) to provide improvements to the way Linksys delivers THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILL technology to you and to other Linksys customers;...
  • Page 55 Software License Agreement Appendix E freedom to share and change free software–to make sure TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND the software is free for all its users. This General Public MODIFICATION License applies to most of the Free Software Foundation’s This License applies to any program or other work software and to any other program whose authors which contains a notice placed by the copyright...
  • Page 56 Software License Agreement Appendix E If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
  • Page 57 Software License Agreement Appendix E If, as a consequence of a court judgment or allegation not specify a version number of this License, you of patent infringement or for any other reason (not may choose any version ever published by the Free limited to patent issues), conditions are imposed on Software Foundation.
  • Page 58 Software License Agreement Appendix E This product includes software written by Tim Hudson EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, (tjh@cryptsoft.com). BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; In addition, if this Linksys product contains open OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND source software licensed under the OpenSSL license ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,...
  • Page 59 Software License Agreement Appendix E The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptographic related. If you include any Windows specific code (or a derivative thereof ) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@ cryptsoft.com)”...

Table of Contents