Cisco Linksys WRT310N User Manual

Cisco Linksys WRT310N User Manual

Wireless-n
Table of Contents

Advertisement

USER GUIDE
Wireless-N Gigabit Router
WRT310N
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Cisco Linksys WRT310N

  • Page 1 USER GUIDE Wireless-N Gigabit Router WRT310N Model:...
  • Page 2 Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks...
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview Front Panel..........4 Back Panel .
  • Page 4 Table of Contents Appendix D: Regulatory Information FCC Statement ..........34 FCC Radiation Exposure Statement .
  • Page 5: Chapter 1: Product Overview

    Product Overview Chapter 1 Chapter 1: Wireless (Blue) The Wireless LED lights up when the wireless feature is enabled. If the LED Product Overview is flashing, the Router is actively sending or receiving data over the network. Thank you for choosing the Linksys Wireless-N Gigabit Internet (Blue) The Internet LED lights up Router.
  • Page 6 Product Overview Chapter 1 Follow these instructions: Wall-Mounting Placement Determine where you want to mount the Router. Make The Router has two wall-mount slots on its bottom sure that the wall you use is smooth, flat, dry, and panel. The distance between the slots is 152 mm sturdy.
  • Page 7: Chapter 2: Wireless Security Checklist

    Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalency Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
  • Page 8: Chapter 3: Advanced Configuration

    Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you’d like to change its advanced settings, use the Router’s web-based utility. This chapter describes each web page of the utility and each page’s key functions.
  • Page 9 Advanced Configuration Chapter 3 before your Internet connection terminates. The default Static IP Max Idle Time is 15 minutes. If you are required to use a permanent IP address to Keep Alive: Redial Period If you select this option, connect to the Internet, select Static IP. the Router will periodically check your Internet connection.
  • Page 10 Advanced Configuration Chapter 3 inactivity, Connect on Demand enables the Router to Telstra Cable automatically re-establish your connection as soon as you Telstra Cable is a service that applies to connections in attempt to access the Internet again. To use this option, Australia only.
  • Page 11 Advanced Configuration Chapter 3 host and domain name. In most cases, leaving these fields DHCP Reservation blank will work. You will see a list of DHCP clients with the following MTU is the Maximum Transmission Unit. It specifies information: Client Name, Interface, IP Address, and the largest packet size permitted for Internet transmission.
  • Page 12: Setup > Ddns

    Advanced Configuration Chapter 3 Client Lease Time The Client Lease Time is the amount DynDNS.org of time a network user will be allowed connection to the Router with their current dynamic IP address. Enter the amount of time, in minutes, that the user will be “leased” this dynamic IP address.
  • Page 13: Setup > Mac Address Clone

    Advanced Configuration Chapter 3 Clone My PC’s MAC Click this button to clone the MAC TZO.com address of the computer you are using. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Setup > Advanced Routing This screen is used to set up the Router’s advanced functions.
  • Page 14: Wireless > Basic Wireless Settings

    Advanced Configuration Chapter 3 Route Entries To set up a static route between the Router select Wi-Fi Protected Setup. Proceed to the “Wi-Fi and another network, select a number from the drop- Protected Setup” section. down list. Click Delete This Entry to delete a static route. Basic Wireless Settings Enter Route Name Enter a name for the Route here,...
  • Page 15: Wireless > Wireless Security

    Advanced Configuration Chapter 3 Standard Channel If you selected Wide - 40MHz Channel NOTE: Wi-Fi Protected Setup configures one or Standard - 20MHz Channel for the Radio Band setting, client device at a time. Repeat the instructions then this setting will be available. Select the channel for for each client device that supports Wi-Fi Wireless-N, Wireless-G, and Wireless-B networking.
  • Page 16 Advanced Configuration Chapter 3 for Remote Authentication Dial-In User Service.) These Passphrase Enter a Passphrase of 8-63 characters. six are briefly discussed here. For detailed instructions Key Renewal Enter a Key Renewal period, which instructs on configuring wireless security for the Router, refer to the Router how often it should change the encryption keys.
  • Page 17: Wireless > Wireless Mac Filter

    Advanced Configuration Chapter 3 type of algorithm, AES or TKIP or AES. The default is TKIP Key 1-4 If you did not enter a Passphrase, enter the WEP or AES. key(s) manually. RADIUS Server Enter the IP Address of the RADIUS TX Key Select which TX (Transmit) Key to use.
  • Page 18: Wireless > Advanced Wireless Settings

    Advanced Configuration Chapter 3 Wireless Client List This screen shows computers and other devices on the wireless network. The list can be sorted by Client Name, Interface, IP Address, MAC Address, and Status. Select Save to MAC Address Filter List for any device you want to add to the MAC Address Filter List.
  • Page 19: Security > Firewall

    Advanced Configuration Chapter 3 With Shared Key authentication, the sender and recipient hear the beacons and awaken to receive the broadcast use a WEP key for authentication. Select Shared Key to and multicast messages. The default value is 1. only use Shared Key authentication. Fragmentation Threshold This value specifies the Basic Rate...
  • Page 20: Security > Vpn Passthrough

    Advanced Configuration Chapter 3 Deselect the feature to allow anonymous Internet Security > VPN Passthrough requests. The VPN Passthrough screen allows you to enable VPN Filter Multicast Multicasting allows multiple tunnels using IPSec, PPTP, or L2TP protocols to pass through transmissions to specific recipients at the same time.
  • Page 21 Advanced Configuration Chapter 3 Status Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu, and select Enabled. To create a policy, follow steps 1-11. Repeat these steps to create additional policies, one at a time. Select a number from the Access Policy drop-down menu.
  • Page 22: Applications And Gaming > Single Port Forwarding

    Advanced Configuration Chapter 3 You can filter access to various services accessed Single Port Forwarding over the Internet, such as FTP or telnet. (You Common applications are available for the first five can block up to three applications per policy.) entries.
  • Page 23: Applications & Gaming > Port Range Triggering

    Advanced Configuration Chapter 3 Applications and Gaming > Port Range Triggering Applications and Gaming > Port Range Forwarding Port Range Triggering Port Range Forwarding Application Name Enter the application name of the To forward a port, enter the information on each line for trigger.
  • Page 24: Applications And Gaming > Qos

    Advanced Configuration Chapter 3 information, click Refresh. To exit this screen and return to the DMZ screen, click Close. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Applications and Gaming > QoS Quality of Service (QoS) ensures better service to high-priority types of network traffic, which may involve demanding, real-time applications, such as videoconferencing.
  • Page 25 Advanced Configuration Chapter 3 Priority Select the appropriate priority: High, Medium Category (Recommend), Normal, or Low. There are four categories available. Select one of the Click Add to save your changes. Your new entry will appear following: Applications, Online Games, MAC Address, in the Summary list.
  • Page 26: Administration > Management

    Advanced Configuration Chapter 3 Summary Web Access This lists the QoS entries you have created for your Web Utility Access HTTP (HyperText Transport Protocol) applications and devices. is the communications protocol used to connect to servers on the World Wide Web. HTTPS uses SSL (Secured Socket Priority This column displays the bandwidth priority of Layer) to encrypt data transmitted for higher security.
  • Page 27: Administration > Log

    Advanced Configuration Chapter 3 UPnP If you want to use UPnP, keep the default setting, Enabled. Otherwise, select Disabled. Allow Users to Configure Keep the default, Enabled, if you want to be able to make manual changes to the Router while using the UPnP feature. Otherwise, select Disabled.
  • Page 28: Administration > Factory Defaults

    Advanced Configuration Chapter 3 Diagnostics Administration > Factory Defaults The Administration > Factory Defaults screen allows you Ping Test to restore the Router’s configuration to its factory default The Ping test checks the status of a connection. settings. IP or URL Address Enter the address of the PC whose connection you wish to test.
  • Page 29: Status > Router

    Advanced Configuration Chapter 3 Firmware Upgrade Status > Local Network Before upgrading the firmware, download the Router’s The Local Network screen displays information about the firmware upgrade file from the Linksys website, local, wired network. www.linksys.com. Then extract the file. Please select a file to upgrade the firmware Click Browse and select the extracted firmware upgrade file.
  • Page 30: Status > Wireless Network

    Advanced Configuration Chapter 3 DHCP Client Table The DHCP Client Table lists computers and other devices that have been assigned IP addresses by the Router. The list can be sorted by Client Name, Interface, IP Address, MAC Address, and Expired Time (how much time is left for the current IP address).
  • Page 31: Appendix A: Troubleshooting

    Troubleshooting Appendix A Appendix A: When you double-click the web browser, you are prompted for a username and password. If you want to get rid of the prompt, follow these instructions. Troubleshooting Launch the web browser and perform the following steps (these steps are specific to Internet Explorer but are similar Your computer cannot connect to the Internet.
  • Page 32: Appendix B: Specifications

    Specifications Appendix B Appendix B: Specifications Model WRT310N Standards Draft 802.11n, 802.11g, 802.11b, 802.3, 802.3u, 802.3ab Ports Power, Internet, and Ethernet Buttons Reset, Wi-Fi Protected Setup LEDs Ethernet (1-4), Wi-Fi Protected Setup, Wireless, Internet, Power Cabling Type CAT 5e Number of Antennas 3 Max.
  • Page 33: Appendix C: Warranty Information

    Warranty Information Appendix C Appendix C: service offerings. This limited warranty shall not apply to such third party software or service offerings. This limited warranty does not guarantee any continued availability Warranty Information of a third party’s service for which this product’s use or operation may require.
  • Page 34: Technical Support

    Warranty Information Appendix C rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
  • Page 35: Appendix D: Regulatory Information

    Regulatory Information Appendix D Appendix D: Safety Notices Regulatory Information Caution: To reduce the risk of fire, use only No.26 AWG or larger telecommunication line cord. Do not use this product near water, for example, in a FCC Statement wet basement or near a swimming pool. This device complies with Part 15 of the FCC Rules.
  • Page 36: Avis D'industrie Canada

    Regulatory Information Appendix D Avis d’Industrie Canada Avis de non-responsabilité concernant les appareils sans fil Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. Les performances maximales pour les réseaux sans fil L’utilisation de ce dispositif est autorisée seulement aux sont tirées des spécifications de la norme IEEE 802.11.
  • Page 37: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    Regulatory Information Appendix D Ceština (Czech) - Informace o ochraně životního User Information for Consumer Products prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno Waste Electric and Electronic Equipment s netříděným komunálním odpadem.
  • Page 38 Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 39 Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 40 Regulatory Information Appendix D Português (Portuguese) - Informação ambiental para Slovenčina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/EC prepoveduje odlaganje opreme, que exibe este símbolo no produto e/ou na sua embalagem označene s tem simbolom –...
  • Page 41: Appendix E: Software License Agreement

    CISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR USING THE PRODUCT CONTAINING This product from Cisco-Linksys LLC or from one of its THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco- THIS AGREEMENT.
  • Page 42 Software License Agreement Appendix E your Linksys product and/or the Software is being used in OR RELATED TO THE USE OF OR INABILITY TO USE THE accordance with the terms of this Agreement; (iii) to provide SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF improvements to the way Linksys delivers technology to THE POSSIBILITY OF SUCH DAMAGES.
  • Page 43 Software License Agreement Appendix E GNU General Public License is intended to guarantee your TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND freedom to share and change free software–to make sure MODIFICATION the software is free for all its users. This General Public This License applies to any program or other work License applies to most of the Free Software Foundation’s which contains a notice placed by the copyright...
  • Page 44 Software License Agreement Appendix E If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
  • Page 45 Software License Agreement Appendix E If, as a consequence of a court judgment or allegation not specify a version number of this License, you of patent infringement or for any other reason (not may choose any version ever published by the Free limited to patent issues), conditions are imposed on Software Foundation.
  • Page 46 Software License Agreement Appendix E To protect each distributor, we want to make it very clear GNU LESSER GENERAL PUBLIC LICENSE that there is no warranty for the free library. Also, if the Version 2.1, February 1999 library is modified by someone else and passed on, the recipients should know that what they have is not the Copyright (C) 1991, 1999 Free Software Foundation, Inc.
  • Page 47 Software License Agreement Appendix E freedom and the wherewithal to run that program using a You may copy and distribute verbatim copies of the modified version of the Library. Library’s complete source code as you receive it, in any medium, provided that you conspicuously and The precise terms and conditions for copying, distribution appropriately publish on each copy an appropriate and modification follow.
  • Page 48 Software License Agreement Appendix E Thus, it is not the intent of this section to claim When a “work that uses the Library” uses material from rights or contest your rights to work written entirely a header file that is part of the Library, the object code by you;...
  • Page 49 Software License Agreement Appendix E Use a suitable shared library mechanism for linking You may not copy, modify, sublicense, link with, or with the Library. A suitable mechanism is one that distribute the Library except as expressly provided (1) uses at run time a copy of the library already under this License.
  • Page 50 Software License Agreement Appendix E software distributed through that system in reliance BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, on consistent application of that system; it is up to THERE IS NO WARRANTY FOR THE LIBRARY, TO THE the author/donor to decide if he or she is willing to EXTENT PERMITTED BY APPLICABLE LAW.
  • Page 51 Software License Agreement Appendix E OpenSSL License Original SSLeay License Copyright © 1998-2007 The OpenSSL Project. All rights Copyright © 1995-1998 Eric Young (eay@cryptsoft.com)All reserved. rights reserved. Redistribution and use in source and binary forms, with This package is an SSL implementation written by Eric or without modification, are permitted provided that the Young (eay@cryptsoft.com).
  • Page 52 Software License Agreement Appendix E DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Table of Contents