Cisco Systems RAN201 User Manual

USER GUIDE
Wireless-N Home ADSL2 + Modem Router
Models: RAN201
About This Guide
W
a
:
cates that there is
should
.
.
y
.
s
address because most current web
dd
h
.
l
y
y
l
t
t
.
A
t This Guide
Icon Descriptions
hile reading through the User Guide you may see
various icons that call attention to specific items. Below is
description of these icons
NOTE: This check mark indi
a note of interest and is something that you
pay special attention to while using the
roduct
WARNING: This exclamation point indicates
that there is a caution or warning of potential risk of bodily injury and/or it is something that
ould damage your property or product
WEB: This globe icon indicates a noteworth
website address or e-mail address
Copyright and Trademarks
inksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain
ther countries. Other brands and product names are trademarks or registered trademarks of their respective holders. Copyright © 2009 Cisco Systems, Inc. All rights reserved
nline Resource
ebsite addresses in this document are listed without
ttp:// in front of the rowsers do not require it. If you use an older web browser,
ou may have to a
Resource Website
inksys
nternational
work
ecurit
eb Technica
uppor
ttp://in front of the web address
ww.linksysbycisco.com/internationa
ww.linksysbycisco.com/securit
ww.linksysbycisco.com/suppor
i
Table of Contents
Chapter 1: Product Overview 1
Front Panel.................................................. 1
Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Placement Positions............................................ 2
Chapter 2: Wireless Security Checklist 3
General Network Security Guidelines ................................. 3
Additional Security Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Chapter 3: Advanced Conguration 4
How to Access the Utility......................................... 4
Using the Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
List of Screens in the Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Setup Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Wireless Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Storage Tab (WAG320N Only) ...................................... 5
Security Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Access Restrictions Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Applications & Gaming Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Administration Tab............................................. 6
Status Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Appendix A: Troubleshooting 8
Appendix B: Specications 9R
RAN201
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Appendix C: Regulatory Information 11
European Union . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
Australia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
New Zealand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
United States of America.........................................18
Canada . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
ii
Chapter 1
T
.
d)
Th
s
(
s.
each of the number
.
:
d
p
d
T
.
)
Th
ected to the
.
ess
ed. It flashes
k.
afu
ection.
.
.
l
ces.
b-
p
gpg
,
b.
ode
outer to a hard d
-
.
on
e
.
.
ff.
Product Overview
apter 1:
roduct Overview
hank you for choosing the Wireless ADSL2+ Modem Router. This device lets you access the Internet via a wireless connection or through one of its four switched
orts. You can also use it to share resources such as computers, printers and files. A variety of security features, such as WPA2
irewall and NAT technology, help to protect your data
nd your privacy while online. Configuration is easy using
the provided browser-based utility
Front Panel
Power
s continuously lit gn while the device i
or red (WAG160N v2 and WAG320N) if a POST
Power On Self Test) failure or device malfunction
Ethernet 1-4
Modem Router’s back panel, serve two purposes. If the LED is continuously lit, the Modem Router is successfully connected to a device through that
that port.
Wi-Fi Protected Setup™ Button
Green/Amber; WAG160N v2 and WAG320N Green) Press this button to have Wi-Fi Protecte
continuously lit green when a Wi-Fi Protecte
security, a Stateful Packet Inspection (SPI)
: Green/Amber; WAG160Nv2
nd WAG320N: Green/Re
owered on. The LED is lit amber
r
Green)These numbered LEDs,
ne for
ort. It flashes to indicate network activity over
NOTE: The Ethernet 1 LED is lit amber
en the WAN link is established on that
port
etu etup™-supported wireless device. The LED is
etup™ connection is successfully established. he LED blinks slowly while Wi-Fi Protected etup™ is setting up a connection, and is lit amber
AG320N) if an error occurs. The LED is off when i-Fi Protected Setup™ is idle
search for your Wi-Fi Protected
N20) or blinks rapidly (WAG160Nv2 and
e Power LED
ports on the
USB (WAG320N only)
lights up when a USB device is Modem Router through the USB port
Wireless
when the wirel when the Modem Router is actively sending or
eceiving data over the networ
DSL
here is lashes green while the Modem Router is
establishing the ADSL connection
Internet The Internet LED lights up
en and stays on when a connection is made
through the Internet port. It flashes to indicate
etwork activity over the Internet port. The LED
s lit red when an authentication error occurs
Back Pane
DSLThe DSL port connects to the ADSL line.
Ethernet 4, 3, 2, 1 The Ethernet ports (4, 3, 2, 1)
nd other Ethernet network devi
USB (WAG320N only) The USB port connects
he M
ased USB storage device
ResetThere are two ways to reset the Modem
Router’s factory defaults. Either press and hold the Reset button for approximately five seconds, or restore the defaults from the
Administrati
Modem Router’s web-based utility
PowerThe Power port is where you will connect
e power adapter
On/Off Button Press the On/Off button to turn
ower to the device on or o
Green
Green)The Wireless LED lights up
re is enabl
Green)The DSL LED lights up whenever
l DSL conn
t the Modem Router to wired computers
NOTE: The Ethernet 1 port can
lso be configured as the WAN port. To do this, access the We based utility (refer to
en select the Setup > Ethernet ta
m R
actory Defaults screen
e USB LED
nn
The LED
rive or flash
th
)
NOTE:
that makes it easy to configure your wireless network and its security settings.
Wi-Fi Protected Setup™ is a feature
1
Chapter 1
.
.
p
.
ace the wa
ots
de
Th
lly
T
.
T
.
T
.
The d
T
.
3
0
scale.
.
Product Overview
Placement Positions
ere are two ways to physica
irst way is to place the device horizontally on a surface.
he second way is to mount the device on a wall
he best place for the device is usually at the center of our wireless network, within range of all of your wireless
devices
Horizontal Placement
he device has four rubber feet on its bottom panel. Place
the device on a level surface near an electrical outlet
Wall-Mounting Placement
evice has two wall-mount slots on its bottom
anel. The distance between the slots is 152 mm
(6 inches).
wo screws are needed to mount the device
Suggested Mounting Hardware
install the device. The
mm ,
,5-
Follow these instructions:
Determine where you sure that the wall you use is smooth, flat, dry, and sturdy. Also make sure the location is within reach of
n electrical outlet.
Drill two holes int the wall. Make sure the holes are
52 mm (6 inches) apart
Insert a screw into each hole and leave 3 mm (0,12 inches) of its head exposed
Maneuver the device so the wall-mount slots line u with the two screws
Pl the device down until the screws fit snugly into the wall-mount slots.
ll-mount sl
ant to mount the device. Make
ver the screws and sli
ote: Mounting hardware illustrations are not
rue to
NOTE: Cisco is not responsible for damages
incurred by insecure wall-mounting hardware
152 mm
all Mounting Template
2
Chapter 2
t
uders than a traditiona
.
g
y
d
otected Access
A
/
.
A
/
A
/
A
s
.
.
s
T
.
g
f
Wireless Security Checklist
apter 2:
Wireless Security Checklis
ireless networks are convenient and easy to install, so
homes with high-speed Internet access are adopting them
t a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intr Like signals from your cellular or cordless phones, signals
rom your wireless network can also be intercepted. Since
ou cannot physically prevent someone from connecting to your wireless network, you need to take some additional steps to keep your network secure.
1. Change the default wireless network name or SSID
ireless devices have a default wireless network name or Service Set Identifier (SSID) set by the factory. This is the name of your wireless network, and can be up to 32 characters in length. Linksys by Cisco wireless products
inksys as the default wireless network name. You
should change the wireless network name to somethin
nique to distinguish your wireless network from other
wireless networks that may exist around you, but do not
se personal information (such as your Social Securit umber) because this information may be available for
nyone to see when browsing for wireless networks.
2. Change the default password
For wireless products such as access points, routers, an
odem routers, you will be asked for a password when you want to change their settings. These devices have a default password set by the factory. The default password
min. Hackers know these defaults and may try to
se them to access your wireless device and change your
etwork settings. To thwart any unauthorized changes, customize the device’s password so it will be hard to guess.
l wired network
4. Enable encryption
Encryption protects data transmitted over a wireless
work. Wi-Fi Pr
ired Equivalency Privacy (WEP) offer different levels of
security for wireless communication
network encrypted with WP
secure than a network encrypted with WEP, because
P
WPA2 uses dynamic key encryption. To protect the information as it passes over the airwaves, you should enable the highest level of encryption supported by your
etwork equipment.
EP is an older encryption standard and may be the only option available on some older devices that do not support WP
(WP
WPA2
WPA2 is more
and
General Network Security Guideline
ireless network security is useless if the underlying
etwork is not secure.
Password protect all computers on the network and
ndividually password protect sensitive files
Change passwords on a regular basis
Install anti-virus software and personal firewall software.
Disable file sharing (peer-to-peer). Some applications
ay open file sharing without your consent and/or
knowledge.
Additional Security Tip
Keep wireless routers, access points, or modem routers
way from exterior walls and windows.
urn wireless routers, access points, or modem routers off when they are not being used (at night, during vacations)
Use strong passphrases that are at least eight characters
n length. Combine letters and numbers to avoid usin
standard words that can be found in the dictionary.
3. Enable MAC address filtering
Linksys by Cisco routers and modem routers give you the ability to enable Media Access Control (MAC) address
iltering. The MAC address is a unique series of numbers
nd letters assigned to every networking device. With
MAC address filtering enabled, wireless network access
s provided solely for wireless devices with specific MAC
ddresses. For example, you can specify the MAC address of each computer in your home so that only those computers can access your wireless network.
WEB: For more in
isitwww.linksysbycisco.com/security
ormation on wireless security,
3
Chapter 3
.
efer to
ote
pp
.
y
Add
s
ter
y
.
T
.
Th
lly
)
b
p
t
g
ab
s
y
ess
ess
ter
s
ly)
r
n
r
b
ll
h
b
y
b
g
g
g
Z
S
ab
t
g
s
e
s
e
e
ab
ode
outer
k
eless Network
ection
Advanced Configuration
apter 3:
Advanced Configuration
ter you finish running the Setup Wizard on the Setup
CD-ROM, the device is ready for use. To change the device’s
dvanced settings, access the Configuration Utility via a web browser on a computer connected to the device
NOTE FOR USERS IN NEW ZEALAND: R
he N
setup instructions specific to your country
How to Access the Utilit
Launch the web browser on your computer, and enter the device’s default IP address,92.168.1.1 in the
ield. Then, press
login screen appears. Use the default user name and assword,
an the Setup Wizard. (You can set a new user name and
assword from the Administration tab’s
screen.) Click
in
n
min, unless you changed them when you
to continue.
for
res
anagement
List of Screens in the Utility
e screens are organized hierarchica
(Some screens may not apply to all models.
Setup Ta
etup > Basic Setu etup > Etherne etup > DDNS etup > MAC Address Clone etup > Advanced Routin
ireless T
ireless > Basic Wireless Setting ireless > Wireless Securit irel
> Wirel
ireless > Advanced Wireless Setting
Storage Tab (WAG320N On
torage > Disk Management torage > Shared Folde torage > Administratio torage > Media Serve
Security Ta
ecurity > Firewa ecurity > VPN Passthroug
MAC Fil
as listed below.
ogin
If you are unable to log in, press the Reset button on the
ack panel for at least 5 seconds, then wait for the device
to reset and try again.
Using the Utility
Immediately after login, the Basic Setup screen appears. Near the top of the screen is a bar with selectable tabs. Use these tabs to navigate within the Utility. The
indicate the Utility’s main configuration categories.
Each primary tab has one or more secondary tabs that
rovide access to the primary tab’s configuration screens
rimary Tabs
Access
Setup Wireless Storage Security
Basic Setup Ethernet DDNS MAC Address Clone Advanced Routing
Secondary Tabs
o access a screen, click the appropriate primary tab,
then click the appropriate secondary tab. The screen will
ppear, with its primary and secondary tabs highlighted
Restrictions
Navigation Tabs
Applications &
Gaming
Administration Status
rimar
Access Restrictions Ta
ccess Restrictions > Internet Access Polic
Applications & Gaming Ta
pplications & Gaming > Single Port Forwardin pplications & Gaming > Port Range Forwardin pplications & Gaming > Port Range Triggerin pplications & Gaming > DM pplications & Gaming > Qo
Administration T
ministration > Managemen ministration > Reportin
dministration > Diagnostic
ministration > Back Up & Restor dministration > Factory Default dministration > Firmware Upgrad
ministration > Languag
Status T
> M
tatus > Local Networ
> Wir > DSL Conn
m R
4
Loading...
+ 15 hidden pages