LINKSYS WRT310NV2 User Manual

USER GUIDE
Wireless-N Gigabit Router
Model: WRT310N
About This Guide
Icon Descriptions
W
a
:
cates that there is
should
.
.
hy
ebsite address or e-mail address.
s
address because most current web
dd
h
.
m
l
y
y
y
y
d
hile reading through the User Guide you may see
various icons that call attention to specific items. Below is
description of these icons
NOTE: This check mark indi
a note of interest and is something that you
pay special attention to while using the
roduct
WARNING: This exclamation point indicates
that there is a caution or warning and it is
omething that could damage your property or
product
About This Guide
WEB: This globe icon indicates a notewort
w
nline Resource
ebsite addresses in this document are listed without ttp:// in front of the rowsers do not require it. If you use an older web browser,
ou may have to a
Resource Website
inksys www.linksys.co
inksys Internationalwww.linksys.com/internationa
Glossar
etwork Securit
ttp://in front of the web address
www.linksys.com/glossar
www.linksys.com/securit
Copyright and Trademarks
inksys is a registered trademark
r trademark of Cisco Systems, Inc.
and/or its affiliates in the U.S. and
ertain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registere trademarks of their respective holders.
Wireless-N Gigabit Router
i
Table of Contents
Chapter 1: Product Overview 4
Front Panel..................................................4
Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Placement Positions............................................ 4
Chapter 2: Wireless Security Checklist 6
General Network Security Guidelines .................................6
Additional Security Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Chapter 3: Advanced Conguration 7
Setup > Basic Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Setup > DDNS................................................11
Setup > MAC Address Clone.......................................12
Setup > Advanced Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
Wireless > Basic Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
Wireless > Wireless Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
Wireless > Wireless MAC Filter......................................16
Wireless > Advanced Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
Security > Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
Security > VPN Passthrough.......................................19
Access Restrictions > Internet Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Applications and Gaming > Single Port Forwarding........................21
Applications and Gaming > Port Range Forwarding . . . . . . . . . . . . . . . . . . . . . . .21
Applications & Gaming > Port Range Triggering . . . . . . . . . . . . . . . . . . . . . . . . . .22
Applications and Gaming > DMZ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
Applications and Gaming > QoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
Administration > Management.....................................25
Administration > Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26
Administration > Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26
Administration > Factory Defaults ...................................27
Administration > Firmware Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
Status > Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
Status > Local Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
Status > Wireless Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29
Wireless-N Gigabit Router
Appendix A: Troubleshooting 30
Appendix B: Specications 31
Appendix C: Warranty Information 32
Limited Warranty..............................................32
Exclusions and Limitations........................................32
Obtaining Warranty Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
ii
Table of Contents
Appendix D: Regulatory Information 34
FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34
FCC Radiation Exposure Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34
Safety Notices................................................34
Industry Canada Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34
Avis d’Industrie Canada..........................................35
Wireless Disclaimer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35
Avis de non-responsabilité concernant les appareils sans l . . . . . . . . . . . . . . . . . .35
User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste
Electric and Electronic Equipment (WEEE) ..............................36
Appendix E: Software License Agreement 40
Software in Linksys Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40
Software Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40
Wireless-N Gigabit Router
iii
Chapter 1
T
h
.
.
lly
T
)
t
ed.
o
i
i
.
)
Th
ess feature is enabled. If the
k.
.
ll
dly lit.
l
n
y
.
Th
lly
Th
ll.
T
outer on a level surface near an electrical outlet.
Product Overview
apter 1:
roduct Overview
hank you for choosing the Linksys Wireless-N Gigabit Router. The Router lets you access the Internet via a wireless connection or through one of its four switched
orts. You can also use the Router to share resources, suc
s computers. A variety of security features help to protect your data and your privacy while online. Security features
nclude WPA2 security, a Stateful Packet Inspection (SPI)
irewall and NAT technology. Configuring the Router is
easy using the provided browser-based utility
Front Panel
1, 2, 3, 4
corresponding with the numbered ports on the Router’s back panel, serve two purposes. The LED is solidly lit when the Router is connected to a device through that port. It flashes to
ndicates network activity. Green indicates Gigabit speeds, and blue indicates 10/100 speeds
Wi-Fi Protected Setup Button
client devices, such as wireless adapters, that support Wi-Fi Protected Setup, then you can
se Wi-Fi Protected Setup to automatica
configure wireless security for your wireless
etwork(s).
o use Wi-Fi Protected Setup, run the Setup
izard, or refer to the “Wireless > Basic Wireless
ettings” section of “Chapter 3: Advanced
Configuration”.
Wi-Fi Protected Setup LED (Blue/Amber
ights up blue when wireless security is
nabl
inutes during Wi-Fi Protected Setup.
Green/Blue)These numbered LEDs,
you have
I
The LED flashes blue for tw
Wireless
when the wirel
s flashing, the Router is actively sending or
eceiving data over the networ
Internet
when there is a connection made through the Internet port. A flashing LED indicates network
ctivity over the Internet port
Power (Blue)The Power LED lights up and will
stay on while the Router is powered on. When the Router goes through its self-diagnostic
ode during every boot-up, this LED will flash.
en the diagnostic is complete, the LED wi
e soli
Blue
Blue)The Internet LED lights up
e Wireless LED lights up
LED
Back Pane
InternetThis Gigabit port is where you will
connect your cable or DSL Internet connection.
1, 2, 3, 4These Gigabit ports (1, 2, 3, 4) connect
the Router to computers and other Ethernet
etwork devices on your wired network.
ResetThere are two ways to reset the Router’s
actory defaults. Either press and hold the Reset Button for approximately five seconds, or restore the defaults from Administratio Defaults in the Router’s web-based utility.
Power The Power port is where you will
connect the power adapter
actor
Placement Positions
ere are two ways to physica
irst way is to place the Router horizontally on a surface.
e second way is to mount the Router on a wa
Horizontal Placement
install the Router. The
The LED lights up amber if there is an error during the W sure the client device supports WiFi Protected
etup. Wait until the LED is off, and then try again.
The LED flashes amber when a W
etup session is active, and a second session
egins. The Router supports one session at a
time. Wait until the LED is off before starting the
ext Wi-Fi Protected Setup session
Wireless-N Gigabit Router
Fi Protected Setup process. Make
he Router has four rubber feet on its bottom panel. Place
he R
i Protected
4
Chapter 1
The Route
ots o
botto
Two screws are needed to mount the Router.
3
0
m
ollow these
uctions:
ectrical outlet.
h
.
eac
.
s.
ots.
long the d
g.
Product Overview
Wall-Mounting Placement
r has two wall-mount sl
anel. The distance between the slots is 152 mm
6 inches).
Suggested Mounting Hardware
-5 mm
ote: Mounting hardware illustrations are not
true to scale.
NOTE:
-1.5 mm
inksys is not responsible for damages
incurred by insecure wall-mounting hardware.
m .
.5-
n its
m
F
instr
Determine where you want to mount the Router. Make
ure that the wall you use is smooth, flat, dry, and turdy. Also make sure the location is within reach of
n el
Drill two holes into the wall. Make sure the holes are
.
152 mm (6 inc Insert a screw into
es) apart
h hole and leave 3 mm
0.12 inches) of its head exposed
Maneuver the Router so the wall-mount slots line up
ith the two screw
Place the wall-mount slots over the screws and slide5.
he Router down until the screws fit snugly into the
ll-mount sl
Print this page at 100% size.
Cut a
Wireless-N Gigabit Router
152 mm
otted line, and place on the wall to drill precise spacin
all Mounting Template
5
Chapter 2
t
uders than a traditiona
.
g
n
.
y
.
s
.
.
f
s
.
T
.
g
o
ess
y
Wireless Security Checklist
apter 2:
Wireless Security Checklis
ireless networks are convenient and easy to install, so
homes with high-speed Internet access are adopting them
t a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intr Like signals from your cellular or cordless phones, signals
rom your wireless network can also be intercepted. Since you cannot physically prevent someone from connecting to your wireless network, you need to take some additional steps to keep your network secure.
1. Change the default wireless network name or SSID
ireless devices have a default wireless network name
or Service Set Identifier (SSID) set by the factory. This
s the name of your wireless network, and can be up
to 32 characters in length. Linksys wireless products
inksys as the default wireless network name. You
should change the wireless network name to somethin
nique to distinguish your wireless network from other
wireless networks that may exist around you, but do not
se personal information (such as your Social Security umber) because this information may be available for
nyone to see when browsing for wireless networks.
2. Change the default password
For wireless products such as access points and routers, you will be asked for a password when you want to change their settings. These devices have a default password set
the factory. The Linksys default password is admi Hackers know these defaults and may try to use them to access your wireless device and change your network settings. To thwart any unauthorized changes, customize the device’s password so it will be hard to guess
l wired network
4. Enable encryption
Encryption protects data transmitted over a wireless
etwork. Wi-Fi Protected Access (WPA/WPA2) and Wired
Equivalency Privacy (WEP) offer different levels of security
or wireless communication
network encrypted with WPA/WPA2 is more secure
than a network encrypted with WEP, because WPA/WPA2
ses dynamic key encryption. To protect the information
s it passes over the airwaves, you should enable the highest level of encryption supported by your network equipment.
EP is an older encryption standard and may be the only option available on some older devices that do not support WPA.
General Network Security Guideline
ireless network security is useless if the underlying
etwork is not secure.
Password protect all computers on the network and
ndividually password protect sensitive files
Change passwords on a regular basis
Install anti-virus software and personal firewall software.
Disable
knowledge.
ile sharing (peer-to-peer). Some applications
ay open file sharing without your consent and/or
Additional Security Tip
Keep wireless routers, access points, or gateways away
rom exterior walls and windows
urn wireless routers, access points, or gateways off when they are not being used (at night, during vacations)
Use strong passphrases that are at least eight characters
n length. Combine letters and numbers to avoid usin
standard words that can be found in the dictionary.
3. Enable MAC address filtering
WEB: F
Linksys routers give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a
nique series of numbers and letters assigned to ever
etworking device. With MAC address filtering enabled, wireless network access is provided solely for wireless devices with specific MAC addresses. For example, you can specify the MAC address of each computer in your home so that only those computers can access your wireless
etwork.
Wireless-N Gigabit Router
ecurity, visit www.linksys.com/securit
r more information on wirel
6
Chapter 3
h
.
T
ll
.
y.
y
T
68.1.1
ess
f
screen.) Click
t
ue.
p
T
p
p
T
.
e
:
P
E
Tel
ble
P
lly
)
P
apter 3:
dvanced Configuration
ter setting up the Router with the Setup Wizard (located
on the CD-ROM), the Router will be ready for use. However,
f you’d like to change its advanced settings, use the Router’s web-based utility. This chapter describes eac web page of the utility and each page’s key functions. You can access the utility via a web browser on a computer connected to the Router
he web-based utility has these main tabs: Setup,
ireless, Security, Access Restrictions, Applications &
Gaming, Administration, and Status. Additional tabs wi
e available after you click one of the main tabs
NOTE: When first installing the Router, you
should use the Setup Wizard on the Setup CD-ROM. If you want to configure advanced settings, use this chapter to learn about the web-based utilit
Advanced Configuration
etup > Basic Setu
How to Access the Web-Based Utilit
o access the web-based utility, launch the web browser on our computer, and enter the Router’s default IP address,
192.1
login screen will appear. (Non-Windows XP users will
see a similar screen.) Leave the
irst time you open the Web-based utility, use the default
assword
ministration tab’s
ntin
in the Addr
min (You can set a new password from the
ield. Then, press
ser name field blank. The
ogin Screen
nter
Internet Setu
he Internet Setup section configures the Router to your Internet connection. Most of this information can be obtained through your ISP
nternet Connection Typ
elect the type of Internet connection your ISP provides
rom the drop-down menu. These are the available types
utomatic Configuration - DHC
o
tatic IP
PPPo
stra Ca
Automatic Configuration - DHC
By default, the Router’s Internet Connection Type is set
utomatic Configuration - DHCP, which should be
kept only if your ISP supports DHCP or you are connecting through a dynamic IP address. (This option usua to cable connections.
applies
Wireless-N Gigabit Router
etup > Basic Setu
he first screen that appears is the
ows you to change the Router’s general settings.
asic Setup screen. This
nternet Connection Type > Automatic Configuration - DHC
7
Chapter 3
P
P
P
.
ll
k.
.
h
E
E
d
.
lly
.
d
field,
ection.
default Redia
s
P
ly.
P
ess
lly
ess
g:
Th
.
.
address of the ISP server.
.
address of the
.
d
.
Advanced Configuration
tatic I
If you are required to use a permanent IP address to connect to the Internet, select Static I
nternet Connection Type > Static I
Internet IP Address This is the Router’s IP address, when
seen from the Internet. Your ISP will provide you with the IP Address you need to specify here
Subnet Mask This is the Router’s Subnet Mask, as seen
users on the Internet (including your ISP). Your ISP wi
rovide you with the Subnet Mas
Default Gateway Your ISP will provide you with the IP
ddress of the ISP server
DNS 1-3
(Domain Name System) server IP address.
our ISP will provide you with at least one DNS
efore your Internet connection terminates. The default
Max Idle Time is 15 minutes
Keep Alive: Redial Period
you select this option,
he Router will periodically check your Internet
connection. If you are disconnected, then the Router
ill automatically re-establish your connection. To use
his option, select
eep Alive. In the Redial Perio
ou specify how often you want the Router to check
he Internet conn
The
l Period i
seconds.
T
Point-to-Point Tunneling Protocol (PPTP) is a service that
pplies to connections in Europe on
PPPoE
ome DSL-based ISPs use PPPoE (Point-to-Point Protocol over Ethernet) to establish Internet connections. If you are connected to the Internet through a DSL line, check wit your ISP to see if they use PPPoE. If they do, you will have to enable
Username and Password
Password provided by your ISP
Service Name If provided by your ISP, enter the Service
ame.
Connect on Demand: Max Idle Time You can configure
the Router to cut the Internet connection after it has been
nactive for a specified period of time (Max Idle Time). If
your Internet connection has been terminated due to
nactivity, Connect on Demand enables the Router to
utomatica
ttempt to access the Internet again. To use this option, select enter the number of minutes you want to have elapsed
PPo
Internet Connection Type > PPPo
nter the Username an
re-establish your connection as soon as you
onnect on Demand. In the
ax Idle Timefield,
Internet Connection Type > PPT
If your ISP supports DHCP or you are connecting through
dynamic IP address, then select
utomatica
. If you are required to use a permanent IP
in an IP Addr
ress to connect to the Internet, then select Specify an
IP Addr
Specify an IP Address
Then configure the followin
is is the Router’s IP address,
s seen from the Internet. Your ISP will provide you
ith the IP Address you need to specify here
Subnet Mask
This is the Router’s Subnet Mask, as
seen by users on the Internet (including your ISP). Your
SP will provide you with the Subnet Mask
Default Gateway
our ISP will provide you with the
P
DNS 1-3
Your ISP will provide you with at least one
DNS (Domain Name System) server IP address
PPTP Server IP Address
he IP
PPTP server
Username and Password
our ISP will provide you with
nter the Username an
Password provided by your ISP
Connect on Demand: Max Idle Time You can configure
he Router to cut the Internet connection after it has been
nactive for a specified period of time (Max Idle Time). If
our Internet connection has been terminated due to
Wireless-N Gigabit Router
8
Chapter 3
lly
5
.
od
field, you specify how often
.
ly.
.
d
.
lly
.
lly
od
field,
ection.
default Redia
s
seconds.
able
T
.
.
d
.
lly
.
lly
od
field,
ection.
default Redia
s
seconds.
s
y
.
s
Advanced Configuration
nactivity, Connect on Demand enables the Router to
utomatica
ttempt to access the Internet again. To use this option, select enter the number of minutes you want to have elapsed
efore your Internet connection terminates. The default
Max Idle Time is 1
Keep Alive: Redial Period
Router will periodically check your Internet connection. If
ou are disconnected, then the Router will automatically
e-establish your connection. To use this option, select
Keep Alive In the
ou want the Router to check the Internet connection. The
default value is 30seconds
L2TP is a service that applies to connections in Israel on
Server IP Address This is the IP address of the L2TP
erver. Your ISP will provide you with the IP Address you
eed to specify here
Username and Password
Password provided by your ISP
Connect on Demand: Max Idle Time You can configure
the Router to cut the Internet connection after it has been
nactive for a specified period of time (Max Idle Time). If
your Internet connection has been terminated due to
nactivity, Connect on Demand enables the Router to
utomatica
ttempt to access the Internet again. To use this option, select enter the number of minutes you want to have elapsed
efore your Internet connection terminates. The default
Max Idle Time is 15 minutes
re-establish your connection as soon as you
onnect on Demand. In the
minutes
you select this option, the
ial Peri
Internet Connection Type > L2TP
nter the Username an
re-establish your connection as soon as you
onnect on Demand. In the
ax Idle Timefield,
ax Idle Timefield,
elstra C
elstra Cable is a service that applies to connections in
ustralia only
nternet Connection Type > Telstra Cable
Server IP Address This is the IP address of the Heartbeat
erver. Your ISP will provide you with the IP Address you eed to specify here
Username and Password
Password provided by your ISP
Connect on Demand: Max Idle Time You can configure
the Router to cut the Internet connection after it has been
nactive for a specified period of time (Max Idle Time). If
your Internet connection has been terminated due to
nactivity, Connect on Demand enables the Router to
utomatica
ttempt to access the Internet again. To use this option, select enter the number of minutes you want to have elapsed
efore your Internet connection terminates. The default
Max Idle Time is 15 minutes
Keep Alive: Redial Period
he Router will periodically check your Internet
connection. If you are disconnected, then the Router
ill automatica
his option, select
ou specify how often you want the Router to check
he Internet conn
re-establish your connection as soon as you
onnect on Demand. In the
re-establish your connection. To use
eep Alive In theRedial Peri
nter the Username an
ax Idle Timefield,
you select this option,
The
l Period i
Optional Setting
ome of these settings may be required by your ISP. Verif with your ISP before making any changes
Keep Alive: Redial Period
he Router will periodically check your Internet
connection. If you are disconnected, then the Router
ill automatica
his option, select
ou specify how often you want the Router to check
he Internet conn
Wireless-N Gigabit Router
you select this option,
re-establish your connection. To use
eep Alive In theRedial Peri
The
l Period i
Optional Setting
Host Name and Domain Name These fields allow you to
supply a host and domain name for the Router. Some ISPs,
sually cable ISPs, require these names as identification. You may have to check with your ISP to see if your
roadband Internet service has been configured with a
9
Chapter 3
ected
U
field, this option
:
92
0
Th
.
P
Th
.
oute
g
T
g
.
g
eservatio
e
ect
eserve a client’s
address.
address
e
ess
d
oca
addresses
e
esh
s
ose
68.1.100
addresses.
Advanced Configuration
host and domain name. In most cases, leaving these fields
ank will work.
MTU MTU is the Maximum Transmission Unit. It specifies
the largest packet size permitted for Internet transmission.
elect Manual if you want to manually enter the largest
acket size that is transmitted. To have the Router select the best MTU for your Internet connection, keep the default setting, Auto
Size
default size depends on the Internet Connection Type
s
hen Manual is sel
s enabled. Leave this value in the 1200 to 1500 range. The
DHCP, Static IP, or Telstra:
14
oE:
PPTP or L2TP:
146
in theMT
Network Setup
e Network Setup section changes the settings on the
etwork connected to the Router’s Ethernet ports. Wireless setup is performed through the Wireless tab
outer I
is presents both the Router’s IP Address and Subnet
Mask as seen by your network
DHCP Reservation
You will see a list of DHCP clients with the followin
nformation: Client Name, Interface, IP Address, and
MAC Address.
DHCP R
Select Clients from DHCP Table
heck box to r
Clients
n
IP
lick th
Then click
l
R
r IP
HCP Server Settin
he settings allow you to configure the Router’s Dynamic Host Configuration Protocol (DHCP) server function. The Router can be used as a DHCP server for your network. A DHCP server automatically assigns an IP address to each computer on your network. If you choose to enable the Router’s DHCP server option, make sure there is no other DHCP server on your network.
DHCP Server Settin
DHCP Server
ready have a DHCP server on your network, or you don’t
want a DHCP server, then select
eatures will be available)
DHCP Reservation Click this button if you want to assign
fixed local IP address to a MAC address.
Wireless-N Gigabit Router
HCP is enabled by factory default. If you
isabled (no other DHCP
Manually Adding Client
ddress, enter the client’s name in the Enter Client
ame field. Enter the IP address you want it to have in
heAssign IP Address field. Enter its MAC
To This MAC Addr
field. Then click
To manually assign an IP
in th
Clients Already Reserve
list of DHCP clients and their fixed l will be displayed at the bottom of the screen. If you want to remove a client from this list, click
lick Save Settingsto apply your changes, or click
ancel Changes to cancel your changes. To view the
ost up-to-date information, click
screen, click
Start IP Address
rt with when issuing IP addresses. Because the Router’s
efault IP address is 192.168.1.1, the Start IP Address must
e 192.168.1.2 or greater, but smaller than 192.168.1.253.
The default Starting IP Address is
Maximum Number of Users
umber of PCs that you want the DHCP server to assign
P addresses to. This number cannot be greater than 253.
The default is
IP Address Range
P
l
nter a value for the DHCP server to
92.1
nter the maximum
isplayed here is the range of available
l IP
r
mov
To exit thi
10
Chapter 3
.
ates doma
ebsite names
)
.
S
T
f
sabled
S
ect
m
The features available on the
g
S
.
.
ectio
c
sabled
sabled
x
T
sabled
.
status of the
ectio
s
.
.
Advanced Configuration
Client Lease TimeThe Client Lease Time is the amount
of time a network user will be allowed connection to the Router with their current dynamic IP address. Enter the
mount of time, in minutes, that the user will be “leased”
this dynamic IP address. After the time is up, the user will
e automatically assigned a new dynamic IP address. The
default is
Static DNS 1-3
he Internet transl nternet addresses or URLs. Your ISP will provide you with at east one DNS Server IP Address. If you wish to use another,
nter that IP Address in one of these fields. You can enter up o three DNS Server IP Addresses here. The Router will use hese for quicker access to functioning DNS servers
WINS The Windows Internet Naming Service (WINS)
anages each PC’s interaction with the Internet. If you
se a WINS server, enter that server’s IP Address here.
therwise, leave this blank.
minutes, which means one day
The Domain Name System (DNS) is how
in or w
into
Time Setting
Time Zone
unctions from this drop-down menu. (You can even
utomatically adjust for daylight saving time.
elect the time zone in which your network
DynDNS.or
Setup > DDNS > DynDN
Username Enter the Username for your DDNS account
Password Enter the Password for your DDNS account
Host NameThe is the DDNS URL assigned by the DDNS
service.
System
elect the DynDNS service you use:
ic, or
m
The default sel
namic
n isynami
Time Setting
lick
ave Settingsto apply your changes, or click
angesto cancel your changes
ncel
etup > DDN
he Router offers a Dynamic Domain Name System (DDNS)
eature. DDNS lets you assign a fixed host and domain
ame to a dynamic Internet IP address. It is useful when you are hosting your own website, FTP server, or other server behind the Router.
Be
ore you can use this feature, you need to sign
for DDNS service with a DDNS service provider,
www.dyndns.org or www.TZO.com. If you do not want to
se this feature, keep the default setting,
DDN
DNS Service
If your DDNS service is provided by DynDNS.org, then
l
ynDNS.org from the drop-down menu. If your
DDNS service is provided by TZO, then select TZO.co
DDNS screen will vary,
depending on which DDNS service provider you use.
i
Mail Exchange (Optional)
exchange server, so e-mails to your DynDNS address go to your mail server.
Backup MX This feature allows the mail exchange server
to be a backup. To disable this feature, keep the default,
Di
re not sure which setting to select, keep the default,
Di
Wildcard This setting enables or disables wildcards
or your host. For example, if your DDNS address is
myplace.dyndns.org and you enable wildcards, then
.myplace.dyndns.orgwill work as well (x is the wildcard).
o disable wildcards, keep the default, wildcards, select Enabled If you are not sure which setting to select, keep the default, Di
Internet IP Address The Router’s Internet IP address is
isplayed here. Because it is dynamic, it will change
Status The
isplayed here.
UpdateTo manually trigger an update, click this button
lick
To enable the feature, select Enabled If you
ave Settingsto apply your changes, or click
angesto cancel your changes
nter the address of your mail
isabled. To enable
DDNS service conn
n i
ncel
Wireless-N Gigabit Router
11
Chapter 3
m
f
.
outer’s
address is
.
T
.
l
.
.
e
d,
ect
ed
.
button to clone the
C
.
l
.
g
Th
d
lly ad
.
g
d
ed.
)
lly ad
Th
d
.
Advanced Configuration
ZO.co
Setup > DDNS > TZO
E-mail Address, TZO Key, and Domain Name Enter the
settings o
Internet IP Address The R
displayed here. Because it is dynamic, it will change
Status The status of the DDNS service connection is
displayed here.
Update
the account you set up with TZO
Internet IP
o manually trigger an update, click this button
Clone My PC’s MAC
ddress of the computer you are using
Clickave Settingsto apply your changes, or click Cance
angesto cancel your changes
ick this
MA
etup > Advanced Routin
is screen is used to set up the Router’s advance
unctions. Operating Mode allows you to select the
type(s) of advanced functions you use. Dynamic Routing
utomatica
tatic Routing sets up a fixed route to another network
ination
justs how packets travel on your network.
Clickave Settingsto apply your changes, or click
hangesto cancel your changes
ance
etup > MAC Address Clone
MAC address is a 12-digit code assigned to a unique
iece of hardware for identification. Some ISPs will require you to register a MAC address in order to access the Internet. If you do not wish to re-register the MAC address with your ISP, you may assign the MAC address you have currently registered with your ISP to the Router with the MAC Address Clone feature
etup > MAC Address Clone
MAC Address Clon
Enabled/Disabled To have the MAC Address clone
l
Enabl
MAC Address
our ISP here
nter the MAC Address registered with
etup > Advanced Routing
Advanced Routin
Enabled/Disabled
connection to the Internet, keep the default,
nother router exists on your network, select Disable
en the NAT setting is disabled, dynamic routing will be
nabl
namic Routing (RIP
Enabled/Disabled This feature enables the Router to
utomatica
layout and exchange routing tables with the other router(s).
e Router determines the network packets’ route base on the fewest number of hops between the source and the destination. When the NAT setting is enabled, the Dynamic Routing feature is automatically disabled. When the NAT setting is disabled, this feature is available. Select
Enabledto use the Dynamic Routing feature
tatic Routing
static route is a pre-determined pathway that network
nformation must travel to reach a specific host or network. Enter the information described below to set up a new static route.
this Router is hosting your network’s
nabled If
just to physical changes in the network’s
Wireless-N Gigabit Router
12
Chapter 3
-
st. Clic
ete a static route.
.
estinatio
address
.
Subnet
dete
.
)
.
esh
ose
t
.
.
T
.
T
.
.
ual
oceed to the
c
p
.
gs
ect
d
the network name
case-sensitive and
ust not exceed
.
ess
d
.
o
Advanced Configuration
Route EntriesTo set up a static route between the Router
nd another network, select a number from the drop
wn li
Enter Route Name Enter a name for the Route here,
sing a maximum of 25 alphanumeric characters
Destination LAN IPThe D
of the remote network or host to which you want to assign
static route
Subnet Mask The
ortion of a Destination LAN IP address is the network ortion, and which portion is the host portion.
Gateway This is the IP address of the gateway device that
llows for contact between the Router and the remote
etwork or host
Interface This interface tells you whether the Destination
IP Address is on the LAN & Wireless (Ethernet and wireless
etworks) or the
lick
have already set up
k Delete This Entry to del
n LAN IP is the
Mask
Internet
how Routing Table to view the static routes you
rmines which
select Wi-Fi Protected Setu Protected Setup” section
. Proceed to the “Wi-Fi
Basic Wireless Settin
ireless > Basic Wireless Settings (Manual Setup)
Network Mode
select the wireless standards running on your network. If you have Wireless-N, Wireless-G, and Wireless-B devices in
our network, keep the default setting, Mixed If you have
only Wireless-G and Wireless-B devices in your network,
l
BG-Mixed. If you have only Wireless-N devices, select Wireless-N Only If you have only Wireless-G devices, select B devices, select wireless devices in your network, select
rom this drop-down menu, you can
ireless-G Only. If you have only Wireless-
ireless-B Only
If you do not have any
isable
dvanced Routing > Routing Table
Routing Table
For each route, the Destination LAN IP address, Subnet Mask, Gateway, and Interface are displayed. Click
Refr
this screen
lick
hangesto cancel your changes
to update the information. Click
ave Settingsto apply your changes, or click
l
to exi
ncel
Wireless > Basic Wireless Settings
he basic settings for wireless networking are set on this
reen
here are two ways to configure the Router’s wireless
etwork(s), manual and Wi-Fi Protected Setup
i-Fi Protected Setup is a feature that makes it easy to set
p your wireless network. If you have client devices, such
s wireless adapters, that support Wi-Fi Protected Setup,
then you can use Wi-Fi Protected Setup
Wireless ConfigurationTo manually configure your
wireless network, select
ireless Settings” section. To use Wi-Fi Protected Setup,
n
Pr
“Basi
Network Name (SSID) The SSID is
shared among all points in a wireless network. The
SID must be identical for all devices in the wireless
work. It is
2 characters (use any of the characters on the keyboard). Make sure this setting is the same for all points in your wireless network. For added security, you should change the default SSID (inksys) to a unique name
Radio Band
ireless-N, Wireless-G and Wireless-B devices, keep the
default,
ireless-B networking only, select Standard - 20MHz
nnel If you are not sure which radio band to select,
keep the default,
Wide Channel
e Radio Band setting, then this setting will be available or your primary Wireless-N channel. Select any channel rom the drop-down menu. If you are not sure which
hannel to select, keep the default,
or best performance in a network using
ide - 40MHz Channel
NOTE: If you select Wide - 40MHz Channel for
the Radio Band setting, then Wireless-N can use two channels: a primary one (Wide Channel) and a secondary one (Standard Channel). This will enhance Wireless-N performance
you selected Wide - 40MHz Channel for
m
For Wirel
ut
-G an
Wireless-N Gigabit Router
13
Chapter 3
.
l
l
.
p
There are three methods available. Use the method that
.
.
.
he
ce.
p
b
reen.
.
2
.
the
the
.
r
tation for furthe
uctions.
)
.
.
Th
.
.
y
T
screen configures the security of
y
Advanced Configuration
Standard Channel
or Standard - 20MHz Channel for the Radio Band setting, then this setting will be available. Select the channel for
ireless-N, Wireless-G, and Wireless-B networking. If
ou selected Wide – 40MHz Channel for the Radio Band setting, then the Standard Channel will be a secondary channel for Wireless-N
SSID Broadcast When wireless clients survey the loca
rea for wireless networks to associate with, they will detect the SSID broadcast by the Router. To broadcast the Router’s SSID, keep the default setting, do not want to broadcast the Router’s SSID, then select
Disabled
Clickave Settingsto apply your changes, or click
hangesto cancel your changes
f you selected Wide - 40MHz Channel
nabled. If you
ance
Wi-Fi Protected Setu
pplies to the client device you are configuring
NOTE: Wi-Fi Protected Setup configures one
client device at a time. Repeat the instructions
or each client device that supports Wi-Fi
rotected Setup
ethod #1
Use this method if your client device has a Wi-Fi Protected
etup button
Click or press t
he client devi
Click the
c
ter the client device has been configured, click
Then refer back to your client device or its
documentation for further instructions
Wi-Fi Protected Setup button on
Fi Protected Setu
utton on this
ethod #
Use this method if your client device has a Wi-Fi Protected
etup PIN number
Enter
lick fter the client device has been configured, click
PIN number in
Registe
Then refer back to your client device or its
men
ield on this screen
r instr
Wireless > Basic Wireless Settings (Wi-Fi Protected Setup)
Wi-Fi Protected Setup > Congratulations
ethod #3
Use this method if your client device asks for the Router’s PIN number.
Enter the PIN number listed on this screen. (It is also listed on the label on the bottom of the Router.
ter the client device has been configured, click 2
Then refer back to your client device or its
documentation for further instructions
e Wi-Fi Protected Setup Status, Network Name (SSID),
ecurity, Encryption, and Passphrase are displayed at the
ottom of the screen
NOTE: If you have client devices that do not
support Wi-Fi Protected Setup, note the wireless settings, and then manually configure those
ient devices
Wireless > Wireless Securit
he our wireless network. There are six wireless securit
ode options supported by the Router: WPA Personal,
PA Enterprise, WPA2 Personal, WPA2 Enterprise, RADIUS,
nd WEP. (WPA stands for Wi-Fi Protected Access, which
s a security standard stronger than WEP encryption. WEP
stands for Wired Equivalent Privacy, while RADIUS stands
Wireless-N Gigabit Router
14
Chapter 3
y
e
sabled
al
f
y.
l
y
T
seconds.
l
l
T
S
or
default is
S
T
e
T
)
ess of the
US
er.
2
the server.
seconds.
e
T
)
T
Advanced Configuration
or Remote Authentication Dial-In User Service.) These six are briefly discussed here. For detailed instructions on configuring wireless security for the Router, refer to
Chapter 2: Wireless Security.
Wireless Securit
ecurity Mod
elect the security method for your wireless network. If
ou do not want to use wireless security, keep the default,
Di
PA Person
NOTE: If you are using WPA, always remember
that each device in your wireless network MUST
se the same WPA method and shared key, or
else the network will not
unction properl
Passphrase
Key Renewal Enter a Key Renewal period, which instructs
the Router how often it should change the encryption keys.
he default Group Key Renewal period is
nter a Passphrase of 8-63 characters.
600 seconds.
A Enterpris
his option features WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.
ecurity Mode > WPA Enterprise
Security Mode > WPA Persona
Passphrase
Key Renewal Enter a Ke
the Router how often it should change the encryption keys.
he default Group Key Renewal period is
nter a Passphrase of 8-63 characters.
Renewal period, which instructs
PA2 Persona
RADIUS Server Enter the IP Addr
v
RADIUS Port Enter the port number of the RADIUS
rver. The default value is1
Shared Secret
nd
Key Renewal Enter a Key Renewal period, which instructs
the Router how often it should change the encryption keys. The default Key Renewal period is
nter the key shared between the Router
RADI
PA2 Enterpris
his option features WPA2 used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.
Security Mode > WPA2 Persona
Encryption WPA2 supports two encryption methods,
KIP and AES, with dynamic encryption keys. Select the
type of algorithm, AE
r AE
Wireless-N Gigabit Router
KIP or AES The
TKIP
ecurity Mode > WPA2 Enterprise
Encryption
KIP and AES, with dynamic encryption keys. Select the
PA2 supports two encryption methods,
15
Loading...
+ 36 hidden pages