LINKSYS E1500 Wireless-N Router User Manual Linksys E1000 User Guide
LINKSYS LLC Wireless-N Router Linksys E1000 User Guide
LINKSYS >
User Manual
User Guide Linksys E1200/E1500 Wireless-N Router Linksys E1200/E1500 Table of Contents Contents Chapter 1: Product Overview Top . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Back . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Horizontal Placement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Wall-Mounting Placement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Chapter 2: Cisco Connect Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Main Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Computers and Other Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Parental Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Guest Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Router Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 How to Exit Cisco Connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 How to Access Cisco Connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Chapter 3: Advanced Configuration 13 How to Access the Browser-Based Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Setup > Basic Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Setup > DDNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Setup > MAC Address Clone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Setup > Advanced Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Wireless > Basic Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Manual Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20 Wireless > Wireless Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Wireless > Wireless MAC Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Wireless > Advanced Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Security > Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Security > VPN Passthrough . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Access Restrictions > Internet Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Applications and Gaming > Single Port Forwarding . . . . . . . . . . . . . . . . . . . . . . . 30 Applications and Gaming > Port Range Forwarding . . . . . . . . . . . . . . . . . . . . . . . 30 Applications & Gaming > Port Range Triggering . . . . . . . . . . . . . . . . . . . . . . . . . .31 Applications and Gaming > DMZ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Applications and Gaming > QoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Administration > Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Administration > Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Administration > Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Administration > Factory Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Administration > Firmware Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Status > Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Status > Local Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38 Status > Wireless Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Wireless-N Router ii Linksys E1200/E1500 Wireless-N Router Table of Contents Appendix A: Troubleshooting 39 Appendix B: Specifications 41 iii Linksys E1200/E1500 Chapter 1: Product Overview Chapter 1: Product Overview Thank you for choosing the Linksys E1200/E1500 Wireless-N Router. The Router lets you access the Internet via a wireless connection or through one of its four switched ports. You can also use the Router to share resources such as computers, printers and files. A variety of security features help to protect your data and your privacy while you are online. Security features include Wi‑Fi Protected Access 2 (WPA2) security, which encrypts data on your wireless network; a Stateful Packet Inspection (SPI) firewall to help block unauthorized access to your Router; and Network Address Translation (NAT) technology, which enhances network protection by allowing your computers to share Internet access through a single, public Internet IP address. (IP stands for Internet Protocol.) Setup and use of the Router is easy using Cisco Connect, the software that is installed when you run the included CD. Advanced configuration of the Router is available through the provided browser‑based utility. Wireless-N Router Linksys E1200/E1500 Appendix A: Troubleshooting Appendix A: Troubleshooting The DSL telephone line does not fit into the Router’s Internet port. Your computer cannot connect to the Internet. The Router does not replace your modem. You still need your DSL modem in order to use the Router. Connect the telephone line to the DSL modem, and then insert the setup CD into your computer. Click Set up your Linksys Router and follow the on‑screen instructions. Follow these instructions until your computer can connect to the Internet: •• •• Verify that the power adapter is connected to the Router and to a power outlet. If connected to a power strip, make sure the power strip is turned on. Make sure that the Power LED, Internet LED, and Wireless LED are on. If you have any wired computers connected to the Router, make sure the appropriate port LED is lit. NOTE: The Power LED flashes after the power adapter is plugged in to the Router. If the light remains flashing for more than 30 seconds, it may indicate the Router is not working properly. For assistance, use a computer or device with Internet access to refer to our Linksys E1200/E1500 support section on the web at www.linksys.com/support •• Make sure that your DSL or cable modem is connected to your Router’s Internet port using an Ethernet cable. •• Reset all of the devices on your network: 1. Turn off all of your network computers and devices, and then unplug the power adapter from your Router. 2. Unplug your modem’s power cord (and coaxial cable if you have a cable modem), and wait two minutes. 3. Reconnect your modem’s power cord (and coaxial cable) and wait two more minutes. 4. Reconnect the power adapter to the Router, and then power on all of your network computers and devices. The modem does not have an Ethernet port. The modem is a dial-up modem for traditional dial-up service. To use the Router, you need a cable/DSL modem and high-speed Internet connection. You cannot use the DSL service to connect manually to the Internet. After you have installed the Router, it will automatically connect to your Internet Service Provider (ISP), so you no longer need to connect manually. When you double-click the web browser, you are prompted for a username and password. If you want to get rid of the prompt, follow these instructions. Launch the web browser and perform the following steps (these steps are specific to Internet Explorer but are similar for other browsers): 1. Select Tools > Internet Options. 2. Click the Connections tab. 3. Select Never dial a connection. 4. Click OK. The Router does not have a coaxial port for the cable connection. The Router does not replace your modem. You still need your cable modem in order to use the Router. Connect your cable connection to the cable modem, and then insert the setup CD into your computer. Click Set up your Linksys Router and follow the on‑screen instructions. The computer cannot connect wirelessly to the network. Make sure the wireless network name or SSID is the same on both the computer and the Router. If you have enabled wireless security, then make sure the same security method and key are used by both the computer and the Router. You need to modify the settings on the Router. Router settings can be modified using the Cisco Connect software; refer to “How to Access Cisco Connect” on page 12. To modify the advanced settings, go to Advanced settings. Refer to “Advanced Settings” on page 12. You want to access the browser-based utility from Cisco Connect. To enter the browser-based utility from Cisco Connect, follow these steps: 1. Open Cisco Connect. 2. On the main menu, click Router settings. 3. Click Advanced settings. 4. Write down the username and password that are displayed. (To help protect your password, you can copy it to the Clipboard by clicking Copy password.) 5. Click OK. Wireless-N Router Linksys E1200/E1500 Appendix A: Troubleshooting 6. Your web browser automatically opens. Enter the username and password, and then click OK. (If you copied the password to the Clipboard in step 4, press Ctrl-V to paste it into the Password field.) When you try to log into the browser-based utility, your password does not work. Your wireless security password also serves as the browser‑based utility’s login password. To see this password: 1. Open Cisco Connect. 2. On the main menu, click Router settings. 3. The Password is displayed on the left side of the screen. WEB: If your questions are not addressed here, refer to our E1200/E1500 section on the web at www.linksys.com/support Wireless-N Router Linksys E1200/E1500 Chapter 2: Advanced Configuration After setting up the Router with the setup software (located on the CD-ROM), the Router will be ready for use. If you would like to change its advanced settings, use the Router’s browser-based utility. This chapter describes each web page of the utility and each page’s key functions. You can access the utility via a web browser on a computer connected to the Router. Chapter 2: Advanced Configuration Setup > Basic Setup The first screen that appears is the Basic Setup screen. This allows you to change the Router’s general settings. The browser-based utility has these main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. Additional tabs will be available after you click one of the main tabs. How to Access the Browser-Based Utility To access the browser-based utility, launch the web browser on your computer, and enter the Router’s default Internet Protocol (IP) address, 192.168.1.1, in the Address field. Then press Enter. NOTE: You can also access the browser‑based utility on Windows computers by entering the device name in the Address field. Refer to Device Name under “Router IP” on page 7. A login screen will appear. (Non-Windows 7 users will see a similar screen.) Leave the User name field blank. Then enter the password you set up during the setup software. (If you did not run the setup software, then use the default password, admin. You can set a new password on the Administration > Management screen. Refer to “Administration > Management” on page 25.) Click OK to continue. Setup > Basic Setup Language Language To use a different language, select one from the drop-down menu. The language of the browser-based utility will change five seconds after you select another language. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Internet Setup The Internet Setup section configures the Router to your Internet connection. Most of this information can be obtained through your Internet Service Provider (ISP). Login Screen NOTE: You can also access the browser-based utility through Cisco Connect. For more information, refer to “Router Settings” on page 10. Wireless-N Router Internet Connection Type Select the type of Internet connection your ISP provides from the drop-down menu. The available types are: •• Automatic Configuration - DHCP •• Static IP •• PPPoE •• PPTP •• L2TP •• Telstra Cable Linksys E1200/E1500 Automatic Configuration - DHCP The default Internet Connection Type is set to Automatic Configuration - DHCP (Dynamic Host Configuration Protocol). Keep the default only if your ISP supports DHCP or if you connect using a dynamic IP address. (This option usually applies to cable connections.) Internet Connection Type > Automatic Configuration - DHCP Static IP If you are required to use a permanent IP address to connect to the Internet, select Static IP. Chapter 2: Advanced Configuration Username and Password Enter the Username and Password provided by your ISP. Service Name (optional) If provided by your ISP, enter the Service Name. Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time). If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again. To use this option, select Connect on Demand. In the Max Idle Time field, enter the number of minutes you want to elapse before your Internet connection terminates. The default is 5 minutes. Keep Alive: Redial Period If you select this option, the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re-establish your connection. To use this option, select Keep Alive. In the Redial Period field, specify how often the Router should check the Internet connection. The default is 30 seconds. PPTP Internet Connection Type > Static IP Point-to-Point Tunneling Protocol (PPTP) is a service that applies to connections in Europe only. Internet IP Address This is the Router’s IP address, when seen from the Internet. Your ISP will provide you with the IP address you need to enter here. Subnet Mask This is the Router’s Subnet Mask, as seen by users on the Internet (including your ISP). Your ISP will provide you with the Subnet Mask. Default Gateway Your ISP will provide you with the Gateway address, which is the ISP server’s IP address. DNS 1-3 Your ISP will provide you with at least one DNS (Domain Name System) server IP address. PPPoE Some DSL-based ISPs use Point-to-Point Protocol over Ethernet (PPPoE) to establish Internet connections. If you are connected to the Internet through a DSL line, check with your ISP to see if they use PPPoE. If they do, you will have to enable PPPoE. Internet Connection Type > PPTP If your ISP supports DHCP or you are connecting through a dynamic IP address, then select Obtain an IP Address Automatically. If you are required to use a permanent IP address to connect to the Internet, then select Specify an IP Address. Then configure the following: Specify an IP Address This is the Router’s IP address, as seen from the Internet. Your ISP will provide you with the IP address you need to specify here. Internet Connection Type > PPPoE Subnet Mask This is the Router’s Subnet Mask, as seen by users on the Internet (including your ISP). Your ISP will provide you with the Subnet Mask. Default Gateway Your ISP will provide you with the Gateway address, which is the ISP server’s IP address. Wireless-N Router Linksys E1200/E1500 DNS 1-3 Your ISP will provide you with at least one DNS (Domain Name System) Server IP address. PPTP Server IP Address Your ISP will provide you with the IP address of the PPTP server. Username and Password Enter the Username and Password provided by your ISP. Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time). If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again. To use this option, select Connect on Demand. In the Max Idle Time field, enter the number of minutes you want to elapse before your Internet connection terminates. The default is 5 minutes. Keep Alive: Redial Period If you select this option, the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re-establish your connection. To use this option, select Keep Alive. In the Redial Period field, specify how often the Router should check the Internet connection. The default is 30 seconds. L2TP Layer 2 Tunneling Protocol (L2TP) is a service that applies to connections in Israel only. Internet Connection Type > L2TP Server IP Address This is the IP address of the L2TP Server. Your ISP will provide you with the IP address you need to specify here. Username and Password Enter the Username and Password provided by your ISP. Chapter 2: Advanced Configuration Keep Alive: Redial Period If you select this option, the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re-establish your connection. To use this option, select Keep Alive. In the Redial Period field, specify how often the Router should check the Internet connection. The default is 30 seconds. Telstra Cable Telstra Cable is a service that applies to connections in Australia only. Internet Connection Type > Telstra Cable Server IP Address This is the IP address of the Telstra Cable. Your ISP will provide you with the IP address you need to specify here. Username and Password Enter the Username and Password provided by your ISP. Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time). If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again. To use this option, select Connect on Demand. In the Max Idle Time field, enter the number of minutes you want to elapse before your Internet connection terminates. The default is 5 minutes. Keep Alive: Redial Period If you select this option, the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re-establish your connection. To use this option, select Keep Alive. In the Redial Period field, specify how often the Router should check the Internet connection. The default is 30 seconds. Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time). If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again. To use this option, select Connect on Demand. In the Max Idle Time field, enter the number of minutes you want to elapse before your Internet connection terminates. The default is 5 minutes. Wireless-N Router Linksys E1200/E1500 Chapter 2: Advanced Configuration Optional Settings DHCP Server Settings Some of these settings may be required by your ISP. Verify with your ISP before making any changes. The settings allow you to configure the Router’s DHCP server function. The Router can be used as a DHCP server for your network. A DHCP server automatically assigns an IP address to each computer or device on your network. Optional Settings NOTE: If you choose to enable the DHCP server option, make sure there is no other DHCP server on your network. Host Name and Domain Name These fields allow you to supply a host and domain name for the Router. Some ISPs, usually cable ISPs, require these names as identification. You may have to check with your ISP to see if your broadband Internet service has been configured with a host and domain name. In most cases, leaving these fields blank will work. MTU MTU is the Maximum Transmission Unit. It specifies the largest packet size permitted for Internet transmission. Select Manual if you want to manually enter the largest packet size that is transmitted. To have the Router select the best MTU for your Internet connection, keep the default setting, Auto. Size When Manual is selected in the MTU field, this option is enabled. Leave this value in the 1200 to 1500 range. The default size depends on the Internet Connection Type: •• DHCP, Static IP, or Telstra: 1500 •• PPPoE: 1492 •• PPTP or L2TP: 1460 Network Setup The Network Setup section configures the IP settings for your local network. Router IP DHCP Server Settings DHCP Server DHCP is enabled by factory default. If you already have a DHCP server on your network, or you do not want a DHCP server, then select Disabled (no other DHCP features will be available). DHCP Reservation Click DHCP Reservation if you want to assign a fixed local IP address to a specific device on your network. This is helpful if you have a device you need to access at the same address all the time, such as a media server or print server. You can reserve the IP address for the specific device by selecting it from the list of devices or by manually entering the MAC address of the device. DHCP Reservation You will see a list of DHCP clients with the following information: Client Name, Interface, IP Address, and MAC Address. IP Address The Router’s IP address, as seen by your network, is displayed. The default Router IP address is 192.168.1.1. Subnet Mask The Router’s Subnet Mask, as seen by your network, is displayed. Device name To access the browser-based utility, enter the Router’s Device name or IP address. The default is Ciscoxxxxx (xxxxx are the last five digits of the Router’s serial number, found on the product label on the left side of the Router’s bottom panel). If you want to change the default, enter a new Device name. (The Device name is also the Router’s NetBIOS name.) DHCP Reservation Router IP Wireless-N Router Linksys E1200/E1500 •• Select Clients from DHCP Table Click the Select check box to reserve a client’s IP address. Then click Add Clients. •• Manually Adding Client To manually assign an IP address, enter the client’s name in the Enter Client Name field. Enter the IP address you want it to have in the Assign IP Address field. Enter its MAC address in the To This MAC Address field. Then click Add. Clients Already Reserved A list of DHCP clients and their fixed local IP addresses is displayed at the bottom of the screen. If you want to remove a client from this list, click Remove. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. To update the on-screen information, click Refresh. To exit this screen, click Close. Start IP Address The Start IP Address specifies the starting IP address for the range of addresses assigned by your Router when it functions as a DHCP server. (The first IP address assigned by the Router will be randomly selected within the range you specify.) Because the Router’s default IP address is 192.168.1.1, the Start IP Address must be 192.168.1.2 or greater, but smaller than 192.168.1.254. The default Start IP Address is 192.168.1.100. Maximum Number of Users Enter the maximum number of computers that you want the DHCP server to assign IP addresses to. This number cannot be greater than 253. The default is 50. IP Address Range The range of available IP addresses is displayed. Client Lease Time The Client Lease Time is the amount of time a network user will be allowed connection to the Router with their current dynamic IP address. Enter the amount of time, in minutes, that the user will be “leased” this dynamic IP address. After the time is up, the user will be automatically assigned a new dynamic IP address, or the lease will be renewed. The default is 0 minutes, which means one day. Static DNS 1-3 The Domain Name System (DNS) is how the Internet translates domain or website names into Internet addresses or URLs. Your ISP will provide you with at least one DNS server IP address. If, however, you wish to use a different DNS server, enter its IP address (you can enter up to three DNS server IP addresses). These static DNS server(s) will have higher priority than the ISP’s DNS servers. The Router will assign these DNS servers to the computers and other devices in your local network. Chapter 2: Advanced Configuration Time Settings Time Setting Time Zone Select the time zone in which your network functions from this drop-down menu. Automatically adjust clock for daylight saving changes Select this option to have the Router automatically adjust for daylight saving time. Reboot Reboot Reboot Click Reboot to restart the Router. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Setup > DDNS The Router offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address. It is useful when you are hosting your own website, File Transfer Protocol (FTP) server, or other server behind the Router. Before you can use this option, you need to sign up for DDNS service with a DDNS service provider, www.dyndns.org or www.tzo.com. If you do not want to use this option, keep the default, Disabled. DDNS DDNS Service If your DDNS service is provided by DynDNS.org, then select DynDNS.org from the drop-down menu. If your DDNS service is provided by TZO, then select TZO.com. The options available on the DDNS screen will vary, depending on which DDNS service provider you use. WINS The Windows Internet Naming Service (WINS) manages each computer’s interaction with the Internet. If you use a WINS server, enter that server’s IP address here. Otherwise, leave this blank. Wireless-N Router Linksys E1200/E1500 DynDNS.org Chapter 2: Advanced Configuration TZO.com Setup > DDNS > TZO Setup > DDNS > DynDNS Username Enter the Username for your DDNS account. Password Enter the Password for your DDNS account. Host Name The DDNS URL assigned by the DDNS service is displayed. System Select the DynDNS service you use: Dynamic, Static, or Custom. The default selection is Dynamic. Mail Exchange (Optional) Enter the address of your mail exchange server, so emails to your DynDNS address go to your mail server. Backup MX This option allows the Mail eXchange (MX) server to be a backup. To disable this option, keep the default, Disabled. To enable the option, select Enabled. If you are not sure which setting to select, keep the default, Disabled. Wildcard This setting enables or disables wildcards for your host. For example, if your DDNS address is myplace.dyndns.org and you enable wildcards, then x.myplace.dyndns.org will work as well (x is the wildcard). To disable wildcards, keep the default, Disabled. To enable wildcards, select Enabled. If you are not sure which setting to select, keep the default, Disabled. E-mail Address, TZO Key, and Domain Name Enter the settings of the account you set up with TZO. Internet IP Address The Router’s Internet IP address is displayed here. Because it is dynamic, it will change. Status The status of the DDNS service connection is displayed. Update To manually trigger an update, click Update. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Setup > MAC Address Clone A Media Access Control (MAC) address is a 12-digit code assigned to a unique piece of hardware for identification. Some ISPs require you to register a MAC address in order to access the Internet. If you have your computer’s MAC address registered with your ISP and you do not wish to re-register the MAC address, then you may assign the registered MAC address to the Router with the MAC Address Clone feature. Internet IP Address The Router’s Internet IP address is displayed here. Because it is dynamic, it will change. Status The status of the DDNS service connection is displayed. Update To manually trigger an update, click Update. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Setup > MAC Address Clone MAC Address Clone Enabled/Disabled To have the MAC address cloned, select Enabled. MAC Address Enter the MAC address registered with your ISP here. Wireless-N Router Linksys E1200/E1500 Chapter 2: Advanced Configuration Clone My PC’s MAC Click this option to clone the MAC address of the computer you are using. network. Enter the information described below to set up a new static route. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Route Entries To set up a static route between the Router and another network, select a number from the drop‑down list. Click Delete This Entry to delete a static route. Setup > Advanced Routing This screen is used to set up the Router’s advanced functions. Operating Mode allows you to select the type(s) of advanced functions you use. Dynamic Routing automatically adjusts how packets travel on your network. Static Routing sets up a fixed route to another network destination. Enter Route Name Enter a name for the Route here, using a maximum of 25 alphanumeric characters. Destination LAN IP The Destination LAN (Local Area Network) IP is the address of the remote network or host to which you want to assign a static route. Subnet Mask The Subnet Mask determines which portion of a Destination LAN IP address is the network portion, and which portion is the host portion. Gateway This is the IP address of the gateway device that allows for contact between the Router and the remote network or host. Interface This interface tells you whether the Destination IP address is on the LAN & Wireless (Ethernet and wireless networks) or the Internet (WAN). (WAN stands for Wide Area Network.) Click Show Routing Table to view the static routes you have already set up. Setup > Advanced Routing Advanced Routing NAT Enabled/Disabled If this Router is hosting your network’s connection to the Internet, keep the default, Enabled. If another router exists on your network, select Disabled. When the NAT setting is disabled, dynamic routing will be available. Dynamic Routing (RIP) Dynamic routing uses the Routing Information Protocol (RIP). This option enables the Router to automatically adjust to physical changes in the network’s layout and exchange routing tables with the other router(s). The Router determines the network packets’ route based on the fewest number of hops between the source and the destination. Advanced Routing > Routing Table Routing Table For each route, the Destination LAN IP address, Subnet Mask, Gateway, and Interface are displayed. Click Refresh to update the information. Click Close to exit this screen. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Enabled/Disabled When the NAT setting is enabled, the Dynamic Routing option is automatically disabled. When the NAT setting is disabled, this option is available. Select Enabled to use the Dynamic Routing option. Static Routing A static route is a pre-determined pathway that network information must travel to reach a specific host or Wireless-N Router 10 Linksys E1200/E1500 Wireless > Basic Wireless Settings The basic settings for wireless networking are set on this screen. There are two ways to configure the Router’s wireless network(s), manual and Wi-Fi Protected Setup. Wi-Fi Protected Setup is a feature that makes it easy to set up your wireless network. If you have client devices, such as wireless adapters, that support Wi-Fi Protected Setup, then you can use Wi-Fi Protected Setup. Configuration View To manually configure your wireless networks, select Manual. Proceed to the Manual Setup section. To use Wi-Fi Protected Setup, select Wi-Fi Protected Setup. Proceed to “Wi-Fi Protected Setup” on page 12. Manual Setup If you set the Configuration View to Manual, the Basic Wireless Settings screen displays the following fields. Chapter 2: Advanced Configuration Network Name (SSID) The Service Set Identifier (SSID) is the network name shared by all devices in a wireless network. It is case-sensitive and must not exceed 32 keyboard characters. The default is Ciscoxxxxx (xxxxx are the last five digits of the Router’s serial number, found on the product label on the left side of the Router’s bottom panel). The setup software that you use to install your Router and set up your wireless network changes the default Network Name to an easy-to-remember name. NOTE: If you restore the Router’s factory default settings (by pressing the Reset button or using the Administration > Factory Defaults screen), the Network Name will return to its default value, and all devices on your wireless network will need to be reconnected. Channel Width The default is 20 MHz Only. For best performance, select Auto (20 MHz or 40 MHz) to have the Router automatically select the Channel Width, 20 MHz or 40 MHz. Channel Select the appropriate channel for your wireless network. If you are not sure which channel to select, then keep the default, Auto. SSID Broadcast When wireless clients survey the local area for wireless networks to associate with, they will detect the SSID broadcast by the Router. To broadcast the Router’s SSID, keep the default, Enabled. If you do not want to broadcast the Router’s SSID, then select Disabled. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Wireless > Basic Wireless Settings (Manual Setup) Network Mode From this drop-down menu, you can select the wireless standards running on your network. •• Mixed If you have Wireless-N, Wireless-G, and Wireless-B devices in your network, keep the default, Mixed. •• BG-Mixed If you have only Wireless-G and Wireless-B devices in your network, select BG-Mixed. •• Wireless-N Only If you have only Wireless-N devices, select Wireless-N Only. •• Wireless-G Only If you have only Wireless-G devices, select Wireless-G Only. •• Wireless-B Only If you have only Wireless-B devices, select Wireless-B Only. •• Disabled If you do not have any wireless devices in your network, select Disabled. NOTE: If you are not sure which mode to use, keep the default, Mixed. Wireless-N Router 11 Linksys E1200/E1500 Chapter 2: Advanced Configuration Wi-Fi Protected Setup a. Enter the PIN from the client device in the field on the Router’s Wi-Fi Protected Setup screen. There are three methods available. Use the method that applies to the client device you are configuring. b. Click the Register button on the Router’s Wi-Fi Protected Setup screen. c. After the client device has been configured, click OK on the Router’s Wi-Fi Protected Setup screen. Then refer back to your client device or its documentation for further instructions. •• Enter Router PIN on Client Device Use this method if your client device asks for the Router’s PIN. a. On the client device, enter the PIN listed on the Router’s Wi-Fi Protected Setup screen. (It is also listed on the label on the bottom of the Router.) b. After the client device has been configured, click OK on the Router’s Wi-Fi Protected Setup screen. Then refer back to your client device or its documentation for further instructions. Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) NOTE: Wi-Fi Protected Setup configures one client device at a time. Repeat the instructions for each client device that supports Wi-Fi Protected Setup. •• The Network Name (SSID), Security, and Passphrase are displayed at the bottom of the screen. NOTE: If you have client devices that do not support Wi-Fi Protected Setup, note the wireless settings, and then manually configure those client devices. Wi-Fi Protected Setup Button Use this method if your client device has a Wi-Fi Protected Setup button. a. Click or press the Wi-Fi Protected Setup button on the client device. b. Click the Wi‑Fi Protected Setup button on the Router’s Wi-Fi Protected Setup screen. The Wi-Fi Protected Setup LED flashes blue for two minutes during the Wi-Fi Protected Setup process and lights up blue when the Wi-Fi Protected Setup process is successful. The LED lights up amber if there is an error during the Wi‑Fi Protected Setup process. Make sure the client device supports Wi‑Fi Protected Setup. Wait until the LED is off, and then try again. The LED flashes when a Wi‑Fi Protected Setup session is active. The Router supports one session at a time. Wait until the LED is continuously lit, or off before starting the next Wi-Fi Protected Setup session. c. After the client device has been configured, click OK on the Router’s Wi-Fi Protected Setup screen. Then refer back to your client device or its documentation for further instructions. •• Enter Client Device PIN on Router Use this method if your client device has a Wi-Fi Protected Setup PIN (Personal Identification Number). Wireless-N Router 12 Linksys E1200/E1500 Chapter 2: Advanced Configuration Wireless > Wireless Security The wireless security settings configure the security of your wireless network(s). The Router supports the following wireless security options: WPA2/WPA Mixed Mode, WPA2 Personal, WPA Personal, WPA2/WPA Enterprise Mixed Mode, WPA2 Enterprise, WPA Enterprise, WEP, and RADIUS. (WPA stands for Wi-Fi Protected Access. WEP stands for Wireless Equivalent Privacy. RADIUS stands for Remote Authentication Dial-In User Service.) WPA2/WPA Mixed Mode NOTE: If you select WPA2/WPA Mixed Mode as your Security Mode, each device in your wireless network MUST use WPA2/WPA and the same passphrase. Personal Options Security Option Strength WPA2 Personal Strongest WPA2/WPA mixed mode WPA2: Strongest WPA: Strong WPA Personal Strong WEP Basic Wireless Security > WPA2/WPA Mixed Mode Passphrase Enter a passphrase of 8-63 characters. The default is password. Office Options The office options are available for networks that use a RADIUS server for authentication. The office options are stronger than the personal options because WPA2 or WPA provides encryption while RADIUS provides authentication. Security Option Strength WPA2 Enterprise Strongest WPA2/WPA Enterprise Mixed Mode WPA2: Strongest WPA: Strong WPA Enterprise Strong RADIUS Basic Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. WPA2 Personal NOTE: If you select WPA2 Personal as your Security Mode, each device in your wireless network MUST use WPA2 Personal and the same passphrase. Security Mode Select the security method for your wireless network. Wireless Security > WPA2 Personal Passphrase Enter a passphrase of 8-63 characters. The default is password. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Wireless-N Router 13 Linksys E1200/E1500 WPA Personal NOTE: If you select WPA Personal as your Security Mode, each device in your wireless network MUST use WPA Personal and the same passphrase. Chapter 2: Advanced Configuration WPA2 Enterprise This option features WPA2 used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) NOTE: If you select WPA2 Enterprise as your Security Mode, each device in your wireless network MUST use WPA2 Enterprise and the same shared key. Wireless Security > WPA Personal Passphrase Enter a passphrase of 8-63 characters. The default is password. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. WPA2/WPA Enterprise Mixed Mode This option features WPA2/WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) NOTE: If you select WPA2/WPA Enterprise Mixed Mode as your Security Mode, each device in your wireless network MUST use WPA2/WPA Enterprise and the same shared key. WPA2 Enterprise RADIUS Server Enter the IP address of the RADIUS server. RADIUS Port Enter the port number of the RADIUS server. The default is 1812. Shared Secret Enter the key shared between the Router and the server. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. WPA2/WPA Enterprise Mixed Mode RADIUS Server Enter the IP address of the RADIUS server. RADIUS Port Enter the port number of the RADIUS server. The default is 1812. Shared Secret Enter the key shared between the Router and the server. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Wireless-N Router 14 Linksys E1200/E1500 WPA Enterprise This option features WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) NOTE: If you select WPA Enterprise as your Security Mode, each device in your wireless network MUST use WPA Enterprise and the same shared key. Chapter 2: Advanced Configuration Encryption Select a level of WEP encryption, 40/64 bits (10 hex digits) or 104/128 bits (26 hex digits). The default is 40/64 bits (10 hex digits). Passphrase Enter a Passphrase to automatically generate WEP keys. Then click Generate. Key 1 If you did not enter a Passphrase, enter the WEP key manually. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. RADIUS This option features WEP used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) NOTE: If you select RADIUS as your Security Mode, each device in your wireless network MUST use RADIUS and the same encryption and shared key. WPA Enterprise RADIUS Server Enter the IP address of the RADIUS server. RADIUS Port Enter the port number of the RADIUS server. The default is 1812. Shared Secret Enter the key shared between the Router and the server. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. WEP WEP is a basic encryption method, which is not as secure as WPA. RADIUS RADIUS Server Enter the IP address of the RADIUS server. NOTE: If you select WEP as your Security Mode, each device in your wireless network MUST use WEP and the same encryption and shared key. RADIUS Port Enter the port number of the RADIUS server. The default is 1812. Shared Secret Enter the key shared between the Router and the server. Encryption Select a level of WEP encryption, 40/64 bits (10 hex digits) or 104/128 bits (26 hex digits). The default is 40/64 bits (10 hex digits). Passphrase Enter a Passphrase to automatically generate WEP keys. Then click Generate. Key 2 If you did not enter a Passphrase, enter the WEP key manually. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Wireless Security > WEP Wireless-N Router 15 Linksys E1200/E1500 Chapter 2: Advanced Configuration Disabled Wireless > Wireless MAC Filter If you choose to disable wireless security, you will be informed that wireless security is disabled when you first attempt to access the Internet. You will given the option to enable wireless security, or confirm that you understand the risks but still wish to proceed without wireless security. Wireless access can be filtered (restricted) by specifying the MAC addresses of the devices in your wireless network. NOTE: When wireless security is disabled, anyone can access your wireless network at any time. Disabled Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Wireless > Wireless MAC Filter Wireless MAC Filter Enabled/Disabled To filter wireless users by the MAC addresses of their computers or devices, select Enabled. Otherwise, keep the default, Disabled. Access Restriction Prevent PCs listed below from accessing the wireless network When the Wireless Mac Filter is enabled and this option is selected, computers listed in the MAC Address filter list will be prevented from accessing the wireless network. This option is enabled by default. Permit PCs listed below access to the wireless network When the Wireless Mac Filter is enabled and this option is selected, only computers listed in the MAC Address filter list will be granted access to the wireless network. This option is disabled by default. Wireless-N Router 16 Linksys E1200/E1500 Chapter 2: Advanced Configuration MAC Address Filter List Wireless > Advanced Wireless Settings Wireless Client List Click this option to open the Wireless Client List screen. The Advanced Wireless Settings screen is used to set up the Router’s advanced wireless functions. These settings should only be adjusted by an advanced user because incorrect settings can reduce wireless performance. In most cases, keep the default settings. Wireless Client List Wireless Client List This screen shows computers and other devices on the wireless network. The list can be sorted by Client Name, Interface, IP Address, MAC Address, and Status. Select Save to MAC Address Filter List for any device you want to add to the MAC Address Filter List. Then click Add. To update the on-screen information, click Refresh. To exit this screen and return to the Wireless MAC Filter screen, click Close. MAC 01-50 Enter the MAC addresses of the devices whose wireless access you want to control. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Wireless > Advanced Wireless Settings Advanced Wireless AP Isolation The AP (Access Point) Isolation feature isolates all wireless clients and wireless devices on your network from each other. Wireless devices will be able to communicate with the Router but not with each other. To use this option, select Enabled. AP Isolation is disabled by default. Frame Burst This option should provide your network with greater performance, depending on the manufacturer of your wireless products. To use this option, keep the default, Enabled. Otherwise, select Disabled. Authentication Type The Authentication Type setting is available if the Security Mode is RADIUS or WEP. The default is set to Auto, which allows either Open System or Shared Key authentication to be used. With Open System authentication, the sender and the recipient do NOT use a WEP key for authentication. With Shared Key authentication, the sender and recipient use a WEP key for authentication. Select Shared Key to only use Shared Key authentication. Basic Rate The Basic Rate setting is not actually one rate of transmission but a series of rates at which the Router can transmit. (The Basic Rate is not the actual rate of data transmission. If you want to specify the Router’s rate of data transmission, configure the Transmission Rate setting.) The Router will advertise its Basic Rate to the other wireless devices in your network, so they know which rates will be used. The Router will also advertise that it will automatically select the best rate for transmission. The default setting is Default, when the Router can transmit at all standard wireless rates (1-2 Mbps, 5.5 Mbps, Wireless-N Router 17 Linksys E1200/E1500 11 Mbps, 18 Mbps, and 24 Mbps). Select 1-2 Mbps for use with older wireless technology. Select All, when the Router can transmit at all wireless rates. Transmission Rate The Transmission setting is available if the Network Mode is BG-Mixed, Wireless-G Only, or Wireless-B Only. The rate of data transmission should be set depending on the speed of your wireless network. Select from a range of transmission speeds, or keep the default, Auto, to have the Router automatically use the fastest possible data rate and enable the Auto-Fallback feature. Auto-Fallback will negotiate the best possible connection speed between the Router and a wireless client. N Transmission Rate The N Transmission setting is available if the Network Mode is Mixed or Wireless-N Only. The rate of data transmission should be set depending on the speed of your Wireless-N networking. Select from a range of transmission speeds, or keep the default, Auto, to have the Router automatically use the fastest possible data rate and enable the Auto-Fallback feature. Auto‑Fallback will negotiate the best possible connection speed between the Router and a wireless client. Chapter 2: Advanced Configuration RTS Threshold Should you encounter inconsistent data flow, only minor reduction of the default value, 2347, is recommended. If a network packet is smaller than the preset Request to Send (RTS) threshold size, the RTS/CTS (Clear to Send) mechanism will not be enabled. The Router sends RTS frames to a particular receiving station and negotiates the sending of a data frame. After receiving an RTS, the wireless station responds with a CTS frame to acknowledge the right to begin transmission. The RTS Threshold value should remain at its default value of 2347 Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Security > Firewall The Firewall screen is used to configure a firewall that can filter out various types of unwanted traffic on the Router’s local network. CTS Protection Mode The Router automatically uses CTS (Clear-To-Send) Protection Mode when your Wireless-N and Wireless-G devices are experiencing severe problems and are not able to transmit to the Router in an environment with heavy 802.11b traffic. This option boosts the Router’s ability to catch all Wireless-N and Wireless-G transmissions but severely decreases performance. To use this option, keep the default, Auto. To disable this option, select Disabled. Beacon Interval A beacon is a packet broadcast by the Router to synchronize the wireless network. The Beacon Interval value indicates the frequency interval of the beacon. Enter a value between 20 and 65,535 milliseconds. The default value is 100. DTIM Interval This value, between 1 and 255, indicates the interval of the Delivery Traffic Indication Message (DTIM). A DTIM field is a countdown field informing clients of the next window for listening to broadcast and multicast messages. When the Router has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value. Its clients hear the beacons and awaken to receive the broadcast and multicast messages. The default value is 1. Fragmentation Threshold This value specifies the maximum size for a packet before data is fragmented into multiple packets. If you experience a high packet error rate, you may slightly increase the Fragmentation Threshold. Setting the Fragmentation Threshold too low may result in poor network performance. Only minor reduction of the default value is recommended. In most cases, it should remain at its default value of 2346. Security > Firewall Firewall SPI Firewall Protection To use firewall protection, keep the default selection, Enabled. To turn off firewall protection, select Disabled. Internet Filters Filter Anonymous Internet Requests This option makes it more difficult for outside users to work their way into your network. This option is enabled by default. Disable it to allow anonymous Internet requests. Filter Multicast The multicasting feature allows for multiple transmissions to specific recipients at the same time. If multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate computers. Select this option to enable the filter. This option is disabled by default. Filter Internet NAT Redirection This option is used to prevent a local computer from using a URL or Internet address to access the local server. Select this option to enable the filter. This option is disabled by default. Filter IDENT (Port 113) The Filter IDENT (Identification) option keeps port 113 from being scanned by devices Wireless-N Router 18 Linksys E1200/E1500 Chapter 2: Advanced Configuration outside of your local network. This option is enabled by default. Disable it to allow port 113 to be scanned. Internet on the Layer 2 level. To allow L2TP tunnels to pass through the Router, keep the default, Enabled. Web Filters Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Proxy Use of WAN proxy servers may compromise the Gateway’s security. Denying Proxy will disable access to any WAN proxy servers. Select this option to enable proxy filtering. Deselect the option to allow proxy access. Java Java is a programming language for websites. If you deny Java, you run the risk of not having access to Internet sites created using this programming language. Select this option to enable Java filtering. Deselect the option to allow Java usage. Access Restrictions > Internet Access The Internet Access screen allows you to deny or allow specific kinds of Internet usage and traffic, such as Internet access, designated services, and websites during specific days and times. ActiveX ActiveX is a programming language for websites. If you deny ActiveX, you run the risk of not having access to Internet sites created using this programming language. Select this option to enable ActiveX filtering. Deselect the option to allow ActiveX usage. Cookies A cookie is data stored on your computer and used by Internet sites when you interact with them. Select this option to filter cookies. Deselect the option to allow cookie usage. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Security > VPN Passthrough The VPN Passthrough screen allows you to enable Virtual Private Network (VPN) tunnels using IPSec, PPTP, or L2TP protocols to pass through the Router’s firewall. Access Restrictions > Internet Access Internet Access Policy Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, keep the default, Enabled. PPTP Passthrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be tunneled through an IP network. To allow PPTP tunnels to pass through the Router, keep the default, Enabled. L2TP Passthrough Layer 2 Tunneling Protocol (L2TP) is the method used to enable Point-to-Point sessions via the Wireless-N Router Access Policy Access can be managed by a policy. Use the settings on this screen to establish an access policy (after Save Settings is clicked). Selecting a policy from the drop-down menu will display that policy’s settings. To delete a policy, select that policy’s number and click Delete This Policy. To view all the policies, click Summary. Summary The policies are listed with the following information: No., Policy Name, Access, Days, Time, and status (Enabled). To enable a policy, select Enabled. To delete a policy, click Delete. Click Save Settings to save your changes, or click Cancel Changes to clear your changes. To return to the Internet Access Policy screen, click Close. 19 Linksys E1200/E1500 Chapter 2: Advanced Configuration 6. Decide which days and what times you want this policy to be enforced. Select the individual days during which the policy will be in effect, or select Everyday. Then enter a range of hours and minutes during which the policy will be in effect, or select 24 Hours. 7. You can block websites with specific URL addresses. Enter each URL in a separate Website Blocking by URL Address field. 8. You can also block websites using specific keywords. Enter each keyword in a separate Website Blocking by Keyword field. Summary Status Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu, and select Enabled. To create a policy, follow steps 1-11. Repeat these steps to create additional policies, one at a time. 1. Select a number from the Access Policy drop-down menu. 2. Enter a Policy Name in the field provided. 3. To enable this policy, select Enabled. 4. Click Edit List to select which computers will be affected by the policy. The List of PCs screen appears. You can select a computer by MAC address or IP address. You can also enter a range of IP addresses if you want this policy to affect a group of computers. After making your changes, click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Then click Close. 9. You can filter access to various services accessed over the Internet, such as FTP or telnet. (You can block up to three applications per policy.) From the Applications list, select the application you want to block. Then click the >> button to move it to the Blocked List. To remove an application from the Blocked List, select it and click the << button. 10. If the application you want to block is not listed or you want to edit a service’s settings, enter the application’s name in the Application Name field. Enter its range in the Port Range fields. Select its protocol from the Protocol drop-down menu. Then click Add. To modify a service, select it from the Applications list. Change its Application Name, Port Range, and/or Protocol setting. Then click Modify. To delete a service, select it from the Applications list. Then click Delete. 11. Click Save Settings to save the policy’s settings, or click Cancel Changes to clear the changes. List of PCs 5. Select the appropriate option, Deny or Allow, depending on whether you want to block or allow Internet access for the computers you listed on the List of PCs screen. Wireless-N Router 20 Linksys E1200/E1500 Chapter 2: Advanced Configuration Applications and Gaming > Single Port Forwarding Protocol Select the protocol(s) used for this application, TCP (Transmission Control Protocol), UDP (User Datagram Protocol),or Both. The Single Port Forwarding screen allows you to customize port services for various applications. To IP Address Enter the IP address of the computer that should receive the requests. If you assigned a static IP address to the computer, then you can look up its static IP address; refer to “DHCP Reservation” on page 7. When users send these types of requests to your network via the Internet, the Router will forward those requests to the appropriate computers (also called servers). Before using forwarding, you should assign static IP addresses to the designated computers (use the DHCP Reservation option on the Basic Setup screen; refer to “DHCP Reservation” on page 7). Enabled Select Enabled to enable port forwarding. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Applications and Gaming > Port Range Forwarding The Port Range Forwarding screen allows you to set up public services on your network, such as web servers, FTP servers, email servers, or other specialized Internet applications. (Specialized Internet applications are any applications that use Internet access to perform functions such as videoconferencing or online gaming. Some Internet applications may not require any forwarding.) When users send these types of requests to your network via the Internet, the Router will forward those requests to the appropriate computers (also called servers). Before using forwarding, you should assign static IP addresses to the designated computers (use the DHCP Reservation option on the Basic Setup screen; refer to “DHCP Reservation” on page 7). Applications and Gaming > Single Port Forwarding If you need to forward all ports to one computer, click the DMZ tab. Single Port Forwarding Preset applications are available for the first five entries. For each entry, complete the following: Application Name Select the appropriate application. To IP Address Enter the IP address of the computer that should receive the requests. If you assigned a static IP address to the computer, then you can look up its static IP address; refer to “DHCP Reservation” on page 7. Enabled Select Enabled to enable port forwarding. You can customize entries for additional applications. For each entry, complete the following: Application Name Enter the name you wish to give the application. Each name can be up to 12 characters. Applications and Gaming > Port Range Forwarding External Port Enter the external port number used by the computer or Internet application. Check with the Internet application documentation for more information. Port Range Forwarding Internal Port Enter the internal port number used by the computer or Internet application. Check with the Internet application documentation for more information. Application Name Enter the name you wish to give the application. Each name can be up to 12 characters. Wireless-N Router For each entry, complete the following: Start~End Port Enter the number or range of port(s) used by the server or Internet application. Check with the Internet application documentation for more information. 21 Linksys E1200/E1500 Protocol Select the protocol(s) used for this application, TCP, UDP, or Both. To IP Address Enter the IP address of the computer running the specific application. If you assigned a static IP address to the computer, then you can look up its static IP address; refer to “DHCP Reservation” on page 7. Enabled Select Enabled to enable port forwarding. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Chapter 2: Advanced Configuration Applications and Gaming > DMZ The DMZ (Demilitarized Zone) feature allows one network computer to be exposed to the Internet for use of a special-purpose service such as Internet gaming or videoconferencing. DMZ hosting forwards all the ports at the same time to one computer. The Port Range Forwarding feature is more secure because it only opens the ports you want to have opened, while DMZ hosting opens all the ports of one computer, exposing the computer to the Internet. Applications & Gaming > Port Range Triggering The Port Range Triggering screen allows the Router to watch outgoing data for specific port numbers. The IP address of the computer that sends the matching data is remembered by the Router, so that when the requested data returns through the Router, the data is pulled back to the proper computer by way of IP address and port mapping rules. Applications and Gaming > DMZ DMZ Any computer whose port is being forwarded should have its DHCP client function disabled and have a new static IP address assigned to it because its IP address may change when using the DHCP function. Enabled/Disabled To disable DMZ hosting, select Disabled. To expose one computer, select Enabled. Then configure the following settings: Applications and Gaming > Port Range Triggering Port Range Triggering For each entry, complete the following: Application Name Enter the application name of the trigger. Triggered Range Enter the starting and ending port numbers of the triggered port number range. Check with the Internet application documentation for the port number(s) needed. Source IP Address If you want any IP address to be the source, select Any IP Address. If you want to specify an IP address or range of IP addresses as the designated source, select and complete the IP address range fields. Destination If you want to specify the DMZ host by IP address, select IP Address and enter the IP address in the field provided. If you want to specify the DMZ host by MAC address, select MAC Address and enter the MAC address in the field provided. To retrieve this information, click DHCP Client Table. Forwarded Range Enter the starting and ending port numbers of the forwarded port number range. Check with the Internet application documentation for the port number(s) needed. Enabled Select Enabled to enable port triggering. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Wireless-N Router 22 Linksys E1200/E1500 Chapter 2: Advanced Configuration this option, select Disabled. Otherwise, keep the default, Enabled. No Acknowledgement If you want to disable the Router’s Acknowledgement option, so the Router will not re-send data if an error occurs, then select Enabled. Otherwise, keep the default, Disabled. Internet Access Priority DMZ > DHCP Client Table DHCP Client Table The DHCP Client Table lists computers and other devices that have been assigned IP addresses by the Router. The list can be sorted by Client Name, Interface, IP Address, and MAC Address. To select a DHCP client, click Select. To update the on-screen information, click Refresh. To exit this screen and return to the DMZ screen, click Close. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Applications and Gaming > QoS Quality of Service (QoS) is a method that assigns priority to specific types of network traffic, which often are demanding, real-time applications, such as gaming, videoconferencing, video streaming, and Voice over Internet Protocol (VoIP) telephony. QoS helps to ensure optimal performance for these types of uses. Applications and Gaming > QoS In this section, you can set the bandwidth priority for a variety of applications and devices. There are four levels of priority: High, Medium, Normal, or Low. When you set priority, do not set all applications to High, because this will defeat the purpose of allocating the available bandwidth. If you want to select below normal bandwidth, select Low. Depending on the application, a few attempts may be needed to set the appropriate bandwidth priority. Enabled/Disabled To use the QoS policies you set, select Enabled. Otherwise, keep the default, Disabled. Upstream Bandwidth Upstream Bandwidth This option sets the maximum outgoing bandwidth that applications can use. To allow the Router to set the maximum, keep the default, Auto. To specify the maximum, select Manual. Then enter the appropriate value and select Kbps or Mbps. Category You can define the Internet access priority level for as many categories as you want. The Summary section will display all of the priority selections that you enter. Select from the following categories: •• Applications Allows you to assign a priority level for a pre-defined application or one that you add. •• Online Games Allows you to assign a priority level for a pre-defined game or one that you add. •• MAC Address This option lets you prioritize network traffic based on the device that is accessing the network. For example, if you want your gaming console to have higher priority accessing the Internet than your computer, you can assign their priority levels using their respective MAC addresses. •• Voice Device Voice devices require a higher priority level. You can assign a higher priority level to voice devices using their respective MAC addresses. QoS (Quality of Service) Summary Wireless This lists the QoS entries you have created for your applications and devices. Refer to “Summary” on page 25 for more information. WMM Support Wi-Fi Multimedia (WMM) is a wireless Quality of Service feature that improves quality for audio, video, and voice applications by prioritizing wireless traffic. To use this feature, the wireless client devices in your network must support Wireless WMM. To disable Wireless-N Router 23 Linksys E1200/E1500 Applications Chapter 2: Advanced Configuration Add a New Game Applications Select the appropriate application. If you select Add a New Application, follow the instructions in the Add a New Application section. Priority Select the appropriate priority: High, Medium (Recommend), Normal, or Low. Click Add to save your changes. Your new entry will appear in the Summary list. Add a New Application QoS > Add a New Game Enter a Name Enter any name to indicate the name of the entry. Port Range Enter the port range that the game will be using. You can have up to three ranges to define for this bandwidth allocation. Port numbers can range from 1 to 65535. Check your application’s documentation for details on the service ports used. QoS > Add a New Application Enter a Name Enter a name for this application. Port Range Enter the port range that the application will be using. For example, if you want to allocate bandwidth for FTP, you can enter 21-21. If you need services for an application that uses from 1000 to 1250, you enter 10001250 as your settings. You can have up to three ranges to define for this bandwidth allocation. Port numbers can range from 1 to 65535. Check your application’s documentation for details on the service ports used. Select the protocol TCP or UDP, or select Both. Priority Select the appropriate priority: High, Medium (Recommend), Normal, or Low. Click Add to save your changes. Your new entry will appear in the Summary list. MAC Address Select the protocol TCP or UDP, or select Both. Priority Select the appropriate priority: High, Medium (Recommend), Normal, or Low. Click Add to save your changes. Your new entry will appear in the Summary list. QoS > MAC Address The MAC address of the computer you are using is displayed. Enter a Name Enter a name for your device. Online Games MAC Address Enter the MAC address of your device. Priority Select the appropriate priority: High, Medium (Recommend), Normal, or Low. Click Add to save your changes. Your new entry will appear in the Summary list. QoS > Online Games Game Select the appropriate game. If you select Add a New Game, follow the instructions in the Add a New Game section. Voice Device Priority Select the appropriate priority: High, Medium (Recommend), Normal, or Low. Click Add to save your changes. Your new entry will appear in the Summary list. QoS > Voice Device Enter a Name Enter a name for your voice device. Wireless-N Router 24 Linksys E1200/E1500 Chapter 2: Advanced Configuration MAC Address Enter the MAC address of your voice device. Priority Select the appropriate priority: (Recommend), Medium, Normal, or Low. High Click Add to save your changes. Your new entry will appear in the Summary list. Summary This lists the QoS entries you have created for your applications and devices. Priority This column displays the bandwidth priority of High, Medium, Normal, or Low. Name This column displays the application, game, device, or port name. Information This column displays the port range or MAC address entered for your entry. If a pre-configured application or game was selected, there will be no valid entry shown in this section. Remove Click this option to remove an entry. Edit Click this option to make changes. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Administration > Management The Management screen allows the network’s administrator to manage specific Router functions for access and security. Router Password Enter a new password for the Router. Re-enter to confirm Enter the password again to confirm. Web Access Web Utility Access HTTP (HyperText Transport Protocol) is the communications protocol used to connect to servers on the World Wide Web. HTTPS uses SSL (Secure Socket Layer) to encrypt data transmitted for higher security. Select HTTP or HTTPS. The default is HTTP. Web Utility Access via Wireless If you are using the Router in a public domain where you are giving wireless access to your guests, you can disable wireless access to the Router’s browser-based utility. You will only be able to access the utility via a wired connection if you disable the setting. Keep the default, Enabled, to allow wireless access to the utility, or select Disabled to block wireless access to the utility. Remote Access Remote Management To permit remote access of the Router from the Internet (outside the local network), select Enabled. Otherwise, keep the default, Disabled. Web Utility Access HTTP (HyperText Transport Protocol) is the communications protocol used to connect to servers on the World Wide Web. HTTPS uses SSL (Secure Socket Layer) to encrypt data transmitted for higher security. Select HTTP or HTTPS. HTTP is the default. Remote Upgrade If you want to be able to upgrade the Router from the Internet (outside the local network), select Enabled. (You must have the Remote Management option enabled as well.) Otherwise, keep the default, Disabled. Allowed Remote IP Address If you want to be able to access the Router from any external IP address, select Any IP Address. If you want to specify an external IP address or range of IP addresses, then select the second option and complete the fields provided. Remote Management Port Enter the port number that will be open to outside access. (To access the Router, you will need to enter the Router’s password.) NOTE: When you are in a remote location and wish to manage the Router, enter http://xxx.xxx.xxx.xxx:yyyy or https://xxx.xxx.xxx.xxx:yyyy, depending on whether you use HTTP or HTTPS. Enter the Router’s specific Internet IP address in place of xxx.xxx.xxx.xxx, and enter the Remote Management Port number in place of yyyy. Administration > Management Management To ensure the Router’s security, you will be asked for your password when you access the Router’s browser-based utility. The default is admin. Wireless-N Router UPnP Universal Plug and Play (UPnP) allows the appropriate Windows operating system to automatically configure the 25 Linksys E1200/E1500 Chapter 2: Advanced Configuration Router for various Internet applications, such as gaming and videoconferencing. UPnP If you want to use UPnP, keep the default, Enabled. Otherwise, select Disabled. Allow Users to Configure Keep the default, Enabled, if you want to be able to make manual changes to the Router while using the UPnP feature. Otherwise, select Disabled. Allow Users to Disable Internet Access Select Enabled, if you want to be able to prohibit any and all Internet connections. Otherwise, keep the default, Disabled. Backup and Restore Backup Configurations To back up the Router’s configuration settings, click this option and follow the on‑screen instructions. Restore Configurations To restore the Router’s configuration settings, click this option and follow the on‑screen instructions. (You must have previously backed up the Router’s configuration settings.) Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Administration > Log The Router can keep logs of all traffic for your Internet connection. Log > View Log Log •• Type Select Incoming Log, Outgoing Log, Security Log, or DHCP Client Log. ••Log The Incoming Log displays a temporary log of the source IP addresses and destination port numbers for the incoming Internet traffic. The Outgoing Log displays a temporary log of the local IP addresses, destination URLs/IP addresses, and service/port numbers for the outgoing Internet traffic. The Security log displays the login information for the browser-based utility. The DHCP Client Log displays the local DHCP server status information. Click Save the Log to save this information to a file on your computer’s hard drive. Click Refresh to update the log. Click Clear to clear all the information that is displayed. Administration > Diagnostics The diagnostic tests (Ping and Traceroute) allow you to check the connections of your network devices, including connection to the Internet. Administration > Log Log Log To disable the Log function, keep the default, Disabled. To monitor traffic between the network and the Internet, select Enabled. With logging enabled, you can choose to view temporary logs. Click Save Settings to apply your change, or click Cancel Changes to clear your change. View Log When you wish to view the logs, click this option. Administration > Diagnostics Diagnostics Ping Test Ping checks the status of a connection. IP or URL Address Enter the address of the computer, device, or website whose connection you wish to test. Packet Size Enter the packet size you want to use. The default is 32 bytes. Wireless-N Router 26 Linksys E1200/E1500 Chapter 2: Advanced Configuration Times to Ping Enter the number of times you wish to test the connection. The default is 5. Start to Ping To run the test, click this option. The Ping screen shows if the test is successful. Click Close to return to the Diagnostics screen. Click Stop to stop the test. Diagnostics > Ping Traceroute Test Traceroute checks the performance of a connection. IP or URL Address Enter the address of the computer, device, or website whose connection you wish to test. Start to Traceroute To run the test, click this option. The Traceroute screen shows if the test is successful. Click Close to return to the Diagnostics screen. Click Stop to stop the test. Diagnostics > Traceroute Administration > Factory Defaults The Factory Defaults screen allows you to restore the Router’s configuration to its factory default settings. NOTE: Do not restore the factory defaults unless you are having difficulties with the Router and have exhausted all other troubleshooting measures. Once the Router is reset, you will have to re-enter all of your configuration settings. Administration > Factory Defaults Factory Defaults Restore All Settings To reset the Router’s settings to the defaults, click this option and then follow the on‑screen instructions. Any settings you have saved will be lost when the default settings are restored. Wireless-N Router 27 Linksys E1200/E1500 Chapter 2: Advanced Configuration Administration > Firmware Upgrade Status > Router The Firmware Upgrade screen allows you to upgrade the Router’s firmware. Do not upgrade the firmware unless you are experiencing problems with the Router or the new firmware has a feature you want to use. The Router screen displays information about the Router and its current settings. Administration > Firmware Upgrade NOTE: The Router may lose the settings you have customized. Before you upgrade its firmware, write down all of your custom settings. After you upgrade its firmware, you will have to re‑enter all of your configuration settings. Firmware Upgrade Before upgrading the firmware, download the Router’s firmware upgrade file from the website, www.linksys.com/support. Please select a file to upgrade the firmware Click Browse and select the firmware upgrade file. Start to Upgrade After you have selected the appropriate file, click this option, and follow the on-screen instructions. WARNING: Do not interrupt the upgrade process. You should not turn off the power or press the Reset button during the upgrade process. Doing so may disable the Router. Status > Router Router Information Firmware Version The version number of the Router’s current firmware is displayed. Firmware Verification The unique identifier of the firmware is displayed. Current Time The time set on the Router is displayed. Internet MAC Address The Router’s MAC address, as seen by your ISP, is displayed. Host Name The Host Name of the Router is displayed (if it was entered on the Setup > Basic Setup screen). Domain Name The Domain Name of the Router is displayed (if it was entered on the Setup > Basic Setup screen). Internet Connection This section shows the current network information stored in the Router. The information varies depending on the Internet connection type selected on the Setup > Basic Setup screen. For a DHCP connection, select Release IP Address or Renew IP Address as appropriate to release or renew a DHCP lease. For a PPPoE or similar connection, select Connect or Disconnect as appropriate to connect to or disconnect from the Internet. Click Refresh to update the on-screen information. Wireless-N Router 28 Linksys E1200/E1500 Status > Local Network The Local Network screen displays information about the local network. Chapter 2: Advanced Configuration DHCP Client Table The DHCP Client Table lists computers and other devices that have been assigned IP addresses by the Router. The list can be sorted by IP Address, MAC Address, Interface, and Client Name. To remove a DHCP client, click Delete. To update the on-screen information, click Refresh. To exit this screen and return to the Local Network screen, click Close. Status > Wireless Network The Wireless Network screen displays information about your wireless network. Status > Local Network Local Network Local MAC Address The MAC address of the Router’s local, wired interface is displayed. Router IP Address The Router’s IP address, as it appears on your local network, is displayed. Subnet Mask The Subnet Mask of the Router is displayed. DHCP Server Status > Wireless Network Wireless Network DHCP Server The status of the Router’s DHCP server function is displayed. Start IP Address For the range of IP addresses that can be used by devices on your local network, the starting IP address is displayed. End IP Address For the range of IP addresses that can be used by devices on your local network, the ending IP address is displayed. DHCP Client Table Click this option to view a list of computers or other devices that are using the Router as a DHCP server. MAC Address The MAC address of the Router’s local, wireless interface is displayed. Mode The wireless mode is displayed. Network Name (SSID) The name of the wireless network, which is also called the SSID, is displayed. Channel Width The Channel Width setting (selected on the Wireless > Basic Wireless Settings screen) is displayed. Channel The Channel setting selected on the Basic Wireless Settings screen is displayed. Security The wireless security method used by the Router is displayed. SSID Broadcast The status of the SSID Broadcast option is displayed. DHCP Client Table Wireless-N Router 29 Linksys E1200/E1500 Appendix C: Specifications Appendix C: Specifications Linksys E1200 Linksys E1500 Model Name Linksys E1200 Model Name Linksys E1500 Description Wireless-N Router Description Wireless-N Router Model Number E1200 Model Number E1500 Standards 802.11n, 802.11g, 802.11b, 802.3u Standards 802.11n, 802.11g, 802.11b, 802.3u Ports Power, Internet, and Ethernet (1-4) Ports Power, Internet, and Ethernet (1-4) Buttons Reset, Wi-Fi Protected Setup Buttons Reset, Wi-Fi Protected Setup LEDs Power/Wi-Fi Protected Setup™, Internet, Ethernet (1-4) LEDs Power/Wi-Fi Protected Setup, Internet, Ethernet (1-4) Cabling Type CAT 5e Cabling Type CAT 5e Transmitted Power 802.11n (20MHz): 15.0 ± 1.5dBm @ CH6, low rates 13.5 ± 1.5dBm @ CH6, high rates Transmitted Power 802.11n (20MHz): 17.0 ± 1.5dBm @ CH6, low rates 16.0 ± 1.5dBm @ CH6, high rates 802.11n (40MHz): 14.0 ± 1.5dBm @ CH6, low rates 13.5 ± 1.5dBm @ CH6, high rates 802.11n (40MHz): 14.5 ± 1.5dBm @ CH6, low rates 15.5 ± 1.5dBm @ CH6, high rates 802.11g: 14.5 ± 1.5dBm @ CH6, all rates 802.11g: 18.0 ± 1.5 dBm @ CH6, low rates 17.0 ± 1.5 dBm @ CH6, high rates 802.11b: 16.5 ± 1.5dBm @ CH6, all rates 802.11b: 18.0 ± 1.5 dBm @ CH6, all rates Antenna Gain ≤2.5 dBi, ≤4.0 dBi (2 antennas) UPnP able/cert Able Antenna Gain Wireless Security Wi-Fi Protected Access™ 2 (WPA2), WEP, wireless MAC filtering ≤3.0 dBi, ≤4.0 dBi, ≤4.5 dBi (3 antennas) UPnP able/cert Able Security Key Bits Up to 128-Bit Encryption Wireless Security Wi-Fi Protected Access 2 (WPA2), WEP, wireless MAC filtering Security Key Bits Up to 128-Bit Encryption Environmental Dimensions 7.43" × 5.97" × 1.23" (188.7 × 151.7 × 31.2 mm) Unit Weight 8.91 oz. (252.7g) Power 12V, 0.5A Certifications FCC, UL/cUL, ICES-003, RSS210, CE, Wi-Fi (IEEE 802.11b/g/n), WPA2™, WMM®, Wi-Fi Protected Setup, Windows 7 Operating Temp. 32 to 104°F (0 to 40°C) Storage Temp. -4 to 140°F (-20 to 60°C) Operating Humidity 10 to 85% Noncondensing Storage Humidity 5 to 90% Noncondensing Environmental Dimensions 7.43" × 5.97" × 1.23" (188.7 × 151.7 × 31.2 mm) Unit Weight 8.96 oz. (254.1g) Power 12V, 0.5A Certifications FCC, UL/cUL, ICES-003, RSS210, CE, Wi-Fi (IEEE 802.11b/g/n), WPA2, WMM, Wi-Fi Protected Setup, Windows 7 Operating Temp. 32 to 104°F (0 to 40°C) Storage Temp. -4 to 140°F (-20 to 60°C) Operating Humidity 10 to 85% Noncondensing Storage Humidity 5 to 90% Noncondensing Specifications are subject to change without notice. 3425-01455 Wireless-N Router 10121010C-JL 30 Federal Communication Commission Interference Statement Industry Canada statement: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures: - Reorient or relocate the receiving antenna. - Increase the separation between the equipment and receiver. - Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. - Consult the dealer or an experienced radio/TV technician for help. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. IMPORTANT NOTE: Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. Ce dispositif est conforme à la norme CNR-210 d'Industrie Canada applicable aux appareils radio exempts de licence. Son fonctionnement est sujet aux deux conditions suivantes: (1) le dispositif ne doit pas produire de brouillage préjudiciable, et (2) ce dispositif doit accepter tout brouillage reçu, y compris un brouillage susceptible de provoquer un fonctionnement indésirable. ===================================================== ==== IMPORTANT NOTE: Radiation Exposure Statement: This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. NOTE IMPORTANTE: (Pour l'utilisation de dispositifs mobiles) Déclaration d'exposition aux radiations: Cet équipement est conforme aux limites d'exposition aux rayonnements IC établies pour un environnement non contrôlé. Cet équipement doit être installé et utilisé avec un minimum de 20 cm de distance entre la source de rayonnement et votre corps. rtissements comme indiqué dans ce manuel. www.linksys.com/support Cisco, the Cisco logo, and Linksys are trademarks or registered trademarks of Cisco and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or website are the property of their respective owners. © 2010 Cisco. All rights reserved.
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : Yes Encryption : Standard V2.3 (128-bit) User Access : Print, Extract, Print high-res XMP Toolkit : 3.1-701 Format : application/pdf Title : Linksys E1000 User Guide Creator : Cisco Create Date : 2010:12:10 16:45:46-08:00 Metadata Date : 2011:01:06 13:42:01+08:00 Modify Date : 2011:01:06 13:42:01+08:00 Creator Tool : Adobe InDesign CS4 (6.0.6) Thumbnail Format : JPEG Thumbnail Width : 256 Thumbnail Height : 256 Thumbnail Image : (Binary data 7184 bytes, use -b option to extract) Instance ID : uuid:42b9a745-acac-45b9-acc9-04d92f09233a Original Document ID : xmp.did:521786E7AB2EDE11B3A6F2B7C1B3250F Document ID : xmp.did:F8B32DBB26206811ACAFE280F794580B Rendition Class : proof:pdf History Action : created, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved History Instance ID : xmp.iid:521786E7AB2EDE11B3A6F2B7C1B3250F, xmp.iid:531786E7AB2EDE11B3A6F2B7C1B3250F, xmp.iid:541786E7AB2EDE11B3A6F2B7C1B3250F, xmp.iid:551786E7AB2EDE11B3A6F2B7C1B3250F, xmp.iid:561786E7AB2EDE11B3A6F2B7C1B3250F, xmp.iid:29668E7EB12EDE11B3A6F2B7C1B3250F, xmp.iid:74E7BC3FC12EDE11B3A6F2B7C1B3250F, xmp.iid:75E7BC3FC12EDE11B3A6F2B7C1B3250F, xmp.iid:B9273F54DD60DE11B13CF0898261F791, xmp.iid:BA273F54DD60DE11B13CF0898261F791, xmp.iid:8DB26ACFCD74DE11BD32A2B9CAE1C0DC, xmp.iid:8EB26ACFCD74DE11BD32A2B9CAE1C0DC, xmp.iid:8FB26ACFCD74DE11BD32A2B9CAE1C0DC, xmp.iid:90B26ACFCD74DE11BD32A2B9CAE1C0DC, xmp.iid:91B26ACFCD74DE11BD32A2B9CAE1C0DC, xmp.iid:92B26ACFCD74DE11BD32A2B9CAE1C0DC, xmp.iid:93B26ACFCD74DE11BD32A2B9CAE1C0DC, xmp.iid:94B26ACFCD74DE11BD32A2B9CAE1C0DC, xmp.iid:95B26ACFCD74DE11BD32A2B9CAE1C0DC, xmp.iid:96B26ACFCD74DE11BD32A2B9CAE1C0DC, xmp.iid:4BD24C80D474DE11BD32A2B9CAE1C0DC, xmp.iid:4CD24C80D474DE11BD32A2B9CAE1C0DC, xmp.iid:4DD24C80D474DE11BD32A2B9CAE1C0DC, xmp.iid:4ED24C80D474DE11BD32A2B9CAE1C0DC, xmp.iid:4FD24C80D474DE11BD32A2B9CAE1C0DC, xmp.iid:50D24C80D474DE11BD32A2B9CAE1C0DC, xmp.iid:51D24C80D474DE11BD32A2B9CAE1C0DC, xmp.iid:52D24C80D474DE11BD32A2B9CAE1C0DC, xmp.iid:2B5B71545D75DE118F59B3361E101A93, xmp.iid:2C5B71545D75DE118F59B3361E101A93, xmp.iid:2D5B71545D75DE118F59B3361E101A93, xmp.iid:2E5B71545D75DE118F59B3361E101A93, xmp.iid:17980FB01CAADE11A3E3B1084795E562, xmp.iid:18980FB01CAADE11A3E3B1084795E562, xmp.iid:F1CDA1914EACDE11B28AA608CD50938E, xmp.iid:8D59C64379CDDE11A7FD805103D0C7C1, xmp.iid:92CD2D727ECDDE11A7FD805103D0C7C1, xmp.iid:95CD2D727ECDDE11A7FD805103D0C7C1, xmp.iid:62F7FC2DEFD2DE11BAF9CD9BF64BAF4D, xmp.iid:63F7FC2DEFD2DE11BAF9CD9BF64BAF4D, xmp.iid:65F7FC2DEFD2DE11BAF9CD9BF64BAF4D, xmp.iid:66F7FC2DEFD2DE11BAF9CD9BF64BAF4D, xmp.iid:67F7FC2DEFD2DE11BAF9CD9BF64BAF4D, xmp.iid:68F7FC2DEFD2DE11BAF9CD9BF64BAF4D, xmp.iid:49DCED7C8BD4DE118EB4CDB0E9CF6288, xmp.iid:4ADCED7C8BD4DE118EB4CDB0E9CF6288, xmp.iid:4FD3C65401D6DE1186C2BD8FDA215704, xmp.iid:B516251A2CE4DE11B38789FE42E75E77, xmp.iid:B616251A2CE4DE11B38789FE42E75E77, xmp.iid:B716251A2CE4DE11B38789FE42E75E77, xmp.iid:7FD50D3AEFE4DE1190D0F7845D787260, xmp.iid:80D50D3AEFE4DE1190D0F7845D787260, xmp.iid:82D50D3AEFE4DE1190D0F7845D787260, xmp.iid:84D50D3AEFE4DE1190D0F7845D787260, xmp.iid:4073432E7DEEDE119418D21E8888CA9F, xmp.iid:3E4E2370A728DF119B2F8512047068E3, xmp.iid:F92081DD6D2CDF11AA58D697BE4B53BB, xmp.iid:FD2081DD6D2CDF11AA58D697BE4B53BB, xmp.iid:62B08734772CDF11AA58D697BE4B53BB, xmp.iid:298031F7B03DDF11AB56F772DB67EEBF, xmp.iid:2A8031F7B03DDF11AB56F772DB67EEBF, xmp.iid:7FA64D8A6642DF11B593A7AF8CC91D01, xmp.iid:80A64D8A6642DF11B593A7AF8CC91D01, xmp.iid:094D7E440F48DF1199AF859EE57CCE7A, xmp.iid:0A4D7E440F48DF1199AF859EE57CCE7A, xmp.iid:9C5A6E3EB348DF1188BABE5C5D4668C2, xmp.iid:9D5A6E3EB348DF1188BABE5C5D4668C2, xmp.iid:0580117407206811B1A4A7C3EA219CFB, xmp.iid:0680117407206811B1A4A7C3EA219CFB, xmp.iid:4BF5C5F71D206811A961E228500106A6, xmp.iid:81D88A7522206811A961E228500106A6, xmp.iid:82D88A7522206811A961E228500106A6, xmp.iid:6E45B18122206811A961E228500106A6, xmp.iid:F7B32DBB26206811ACAFE280F794580B, xmp.iid:F8B32DBB26206811ACAFE280F794580B, xmp.iid:94D7D61CCB03E011BA08DC5CEBD2B5DB, xmp.iid:BC742BAACC03E011BA08DC5CEBD2B5DB, xmp.iid:AA28486ECF03E011AE8CE0FBEEB25861, xmp.iid:E63BFE8F0304E0118D28DFE9348A2582 History When : 2009:04:21 12:45:23-07:00, 2009:04:21 12:46:08-07:00, 2009:04:21 12:46:08-07:00, 2009:04:21 13:08:28-07:00, 2009:04:21 13:14:54-07:00, 2009:04:21 13:17:53-07:00, 2009:04:21 15:10:40-07:00, 2009:04:21 15:16:08-07:00, 2009:06:24 11:02:36-07:00, 2009:06:24 11:02:36-07:00, 2009:07:19 18:36:56-07:00, 2009:07:19 18:36:56-07:00, 2009:07:19 18:42:59-07:00, 2009:07:19 18:46-07:00, 2009:07:19 19:05:35-07:00, 2009:07:19 19:06:28-07:00, 2009:07:19 19:08:45-07:00, 2009:07:19 19:10:52-07:00, 2009:07:19 19:14:37-07:00, 2009:07:19 19:18:43-07:00, 2009:07:19 19:24:50-07:00, 2009:07:19 19:27:50-07:00, 2009:07:19 19:27:50-07:00, 2009:07:19 19:28:02-07:00, 2009:07:19 19:28:21-07:00, 2009:07:19 19:34:42-07:00, 2009:07:19 19:34:42-07:00, 2009:07:19 19:40:05-07:00, 2009:07:20 11:44:17-07:00, 2009:07:20 11:44:17-07:00, 2009:07:20 11:45:06-07:00, 2009:07:20 11:45:06-07:00, 2009:09:25 17:14:46-07:00, 2009:09:25 17:14:46-07:00, 2009:09:28 09:47:11-07:00, 2009:11:09 14:23:03-08:00, 2009:11:09 14:23:03-08:00, 2009:11:09 14:23:55-08:00, 2009:11:16 12:32:37-08:00, 2009:11:16 12:33:24-08:00, 2009:11:16 13:34:07-08:00, 2009:11:16 13:41:30-08:00, 2009:11:16 13:51:08-08:00, 2009:11:16 14:19:02-08:00, 2009:11:18 18:07:15-08:00, 2009:11:18 18:16:42-08:00, 2009:11:20 10:20:07-08:00, 2009:12:08 11:01:33-08:00, 2009:12:08 11:03:22-08:00, 2009:12:08 11:03:22-08:00, 2009:12:09 10:21:43-08:00, 2009:12:09 10:22:37-08:00, 2009:12:09 10:26:38-08:00, 2009:12:09 10:27:54-08:00, 2009:12:21 14:10:52-08:00, 2010:03:05 14:51:12-08:00, 2010:03:10 09:53:42-08:00, 2010:03:10 09:55:08-08:00, 2010:03:10 11:08:04-08:00, 2010:04:01 17:26:38-07:00, 2010:04:01 17:26:38-07:00, 2010:04:07 10:10:26-07:00, 2010:04:07 10:10:26-07:00, 2010:04:14 14:58:39-07:00, 2010:04:14 14:58:39-07:00, 2010:04:15 10:20:56-07:00, 2010:04:15 10:20:56-07:00, 2010:05:19 12:10:42-07:00, 2010:05:19 12:10:42-07:00, 2010:07:26 15:48:51-07:00, 2010:07:26 15:53:42-07:00, 2010:07:26 15:53:42-07:00, 2010:07:26 16:04:19-07:00, 2010:08:02 13:10:08-07:00, 2010:08:02 13:10:08-07:00, 2010:12:09 11:32:51-08:00, 2010:12:09 11:54:38-08:00, 2010:12:09 12:04:44-08:00, 2010:12:09 18:22:17-08:00 History Software Agent : Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0 History Changed : /, /metadata, /, /, /, /, /, /metadata, /;/metadata, /metadata, /;/metadata, /, /, /, /, /, /, /, /, /, /metadata, /;/metadata, /, /, /, /metadata, /, /, /metadata, /metadata, /;/metadata, /, /metadata, /, /metadata, /;/metadata, /, /, /, /, /, /, /, /, /, /, /, /metadata, /, /, /, /, /, /, /, /, /, /, /metadata, /, /metadata, /, /metadata, /, /metadata, /, /metadata, /, /, /metadata, /, /, /metadata, /, /, /, /, / Derived From Instance ID : xmp.iid:F7B32DBB26206811ACAFE280F794580B Derived From Document ID : xmp.did:82D88A7522206811A961E228500106A6 Derived From Original Document ID: xmp.did:521786E7AB2EDE11B3A6F2B7C1B3250F Derived From Rendition Class : default Manifest Link Form : ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream Manifest Placed X Resolution : 300.00, 72.00, 72.00, 300.00, 300.00, 300.00, 300.00, 72.00, 300.00, 72.00, 300.00, 72.00, 300.00, 72.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 72.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 72.00, 72.00, 300.00, 300.00, 72.00, 72.00, 300.00, 72.00, 300.00, 72.00, 300.00, 300.00, 72.00, 300.00, 72.00, 300.00, 72.00, 300.00, 300.00, 72.00, 300.00, 72.00, 300.00, 72.00, 300.00, 300.00, 72.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 72.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 72.00, 300.00, 300.00, 300.00, 72.00, 72.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 72.00 Manifest Placed Y Resolution : 300.00, 72.00, 72.00, 300.00, 300.00, 300.00, 300.00, 72.00, 300.00, 72.00, 300.00, 72.00, 300.00, 72.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 72.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 72.00, 72.00, 300.00, 300.00, 72.00, 72.00, 300.00, 72.00, 300.00, 72.00, 300.00, 300.00, 72.00, 300.00, 72.00, 300.00, 72.00, 300.00, 300.00, 72.00, 300.00, 72.00, 300.00, 72.00, 300.00, 300.00, 72.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 72.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 72.00, 300.00, 300.00, 300.00, 72.00, 72.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 72.00 Manifest Placed Resolution Unit : Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches Manifest Reference Instance ID : xmp.iid:5E505252CD74DE1195DEDAE1F9B44DCE, uuid:744c5659-46ac-4d66-9839-30259431ad2e, uuid:744c5659-46ac-4d66-9839-30259431ad2e, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, uuid:720a9d92-6699-4f10-addd-c1a036fead8a, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, uuid:9da639e1-9017-4020-8617-fee87680f534, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, uuid:720a9d92-6699-4f10-addd-c1a036fead8a, xmp.iid:C57E170420E1DE1189FFCE5A6A387F81, uuid:720a9d92-6699-4f10-addd-c1a036fead8a, xmp.iid:199895E86F2CDF11B046F714F2077B1C, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:4A5B26AC2CD9DE1187B3E262F98982F6, xmp.iid:7566D16A2CD9DE1187B3E262F98982F6, xmp.iid:445B26AC2CD9DE1187B3E262F98982F6, xmp.iid:7D66D16A2CD9DE1187B3E262F98982F6, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:4B5B26AC2CD9DE1187B3E262F98982F6, xmp.iid:7866D16A2CD9DE1187B3E262F98982F6, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:13D393152DD9DE1187B3E262F98982F6, xmp.iid:8FA36E63712CDF11B046F714F2077B1C, uuid:720a9d92-6699-4f10-addd-c1a036fead8a, xmp.iid:17D393152DD9DE1187B3E262F98982F6, xmp.iid:C67E170420E1DE1189FFCE5A6A387F81, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:475B26AC2CD9DE1187B3E262F98982F6, xmp.iid:209895E86F2CDF11B046F714F2077B1C, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:7006066586EADE118A14FBA4B7F76B6B, xmp.iid:7106066586EADE118A14FBA4B7F76B6B, xmp.iid:7206066586EADE118A14FBA4B7F76B6B, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:7306066586EADE118A14FBA4B7F76B6B, xmp.iid:C77E170420E1DE1189FFCE5A6A387F81, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:7506066586EADE118A14FBA4B7F76B6B, uuid:720a9d92-6699-4f10-addd-c1a036fead8a, uuid:720a9d92-6699-4f10-addd-c1a036fead8a, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:91A36E63712CDF11B046F714F2077B1C, uuid:720a9d92-6699-4f10-addd-c1a036fead8a, uuid:720a9d92-6699-4f10-addd-c1a036fead8a, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, uuid:720a9d92-6699-4f10-addd-c1a036fead8a, xmp.iid:7BCD5E7C85EADE118A14FBA4B7F76B6B, uuid:720a9d92-6699-4f10-addd-c1a036fead8a, xmp.iid:7ACD5E7C85EADE118A14FBA4B7F76B6B, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, uuid:720a9d92-6699-4f10-addd-c1a036fead8a, xmp.iid:7ECD5E7C85EADE118A14FBA4B7F76B6B, uuid:720a9d92-6699-4f10-addd-c1a036fead8a, xmp.iid:F226E5F40F206811871FBA3A96B0CBE0, uuid:720a9d92-6699-4f10-addd-c1a036fead8a, xmp.iid:09B3B6F617206811871FBA3A96B0CBE0, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, uuid:720a9d92-6699-4f10-addd-c1a036fead8a, xmp.iid:0BB3B6F617206811871FBA3A96B0CBE0, uuid:720a9d92-6699-4f10-addd-c1a036fead8a, xmp.iid:7DCD5E7C85EADE118A14FBA4B7F76B6B, uuid:720a9d92-6699-4f10-addd-c1a036fead8a, xmp.iid:E06C5E22DF41DF11BBF99BEE7A941E48, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, uuid:720a9d92-6699-4f10-addd-c1a036fead8a, xmp.iid:0EB3B6F617206811871FBA3A96B0CBE0, xmp.iid:80CD5E7C85EADE118A14FBA4B7F76B6B, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:C87E170420E1DE1189FFCE5A6A387F81, xmp.iid:7FCD5E7C85EADE118A14FBA4B7F76B6B, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:720444F285EADE118A14FBA4B7F76B6B, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:81CD5E7C85EADE118A14FBA4B7F76B6B, xmp.iid:6D06066586EADE118A14FBA4B7F76B6B, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:C97E170420E1DE1189FFCE5A6A387F81, xmp.iid:CA7E170420E1DE1189FFCE5A6A387F81, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:7C0444F285EADE118A14FBA4B7F76B6B, xmp.iid:7A0444F285EADE118A14FBA4B7F76B6B, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:7B0444F285EADE118A14FBA4B7F76B6B, xmp.iid:790444F285EADE118A14FBA4B7F76B6B, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:D90F218E23E1DE1189FFCE5A6A387F81, xmp.iid:99A36E63712CDF11B046F714F2077B1C, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:BBD5CAE22ED9DE1187B3E262F98982F6, xmp.iid:B8D5CAE22ED9DE1187B3E262F98982F6, xmp.iid:B5D5CAE22ED9DE1187B3E262F98982F6, xmp.iid:1DD393152DD9DE1187B3E262F98982F6, xmp.iid:BED5CAE22ED9DE1187B3E262F98982F6, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:E04936B465EADE118A14FBA4B7F76B6B, uuid:720a9d92-6699-4f10-addd-c1a036fead8a, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:E24936B465EADE118A14FBA4B7F76B6B, xmp.iid:CD7E170420E1DE1189FFCE5A6A387F81, xmp.iid:62CF502C772CDF11B046F714F2077B1C, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:D50F218E23E1DE1189FFCE5A6A387F81, xmp.iid:D60F218E23E1DE1189FFCE5A6A387F81, uuid:720a9d92-6699-4f10-addd-c1a036fead8a, xmp.iid:79CD5E7C85EADE118A14FBA4B7F76B6B, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:78CD5E7C85EADE118A14FBA4B7F76B6B, uuid:720a9d92-6699-4f10-addd-c1a036fead8a, uuid:2f88acdd-617c-427a-9108-15f7271ed2a0, xmp.iid:77CD5E7C85EADE118A14FBA4B7F76B6B, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, xmp.iid:6C2D1BE292EADE118A14FBA4B7F76B6B, xmp.iid:D80F218E23E1DE1189FFCE5A6A387F81, xmp.iid:7406066586EADE118A14FBA4B7F76B6B, xmp.iid:3652D5C75B25DE119314F48FA4F7F403, uuid:20c17c03-ecc0-4867-a03e-59615e498a2a Manifest Reference Document ID : uuid:E021953FAAEDDD11A859EA196301F15A, xmp.did:088506FCD722DE118D10C66869576A0C, xmp.did:088506FCD722DE118D10C66869576A0C, uuid:714CEDD50018DE119C7AF18FF295A02E, uuid:714CEDD50018DE119C7AF18FF295A02E, uuid:714CEDD50018DE119C7AF18FF295A02E, uuid:714CEDD50018DE119C7AF18FF295A02E, uuid:C6630B259416DB119752CE0FD4DE5706, uuid:714CEDD50018DE119C7AF18FF295A02E, uuid:C1630B259416DB119752CE0FD4DE5706, uuid:714CEDD50018DE119C7AF18FF295A02E, uuid:C6630B259416DB119752CE0FD4DE5706, xmp.did:B9915C7D2BD9DE1187B3E262F98982F6, uuid:C6630B259416DB119752CE0FD4DE5706, xmp.did:189895E86F2CDF11B046F714F2077B1C, uuid:714CEDD50018DE119C7AF18FF295A02E, xmp.did:CDD5AAF393D8DE11808988744AFC3DF8, xmp.did:CCD5AAF393D8DE11808988744AFC3DF8, xmp.did:CBD5AAF393D8DE11808988744AFC3DF8, xmp.did:C9D5AAF393D8DE11808988744AFC3DF8, uuid:714CEDD50018DE119C7AF18FF295A02E, xmp.did:CAD5AAF393D8DE11808988744AFC3DF8, xmp.did:C7D5AAF393D8DE11808988744AFC3DF8, uuid:714CEDD50018DE119C7AF18FF295A02E, xmp.did:CDD5AAF393D8DE11808988744AFC3DF8, xmp.did:189895E86F2CDF11B046F714F2077B1C, uuid:C6630B259416DB119752CE0FD4DE5706, xmp.did:CDD5AAF393D8DE11808988744AFC3DF8, xmp.did:C6D5AAF393D8DE11808988744AFC3DF8, uuid:714CEDD50018DE119C7AF18FF295A02E, xmp.did:CDD5AAF393D8DE11808988744AFC3DF8, xmp.did:189895E86F2CDF11B046F714F2077B1C, uuid:714CEDD50018DE119C7AF18FF295A02E, xmp.did:CED5AAF393D8DE11808988744AFC3DF8, xmp.did:63A4677795D8DE11808988744AFC3DF8, xmp.did:62A4677795D8DE11808988744AFC3DF8, uuid:714CEDD50018DE119C7AF18FF295A02E, xmp.did:60A4677795D8DE11808988744AFC3DF8, xmp.did:3AFA0C7C33D9DE1187B3E262F98982F6, uuid:714CEDD50018DE119C7AF18FF295A02E, xmp.did:30FA0C7C33D9DE1187B3E262F98982F6, uuid:C6630B259416DB119752CE0FD4DE5706, uuid:C6630B259416DB119752CE0FD4DE5706, uuid:714CEDD50018DE119C7AF18FF295A02E, xmp.did:90A36E63712CDF11B046F714F2077B1C, uuid:C6630B259416DB119752CE0FD4DE5706, uuid:C6630B259416DB119752CE0FD4DE5706, uuid:714CEDD50018DE119C7AF18FF295A02E, uuid:C6630B259416DB119752CE0FD4DE5706, xmp.did:64A4677795D8DE11808988744AFC3DF8, uuid:C6630B259416DB119752CE0FD4DE5706, xmp.did:CEC8D08A96D8DE11808988744AFC3DF8, uuid:714CEDD50018DE119C7AF18FF295A02E, uuid:C6630B259416DB119752CE0FD4DE5706, xmp.did:CDC8D08A96D8DE11808988744AFC3DF8, uuid:C6630B259416DB119752CE0FD4DE5706, xmp.did:92A36E63712CDF11B046F714F2077B1C, uuid:C6630B259416DB119752CE0FD4DE5706, xmp.did:94A36E63712CDF11B046F714F2077B1C, uuid:714CEDD50018DE119C7AF18FF295A02E, uuid:C6630B259416DB119752CE0FD4DE5706, xmp.did:96A36E63712CDF11B046F714F2077B1C, uuid:C6630B259416DB119752CE0FD4DE5706, xmp.did:CAC8D08A96D8DE11808988744AFC3DF8, uuid:C6630B259416DB119752CE0FD4DE5706, xmp.did:C9C8D08A96D8DE11808988744AFC3DF8, uuid:714CEDD50018DE119C7AF18FF295A02E, uuid:C6630B259416DB119752CE0FD4DE5706, xmp.did:CAC8D08A96D8DE11808988744AFC3DF8, xmp.did:C8C8D08A96D8DE11808988744AFC3DF8, uuid:714CEDD50018DE119C7AF18FF295A02E, xmp.did:C7C8D08A96D8DE11808988744AFC3DF8, xmp.did:69A4677795D8DE11808988744AFC3DF8, uuid:714CEDD50018DE119C7AF18FF295A02E, xmp.did:68A4677795D8DE11808988744AFC3DF8, uuid:714CEDD50018DE119C7AF18FF295A02E, xmp.did:67A4677795D8DE11808988744AFC3DF8, xmp.did:66A4677795D8DE11808988744AFC3DF8, uuid:714CEDD50018DE119C7AF18FF295A02E, xmp.did:65A4677795D8DE11808988744AFC3DF8, xmp.did:CFC8D08A96D8DE11808988744AFC3DF8, uuid:714CEDD50018DE119C7AF18FF295A02E, xmp.did:C1BD035398D8DE11808988744AFC3DF8, xmp.did:C0BD035398D8DE11808988744AFC3DF8, uuid:714CEDD50018DE119C7AF18FF295A02E, xmp.did:BFBD035398D8DE11808988744AFC3DF8, xmp.did:BEBD035398D8DE11808988744AFC3DF8, uuid:714CEDD50018DE119C7AF18FF295A02E, xmp.did:36FA0C7C33D9DE1187B3E262F98982F6, xmp.did:98A36E63712CDF11B046F714F2077B1C, uuid:714CEDD50018DE119C7AF18FF295A02E, xmp.did:BCBD035398D8DE11808988744AFC3DF8, xmp.did:BBBD035398D8DE11808988744AFC3DF8, xmp.did:BABD035398D8DE11808988744AFC3DF8, xmp.did:B9BD035398D8DE11808988744AFC3DF8, xmp.did:B7BD035398D8DE11808988744AFC3DF8, uuid:714CEDD50018DE119C7AF18FF295A02E, xmp.did:D1C8D08A96D8DE11808988744AFC3DF8, uuid:C6630B259416DB119752CE0FD4DE5706, uuid:714CEDD50018DE119C7AF18FF295A02E, xmp.did:D0C8D08A96D8DE11808988744AFC3DF8, xmp.did:38FA0C7C33D9DE1187B3E262F98982F6, xmp.did:61CF502C772CDF11B046F714F2077B1C, uuid:714CEDD50018DE119C7AF18FF295A02E, xmp.did:95F2F90099D8DE11808988744AFC3DF8, xmp.did:94F2F90099D8DE11808988744AFC3DF8, uuid:C6630B259416DB119752CE0FD4DE5706, xmp.did:93F2F90099D8DE11808988744AFC3DF8, uuid:714CEDD50018DE119C7AF18FF295A02E, xmp.did:92F2F90099D8DE11808988744AFC3DF8, uuid:C6630B259416DB119752CE0FD4DE5706, uuid:872B750B9B16DB119752CE0FD4DE5706, xmp.did:91F2F90099D8DE11808988744AFC3DF8, uuid:714CEDD50018DE119C7AF18FF295A02E, xmp.did:90F2F90099D8DE11808988744AFC3DF8, xmp.did:8FF2F90099D8DE11808988744AFC3DF8, xmp.did:8EF2F90099D8DE11808988744AFC3DF8, uuid:714CEDD50018DE119C7AF18FF295A02E, xmp.did:CD117048F8E5DE11B7C0EC4A6EECEA45 Doc Change Count : 479 Producer : Adobe PDF Library 9.0 Trapped : False Has XFA : No Page Count : 34 Author : CiscoEXIF Metadata provided by EXIF.tools