LINKSYS WRT160N Wireless-N Broadband Router User Manual Linksys WRT160N User Guide

LINKSYS LLC Wireless-N Broadband Router Linksys WRT160N User Guide

Manual 1

USER GUIDEWireless-N Broadband RouterModel: WRT160N
 About This GuideiWireless-N Broadband RouterAbout This GuideIcon DescriptionsWhile  reading  through  the  User  Guide  you  may  see various icons that call attention to specific items. Below is a description of these icons:NOTE: This  check  mark  indicates  that there  is a  note  of  interest  and  is  something  that  you should pay special attention to while using the product. WARNING:  This  exclamation  point  indicates that  there  is  a  caution  or  warning  and  it  is something that could damage your property or product.WEB:  This  globe  icon  indicates  a  noteworthy website address or e-mail address.Online ResourcesWebsite  addresses  in  this  document  are  listed  without http:// in front of the address because most current web browsers do not require it. If you use an older web browser, you may have to add http:// in front of the web address.Resource WebsiteLinksys www.linksys.comLinksys International  www.linksys.com/internationalGlossary www.linksys.com/glossaryNetwork Security www.linksys.com/securityCopyright and TrademarksLinksys  is  a  registered  trademark or  trademark  of  Cisco  Systems,  Inc.  and/or  its  affiliates  in  the  U.S.  and certain  other  countries.  Copyright © 2007 Cisco Systems, Inc. All rights reserved. Other brands and product names  are  trademarks  or registered trademarks  of  their  respective holders.
 Table of ContentsiWireless-N Home RouterChapter 1: Product Overview  3Front Panel.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  3Back Panel .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  3Chapter 2: Wireless Security Checklist  4General Network Security Guidelines .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  4Additional Security Tips   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  4Chapter 3: Advanced Conguration  5Setup > Basic Setup .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  5Setup > DDNS.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  9Setup > MAC Address Clone.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .10Setup > Advanced Routing  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .10Wireless > Basic Wireless Settings  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .11Wireless > Wireless Security .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .12Wireless > Wireless MAC Filter.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .15Wireless > Advanced Wireless Settings .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .15Security > Firewall .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .16Security > VPN Passthrough .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .17Access Restrictions > Internet Access .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .17Applications and Gaming > Single Port Forwarding.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .19Applications and Gaming > Port Range Forwarding   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .19Applications & Gaming > Port Range Triggering .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .20Applications and Gaming > DMZ   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .20Applications and Gaming > QoS .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .21Administration > Management.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .23Administration > Log .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .24Administration > Diagnostics .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .24Administration > Factory Defaults .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .25Administration > Firmware Upgrade  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .25Status > Router .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .26Status > Local Network .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .26Status > Wireless Network .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .27Appendix A: Troubleshooting  28Appendix B: Specications  29Appendix C: Warranty Information  30Appendix D: Regulatory Information  31FCC Statement  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .31FCC Radiation Exposure Statement  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .31Safety Notices.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .31Industry Canada Statement .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .31Avis d’Industrie Canada.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .32
 Table of ContentsiiWireless-N Home RouterWireless Disclaimer  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .32Avis de non-responsabilité concernant les appareils sans l   .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .32User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .33
Chapter 1 Product Overview3Wireless-N Broadband RouterChapter 1:  Product OverviewThank you for choosing the Linksys Wireless-N Broadband Router.  The  Router  lets  you  access  the  Internet  via  a  wireless connection or through one of  its  four switched ports.  You  can  also  use  the  Router  to  share  resources such as computers, printers and files. A variety of security features help to protect your data and your privacy while online. Security features include WPA2 security, a Stateful Packet  Inspection  (SPI)  firewall  and  NAT  technology. Configuring the Router is easy using the provided browser-based utility.Front Panel1,  2,  3,  4  (Blue)  These  numbered  LEDs, corresponding with the numbered ports on the Router’s back panel, serve two purposes. If the LED is continuously lit, the Router is successfully connected  to  a  device  through  that  port.  A flashing  LED  indicates  network  activity  over that port.Wi-Fi  Protected  Setup  Button  If  you  have client  devices,  such  as  wireless  adapters,  that support  Wi-Fi  Protected  Setup,  then  you  can use  Wi-Fi  Protected  Setup  to  automatically configure  wireless  security  for  your  wireless network(s).To  use  Wi-Fi  Protected  Setup,  run  the  Setup Wizard, or refer to the “Wireless > Basic Wireless Settings”  section  of  “Chapter  3:  Advanced Configuration”.Wi-Fi  Protected  Setup  LED  (Blue/Amber)  It lights  up  blue  when  wireless  security  is enabled.  The  LED  flashes  blue  for  two minutes  during  Wi-Fi  Protected  Setup.    The  LED  lights  up  amber  if  there  is  an  error during the Wi-Fi Protected Setup process. Make sure the client device supports Wi-Fi Protected Setup. Wait until the LED is off, and then try again.   The LED flashes amber when a Wi-Fi Protected Setup  session  is  active,  and  a  second  session begins. The  Router  supports  one  session  at  a time. Wait until the LED is off before starting the next Wi-Fi Protected Setup session.Wireless  (Blue)  The  Wireless  LED  lights  up when the wireless feature is enabled. If the LED is  flashing,  the  Router  is  actively  sending  or receiving data over the network.Internet  (Blue)  The  Internet  LED  lights  up when there is a connection made through the Internet port. A flashing LED indicates network activity over the Internet port.Power  (Blue)  The Power LED lights up and will stay on while the Router is powered on. When the  Router  goes  through  its  self-diagnostic mode during every boot-up, this LED will flash. When the diagnostic is complete, the LED will be solidly lit.Back PanelInternet  The  Internet  port  is  where  you  will connect your cable or DSL Internet connection. 1, 2, 3, 4  These Ethernet ports (1, 2, 3, 4) connect the Router to PCs on your wired network and other Ethernet network devices. Reset  There are two ways to reset the Router’s factory defaults. Either press and hold the Reset Button for approximately five seconds, or restore the  defaults  from  Administration > Factory Defaults in the Router’s web-based utility. Power  The  Power  port  is  where  you  will  connect the power adapter.
Chapter 2 Wireless Security Checklist4Wireless-N Broadband RouterChapter 2:  Wireless Security ChecklistWireless  networks are convenient  and  easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending  information  over  radio  waves,  it  can  be  more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted. Since you cannot physically prevent someone from connecting to your wireless network, you need to take some additional steps to keep your network secure. 1.  Change the default wireless    network name or SSIDWireless  devices  have  a  default  wireless  network  name or  Service  Set  Identifier  (SSID)  set  by  the  factory.  This is  the  name  of  your  wireless  network,  and  can  be  up to  32  characters  in  length.  Linksys  wireless  products use  linksys  as  the  default  wireless  network  name.  You should change the wireless network name to something unique  to distinguish  your wireless  network from  other wireless networks that may exist around you, but do not use  personal  information  (such  as  your  Social  Security number)  because  this  information  may  be  available  for anyone to see when browsing for wireless networks. 2.  Change the default passwordFor wireless products such as access points and routers, you will be asked for a password when you want to change their settings. These devices have a default password set by  the  factory.  The  Linksys  default  password  is  admin. Hackers  know  these  defaults  and  may  try  to  use  them to access your wireless device and change your network settings. To thwart any unauthorized changes, customize the device’s password so it will be hard to guess.3.  Enable MAC address filteringLinksys routers give you the ability to enable Media Access Control  (MAC)  address  filtering.  The  MAC  address  is  a unique  series  of  numbers  and  letters  assigned  to  every networking  device. With  MAC  address filtering  enabled, wireless  network  access  is  provided  solely  for  wireless devices with specific MAC addresses. For example, you can specify the MAC address of each computer in your home so  that  only  those  computers  can  access  your  wireless network. 4.  Enable encryptionEncryption  protects  data  transmitted  over  a  wireless network. Wi-Fi Protected  Access (WPA/WPA2) and Wired Equivalency Privacy (WEP) offer different levels of security for wireless communication.A  network  encrypted  with  WPA/WPA2  is  more  secure than a network encrypted with WEP, because WPA/WPA2 uses dynamic key encryption. To protect the information as  it  passes  over  the  airwaves,  you  should  enable  the highest  level  of  encryption  supported  by  your  network equipment. WEP  is  an  older  encryption  standard  and  may  be  the only option available on some older devices that do not support WPA.General Network Security GuidelinesWireless  network  security  is  useless  if  the  underlying network is not secure. Password protect  all computers on  the network  and individually password protect sensitive files.Change passwords on a regular basis.Install  anti-virus  software  and  personal  firewall software.Disable file sharing (peer-to-peer). Some applications may  open  file  sharing  without  your  consent  and/or knowledge.Additional Security TipsKeep wireless routers, access points, or gateways away from exterior walls and windows.Turn  wireless  routers,  access  points,  or  gateways off  when  they  are  not  being  used  (at  night,  during vacations).Use strong passphrases that are at least eight characters in length. Combine letters and numbers to avoid using standard words that can be found in the dictionary. WEB:  For  more  information  on  wireless security, visit www.linksys.com/security•••••••
Chapter 3 Advanced Configuration5Wireless-N Broadband RouterChapter 3:  Advanced ConfigurationAfter setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if  you’d  like  to  change  its  advanced  settings,  use  the Router’s  web-based  utility.  This  chapter  describes  each web page of the utility and each page’s key functions. You can access the  utility via  a  web browser  on a computer connected to the Router.The  web-based  utility  has  these  main  tabs:  Setup, Wireless,  Security,  Access  Restrictions,  Applications  & Gaming, Administration, and Status. Additional tabs will be available after you click one of the main tabs.NOTE:  When  first  installing  the  Router,  you should  use  the  Setup  Wizard  on  the  Setup CD-ROM.  If  you  want  to  configure  advanced settings,  use  this  chapter  to  learn  about  the web-based utility.How to Access the Web-Based UtilityTo access the web-based utility, launch the web browser on your computer, and enter the Router’s default IP address, 192.168.1.1, in the Address field. Then, press Enter.A  login  screen  will  appear.  (Non-Windows  XP  users  will see a similar screen.) Leave the User name field blank. The first time you open the Web-based utility, use the default password admin. (You can set a new password from the Administration  tab’s  Management  screen.)  Click  OK  to continue.Login ScreenSetup > Basic SetupThe first screen that appears is the Basic Setup screen. This allows you to change the Router’s general settings. Setup > Basic SetupInternet SetupThe Internet Setup section configures the Router to your Internet  connection.  Most  of  this  information  can  be obtained through your ISP.Internet Connection TypeSelect the type of Internet connection your ISP provides from the drop-down menu. These are the available types:Automatic Configuration - DHCPStatic IPPPPoEPPTPL2TPTelstra CableAutomatic Configuration - DHCPBy  default,  the  Router’s  Internet  Connection Type  is  set to  Automatic  Configuration  -  DHCP,  which  should  be kept only if your ISP supports DHCP or you are connecting through a dynamic IP address. (This option usually applies to cable connections.)Internet Connection Type > Automatic Configuration - DHCP••••••
Chapter 3 Advanced Configuration6Wireless-N Broadband RouterStatic IPIf  you  are  required  to  use  a  permanent  IP  address  to connect to the Internet, select Static IP.Internet Connection Type > Static IPInternet IP Address  This is the Router’s IP address, when seen from the Internet. Your ISP will provide you with the IP Address you need to specify here.Subnet Mask  This is the Router’s Subnet Mask, as seen by users on the Internet (including your ISP). Your ISP will provide you with the Subnet Mask.Default  Gateway  Your  ISP will  provide you with  the IP address of the ISP server.DNS 1-3  Your ISP will provide you with at least one DNS (Domain Name System) server IP address.PPPoESome DSL-based ISPs use PPPoE (Point-to-Point Protocol over Ethernet) to establish Internet connections. If you are connected to the Internet through a DSL line, check with your ISP to see if they use PPPoE. If they do, you will have to enable PPPoE.Internet Connection Type > PPPoEUsername  and  Password  Enter  the  Username  and Password provided by your ISP.Service Name  If provided by your ISP, enter the Service Name.Connect on Demand: Max Idle Time  You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time). If your  Internet  connection  has  been  terminated  due  to inactivity,  Connect  on  Demand  enables  the  Router  to automatically re-establish your connection as soon as you attempt to access the Internet again. To use this option, select  Connect  on  Demand.  In  the  Max  Idle  Time  field, enter the number of minutes you want to have elapsed before your Internet connection  terminates. The default Max Idle Time is 15 minutes.Keep  Alive:  Redial  Period  If  you  select  this  option, the  Router  will  periodically  check  your  Internet connection.  If  you  are  disconnected,  then  the  Router will  automatically  re-establish  your  connection.  To  use this option,  select Keep Alive. In the  Redial Period  field, you  specify  how  often  you  want  the  Router  to  check the  Internet  connection.  The  default  Redial  Period  is  30 seconds.PPTPPoint-to-Point Tunneling Protocol (PPTP) is a service that applies to connections in Europe only.Internet Connection Type > PPTPIf your ISP supports DHCP or you are connecting through a dynamic IP address, then select Obtain an IP Address Automatically. If you are required to use a permanent IP address to connect to the Internet, then select Specify an IP Address. Then configure the following:Specify  an IP Address  This is the Router’s IP address, as  seen  from  the  Internet. Your  ISP  will  provide  you with the IP Address you need to specify here.Subnet  Mask  This  is  the  Router’s  Subnet  Mask,  as seen by users on the Internet (including your ISP). Your ISP will provide you with the Subnet Mask.Default Gateway  Your ISP will provide you with the IP address of the ISP server.DNS 1-3  Your  ISP will provide you with at least one DNS (Domain Name System) server IP address.PPTP Server IP Address  Your ISP will provide you with the IP address of the PPTP server.Username  and  Password  Enter  the  Username  and Password provided by your ISP.Connect on Demand: Max Idle Time  You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time). If your  Internet  connection  has  been  terminated  due  to ••••

Navigation menu