Home
        Linksys WRT320N router
         Contents
1.     Connect on Demand  Max Idle Time You can configure  the Router to cut the Internet connection after it has been  inactive for a specified period of time  Max Idle Time   If  your Internet connection has been terminated due to  inactivity  Connect on Demand enables the Router to  automatically re establish your connection as soon as you  attempt to access the Internet again  To use this option   select Connect on Demand  In the Max Idle Time field   enter the number of minutes you want to elapse before    Dual Band Wireless N Gigabit Router    your Internet connection terminates  The default Max Idle  Time is 15 minutes     Keep Alive  Redial Period If you select this option   the Router will periodically check your Internet  connection  If you are disconnected  then the Router  will automatically re establish your connection  To use  this option  select Keep Alive  In the Redial Period field   you specify how often you want the Router to check  the Internet connection  The default Redial Period is  30 seconds     PPTP    Point to Point Tunneling Protocol  PPTP  is a service that  applies to connections in Europe only     interne Setup       Internet Connection Type  gt  PPTP    If your ISP supports DHCP or you are connecting through  a dynamic IP address  then select Obtain an IP Address  Automatically  If you are required to use a permanent IP  address to connect to the Internet  then select Specify an  IP Address  Then configure the following     e Specify an IP Address
2.    CISCO    Dual Band Wireless N Gigabit Router i    Table of Contents       Chapter 1  Product Overview 4  FROME PE a Sic SR TE 4  BACK PANG  5 245 954 5044 Goat NUS RENE S RR RS oe oe qe AU Bo eee 4  Placement Positions        54 0445985  4 45699 4 a Seda EET EEO wR 4   Chapter 2  Wireless Security Checklist 6  General Network Security Guidelines       0    0    aa  6  Additional Security Tips s  x voii a oo 9 37895 oe 9 473 479 3989 AA 6   Chapter 3  Advanced Configuration 7  JUD  gt  Basle CD x sus o Var oS a oa CEOS 9 GR de aa ae NG kG ks 7  Sew DON EE ce ee ee dm ed a NG de GA MA 11  Setup  gt  MAC Address Clone                                        12  Setup  gt  Advanced Routing s s 2442666445 4549255 read ire GAB rte cie 12  Wireless  gt  Basic Wireless Settings                                     13  Wireless  gt  Wireless Security                                         14  Wireless  gt  Wireless MAC Filter                                        16  Wireless  gt  Advanced Wireless Settings                                 17  D  CO malc  kaa KA READER A GA ao Ge HE 18  Security  gt  VPN Passthrough  uus ara d   ru apap   ode dia Saw A od e wee 19  Access Restrictions  gt  Internet Access                                  19  Applications and Gaming  gt  Single Port Forwarding                         20  Applications and Gaming  gt  Port Range Forwarding                         21  Applications  amp  Gaming  gt  Port Range Triggering                           21  App
3.    Sinun vastuullasi on h  vitt      t  m   elektroniikkatuote ja muut vastaavat elektroniikkatuotteet  viem  ll   tuote tai tuotteet viranomaisten m    r    m    n  ker  yspisteeseen  Laitteiston oikea h  vitt  minen est      mahdolliset kielteiset vaikutukset ymp  rist    n ja ihmisten  terveyteen  Lis  tietoja vanhan laitteiston oikeasta h  vitystavasta  saa paikallisilta viranomaisilta  j  tteenh  vityspalvelusta tai siit    myym  l  st    josta ostit tuotteen     Svenska  Swedish    Milj  information f  r kunder i  Europeiska unionen    Det europeiska direktivet 2002 96 EC kr  ver att utrustning med  denna symbol    p   produkten och eller f  rpackningen inte f  r  kastas med osorterat kommunalt avfall  Symbolen visar att denna  produkt b  r kastas efter att den avskiljts fran vanligt hushallsavfall   Det faller pa ditt ansvar att kasta denna och annan elektrisk och  elektronisk utrustning pa faststallda insamlingsplatser utsedda  av regeringen eller lokala myndigheter  Korrekt kassering och  atervinning skyddar mot eventuella negativa konsekvenser  for miljon och personhalsa  For mer detaljerad information om  kassering av din gamla utrustning kontaktar du dina lokala  myndigheter  avfallshanteringen eller butiken dar du k  pte  produkten     WEB  For additional information  please visit  www linksys com international    41    Appendix E    Software Licence Agreement       Appendix E  Software  Licence Agreement    Software in Linksys Products    This product from Cisco
4.    The Administration 5 Factory Defaults screen allows you  to restore the Router s configuration to its factory default  settings     LINKSYS by Cisco    Administration       Administration 5 Factory Defaults    ZA NOTE  Do notrestore the factory defaults unless   you are having difficulties with the Router and  have exhausted all other troubleshooting  measures  Once the Router is reset  you will have  to re enter all of your configuration settings        Factory Defaults    Restore All Settings To reset the Router s settings to the  default values  click this button and then follow the on   screen instructions  Any settings you have saved will be  lost when the default settings are restored     26    Chapter 3    Advanced Configuration       Administration  gt  Firmware Upgrade    The Firmware Upgrade screen allows you to upgrade the  Router s firmware  Do not upgrade the firmware unless  you are experiencing problems with the Router or the new  firmware has a feature you want to use     LINKSYS by Cisco    Administration    AA LL kt  bea   Saro Upgrade      LOL L a  Na ay Jabe rad e R  i rl See  prer oes he re buan    D  Upgrada miss NOT be Intermipias          Administration    Firmware Upgrade    ZA NOTE  The Router may lose the settings you  have customised  Before you upgrade its    firmware  write down all of your custom settings   After you upgrade its firmware  you will have to  re enter all of your configuration settings        Firmware Upgrade    Before upgrading
5.    nicht zusammen mit unsortiertem  Gemeindeabfall entsorgt werden darf  Das Symbol weist darauf  hin  dass das Produkt von regul  rem Haushaltm  ll getrennt  entsorgt werden sollte  Es liegt in Ihrer Verantwortung  dieses  Ger  t und andere elektrische und elektronische Ger  te   ber  die daf  r zust  ndigen und von der Regierung oder   rtlichen  Beh  rden dazu bestimmten Sammelstellen zu entsorgen   Ordnungsgem    es Entsorgen und Recyceln tr  gt dazu bei   potentielle negative Folgen f  r Umwelt und die menschliche  Gesundheit zu vermeiden  Wenn Sie weitere Informationen zur  Entsorgung Ihrer Altger  te ben  tigen  wenden Sie sich bitte an  die   rtlichen Beh  rden oder st  dtischen Entsorgungsdienste  oder an den H  ndler  bei dem Sie das Produkt erworben haben     38    Appendix D    Regulatory Information       Eesti  Estonian    Keskkonnaalane informatsioon  Euroopa Liidus asuvatele klientidele    Euroopa Liidu direktiivi 2002 96 EU n  uete kohaselt on  seadmeid  millel on tootel v  i pakendil k  esolev s  mbol      keelatud k  rvaldada koos sorteerimata olmej    tmetega  See  s  mbol n  itab  et toode tuleks k  rvaldada eraldi tavalistest  olmej    tmevoogudest  Olete kohustatud k  rvaldama k  esoleva  ja ka muud elektri  ja elektroonikaseadmed riigi v  i kohalike  ametiasutuste poolt ette n  htud kogumispunktide kaudu   Seadmete korrektne k  rvaldamine ja ringlussev  tt aitab v  ltida  v  imalikke negatiivseid tagaj  rgi keskkonnale ning inimeste  tervisele  Vanade s
6.   Romanian    Informatii de mediu pentru  clientii din Uniunea European      Directiva europeana 2002 96 CE impune ca echipamentele care  prezint   acest simbol    pe produs si sau pe ambalajul acestuia s    nu fie casate impreun   cu gunoiul menajer municipal  Simbolul  indic   faptul c   acest produs trebuie s   fie casat separat de  gunoiul menajer obisnuit  Este responsabilitatea dvs  s   casati  acest produs si alte echipamente electrice si electronice prin  intermediul unit  tilor de colectare special desemnate de guvern  sau de autorit  tile locale  Casarea si reciclarea corecte vor ajuta  la prevenirea potentialelor consecinte negative asupra sanatatii  mediului si a oamenilor  Pentru mai multe informatii detaliate  cu privire la casarea acestui echipament vechi  contactati  autorit  tile locale  serviciul de salubrizare sau magazinul de la  care ati achizitionat produsul     Sloven  ina  Slovak    Inform  cie o ochrane   ivotn  ho  prostredia pre z  kazn  kov v Eur  pskej   nii    Pod  a eur  pskej smernice 2002 96 ES zariadenie s t  mto  symbolom    na produkte a alebo jeho balen   nesmie byt  likvidovan   spolu s netrieden  m komun  lnym odpadom   Symbol znamen      e produkt by sa mal likvidova   oddelene  od be  n  ho odpadu z dom  cnost    Je va  ou povinnos  ou  likvidova   toto i ostatn   elektrick   a elektronick   zariadenia  prostredn  ctvom   pecializovan  ch zbern  ch zariaden   ur  en  ch  vl  dou alebo miestnymi org  nmi  Spr  vna likvid  cia a recykl  
7.   Since  you cannot physically prevent someone from connecting  to your wireless network  you need to take some additional  steps to keep your network secure        Y 1  Change the default wireless  network name or SSID    Wireless devices have a default wireless network name  or Service Set Identifier  SSID  set by the factory  This  is the name of your wireless network  and can be up to  32 characters in length  Linksys wireless products use  linksys as the default wireless network name  You should  change the wireless network name to something unique  to distinguish your wireless network from other wireless  networks that may exist around you  but do not use  personal information  such as your National Insurance  Number  because this information may be available for  anyone to see when browsing for wireless networks     cf 2  Change the default password       For wireless products such as access points and routers   you will be asked for a password when you want to change  their settings  These devices have a default password set  by the factory  The Linksys default password is admin   Hackers know these defaults and may try to use them  to access your wireless device and change your network  settings  To thwart any unauthorised changes  customise  the device s password so it will be hard to guess     cf 3  Enable MAC address filtering       Linksys routers give you the ability to enable Media Access  Control  MAC  address filtering  The MAC address is a  unique series of 
8.   To use this option  select  Keep Alive  In the Redial Period field  you specify how often  you want the Router to check the Internet connection  The  default value is 30 seconds     L2TP    L2TP is a service that applies to connections in Israel only     Internet Setup    LIP T   ServerP Address hb b b b  Username  p o  Password D   C Connect on Demand  Max Vie Time  I5 Minutes       Keep Alive  Redal Period BO Seconds                 Internet Connection Type 5 L2TP    Server IP Address This is the IP address of the L2TP  Server  Your ISP will provide you with the IP Address you  need to specify here     Username and Password Enter the Username and  Password provided by your ISP     Connect on Demand  Max Idle Time You can configure  the Router to cut the Internet connection after it has been  inactive for a specified period of time  Max Idle Time   If  your Internet connection has been terminated due to  inactivity  Connect on Demand enables the Router to  automatically re establish your connection as soon as you  attempt to access the Internet again  To use this option   select Connect on Demand  In the Max ldle Time field   enter the number of minutes you want to elapse before  your Internet connection terminates  The default Max Idle  Time is 15 minutes     Keep Alive  Redial Period If you select this option   the Router will periodically check your Internet  connection  If you are disconnected  then the Router  will automatically re establish your connection  To use  t
9.  27    Chapter 3    Advanced Configuration       LINKSYS by Cisco    Status                         Status  gt  Local Network    Local Network  Local MAC Address The MAC address of the Router s    local  wired interface is displayed here     Router IP Address This shows the Router s IP address  as  it appears on your local network     Subnet Mask This shows the Subnet Mask of the Router     DHCP Server    DHCP Server The status of the Router s DHCP server  function is displayed here     Start IP Address For the range of IP addresses used by  devices on your local network  the starting IP address is  shown here     End IP Address For the range of IP addresses used by  devices on your local network  the ending IP address is  shown here     DHCP Clients Table Click this button to view a list of PCs  that are using the Router as a DHCP server     LINKSYS by Cisco      fette      Unkays2   egent  A   1921681401 O0 ADS CE ES e fie Dose veus           L    zeg 4 AnG   AA  KAG  ne Sur neg Dette    Rm Goo                           DHCP Clients Table    Dual Band Wireless N Gigabit Router          DHCP Client Table    The DHCP Client Table lists computers and other  devices that have been assigned IP addresses by the  Router  The list can be sorted by Client Name  Interface   IP Address  MAC Address and Expired Time  how much  time is left for the current IP address   To remove a  DHCP client  click Delete  To retrieve the most up to   date information  click Refresh  To exit this scre
10.  CUULOPMWON UE  TIG OUOLWO  EIG ATIAITHOEIG KAL GAAEG OXETIK  G  OLATUEEIG TG O  nyiac 1999 5 EC     ExAnvikn   Greek      Tama laite tayttaa direktiivin 1999 5 EY  Suomi olennaiset vaatimukset ja on siina asetettujen   Finnish   muiden laitetta koskevien m    r  ysten        mukainen   Cet appareil est conforme aux exigences    essentielles et aux autres dispositions  pertinentes de la Directive 1999 5 EC  Svenska   Swedish      Fran  ais   French   Denna utrustning ar i   verensst  mmelse med  de v  sentliga kraven och andra relevanta  best  mmelser i Direktiv 1999 5 EC    betta t  ki er samkv  mt grunnkr  fum og    Ca   09rum vi  eigandi   kv    um Tilskipunar For all products  the Declaration of Conformity  DofC  is  Icelandic        1999 5 EC      i available through one or more of these options       slenska    Questo apparato    conforme ai requisiti e A pdf file is included on the product s CD     essenziali ed agli altri principi sanciti dalla SC   Italian   Direttiva tooo cE PD e A print copy is included with the product     Italiano    i e A pdf file is available on the product s webpage   ELE Si iek  rta atbilst Direkt  vas   1999 5  Visit www linksys com international and select your    EK b  tiskajam prasibam un citiem ar to country or region  Then select your product      siete saistitajjem noteikumiem     If you need any other technical documentation  see the   Technical Documents on www linksys com international     Sis jrenginys tenkina 1999 5 EB Direktyvos 
11.  Certification FCC  CE  IC 03  Wi Fi   Operating Temp   O to 40  C  32 to 104  F   Storage Temp    20 to 60  C   4 to 140  F    Operating Humidity 10 to 85  Non condensing  Storage Humidity 5 to 9096 Non condensing      The Router has two main antennas     Specifications are subject to change without notice     Dual Band Wireless N Gigabit Router 30    Appendix C    Warranty Information       Appendix C   Warranty Information    Limited Warranty    Linksys warrants that this Linksys hardware product will be  substantially free of defects in materials and workmanship  arising under normal use during the Warranty Period   which begins on the date of purchase by the original end   user purchaser and lasts for the period specified below     e Two  2  years for new product    e Ninety  90  days for refurbished product    This limited warranty is non transferable and extends only  to the original end user purchaser  Your exclusive remedy  and Linksys  entire liability under this limited warranty will  be for Linksys  at its option  to  a  repair the product with  new or refurbished parts   b  replace the product with a  reasonably available equivalent new or refurbished Linksys  product or  c  refund the purchase price of the product less  any rebates  Any repaired or replacement products will  be warranted for the remainder of the original Warranty  Period or thirty  30  days  whichever is longer  All products  and or parts that are replaced become the property of  Linksys     Thi
12.  Class B digital device  pursuant to Part  15 of the FCC Rules  These limits are designed to provide  reasonable protection against harmful interference in  a residential installation  This equipment generates   uses  and can radiate radio frequency energy and  if not  installed and used according to the instructions  may  cause harmful interference to radio communications   However  there is no guarantee that interference will not  occur in a particular installation  If this equipment does  cause harmful interference to radio or television reception   which is found by turning the equipment off and on  the  user is encouraged to try to correct the interference by  one or more of the following measures     e Reorient or relocate the receiving antenna    e Increase the separation between the equipment or  devices    e Connect the equipment to an outlet other than the  receiver s    e Consulta dealer or an experienced radio TV technician  for assistance    FCC Radiation Exposure Statement    This equipment complies with FCC radiation exposure  limits set forth for an uncontrolled environment  This  equipment should be installed and operated with  minimum distance 20 cm between the radiator and your  body     Safety Notices    e Caution  To reduce the risk of fire  use only No 26 AWG  or larger telecommunication line cord     e Do not use this product near water  for example  in a  wet basement or near a swimming pool     e Avoid using this product during an electrical storm   T
13.  F R  12 212  All Government users acquire the  Software and documentation with only those rights  herein that apply to non governmental customers     General Terms  This Agreement will be governed by and  construed in accordance with the laws of the State of  California  without reference to conflict of laws principles   The United Nations Convention on Contracts for the  International Sale of Goods will not apply  If any portion  of this Agreement is found to be void or unenforceable   the remaining provisions will remain in full force and  effect  This Agreement constitutes the entire agreement  between the parties with respect to the Software and  supersedes any conflicting or additional terms contained  in any purchase order or elsewhere     END OF SCHEDULE 1    Schedule 2    If this Linksys product contains open source software  licensed under Version 2 of the  GNU General Public  Licence  then the licence terms below in this Schedule 2  will apply to that open source software  The licence terms  below in this Schedule 2 are from the public web site at    http   www gnu org copyleft gpl html  GNU GENERAL PUBLIC LICENCE    This is an unofficial translation of the GNU General Public  Licence into  language   It was not published by the  Free Software Foundation and does not legally state the  distribution terms for software that uses the GNU GPL     only the original English text of the GNU GPL does that   However  we hope that this translation will help  language   speak
14.  FOR THE PRODUCT   The foregoing limitations will apply even if any warranty  or remedy provided under this limited warranty fails of  its essential purpose  Some jurisdictions do not allow  the exclusion or limitation of incidental or consequential  damages  so the above limitation or exclusion may not    apply to you     Obtaining Warranty Service    If you have a question about your product or experience a  problem with it  please go to www linksys com support  where you will find a variety of online support tools and  information to assist you with your product  If the product  proves defective during the Warranty Period  contact  Linksys Technical Support for instructions on how to  obtain warranty service  The telephone number for Linksys  Technical Support in your area can be found in the product  User Guide and at www linksys com  Have your product  serial number and proof of purchase on hand when calling   A DATED PROOF OF ORIGINAL PURCHASE IS REQUIRED  TO PROCESS WARRANTY CLAIMS  If you are requested to  return your product  you will be given a Return Materials  Authorisation  RMA  number  You are responsible for  properly packaging and shipping your product to Linksys  at your cost and risk  You must include the RMA number    31    Appendix C Warranty Information       and a copy of your dated proof of original purchase when  returning your product  Products received without a RMA  number and dated proof of original purchase will be  rejected  Do not include any ot
15.  Linksys LLC or from one of its  affiliates Cisco Systems Linksys  Asia  Pte Ltd  or Cisco   Linksys K K    Linksys   contains software  including  firmware  originating from Linksys and its suppliers  and may also contain software from the open source  community  Any software originating from Linksys and its  suppliers is licensed under the Linksys Software Licence  Agreement contained at Schedule 1 below  You may also  be prompted to review and accept that Linksys Software  Licence Agreement upon installation of the software    Any software from the open source community is licensed  under the specific license terms applicable to that software  made available by Linksys at www linksys com gpl or as  provided for in Schedules 2  3 and 4 below     Where such specific licence terms entitle you to the  source code of such software  that source code is upon  request available at cost from Linksys for at least three  years from the purchase date of this product and may also  be available for download from www linksys com gpl   For detailed licence terms and additional information on  open source software in Linksys products please look at  the Linksys public web site at  www linksys com gpl  or  Schedules 2  3 or 4 below as applicable     BY DOWNLOADING OR INSTALLING THE SOFTWARE   OR USING THE PRODUCT CONTAINING THE SOFTWARE   YOU ARE CONSENTING TO BE BOUND BY THE SOFTWARE  LICENCE AGREEMENTS BELOW  IF YOU DO NOT AGREE TO  ALL OF THESE TERMS  THEN YOU MAY NOT DOWNLOAD   INSTALL 
16.  MODIFICATION    O  This Licence Agreement applies to any software library  or other program which contains a notice placed by  the copyright holder or other authorised party saying  it may be distributed under the terms of this Lesser  General Public Licence  also called  this Licence      Each  licensee is addressed as  you      A  library  means a collection of software functions  and or data prepared so as to be conveniently linked  with application programs  which use some of those  functions and data  to form executables     The  Library   below  refers to any such software library  or work which has been distributed under these terms   A  work based on the Library  means either the Library  or any derivative work under copyright law  that is to  say  a work containing the Library or a portion of it   either verbatim or with modifications and or translated  straightforwardly into another language   Hereinafter   translation is included without limitation in the term   modification        Source code  for a work means the preferred form of  the work for making modifications to it  For a library   complete source code means all the source code for  all modules it contains  plus any associated interface  definition files  plus the scripts used to control  compilation and installation of the library     Activities other than copying  distribution and  modification are not covered by this Licence  they are  outside its scope  The act of running a program using  the Library i
17.  Setup section changes the settings on the  network connected to the Router s Ethernet ports  Wireless  setup is performed through the Wireless tab     Router IP    This presents both the Router s IP Address and Subnet  Mask as seen by your network     Router IP P Address 192  163 1 AL  Subrel Mask 21552552550  Router IP  DHCP Server Setting    The settings allow you to configure the Router s Dynamic  Host Configuration Protocol  DHCP  server function  The  Router can be used as a DHCP server for your network  A  DHCP server automatically assigns an IP address to each  computer on your network  If you choose to enable the  Router s DHCP server option  make sure there is no other  DHCP server on your network     Ggnabled O Disabled    182 166   1  100   pro   182168 1 100   149   H minados     means one day                  o     H  0  0       DHCP Server Setting    DHCP Server DHCP is enabled by factory default  If you  already have a DHCP server on your network or you don t  want a DHCP server  then select Disabled  no other DHCP  features will be available      DHCP Reservation Click this button if you want to assign  a fixed local IP address to a MAC address     Dual Band Wireless N Gigabit Router    DHCP Reservation    You will see a list of DHCP clients with the following  information  Client Name  Interface  IP Address and  MAC Address     DCP Hesenvatian  Saba Ce niim From  DHCP Table    Emter CHemg Nama   Assign IP Address    Chema ETIS I    IU    ci ou di  Te This MA
18.  This is the Router s IP address   as seen from the Internet  Your ISP will provide you  with the IP Address you need to specify here     e Subnet Mask This is the Router s Subnet Mask  as  seen by users on the Internet  including your ISP   Your  ISP will provide you with the Subnet Mask     e Default Gateway Your ISP will provide you with the  IP address of the ISP server     e DNS 1 3 Your ISP will provide you with at least one  DNS  Domain Name System  server IP address     PPTP Server IP Address Your ISP will provide you with  the IP address of the PPTP server     Username and Password Enter the Username and  Password provided by your ISP     Connect on Demand  Max Idle Time You can configure  the Router to cut the Internet connection after it has been  inactive for a specified period of time  Max Idle Time   If  your Internet connection has been terminated due to    8    Chapter 3    Advanced Configuration       inactivity  Connect on Demand enables the Router to  automatically re establish your connection as soon as you  attempt to access the Internet again  To use this option   select Connect on Demand  In the Max ldle Time field   enter the number of minutes you want to elapse before  your Internet connection terminates  The default Max Idle  Time is 15 minutes     Keep Alive  Redial Period If you select this option  the  Router will periodically check your Internet connection  If  you are disconnected  then the Router will automatically  re establish your connection
19.  by the Free Software Foundation  If the Program does  not specify a version number of this Licence  you  may choose any version ever published by the Free  Software Foundation     10  If you wish to incorporate parts of the Program into  other free programs whose distribution conditions are  different  write to the author to ask for permission  For  software which is copyrighted by the Free Software  Foundation  write to the Free Software Foundation  we  sometimes make exceptions for this  Our decision will  be guided by the two goals of preserving the free status  of all derivatives of our free software and of promoting  the sharing and reuse of software generally     NO WARRANTY    11  BECAUSETHE PROGRAM IS LICENSED FREE OF CHARGE   THERE IS NO WARRANTY FOR THE PROGRAM  TO THE  EXTENT PERMITTED BY APPLICABLE LAW  EXCEPT  WHEN OTHERWISE STATED INWRITING THE COPYRIGHT  HOLDERS AND OR OTHER PARTIES PROVIDE THE  PROGRAM  AS IS  WITHOUT WARRANTY OF ANY  KIND  EITHER EXPRESSED OR IMPLIED  INCLUDING   BUT NOT LIMITED TO  THE IMPLIED WARRANTIES OF  MERCHANTABILITY AND FITNESS FOR A PARTICULAR  PURPOSE  THE ENTIRE RISK AS TO THE QUALITY AND  PERFORMANCE OF THE PROGRAM IS WITH YOU   SHOULD THE PROGRAM PROVE DEFECTIVE  YOU  ASSUME THE COST OF ALL NECESSARY SERVICING   REPAIR OR CORRECTION     12  IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR  AGREED TO INWRITING WILL ANY COPYRIGHT HOLDER   OR ANY OTHER PARTY WHO MAY MODIFY AND OR  REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE   BE L
20.  esminius reikalavimus ir kitas   ios direktyvos section  as shown later in this appendix   nuostatas     Lietuvi     Lithuanian      Dual Band Wireless N Gigabit Router 35    Appendix D    Regulatory Information       Wireless Equipment   Wireless N G A B Products     The following standards were applied during the  assessment of the product against the requirements of  the Directive 1999 5 EC     e Radio  EN 300 328 and or EN 301 893 as applicable  e EMC  EN 301 489 1  EN 301 489 17  e Safety  EN 60950 and either EN 50385 or EN 50371    Dynamic Frequency Selection  DFS  and Transmit Power  Control  TPC  are required for operation in the 5 GHZ  band     DFS  The equipment meets the DFS requirements as  defined in ETSI EN 301 893  This feature is required by  the regulations to avoid interference with Radio Location  Services  radars      TPC  For operation in the 5 GHz band  the maximum power  level is 3 dB or more below the applicable limit  As such   TPC is not required     CE Marking    For the Linksys Wireless N   G   B  and or  A products   the following CE mark  notified body number  where  applicable   and class 2 identifier are added to the  equipment     CE 0560 O    CE 0678     CE 0336 O    Or  Check the CE label on the product to find out which  notified body was involved during the assessment     Dual Band Wireless N Gigabit Router    National Restrictions    This product may be used in all EU countries  and other  countries following the EU directive 1999 5 EC  
21.  is given a distinguishing version number   If the Library specifies a version number of this Licence  which applies to it and  any later version   you have the  option of following the terms and conditions either of  that version or of any later version published by the Free  Software Foundation  If the Library does not specify a  licence version number  you may choose any version  ever published by the Free Software Foundation     If you wish to incorporate parts of the Library into  other free programs whose distribution conditions are  incompatible with these  write to the author to ask for  permission  For software which is copyrighted by the  Free Software Foundation  write to the Free Software  Foundation  we sometimes make exceptions for  this  Our decision will be guided by the two goals of  preserving the free status of all derivatives of our free  software and of promoting the sharing and reuse of  software generally     NO WARRANTY    15     BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE   THERE IS NO WARRANTY FOR THE LIBRARY  TO THE  EXTENT PERMITTED BY APPLICABLE LAW  EXCEPT  WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT  HOLDERS AND OR OTHER PARTIES PROVIDE THE  LIBRARY  AS IS  WITHOUT WARRANTY OF ANY KIND   EITHER EXPRESSED OR IMPLIED  INCLUDING  BUT  NOT LIMITED TO  THE IMPLIED WARRANTIES OF  MERCHANTABILITY AND FITNESS FOR A PARTICULAR  PURPOSE  THE ENTIRE RISK AS TO THE QUALITY AND  PERFORMANCE OF THE LIBRARY IS WITH YOU  SHOULD  THE LIBRARY PROVE DEFECTIV
22.  made by offering access  to copy from a designated place  offer equivalent  access to copy the above specified materials from  the same place     e  Verify that the user has already received a copy of  these materials or that you have already sent this  user a copy     For an executable  the required form of the  work that  uses the Library  must include any data and utility  programs needed for reproducing the executable from  it  However  as a special exception  the materials to be  distributed need not include anything that is normally  distributed  in either source or binary form  with the  major components  compiler  kernel and so on  of the  operating system on which the executable runs  unless  that component itself accompanies the executable     It may happen that this requirement contradicts the  licence restrictions of other proprietary libraries that  do not normally accompany the operating system   Such a contradiction means you cannot use both  them and the Library together in an executable that  you distribute     Dual Band Wireless N Gigabit Router    f     Software Licence Agreement       You may place library facilities that are a work based  on the Library side by side in a single library together  with other library facilities not covered by this Licence  and distribute such a combined library  provided that  the separate distribution of the work based on the  Library and of the other library facilities is otherwise  permitted and provided that you do thes
23.  modem  and then  insert the setup CD into your computer  Click Setup and  follow the on screen instructions     The computer cannot connect wirelessly to the network     Make sure the wireless network name or SSID is the same  on both the computer and the Router  If you have enabled  wireless security  then make sure the same security  method and key are used by both the computer and the  Router     You need to modify the settings on the Router     Open the web browser  for example  Internet Explorer or  Firefox   and enter the Router s IP address in the address  field  the default IP address is 192 168 1 1   When  prompted  enter the password to the Router  the default is  admin   Click the appropriate tab to change the settings     WEB  If your questions are not addressed here   refer to the Linksys website  www linksys com       29    Appendix B Specifications       Appendix B     Specifications   Model WRT320N   Standards Draft 802 11n  802 11a  802 119   802 11b  802 3  802 3u  802 3ab   Ports Power  Internet  and Ethernet   Buttons Reset  Wi Fi Protected Setup   LEDs Ethernet  1 4   Wi Fi Protected  Setup  Wireless  Internet  Power   Cabling Type CAT 5e    Number of Antennas 3  RF Pwr  EIRP  in dBm 17 dBm    Antenna Gain in dBi Main Antenna   1 5 dBi  Third Antenna  2 2 dBi    UPnP able cert Able  Security Features WEP  WPA  WPA2  Security Key Bits 128 Bit    Environmental   Dimensions 202 x 160 x 34 mm   7 95  x 6 3  x 1 34     Weight 10 58 oz  0 30 kg    Power 12 V  
24.  mogelijke negatieve gevolgen voor  het milieu en de gezondheid  Voor meer informatie over het  vernietigen van uw oude apparatuur neemt u contact op met  de plaatselijke autoriteiten of afvalverwerkingsdienst  of met de  winkel waar u het product hebt aangeschaft     Norsk  Norwegian    Milj  informasjon for kunder i EU    EU direktiv 2002 96 EF krever at utstyr med f  lgende symbol  Z avbildet p   produktet og eller pakningen  ikke m   kastes  sammen med usortert avfall  Symbolet indikerer at dette  produktet skal h  ndteres atskilt fra ordin  r avfallsinnsamling  for husholdningsavfall  Det er ditt ansvar    kvitte deg med  dette produktet og annet elektrisk og elektronisk avfall via egne  innsamlingsordninger slik myndighetene eller kommunene  bestemmer  Korrekt avfallsh  ndtering og gjenvinning vil  v  re med p      forhindre mulige negative konsekvenser for  milj   og helse  For n  rmere informasjon om h  ndtering av  det kasserte utstyret ditt  kan du ta kontakt med kommunen   en innsamlingsstasjon for avfall eller butikken der du kj  pte  produktet     Polski  Polish    Informacja dla klient  w w Unii  Europejskiej o przepisach dotycz  cych ochrony    rodowiska    Dyrektywa Europejska 2002 96 EC wymaga  aby sprz  t  oznaczony symbolem 4 znajduj  cym si   na produkcie i lub jego  opakowaniu nie by   wyrzucany razem z innymi niesortowanymi  odpadami komunalnymi  Symbol ten wskazuje    e produkt  nie powinien by   usuwany razem ze zwyk  ymi odpadami z  gospodarstw domowy
25.  network s radius     LINKSYS by Cisco    Wireless    mba lasa    CO Paa Pa a a a ra a bo    PAG a  wer COCO     mac or Wm  MACS MON   ememr  Nk Cd NG NG NG DOPO NG   aasa eg   EE   MAC pg OC DOC ECHEC OO   TR EEN   cop MEME EEE   Mt o   OO ocre   wc ap Ta    MAC  DEE   mac loto nan   mitri ODA   matri Dram   mapak 00000   MAC 47  an    auc ap DD   mac TK DEn   WA z   SOOO   aec 3i  SOO ODDO D   MAC Ir IUD SIDO   wei yy DEI   AG Ha  E   wc mae 8       Wireless 5 Wireless MAC Filter    16    Chapter 3    Advanced Configuration       Wireless MAC Filter    Enabled Disabled To filter wireless users by MAC Address   either permitting or blocking access  select Enabled  If you  do not wish to filter users by MAC Address  keep the default  setting  Disabled     Access Restriction    Prevent Select this to block wireless access by MAC  Address  This option is selected by default     Permit Select this to allow wireless access by MAC  Address  This option is not selected by default     MAC Address Filter List    Wireless Client List Click this to open the Wireless Client  List screen     Warciess  bert Lost    Save bo MAL Address  Filter List       Wireless Client List    Wireless Client List    This screen shows computers and other devices on  the wireless network  The list can be sorted by Client  Name  Interface  IP Address  MAC Address and Status     Select Save to MAC Address Filter List for any device  you want to add to the MAC Address Filter List  Then  click Add     To retri
26.  or select Both     Priority Select the appropriate priority  High  Medium   Recommend   Normal or Low     Click Add to save your changes  Your new entry will appear  in the Summary list     Online Games                   QoS 5 Online Games    Games Select the appropriate game     Priority Select the appropriate priority  High  Medium   Recommend   Normal or Low     Click Add to save your changes  Your new entry will appear  in the Summary list     MAC Address       QoS 5s MAC Address    Enter a Name Enter a name for your device   MAC Address Enter the MAC address of your device     Priority Select the appropriate priority  High  Medium   Recommend   Normal or Low     Click Add to save your changes  Your new entry will appear  in the Summary list     Ethernet Port       QoS  gt  Ethernet Port    Ethernet Select the appropriate Ethernet port     Priority Select the appropriate priority  High  Medium   Recommend   Normal or Low     Click Add to save your changes  Your new entry will appear  in the Summary list     23    Chapter 3    Advanced Configuration       Voice Device    Category    voice Device    My Voice Devices MAC Address  000060001757          QoS  gt  Voice Device    Enter a Name Enter a name for your voice device     MAC Address Enter the MAC address of your voice  device     Priority Select the appropriate priority  High   Recommend   Medium  Normal or Low    Click Add to save your changes  Your new entry will appear  in the Summary list     Summary    This lists
27.  other property right claims or  to contest validity of any such claims  this section has  the sole purpose of protecting the integrity of the free  software distribution system which is implemented  by public licence practices  Many people have  made generous contributions to the wide range of  software distributed through that system in reliance  on consistent application of that system  it is up to  the author donor to decide if he or she is willing to  distribute software through any other system and a  licensee cannot impose that choice     This section is intended to make thoroughly clear  what is believed to be a consequence of the rest of this  Licence     If the distribution and or use of the Library is restricted  in certain countries either by patents or by copyrighted  interfaces  the original copyright holder who places  the Library under this Licence may add an explicit  geographical distribution limitation excluding those  countries  so that distribution is permitted only in or  among countries not thus excluded  In such case  this  Licence incorporates the limitation as if written in the  body of this Licence     The Free Software Foundation may publish revised  and or new versions of the Lesser General Public  Licence from time to time  Such new versions will be  similar in spirit to the present version  but may differ in  detail to address new problems or concerns     Dual Band Wireless N Gigabit Router    14     Software Licence Agreement       Each version
28.  provision  and You will not disclose or make available  such trade secrets or copyrighted material in any form  to any third party  Title to and ownership of the Software  and documentation and any portion thereof  will remain  solely with Linksys or its suppliers     Collection and Processing of Information  You agree that  Linksys and or its affiliates may  from time to time  collect  and process information about your Linksys product and   or the Software and or your use of either in order  i  to  enable Linksys to offer you Upgrades   ii  to ensure that    42    Appendix E    Software Licence Agreement       your Linksys product and or the Software is being used in  accordancewiththetermsofthis Agreement   iii  to provide  improvements to the way Linksys delivers technology to  you and to other Linksys customers   iv  to enable Linksys  to comply with the terms of any agreements it has with  any third parties regarding your Linksys product and or  Software and or  v  to enable Linksys to comply with all  applicable laws and or regulations or the requirements  of any regulatory authority or government agency   Linksys and  or its affiliates may collect and process  this information provided that it does not identify you  personally  Your use of your Linksys product and or the  Software constitutes this consent by you to Linksys and   or its affiliates  collection and use of such information and   for EEA customers  to the transfer of such information to a  location outsid
29.  the QoS entries you have created for your  applications and devices     Priority This column displays the bandwidth priority of  High  Medium  Normal or Low     Name This column displays the application  device or  port name     Information This column displays the port range or  MAC address entered for your entry  If a pre configured  application or game was selected  there will be no valid  entry shown in this section     Remove Click this button to remove an entry   Edit Click this button to make changes     Click Save Settings to apply your changes or click Cancel  Changes to cancel your changes     Administration 5 Management    The Administration 5 Management screen allows the  network s administrator to manage specific Router  functions for access and security     Dual Band Wireless N Gigabit Router    LINKSYS by Cisco           Administration              Administration    Management    Management    Router Access    To ensure the Router s security  you will be asked for your  password when you access the Router s web based utility   The default is admin     Router Password Enter a new password for the Router     Re enter to confirm Enter the password again to  confirm     Web Access    Web Utility Access HTTP  HyperText Transport Protocol   isthe communications protocol used to connect to servers  on the World Wide Web  HTTPS uses SSL  Secured Socket  Layer  to encrypt data transmitted for higher security   Select HTTP or HTTPS  HTTP is the default     Web Utility A
30.  the firmware  download the Router s  firmware upgrade file from the Linksys website   www linksys com  Then extract the file     Please select a file to upgrade the firmware Click  Browse and select the extracted firmware upgrade file     Start to Upgrade After you have selected the  appropriate file  click this button and follow the on screen  instructions     Status  gt  Router    The Router screen displays information about the Router  and its current settings     Dual Band Wireless N Gigabit Router    LINKSYS by Cisco    Stabus    LI a g  t Ica d  Pis  E PATA FRE  Naal di aol ae   er Pern iE    ee p N       Status    Router    Router Information    Firmware Version This is the version number of the  Router s current firmware     Firmware Verification This shows the MD5 value  generated during code compilation     Current Time This shows the time set on the Router     Internet MAC Address This is the Router s MAC Address   as seen by your ISP     Host Name  f required by your ISP  this was entered on  the Basic Setup screen     Domain Name If required by your ISP  this was entered  on the Basic Setup screen     Internet Connection    This section shows the current network information  stored in the Router  The information varies depending on  the Internet connection type selected on the Basic Setup  screen     Click Refresh to update the on screen information     Status  gt  Local Network    The Local Network screen displays information about the  local  wired network    
31.  to cable connections      internet Connection Type    Automatic Configuration   DHCP e         Internet Connection Type  gt  Automatic Configuration   DHCP    Chapter 3    Advanced Configuration       Static IP    If you are required to use a permanent IP address to  connect to the Internet  select Static IP        Internet Connection Type  gt  Static IP    Internet IP Address This is the Router s IP address  when  seen from the Internet  Your ISP will provide you with the  IP Address you need to specify here     Subnet Mask This is the Router s Subnet Mask  as seen  by users on the Internet  including your ISP   Your ISP will  provide you with the Subnet Mask     Default Gateway Your ISP will provide you with the IP  address of the ISP server     DNS 1 3 Your ISP will provide you with at least one DNS   Domain Name System  server IP address     PPPoE    Some DSL based ISPs use PPPOE  Point to Point Protocol  over Ethernet  to establish Internet connections  If you are  connected to the Internet through a DSL line  check with  your ISP to see if they use PPPOE  If they do  you will have  to enable PPPoE     internel Setup  TE  WE     m  Password Er                       1    Service Name  Optional        Connect on Demanct Max idle Time  15 Mirades        Keep Alive  Redial Period  30 Seconds        Internet Connection Type 5 PPPoE    Username and Password Enter the Username and  Password provided by your ISP     Service Name If provided by your ISP  enter the Service  Name 
32.  to the copy of this  Licence  Also  you must do one of these things     49    Appendix E    a  Accompany the work with the complete  corresponding machine readable source code  for the Library including whatever changes were  used in the work  which must be distributed  under Sections 1 and 2 above   and  if the work  is an executable linked with the Library  with the  complete machine readable  work that uses the  Library     as object code and or source code  so that  the user can modify the Library and then relink  to produce a modified executable containing the  modified Library   It is understood that the user  who changes the contents of definitions files in the  Library will not necessarily be able to recompile the  application to use the modified definitions      b  Usea suitable shared library mechanism for linking  with the Library  A suitable mechanism is one that   1  uses at run time a copy of the library already  present on the user s computer system  rather than  copying library functions into the executable and   2  will operate properly with a modified version of  the library  if the user installs one  as long as the  modified version is interface compatible with the  version that the work was made with     c  Accompany the work with a written offer  valid  for at least three years  to give the same user the  materials specified in Subsection Ga  above  for a  charge no more than the cost of performing this  distribution     d  If distribution of the work is
33.  value  Its clients  hear the beacons and awaken to receive the broadcast  and multicast messages  The default value is 1     Fragmentation Threshold This value specifies the  maximum size for a packet before data is fragmented  into multiple packets  If you experience a high packet  error rate  you may slightly increase the Fragmentation  Threshold  Setting the Fragmentation Threshold too low  may result in poor network performance  Only minor  reduction of the default value is recommended  In most  cases  it should remain at its default value of 2346     RTS Threshold Should you encounter inconsistent data  flow  only a minor reduction of the default value  2347   is recommended  If a network packet is smaller than the  preset RTS threshold size  the RTS CTS mechanism will  not be enabled  The Router sends Request to Send  RTS   frames to a particular receiving station and negotiates  the sending of a data frame  After receiving an RTS  the  wireless station responds with a Clear to Send  CTS  frame  to acknowledge the right to begin transmission  The RTS  Threshold value should remain at its default value of  2347     Click Save Settings to apply your changes or click Cancel  Changes to cancel your changes     Dual Band Wireless N Gigabit Router    Security 5 Firewall    The Firewall screen is used to configure a firewall that can  filter out various types of unwanted traffic on the Router s  local network     LINKSYS by Cisco    Security    cj Fier hne LS      C Fir ica  
34.  with the standard  integral  or dedicated  external  antenna s  that is are shipped  together with the equipment  However  some applications  may require the antenna s   if removable  to be separated  from the product and installed remotely from the device  by using extension cables  For these applications  Linksys  offers an R SMA extension cable  AC9SMA  and an R TNC  extension cable  AC9TNC   Both of these cables are 9  metres long and have a cable loss  attenuation  of 5 dB  To  compensate for the attenuation  Linksys also offers higher  gain antennas  the HGA7S  with R SMA connector  and  HGA7T  with R TNC connector   These antennas have a  gain of 7 dBi and may only be used with either the R SMA  or R TNC extension cable     Combinations of extension cables and antennas resulting  in a radiated power level exceeding 100 mW EIRP are  ilegal     Third Party Software or Firmware    The use of software or firmware not supported provided  by Linksys may result that the equipment is no longer  compliant with the regulatory requirements     Technical Documents on  www linksys com international    Follow these steps to access technical documents     1  Enter http   www linksys com international in your  web browser     Select the country or region in which you live   Click the Products tab    Select the appropriate product category   Select the product sub category  if necessary     Select the product     A De ML KO NG    Select the type of documentation you want from the  Mor
35.  your changes or click  Cancel Changes to cancel your changes  To return to the  Internet Access Policy screen  click Close     inter fal POY Sey      FRERE      mi  ma       OOOO OOO ooo       Summary    19    Chapter 3    Advanced Configuration       Status Policies are disabled by default  To enable a policy   select the policy number from the drop down menu and  select Enabled     To create a policy  follow steps 1 11  Repeat these steps to  create additional policies  one at a time     1  Select a number from the Access Policy drop down  menu     2  Enter a Policy Name in the field provided   3  To enable this policy  select Enabled     4  Click Edit List to select which PCs will be affected by  the policy  The List of PCs screen appears  You can select  a PC by MAC address or IP address  You can also enter  a range of IP addresses if you want this policy to affect  a group of PCs  After making your changes  click Save  Settings to apply your changes or click Cancel Changes  to cancel your changes  Then click Close     MAC Adda gai    197 168 1 0 DA 192 168  1  0  192  168  7  0   1392 188 1  0  192 168 1  0                      LT  D 190 168 1 0  oO  oa  19  162 1 9 mO             List of PCs    5  Select the appropriate option  Deny or Allow   depending on whether you want to block or allow  Internet access for the PCs you listed on the List of PCs  screen     6  Decide which days and what times you want this policy  to be enforced  Select the individual days during wh
36. 00    5150 5350     5470 5725        tDynamic Frequency Selection and Transmit Power Control are  required in the frequency ranges of 5250 5350 MHz and 5470 5725  MHz     The following countries have restrictions and or  requirements in addition to those given in the table  labelled  Overview of Regulatory Requirements for  Wireless LANs      Denmark    In Denmark  the band 5150   5350 MHz is also allowed for  outdoor usage     I Danmark ma frekvensb  ndet 5150   5350 ogs   anvendes  udend  rs     36    Appendix D    Regulatory Information       France    For 2 4 GHz  the product should not be used outdoors  in the band 2454   2483 5 MHz  There are no restrictions  when used in other parts of the 2 4 GHz band when used  indoors  Check http   www arcep fr  for more details     Pour la bande 2 4 GHz  I      quipement ne doit pas   tre utilis    en ext  rieur dans la bande 2454   2483 5 MHz  Il n y a pas de  restrictions pour des utilisations en int  rieur dans d autres  parties de la bande 2 4GHz  Consultez http   www arcep fr   pour de plus amples d  tails     Applicable Power Levels in France    Frequency    Range  MHz  Power  EIRP     Location    Indoor    2400 2483 5   No restrictions     100 mW  20 dBm     2400 2454 100 mW  20 dBm     Outdoor    2454 2483 5 10 mW  10 dBm     Italy    This product meets the National Radio Interface and  the requirements specified in the National Frequency  Allocation Table for Italy  Unless this 2 4 GHz wireless LAN  product is operating wi
37. C  MAC    Address Address      Client Hame Assign IP Address    EIE LLLI  NEIN EN       DHCP Reservation    e Select Clients from DHCP Table Click the Select tick  box to reserve a client s IP address  Then click Add  Clients     e Manually Adding Client To manually assign an IP  address  enter the client s name in the Enter Client  Name field  Enter the IP address you want it to have in  the Assign IP Address field  Enter its MAC address in the  To This MAC Address field  Then click Add     Clients Already Reserved    A list of DHCP clients and their fixed local IP addresses  will be displayed at the bottom of the screen  If you  want to remove a client from this list  click Remove     Click Save Settings to apply your changes or click  Cancel Changes to cancel your changes  To view the  most up to date information  click Refresh  To exit this  screen  click Close     Start IP Address Enter a value for the DHCP server to  start with when issuing IP addresses  Because the Router s  default IP address is 192 168 1 1  the Start IP Address must  be 192 168 1 2 or greater  but smaller than 192 168 1 253   The default Starting IP Address is 192 168 1 100     Maximum Number of Users Enter the maximum  number of PCs that you want the DHCP server to assign  IP addresses to  This number cannot be greater than 253   The default is 50     IP Address Range Displayed here is the range of available  IP addresses     10    Chapter 3    Advanced Configuration       Client Lease Time The Clie
38. CISCO      by Cisco    LINKSYS    USER GUIDE    Dual Band Wireless N    Gigabit Router    WRT320N    Model       About This Guide       About This Guide    Icon Descriptions    While reading through the User Guide you may see  various icons that call attention to specific items  Below is  a description of these icons     Li NOTE  This tick indicates that there is a note of  interest and is something that you should pay  special attention to while using the product        AN WARNING  This exclamation point indicates   that there is a caution or warning and it is  something that could damage your property or  product           A WEB  This globe icon indicates a noteworthy  website address or email address     Online Resources    Website addresses in this document are listed without  http    in front of the address because most current web  browsers do not require it  If you use an older web browser   you may have to add http    in front of the web address     Resource Website    Linksys International   www linksys com international    Glossary www linksys com glossary       Network Security www linksys com security    Copyright and Trademarks    Linksys  Cisco and the Cisco Logo  are registered trademarks or  trademarks of Cisco Systems  Inc   and or its affiliates in the U S  and  certain other countries  Copyright  O 2009 Cisco Systems  Inc  All rights  reserved  Other brands and product  names are trademarks or registered  trademarks of their respective  holders     MT KUNTI
39. D  Fier inierrei MAT erecci  n  E  Fee DET an    Cy Low  lama  0  coma       Security 5 Firewall    Firewall    SPI Firewall Protection To use firewall protection   keep the default selection  Enabled  To turn off firewall  protection  select Disabled     Internet Filter    Filter Anonymous Internet Requests This feature  makes it more difficult for outside users to work their  way into your network  This feature is selected by default   Deselect the feature to allow anonymous Internet  requests     Filter Multicast Multicasting allows for multiple  transmissions to specific recipients at the same time  If  multicasting is permitted  then the Router will allow IP  multicast packets to be forwarded to the appropriate  computers  Select this feature to filter multicasting  This  feature is not selected by default     Filter Internet NAT Redirection This feature uses port  forwarding to block access to local servers from local  networked computers  Select this feature to filter Internet  NAT redirection  It is not selected by default     Filter IDENT  Port 113  This feature keeps port 113 from  being scanned by devices outside of your local network   This feature is selected by default  Deselect this feature to  disable it     Web Filter    Proxy Use of WAN proxy servers may compromise the  Gateway s security  Denying Proxy will disable access to  any WAN proxy servers  Select this feature to enable proxy  filtering  Deselect the feature to allow proxy access     Java Java is a 
40. E  YOU ASSUME THE  COST OF ALL NECESSARY SERVICING  REPAIR OR  CORRECTION       IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW    OR AGREED TO IN WRITING WILL ANY COPYRIGHT  HOLDER  OR ANY OTHER PARTY WHO MAY MODIFY  AND OR REDISTRIBUTE THE LIBRARY AS PERMITTED  ABOVE  BE LIABLE TO YOU FOR DAMAGES   INCLUDING ANY GENERAL  SPECIAL  INCIDENTAL OR  CONSEQUENTIAL DAMAGES ARISING OUT OF THE  USE OR INABILITY TO USE THE LIBRARY  INCLUDING  BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING  RENDERED INACCURATE OR LOSSES SUSTAINED BY  YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY  TO OPERATE WITH ANY OTHER SOFTWARE   EVEN IF  SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED  OF THE POSSIBILITY OF SUCH DAMAGES     END OF TERMS AND CONDITIONS  END OF SCHEDULE 3    51    Appendix E    Software Licence Agreement       Schedule 4    If this Linksys product contains open source software  licensed under the OpenSSL licence     This product includes software developed by the  OpenSSL Project for use in the OpenSSL Toolkit      http   www openssl org       This product includes cryptographic software written by  Eric Young  eay cryptsoft com      This product includes software written by Tim Hudson   tjhacryptsoft com      In addition  if this Linksys product contains open  source software licensed under the OpenSSL licence  then the licence terms below in this Schedule 3 will  apply to that open source software  The licence terms  below in this Schedule 3 are from the public web site at    http   w
41. IABLE TO YOU FOR DAMAGES  INCLUDING ANY  GENERAL  SPECIAL  INCIDENTAL OR CONSEQUENTIAL  DAMAGES ARISING OUT OF THE USE OR INABILITY TO  USE THE PROGRAM  INCLUDING BUT NOT LIMITED TO  LOSS OF DATA OR DATA BEING RENDERED INACCURATE  OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR  A FAILURE OF THE PROGRAM TO OPERATE WITH ANY  OTHER PROGRAMS   EVEN IF SUCH HOLDER OR OTHER  PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF  SUCH DAMAGES     END OF TERMS AND CONDITIONS  END OF SCHEDULE 2    Schedule 3    If this Linksys product contains open source software  licensed underVersion 2 1 of the  GNU Lesser General Public  Licence  then the licence terms below in this Schedule 3  will apply to that open source software  The licence terms  below in this Schedule 3 are from the public web site at    http   www gnu org licenses old licenses Igpl 2 1 html     46    Appendix E    Software Licence Agreement       GNU LESSER GENERAL PUBLIC LICENCE    This is an unofficial translation of the GNU General Public  Licence into  language   It was not published by the  Free Software Foundation and does not legally state the  distribution terms for software that uses the GNU GPL     only the original English text of the GNU GPL does that   However  we hope that this translation will help  language   speakers understand the GNU GPL better     Version 2 1  February 1999  Copyright  C  1991  1999 Free Software Foundation  Inc     51 Franklin Street  Fifth Floor  Boston  MA 02110 1301   USA    Everyone is per
42. ION AND  MODIFICATION    O  This Licence applies to any program or other work  which contains a notice placed by the copyright  holder saying it may be distributed under the terms  of this General Public Licence  The  Program   below   refers to any such program or work and a  work  based on the Program  means either the Program  or any derivative work under copyright law  that is  to say  a work containing the Program or a portion  of it  either verbatim or with modifications and   or translated into another language   Hereinafter   translation is included without limitation in the term   modification    Each licensee is addressed as  you      Activities other than copying  distribution and  modification are not covered by this Licence  they  are outside its scope  The act of running the Program  is not restricted and the output from the Program is  covered only if its contents constitute a work based on  the Program  independent of having been made by  running the Program   Whether that is true depends  on what the Program does     1  You may copy and distribute verbatim copies of the  Program s source code as you receive it  in any medium   provided that you conspicuously and appropriately  publish on each copy an appropriate copyright  notice and disclaimer of warranty  keep intact all the  notices that refer to this Licence and to the absence  of any warranty  and give any other recipients of the  Program a copy ofthis Licence along with the Program     You may charge a 
43. IP network  To allow PPTP tunnels to  pass through the Router  keep the default  Enabled     L2TP Passthrough Layer 2 Tunneling Protocol is the  method used to enable Point to Point sessions via the  Internet on the Layer 2 level  To allow L2TP tunnels to pass  through the Router  keep the default  Enabled     Click Save Settings to apply your changes or click Cancel  Changes to cancel your changes     Access Restrictions    Internet Access    The  nternet Access screen allows you to block or allow  specific kinds of Internet usage and traffic  such as Internet  access  designated services and websites during specific  days and times     Dual Band Wireless N Gigabit Router    LINKSYS by Cisco    Access  Restrictions    C Enabled binabad  JUN pres roll applied diit  qe PCR dob ee LITLI    insert aga dann pikie zin aed hoang                   Access Restrictions    Internet Access    Internet Access Policy    Access Policy Access can be managed by a policy  Use the  settings on this screen to establish an access policy  after  Save Settings is clicked   Selecting a policy from the drop   down menu will display that policy s settings  To delete a  policy  select that policy s number and click Delete This  Policy  To view all the policies  click Summary     Summary    The policies are listed with the following information  No    Policy Name  Access  Days  Time and status  Enabled   To  enable a policy  select Enabled  To delete a policy  click  Delete  Click Save Settings to save
44. MPORTANT  If you are using WEP encryption   always remember that each device in your    wireless network MUST use the same WEP  encryption method and encryption key or else  your wireless network will not function properly     RADIUS Server Enter the IP Address of the RADIUS  server     RADIUS Port Enter the port number of the RADIUS  server  The default value is 1812     Shared Secret Enter the key shared between the Router  and the server     Encryption Select a level of WEP encryption   40 64 bits  10 hex digits  or 104 128 bits  26 hex digits    The default is 40 64 bits  10 hex digits      Passphrase Entera Passphrase to automatically generate  WEP keys  Then click Generate     Key 1 If you did not enter a Passphrase  enter the WEP  key manually     WEP    WEP is a basic encryption method  which is not as secure  as WPA     Dual Band Wireless N Gigabit Router    LINKSYS by Cisco    Wireless          Security Mode  gt  WEP    Encryption Select a level of WEP encryption   40 64 bits  10 hex digits  or 104 128 bits  26 hex digits    The default is 40 64 bits  10 hex digits      Passphrase Enter a Passphrase to automatically generate  WEP keys  Then click Generate     Key 1 If you did not enter a Passphrase  enter the WEP  key manually     Click Save Settings to apply your changes or click Cancel  Changes to cancel your changes     Wireless  gt  Wireless MAC Filter    Wireless access can be filtered by using the MAC addresses of  the wireless devices transmitting within your
45. OR USE THE SOFTWARE  YOU MAY RETURN  UNUSED SOFTWARE  OR  IF THE SOFTWARE IS SUPPLIED  AS PART OF ANOTHER PRODUCT  THE UNUSED PRODUCT   FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL  PURCHASE  SUBJECT TO THE RETURN PROCESS AND  POLICIES OF THE PARTY FROM WHICH YOU PURCHASED  SUCH PRODUCT OR SOFTWARE     Software Licences    The software Licences applicable to software from Linksys  are made available at the Linksys public web site at   www linksys com  For your convenience of reference  a  copy of the Linksys Software Licence Agreement and the  main open source code licences used by Linksys in its  products are contained in the Schedules below     Dual Band Wireless N Gigabit Router    Schedule 1   Linksys Software Licence Agreement    THIS LICENCE AGREEMENT IS BETWEEN YOU AND  CISCO LINKSYS LLC OR ONE OF ITS AFFILIATES CISCO  SYSTEMS LINKSYS  ASIA  PTE LTD  OR CISCO LINKSYS  K K    LINKSYS   LICENSING THE SOFTWARE INSTEAD OF  CISCO LINKSYS LLC  BY DOWNLOADING OR INSTALLING  THE SOFTWARE  OR USING THE PRODUCT CONTAINING  THE SOFTWARE  YOU ARE CONSENTING TO BE BOUND BY  THIS AGREEMENT  IF YOU DO NOT AGREE TO ALL OF THESE  TERMS  THEN YOU MAY NOT DOWNLOAD  INSTALL OR USE  THE SOFTWARE  YOU MAY RETURN UNUSED SOFTWARE   OR  IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER  PRODUCT  THE UNUSED PRODUCT  FOR A FULL REFUND  UP TO 30 DAYS AFTER ORIGINAL PURCHASE  SUBJECT TO  THE RETURN PROCESS AND POLICIES OF THE PARTY FROM  WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE     Licence  Sub
46. Z hosting opens all the ports of one computer   exposing the computer to the Internet     LINKSYS by Cisco    Applicalions  amp  7  Gaming ne       Applications and Gaming  gt  DMZ    DMZ    Any PC whose port is being forwarded must have its DHCP  client function disabled and should have a new static IP  address assigned to it because its IP address may change  when using the DHCP function     Enabled Disabled To disable DMZ hosting  select  Disabled  To expose one PC  select Enabled  Then  configure the following settings     Source IP Address If you want any IP address to be the  source  select Any IP Address  If you want to specify an IP  address or range of IP addresses as the designated source   select and complete the IP address range fields     Destination If you want to specify the DMZ host by IP  address  select IP Address and enter the IP address in  the field provided  If you want to specify the DMZ host  by MAC address  select MAC Address and enter the MAC    Dual Band Wireless N Gigabit Router    address in the field provided  To retrieve this information   click DHCP Client Table     DHCP Chem Table      Te zoib  F Aiie oe       DMZ  gt  DHCP Client Table    DHCP Client Table    The DHCP Client Table lists computers and other  devices that have been assigned IP addresses by the  Router  The list can be sorted by Client Name  Interface   IP Address  MAC Address and Expired Time  how much  time is left for the current IP address   To select a DHCP  client  click S
47. adable source  code  which must be distributed under the terms of  Sections 1 and 2 above on a medium customarily used  for software interchange     If distribution of object code is made by offering  access to copy from a designated place  then offering  equivalent access to copy the source code from the  same place satisfies the requirement to distribute  the source code  even though third parties are not  compelled to copy the source along with the object  code     Dual Band Wireless N Gigabit Router    Software Licence Agreement       5  A program that contains no derivative of any portion    of the Library  but is designed to work with the Library  by being compiled or linked with it  is called a  work  that uses the Library   Such a work  in isolation  is not  a derivative work of the Library and therefore falls  outside the scope of this Licence     However  linking a  work that uses the Library  with  the Library creates an executable that is a derivative  of the Library  because it contains portions of the  Library   rather than a  work that uses the library   The  executable is therefore covered by this Licence  Section  6 states terms for distribution of such executables     When a  work that uses the Library  uses material from  a header file that is part of the Library  the object code  for the work may be a derivative work of the Library  even though the source code is not  Whether this is  true is especially significant if the work can be linked  without the Li
48. al pali ME TA MIKT   KOIVOTIKA  aroppimuata  To c  uBolAo UTIOSEIKVUEL OTL AUTO TO rrpoi  v Oa  TP  TEL va aropp  rteral   EXWPIOTA ano Ta OUVON oikiak    aroppimuata  Eiote urre  Ouvoc yia TNV AT  PPIJWN Tou rrap  vtoq  KAL GAAOU NAEKTPIKOU KOL NAEKTPOVIKOU E  OTTALOUO   M  CW TWV  kaOopiou  vuv EYKATAOTAOEWV OUYKEVTPWONG ATOPPIUHATWV OL  OTTO  EC TIAP  XOVTAL ATI   TO KPATOG N TIG APM    LEG TOTTIK  G APX  C   H owotr arr  ppupn Kal AVAKUKAWON ouuB  lM el oTnv rrp  Anun  THOAVWV APVNTIKWV OUVETTELWV yia TO TIEPIBGAAOV KOL tnv uyeia   Na MEPLOOOTEPEG TANPOPOPIEG OxETIK   ME TNV AT  PPIWN tou  TIAMO   OAG E  OTALOUOU  TAPAKAAW ETTIIKOLVWVNOTE ME TIG TOTTIKEG  APYEG  TIG UTINPEOIEG arr  ppupnc    TO KATAOTN UA ATI   TO orro  o  AYOPAOATE TO TPO  OV     Dual Band Wireless N Gigabit Router    Fran  ais  French    Informations environnementales  pour les clients de l Union europ  enne    La directive europ  enne 2002 96 CE exige que l   quipement  sur lequel est appos   ce symbole    sur le produit et ou son  emballage ne soit pas jet   avec les autres ordures m  nag  res  Ce  symbole indique que le produit doit   tre   limin   dans un circuit  distinct de celui pour les d  chets des m  nages  Il est de votre  responsabilit   de jeter ce mat  riel ainsi que tout autre mat  riel    lectrique ou   lectronique par les moyens de collecte indiqu  s  par le gouvernement et les pouvoirs publics des collectivit  s  territoriales  L   limination et le recyclage en bonne et due forme  ont 
49. application  a few attempts may be  needed to set the appropriate bandwidth priority     Enabled Disabled To use the QoS policies you have set   keep the default  Enabled  Otherwise  select Disabled     Category    There are four categories available  Select one of the  following  Applications  Online Games  MAC Address   Ethernet Port or Voice Device  Proceed to the instructions  for your selection     Applications    Applications Select the appropriate application  If you  select Add a New Application  follow the Add a New  Application instructions     Priority Select the appropriate priority  High  Medium   Normal or Low     Click Add to save your changes  Your new entry will appear  in the Summary list     Add a New Application     Ads New Application     paan     wl  Bath v              Port Range    Options    to    Both       Joel el     Jee  I             QoS  gt  Add a New Application    Enter a Name Enter any name to indicate the name of  the entry     Port Range Enter the port range that the application will  be using  For example  if you want to allocate bandwidth  for FTP  you can enter 21 21  If you need services for an  application that uses from 1000 to 1250  you enter 1000   1250 as your settings  You can have up to three ranges  to define for this bandwidth allocation  Port numbers    Dual Band Wireless N Gigabit Router    can range from 1 to 65535  Check your application s  documentation for details on the service ports used   Select the protocol TCP or UDP
50. brary or if the work is itself a library  The  threshold for this to be true is not precisely defined by  law     If such an object file uses only numerical parameters   data structure layouts and accessors and small macros  and small inline functions  ten lines or less in length    then the use of the object file is unrestricted  regardless  of whether it is legally a derivative work   Executables  containing this object code plus portions of the Library  will still fall under Section 6      Otherwise  if the work is a derivative of the Library  you  may distribute the object code for the work under the  terms of Section 6  Any executables containing that  work also fall under Section 6  whether or not they are  linked directly with the Library itself     As an exception to the Sections above  you may also  combine or link a  work that uses the Library  with the  Library to produce a work containing portions of the  Library and distribute that work under terms of your  choice  provided that the terms permit modification  of the work for the customer s own use and reverse  engineering for debugging such modifications     You must give prominent notice with each copy of  the work that the Library is used in it and that the  Library and its use are covered by this Licence  You  must supply a copy of this Licence  If the work during  execution displays copyright notices  you must include  the copyright notice for the Library among them  as  well as a reference directing the user
51. cation  the sender  and the recipient do NOT use a WEP key for authentication   With Shared Key authentication  the sender and recipient  use a WEP key for authentication  Select Shared Key to  only use Shared Key authentication     Basic Rate The Basic Rate setting is not actually one rate  of transmission but a series of rates at which the Router  can transmit  The Router will advertise its Basic Rate to the  other wireless devices in your network  so they know which  rates will be used  The Router will also advertise that it will  automatically select the best rate for transmission  The  default setting is Default  when the Router can transmit  at all standard wireless rates  1 2Mbps  5 5Mbps  11Mbps   18Mbps and 24Mbps   Other options are 1 2Mbps  for  use with older wireless technology and All  when the  Router can transmit at all wireless rates  The Basic Rate  is not the actual rate of data transmission  If you want to  specify the Router s rate of data transmission  configure  the Transmission Rate setting     Transmission Rate The rate of data transmission should  be set depending on the speed of your wireless network   You can select from a range of transmission speeds or you  can select Auto to have the Router automatically use the  fastest possible data rate and enable the Auto Fallback  feature  Auto Fallback will negotiate the best possible    17    Chapter 3    Advanced Configuration       connection speed between the Router and a wireless  client  The default 
52. ccess via Wireless If you are using the  Router in a public domain where you are giving wireless  access to your guests  you can disable wireless access to  the Router s web based utility  You will only be able to  access the utility via a wired connection if you disable  the setting  Keep the default  Enabled  to allow wireless  access to the utility or select Disabled to block wireless  access to the utility     Remote Access    Remote Management To permit remote access of the  Router  from outside the local network  select Enabled   Otherwise  keep the default  Disabled     Web Utility Access HTTP  HyperText Transport Protocol   is the communications protocol used to connect to servers  on the World Wide Web  HTTPS uses SSL  Secured Socket  Layer  to encrypt data transmitted for higher security   Select HTTP or HTTPS  HTTP is the default     24    Chapter 3    Advanced Configuration       Remote Upgrade If you want to be able to upgrade the  Router remotely  from outside the local network  select  Enabled   You must have the Remote Management  feature enabled as well   Otherwise  keep the default   Disabled     Allowed Remote IP Address If you want to be able to  access the Router from any external IP address  select Any  IP Address  If you want to specify an external IP address or  range of IP addresses  then select the second option and  complete the fields provided     Remote Management Port Enter the port number that  will be open to outside access     ta NOTE  When yo
53. ch  Na Pa  stwu spoczywa obowi  zek  wyrzucania tego i innych urz  dze   elektrycznych oraz  elektronicznych w punktach odbioru wyznaczonych przezw  adze  krajowe lub lokalne  Pozbywanie sie sprz  tu we w  a  ciwy spos  b  i jego recykling pomog   zapobiec potencjalnie negatywnym  konsekwencjom dla   rodowiska i zdrowia ludzkiego  W celu  uzyskania szczeg    owych informacji o usuwaniu starego sprz  tu   prosimy zwr  ci   sie do lokalnych w  adz  s  u  b oczyszczania  miasta lub sklepu  w kt  rym produkt zosta   nabyty     40    Appendix D    Regulatory Information       Portugu  s  Portuguese    Informacao ambiental para  clientes da Uniao Europeia       Directiva Europeia 2002 96 CE exige que o equipamento  que exibe este simbolo 4 no produto e ou na sua embalagem  nao seja eliminado junto com os residuos municipais nao  separados  O simbolo indica que este produto deve ser  eliminado separadamente dos residuos domesticos regulares   E da sua responsabilidade eliminar este e qualquer outro  equipamento el  ctrico e electr  nico atrav  s das instala    es  de recolha designadas pelas autoridades governamentais ou  locais  A eliminac  o e reciclagem correctas ajudar  o a prevenir  as consequ  ncias negativas para o ambiente e para a sa  de  humana  Para obter informa    es mais detalhadas sobre a  forma de eliminar o seu equipamento antigo  contacte as  autoridades locais  os servicos de eliminacao de residuos ou O  estabelecimento comercial onde adquiriu o produto     Romana
54. cia  pom    e zabr  ni   pr  padn  m negat  vnym dopadom na   ivotn    prostredie a zdravie   ud    Ak m  te z  ujem o podrobnej  ie  inform  cie o likvid  cii star  ho zariadenia  obr    te sa  pros  m  na  miestne org  ny  organiz  cie zaoberaj  ce sa likvid  ciou odpadov  alebo obchod  v ktorom ste si produkt zak  pili     Dual Band Wireless N Gigabit Router       Sloven  ina  Slovene    Okoljske informacije za stranke  v Evropski uniji   Evropska direktiva 2002 96 EC prepoveduje odlaganje opreme   ozna  ene s tem simbolom Z na izdelku in ali na embala  i   med  obi  ajne  nerazvr    ene odpadke  Ta simbol opozarja  da je treba  izdelek odvre  i lo  eno od preostalih gospodinjskih odpadkov   Va  a odgovornost je  da to in preostalo elektri  no in elektronsko  opremo odnesete na posebna zbirali    a  ki jih dolo  ijo  dr  avne ustanove ali lokalna uprava  S pravilnim odlaganjem  in recikliranjem boste prepre  ili morebitne   kodljive vplive na  okolje in zdravje ljudi    e   elite izvedeti ve   o odlaganju stare  opreme  se obrnite na lokalno upravo  odpad ali trgovino  kjer  ste izdelek kupili     Suomi  Finnish    Ymp  rist     koskevia tietoja EU   alueen asiakkaille    EU direktiivi 2002 96 EY edellytt      ett   jos laitteistossa on tama  symboli 2 itse tuotteessa ja tai sen pakkauksessa  laitteistoa  ei saa h  vitt     lajittelemattoman yhdyskuntaj  tteen mukana   Symboli merkitsee sit    ett   tama tuote on h  vitett  v   erill    n  tavallisesta kotitalousj  tteest 
55. ction  If you are disconnected  then the Router  will automatically re establish your connection  To use  this option  select Keep Alive  In the Redial Period field   you specify how often you want the Router to check  the Internet connection  The default Redial Period is  30 seconds     Optional Settings    Some of these settings may be required by your ISP  Verify  with your ISP before making any changes     Optional Settings   requi ed by some Internet  Service Provide si       Optional Settings    Host Name and Domain Name These fields allow you to  supply a host and domain name for the Router  Some ISPs   usually cable ISPs  require these names as identification   You may have to check with your ISP to see if your  broadband Internet service has been configured with a  host and domain name  In most cases  leaving these fields  blank will work     Chapter 3    Advanced Configuration       MTU MTU is the Maximum Transmission Unit  It specifies  the largest packet size permitted for Internet transmission   Select Manual if you want to manually enter the largest  packet size that is transmitted  To have the Router select  the best MTU for your Internet connection  keep the  default setting  Auto     Size When Manual is selected in the MTU field  this option  is enabled  Leave this value in the 1200 to 1500 range  The  default size depends on the Internet Connection Type     e DHCP Static IP or Telstra  1500  e PPPoE  1492  e PPTP or L2TP  1460    Network Setup    The Network
56. e Information section  The document will open  in PDF format if you have Adobe Acrobat installed on  your computer     ZA NOTE  If you have questions regarding  the compliance of this product or you  cannot find the information you need     please contact your local sales office or visit  www linksys com international       37    Appendix D    Regulatory Information       User Information for Consumer Products  Covered by EU Directive 2002 96 EC on  Waste Electric and Electronic Equipment   WEEE     This document contains important information for users  with regards to the proper disposal and recycling of  Linksys products  Consumers are required to comply with  this notice for all electronic products bearing the following  symbol     English   Environmental Information for Customers in  the European Union    European Directive 2002 96 EC requires that the equipment  bearing this symbol 2 on the product and or its packaging must  not be disposed of with unsorted municipal waste  The symbol  indicates that this product should be disposed of separately  from regular household waste streams  It is your responsibility to  dispose of this and other electric and electronic equipment via  designated collection facilities appointed by the government or  local authorities  Correct disposal and recycling will help prevent  potential negative consequences to the environment and  human health  For more detailed information about the disposal  of your old equipment  please contact your l
57. e Router  and the modem must be connected to the  Internet port on the Router     The modem does not have an Ethernet port     The modem is a dial up modem for traditional dial up  service  To use the Router  you need a cable DSL modem  and high speed Internet connection     You cannot use the DSL service to connect manually to  the Internet     After you have installed the Router  it will automatically  connect to your Internet Service Provider  ISP   so you no  longer need to connect manually     The DSL telephone line does not fit into the Router s  Internet port     The Router does not replace your modem  You still need  your DSL modem in order to use the Router  Connect the  telephone line to the DSL modem  and then insert the  setup CD into your computer  Click Setup and follow the  on screen instructions     Dual Band Wireless N Gigabit Router    When you double click the web browser  you are  prompted for a username and password  If you want to  get rid of the prompt  follow these instructions     Launch the web browser and perform the following steps   these steps are specificto Internet Explorer but are similar  for other browsers      1  Select Tools    Internet Options   2  Click the Connections tab    3  Select Never dial a connection   4  Click OK     The Router does not have a coaxial port for the cable  connection     The Router does not replace your modem  You still need  your cable modem in order to use the Router  Connect  your cable connection to the cable
58. e data is pulled back  to the proper computer by way of IP address and port  mapping rules     LINKSYS by Cisco       Applications  amp   Gaming    Zeie Reck           Part Hanga narra  Triggered Range Te maiiba Rage nabbed   te O      ba O   Ch  a n n  mr Ta min                n  JE      g      a        C   a  e   lo  o     D  L  D  Ci       Applications and Gaming    Port Range Triggering    Port Range Triggering    Application Name Enter the application name of the  trigger     21    Chapter 3    Advanced Configuration       Triggered Range For each application  enter the starting  and ending port numbers of the triggered port number  range  Check with the Internet application documentation  for the port number s  needed     Forwarded Range Foreach application  enter the starting  and ending port numbers of the forwarded port number  range  Check with the Internet application documentation  for the port number s  needed     Enabled Select Enabled to enable port triggering for the  applications you have defined     Click Save Settings to apply your changes or click Cancel  Changes to cancel your changes     Applications and Gaming 5 DMZ    The DMZ feature allows one network computer to be  exposed to the Internet for use of a special purpose  service such as Internet gaming or videoconferencing   DMZ hosting forwards all the ports at the same time to  one PC  The Port Range Forwarding feature is more secure  because it only opens the ports you want to have opened   while DM
59. e only Wireless N devices   select Wireless N Only  If you have only Wireless G  devices  select Wireless G Only  If you have only Wireless B  devices  select Wireless B Only  If you do not have any  wireless devices in your network  select Disabled     Network Name  SSID  The SSID is the network name  shared among all points in a wireless network  The  SSID must be identical for all devices in the wireless  network  It is case sensitive and must not exceed  32 characters  use any of the characters on the keyboard    Make sure this setting is the same for all points in your  wireless network  For added security  you should change  the default SSID  linksys  to a unique name     Channel Width Select Auto if you want the Router  to automatically determine the proper channel width   20 MHz or 40 MHz  to use or select 20 MHz only  default   if you want the Router to operate in Wireless B and  Wireless G mode only  For best performance  Auto is  recommended     Wide Channel If you selected Wide   40MHz Channel for  the Radio Band setting  then this setting will be available  for your primary Wireless N channel  Select any channel  from the drop down menu  If you are not sure which  channel to select  keep the default  Auto     Channel Select a channel from 1 to 11 or Auto  default      SSID Broadcast When wireless clients survey the local  area for wireless networks to associate with  they will  detect the SSID broadcast by the Router  To broadcast the    13    Chapter 3    Advanc
60. e the EEA     Software Upgrades etc  If the Software enables you to  receive Upgrades  you may elect at any time to receive  these Upgrades either automatically or manually  If you  elect to receive Upgrades manually or you otherwise  elect not to receive or be notified of any Upgrades  you  may expose your Linksys product and or the Software  to serious security threats and or some features within  your Linksys product and or Software may become  inaccessible  There may be circumstances where we  apply an Upgrade automatically in order to comply with  changes in legislation  legal or regulatory requirements  or as a result of requirements to comply with the terms  of any agreements Linksys has with any third parties  regarding your Linksys product and or the Software  You  will always be notified of any Upgrades being delivered  to you  The terms of this licence will apply to any such  Upgrade unless the Upgrade in question is accompanied  by a separate licence  in which event the terms of that  licence will apply     Open Source Software  The GPL or other open source  code incorporated into the Software and the open  source licence for such source code are available for free  download at http   www linksys com gpl  If You would  like a copy of the GPL or other open source code in this  Software on a CD  Linksys will mail to You a CD with such  code for  9 99 plus the cost of shipping  upon request     Term and Termination  You may terminate this Licence  at any time by dest
61. e two things     a  Accompany the combined library with a copy of  the same work based on the Library  not combined  with any other library facilities  This must be  distributed under the terms of the Sections above     b  Give prominent notice with the combined library of  the fact that part ofit is a work based on the Library  and explaining where to find the accompanying  not combined form of the same work     You may not copy  modify  sublicense  link with or  distribute the Library except as expressly provided  under this Licence  Any attempt otherwise to copy   modify  sublicense  link with or distribute the Library  is void and will automatically terminate your rights  under this Licence  However  parties who have received  copies or rights  from you under this Licence will not  have their licenses terminated so long as such parties  remain in full compliance     You are not required to accept this Licence  since you  have not signed it  However  nothing else grants you  permission to modify or distribute the Library or its  derivative works  These actions are prohibited by law if  you do not accept this Licence  Therefore  by modifying  or distributing the Library  or any work based on the  Library   you indicate your acceptance of this Licence  to do so and all its terms and conditions for copying   distributing or modifying the Library or works based  on it       Each time you redistribute the Library  or any work    based on the Library   the recipient automaticall
62. eadmete k  rvaldamise kohta t  psema  informatsiooni saamiseks v  tke palun   hendust kohalike  ametiasutustega  j    tmek  itlusfirmaga v  i kauplusega  kust te  toote ostsite     Espa  ol  Spanish    Informaci  n medioambiental para  clientes de la Uni  n Europea    La Directiva 2002 96 CE de la UE exige que los equipos que  lleven este simbolo 2 en el propio aparato y o en su embalaje  no deben eliminarse junto con otros residuos urbanos no  seleccionados  El s  mbolo indica que el producto en cuesti  n  debe separarse de los residuos dom  sticos convencionales con  vistas a su eliminaci  n  Es responsabilidad suya desechar este y  cualesquiera otros aparatos el  ctricos y electr  nicos a trav  s de  los puntos de recogida que ponen a su disposici  n el gobierno y  las autoridades locales  Al desechary reciclar correctamente estos  aparatos estar   contribuyendo a evitar posibles consecuencias  negativas para el medio ambiente y la salud de las personas  Si  desea obtener informaci  n m  s detallada sobre la eliminaci  n  segura de su aparato usado  consulte a las autoridades locales   al servicio de recogida y eliminaci  n de residuos de su zona o  pregunte en la tienda donde adquiri   el producto       Mnvik    Greek     lt tolxeia mepiPaAAOvTIKHG  mpootaciac yia TME  GTEG evt  c tnc Eupuwrralik  c  Evoonc    H Koivotikn O  ny  a 2002 96 EC arrarrei  tio    amp orropu  co orro  oq  P  PEL AUTO TO C  LBOAO X oro mpoiov Kal  OTN cuokeuao  a  Tou Dev TIP  TIEL va amoppintet
63. ecial  need to encourage the widest possible use of a certain  library  so that it becomes a de facto standard  To achieve  this  non free programs must be allowed to use the library   A more frequent case is that a free library does the same  job as widely used non free libraries  In this case  there is  little to gain by limiting the free library to free software  only  so we use the Lesser General Public Licence     47    Appendix E    Software Licence Agreement       In other cases  permission to use a particular library in non   free programs enables a greater number of people to use  a large body of free software  For example  permission to  use the GNU C Library in non free programs enables many  more people to use the whole GNU operating system  as  well as its variant  the GNU Linux operating system     Although the Lesser General Public Licence is Less  protective of the users  freedom  it does ensure that the  user of a program that is linked with the Library has the  freedom and the wherewithal to run that program using a  modified version of the Library     The precise terms and conditions for copying  distribution  and modification follow  Pay close attention to the  difference between a  work based on the library  and  a  work that uses the library   The former contains code  derived from the library  whereas the latter must be  combined with the library in order to run     GNU LESSER GENERAL PUBLIC LICENCE    TERMS AND CONDITIONS FOR COPYING  DISTRIBUTION AND 
64. ed Configuration       Router s SSID  keep the default setting  Enabled  If you  do not want to broadcast the Router s SSID  then select  Disabled     Click Save Settings to apply your changes or click Cancel  Changes to cancel your changes     Wi Fi Protected Setup    There are three methods available  Use the method that  applies to the client device you are configuring     LINKSYS by Cisco    Wireless    SS Se SEL    Wi Fl Protected Setup  Nh dp dl ws Feller dor ect NAL Preia Des supported dedos  1 8 paar chii Cara nat     chk or presa Sad on  ered  den pick fen b  s erte  naghi  Cep  2 8 war Gb Sci Punt A Free Eet E PIN Duden  bbs Ei Farbe bag  mikandki Pepe   n    2  your dei mcr for e Pica eer  PA number ere ins ue  FLT ngg  cler diner    Hoteab Hamas   SN c irun  Ei es      Ms sisa  Ad       Wireless  gt  Basic Wireless Settings  Wi Fi Protected Setup     Li NOTE  Wi Fi Protected Setup configures one  client device at a time  Repeat the instructions  for each client device that supports Wi Fi  Protected Setup     Method  1    Use this method if your client device has a Wi Fi Protected  Setup button     1  Click or press the Wi Fi Protected Setup button on  the client device     2  Click the Wi Fi Protected Setup button on this  screen     3  After the client device has been configured  click  OK  Then refer back to your client device or its  documentation for further instructions     Method  2    Use this method if your client device has a Wi Fi Protected  Setup PIN nu
65. ed herein  You are not responsible for enforcing  compliance by third parties to this Licence     45    Appendix E    Y    If  as a consequence of a court judgment or allegation  of patent infringement or for any other reason  not  limited to patent issues   conditions are imposed on  you  whether by court order  agreement or otherwise   that contradict the conditions of this Licence  they do  not excuse you from the conditions of this Licence  If  you cannot distribute so as to satisfy simultaneously  your obligations under this Licence and any other  pertinent obligations  then as a consequence you  may not distribute the Program at all  For example   if a patent licence would not permit royalty free  redistribution of the Program by all those who receive  copies directly or indirectly through you  then the only  way you could satisfy both it and this Licence would be  to refrain entirely from distribution of the Program     If any portion of this section is held invalid or  unenforceable under any particular circumstance   the balance of the section is intended to apply and  the section as a whole is intended to apply in other  circumstances     It is not the purpose of this section to induce you to  infringe any patents or other property right claims or  to contest validity of any such claims  this section has  the sole purpose of protecting the integrity of the free  software distribution system  which is implemented  by public licence practices  Many people have  made g
66. elect  To retrieve the most up to date  information  click Refresh  To exit this screen and  return to the DMZ screen  click Close     Click Save Settings to apply your changes or click Cancel  Changes to cancel your changes     Applications and Gaming  gt  QoS    Quality of Service  QoS  ensures better service to  high priority types of network traffic which may  involve demanding  real time applications  such as  videoconferencing     LINKSYS by Cisco    Applications 4    Gaming       ei ret diei a Py n RI    Cabrio          Applications and Gaming  gt  QoS    QoS  Quality of Service     Wireless    You can configure the support and No Acknowledgement  settings in this section     22    Chapter 3    Advanced Configuration       WMM Support If you have other devices that support Wi   Fi Multimedia  WMM  on your network  keep the default  Enabled  Otherwise  select Disabled     No Acknowledgement Ifyou want to disable the Router s  Acknowledgement feature  so the Router will not re send  data if an error occurs  then select Enabled  Otherwise   keep the default  Disabled     Internet Access Priority    In this section  you can set the bandwidth priority for a  variety of applications and devices  There are four levels of  priority  High  Medium  Normal or Low  When you set the  priority  do not set all applications to High  because this will  defeat the purpose of allocating the available bandwidth   If you want to select below normal bandwidth  select Low   Depending on the 
67. en and  return to the Local Network screen  click Close     Status  gt  Wireless Network    The Wireless Network screen displays information about  your wireless network     LINKSYS by Cisco    Status       Status  gt  Wireless    Wireless Network    MAC Address The MAC address of the Router s local   wireless interface is displayed here     Mode Displayed here is the wireless mode used by the  network     Network Name  SSID  Displayed here is the name of the  wireless network  which is also called the SSID     Channel Width Shown here is the Radio Band setting  selected on the Basic Wireless Settings screen     Channel Shown here is the Channel setting selected on  the Basic Wireless Settings screen     Security Displayed here is the wireless security method  used by the Router     SSID Broadcast Displayed here is the status of the SSID  Broadcast feature     28    Appendix A    Troubleshooting       Appendix A   Troubleshooting    Your computer cannot connect to the Internet     Follow these instructions until your computer can connect  to the Internet     e Make sure that the Router is powered on  The Power  LED should be green and not flashing     e  f the Power LED is flashing  then power off all of  your network devices  including the modem  Router  and computers  Then power on each device in the  following order     1  Cable or DSL modem  2  Router    3  Computer    e Check the cable connections  The computer should  be connected to one of the ports numbered 1 4 on  th
68. enerous contributions to the wide range of  software distributed through that system in reliance  on consistent application of that system  it is up to  the author donor to decide if he or she is willing to  distribute software through any other system and a  licensee cannot impose that choice     This section is intended to make thoroughly clear  what is believed to be a consequence of the rest of this  Licence     If the distribution and or use of the Program is  restricted in certain countries either by patents or by  copyrighted interfaces  the original copyright holder  who places the Program under this Licence may add an  explicit geographical distribution limitation excluding  those countries  so that distribution is permitted only  in or among countries not thus excluded  In such case   this Licence incorporates the limitation as if written in  the body of this Licence     The Free Software Foundation may publish revised  and or new versions of the General Public Licence  from time to time  Such new versions will be similar in  spirit to the present version  but may differ in detail to  address new problems or concerns     Each version is given a distinguishing version number   If the Program specifies a version number of this  Licence which applies to it and  any later version   you  have the option of following the terms and conditions  either of that version or of any later version published    Dual Band Wireless N Gigabit Router    Software Licence Agreement      
69. entifiable sections of that work are not  derived from the Program and can be reasonably  considered independent and separate works in  themselves  then this Licence and its terms  do not  apply to those sections when you distribute them as  separate works  But when you distribute the same  sections as part of a whole which is a work based on  the Program  the distribution of the whole must be on  the terms of this Licence  whose permissions for other  licensees extend to the entire whole and thus to each  and every part regardless of who wrote it     Thus  it is not the intent of this section to claim rights  or contest your rights to work written entirely by you   rather  the intent is to exercise the right to control the  distribution of derivative or collective works based on  the Program     In addition  mere aggregation of another work not  based on the Program with the Program  or with a  work based on the Program  on a volume of a storage  or distribution medium does not bring the other work  under the scope of this Licence     You may copy and distribute the Program  or a  work based on it  under Section 2  in object code or  executable form under the terms of Sections 1 and 2  above provided that you also do one of the following     a  Accompany it with the complete corresponding  machine readable source code  which must be  distributed under the terms of Sections 1 and 2  above on a medium customarily used for software  interchange  or     b  Accompany it with a wr
70. ers understand the GNU GPL better     Version 2  June 1991  Copyright O 1989  1991 Free Software Foundation  Inc     51 Franklin Street  Fifth Floor  Boston  MA 02110 1301   USA    43    Appendix E    Software Licence Agreement       Everyone is permitted to copy and distribute verbatim  copies of this licence document  but changing it is not  allowed     Preamble    The licences for most software are designed to take away  your freedom to share and change it  By contrast  the  GNU General Public Licence is intended to guarantee your  freedom to share and change free software to make sure  the software is free for all its users  This General Public  Licence applies to most of the Free Software Foundation s  software and to any other program whose authors  commit to using it   Some other Free Software Foundation  software is covered by the GNU Lesser General Public  Licence instead   You can apply it to your programs  too     When we speak of free software  we are referring to  freedom  not price  Our General Public Licences are  designed to make sure that you have the freedom to  distribute copies of free software  and charge for this  service if you wish   that you receive source code or can  get it if you want it  that you can change the software or  use pieces of it in new free programs  and that you know  you can do these things     To protect your rights  we need to make restrictions that  forbid anyone to deny you these rights or to ask you to  surrender the rights  The
71. eve the most up to date information  click  Refresh  To exit this screen and return to the Wireless  MAC Filter screen  click Close     MAC 01 50 Enter the MAC addresses of the devices  whose wireless access you want to block or allow     Click Save Settings to apply your changes or click Cancel  Changes to cancel your changes     Wireless  gt  Advanced Wireless Settings    This Advanced Wireless Settings screen is used to set up  the Router s advanced wireless functions  These settings  should only be adjusted by an expert administrator as  incorrect settings can reduce wireless performance     Dual Band Wireless N Gigabit Router    LINKSYS by Cisco  Wireless    n  ienzez wi eig    Dans 100 kieren bg 1   SS  Vin 8 1  Ber 8  22909  atat AL  Panga TA   TA  Etat A7 Rage H  DHT        Wireless  gt  Advanced Wireless Settings    Advanced Wireless    AP Isolation This isolates all wireless clients and wireless  devices on your network from each other  Wireless devices  will be able to communicate with the Router but not  with each other  To use this function  select Enabled  AP  Isolation is disabled by default     Frame Burst Enabling this option should provide your  network with greater performance  depending on the  manufacturer of your wireless products  To use this option   keep the default Enabled  Otherwise  select Disabled     Authentication Type The default is set to Auto  which  allows either Open System or Shared Key authentication  to be used  With Open System authenti
72. fee for the physical act of transferring  a copy and you may at your option offer warranty  protection in exchange for a fee     2  You may modify your copy or copies of the Program  or any portion of it  thus forming a work based on the  Program and copy and distribute such modifications  or work under the terms of Section 1 above  provided  that you also meet all of these conditions     a  You must cause the modified files to carry  prominent notices stating that you changed the  files and the date of any change     b  You must cause any work that you distribute or  publish  that in whole or in part contains or is  derived from the Program or any part thereof  to be  licensed as a whole at no charge to all third parties  under the terms of this Licence     44    Appendix E    c  Ifthe modified program normally reads commands  interactively when run  you must cause it  when  it has started running for such interactive use  in the most ordinary way  to print or display an  announcement including an appropriate copyright  notice and a notice that there is no warranty  or  else  saying that you provide a warranty  and that  users may redistribute the program under these  conditions and telling the user how to view a copy  of this Licence   Exception  if the Program itself is  interactive but does not normally print such an  announcement  your work based on the Program  is not required to print an announcement      These requirements apply to the modified work as  a whole  If id
73. fering equivalent access to copy the source  code from the same place counts as distribution of  the source code  even though third parties are not  compelled to copy the source along with the object  code       You may not copy  modify  sublicense or distribute    the Program except as expressly provided under  this Licence  Any attempt otherwise to copy  modify   sublicense or distribute the Program is void and will  automatically terminate your rights under this Licence   However  parties who have received copies or rights   from you under this Licence will not have their licenses  terminated so long as such parties remain in full  compliance       You are not required to accept this Licence  since you    have not signed it  However  nothing else grants you  permission to modify or distribute the Program or its  derivative works  These actions are prohibited by law if  you do not accept this Licence  Therefore  by modifying  or distributing the Program  or any work based on the  Program   you indicate your acceptance of this Licence  to do so and all its terms and conditions for copying   distributing or modifying the Program or works based  on it     Each time you redistribute the Program  or any work  based on the Program   the recipient automatically  receives a license from the original licensor to copy   distribute or modify the Program subject to these  terms and conditions  You may not impose any further  restrictions on the recipients  exercise of the rights  grant
74. ggende krav og andre relevante     Norwegian     bestemmelser i EU direktiv 1999 5 EF     Cesky   Czech      Danek Dette udstyr er i overensstemmelse med   de v  sentlige krav og andre relevante   bestemmelser i Direktiv 1999 5 EF  Polski   Polish      Urz  dzenie jest zgodne z og  lnymi  wymaganiami oraz szczeg  lnymi warunkami  okre  lonymi Dyrektyw   UE  1999 5 EC      Danish      Dieses Ger  t entspricht den grundlegenden   Deutsch Anforderungen und den weiteren    German   entsprechenden Vorgaben der Richtlinie Portugu  s  1999 5 EU  Portuguese      Este equipamento est   em conformidade com  os requisitos essenciais e outras provis  es  relevantes da Directiva 1999 5 EC     Eesti See seade vastab direktiivi 1999 5 EU olulistele de Acest echipament este in conformitate   Estonian   n  uetele ja teistele asjakohastele s  tetele      cu cerintele esentiale si cu alte prevederi   Romanian    relevante ale Directivei 1999 5 EC     This equipment is in compliance with the  English  essential requirements and other relevant Slovensko  provisions of Directive 1999 5 EC   Slovenian      Ta naprava je skladna z bistvenimi zahtevami  in ostalimi relevantnimi pogoji Direktive  1999 5 EC     Este equipo cumple con los requisitos  TM esenciales asi como con otras disposiciones Slovensky   Spanish   de la Directiva 1999 5 CE   Slovak      Espa  ol Toto zariadenie je v zhode so zakladnymi  poziadavkamiainymiprislusnyminariadeniami    direktiv  1999 5 EC     Aut  c o ECOTAIOUOG Eival oe
75. gistered with your ISP to the Router with the  MAC Address Clone feature     LINKSYS  by Cisco    Setup    Setup 5 MAC Address Clone    MAC Address Clone    Enabled Disabled To have the MAC Address cloned   select Enabled     MAC Address Enter the MAC Address registered with  your ISP here     Dual Band Wireless N Gigabit Router          Clone My PC s MAC Click this button to clone the MAC  address of the computer you are using     Click Save Settings to apply your changes or click Cancel  Changes to cancel your changes     Setup 5 Advanced Routing    This screen is used to set up the Router s advanced  functions  Operating Mode allows you to select the  type s  of advanced functions you use  Dynamic Routing  automatically adjusts how packets travel on your network   Static Routing sets up a fixed route to another network  destination     LINKSYS by Cisco    Setup Be   s tke Scie      Sagi ee       Setup a Advanced Routing  Advanced Routing  NAT    Enabled Disabled Ifthis Router is hosting your network s  connection to the Internet  keep the default  Enabled  If  another router exists on your network  select Disabled   When the NAT setting is disabled  dynamic routing will be  enabled     Dynamic Routing  RIP     Enabled Disabled This feature enables the Router to  automatically adjust to physical changes in the network s  layout and exchange routing tables with the other router s    The Router determines the network packets  route based  on the fewest number of hops between 
76. h a elektronick  ch za    zen   prost  ednictv  m  ur  en  ch sb  rn  ch m  st stanoven  ch vl  dou nebo m  stn  mi      ady  Spr  vn   likvidace a recyklace pom  h   p  edch  zet  potenci  ln  m negativn  m dopad  m na   ivotn   prost  ed   a lidsk    zdrav    Podrobn  j     informace o likvidaci star  ho vybaven   si  laskav   vy    dejte od m  stn  ch     ad    podniku zab  vaj  c  ho se  likvidac   komun  ln  ch odpad   nebo obchodu  kde jste produkt  zakoupili     Dansk  Danish    Milj  information for kunder i EU    EU direktiv 2002 96 EF kr  ver  at udstyr der b  rer dette symbol  Z p   produktet og eller emballagen ikke m   bortskaffes som  usorteret kommunalt affald  Symbolet betyder  at dette produkt  skal bortskaffes adskilt fra det almindelige husholdningsaffald   Det er dit ansvar at bortskaffe dette og andet elektrisk og  elektronisk udstyr via bestemte indsamlingssteder udpeget  af staten eller de lokale myndigheder  Korrekt bortskaffelse  og genvinding vil hj  lpe med til at undg   mulige skader for  milj  et og menneskers sundhed  Kontakt venligst de lokale  myndigheder  renovationstjenesten eller den butik  hvor du  har k  bt produktet  ang  ende mere detaljeret information om  bortskaffelse af dit gamle udstyr     Deutsch  German    Umweltinformation f  r Kunden  innerhalb der Europ  ischen Union    Die Europ  ische Richtlinie 2002 96 EC verlangt  dass technische  Ausr  stung  die direkt am Ger  t und oder an der Verpackung mit  diesem Symbol versehen ist  
77. her items with the product  you are returning to Linksys  Defective product covered  by this limited warranty will be repaired or replaced and  returned to you without charge  Customers outside of  the United States of America and Canada are responsible  for all shipping and handling charges  custom duties   VAT and other associated taxes and charges  Repairs or  replacements not covered under this limited warranty will  be subject to charge at Linksys    then current rates     Technical Support    This limited warranty is neither a service nor a  support contract  Information about Linksys  current  technical support offerings and policies  including  any fees for support services  can be found at    www linksys com support    General    This limited warranty is governed by the laws of the  jurisdiction in which the Product was purchased by you     If any portion of this limited warranty is found to be void  or unenforceable  its remaining provisions shall remain in  full force and effect     Please direct all inquiries to  Linksys  P O  Box 18558  Irvine   CA 92623     For more information  please contact us    www linksys com    Select your country and then select SUPPORT   TECHNICAL    For product returns   Select your Country and then select CUSTOMER SUPPORT    Dual Band Wireless N Gigabit Router 32    Appendix D    Regulatory Information       Appendix D   Regulatory Information    FCC Statement    This product has been tested and complies with the  specifications for a
78. here may be a remote risk of electric shock from  lightning     Dual Band Wireless N Gigabit Router    Industry Canada Statement    This Class B digital apparatus complies with Canadian  ICES 003 and RSS210     Operation is subject to the following two conditions     1  This device may not cause interference and    2  This device must accept any interference  including  interference that may cause undesired operation  of the device     To reduce potential radio interference to other users   the antenna type and its gain should be so chosen  that the EIRP is not more than required for successful  communication     Industry Canada Radiation Exposure Statement    This equipment complies with IC radiation exposure limits  set forth for an uncontrolled environment  This equipment  should be installed and operated with minimum distance  20 cm between the radiator 4 your body     This transmitter must not be co located or operating in  conjunction with any other antenna or transmitter     Avis d Industrie Canada    Cet appareil numerique de la classe B est conforme aux  normes NMB 003 et RSS210 du Canada     L utilisation de ce dispositif est autoris  e seulement aux  conditions suivantes      1  il ne doit pas produire de brouillage et    2  il doit accepter tout brouillage radio  lectrique re  u    memesicebrouillageestsusceptibledecompromettrele  fonctionnement du dispositif   Afin de r  duire le risque d interf  rence aux autres  utilisateurs  le type d antenne et son gain doive
79. his option  select Keep Alive  In the Redial Period field   you specify how often you want the Router to check  the Internet connection  The default Redial Period is  30 seconds     Dual Band Wireless N Gigabit Router    Telstra Cable    Telstra Cable is a service that applies to connections in  Australia only     Internet Setup  Internet Connection Type   Telstra Cable    Server P Address  b b b b    Username  E  Passwort Tt    C Connect on Demand Max idle Time fis Mines      e Keep Alive  Redial Period Bo Seconds           Internet Connection Type  gt  Telstra Cable    Server IP Address This is the IP address of the Heartbeat  Server  Your ISP will provide you with the IP Address you  need to specify here     Username and Password Enter the Username and  Password provided by your ISP     Connect on Demand  Max Idle Time You can configure  the Router to cut the Internet connection after it has been  inactive for a specified period of time  Max Idle Time   If  your Internet connection has been terminated due to  inactivity  Connect on Demand enables the Router to  automatically re establish your connection as soon as you  attempt to access the Internet again  To use this option   select Connect on Demand  In the Max Idle Time field   enter the number of minutes you want to elapse before  your Internet connection terminates  The default Max Idle  Time is 15 minutes     Keep Alive  Redial Period If you select this option   the Router will periodically check your Internet  conne
80. ibutors to deny you these rights or to ask you  to surrender these rights  These restrictions translate to  certain responsibilities for you if you distribute copies of  the library or if you modify it     For example  if you distribute copies of the library   whether gratis or for a fee  you must give the recipients  all the rights that we gave you  You must make sure that  they  too  receive or can get the source code  If you link  other code with the library  you must provide complete    Dual Band Wireless N Gigabit Router    object files to the recipients  so that they can relink them  with the library after making changes to the library and  recompiling it  And you must show them these terms so  they know their rights     We protect your rights with a two step method   1  we  copyright the library and  2  we offer you this licence   which gives you legal permission to copy  distribute and   or modify the library     To protect each distributor  we want to make it very clear  that there is no warranty for the free library  Also  if the  library is modified by someone else and passed on  the  recipients should know that what they have is not the  original version  so that the original author s reputation  will not be affected by problems that might be introduced  by others     Finally  software patents pose a constant threat to the  existence of any free program  We wish to make sure  that a company cannot effectively restrict the users of  a free program by obtaining a re
81. ich  the policy will be in effect or select Everyday  Then  enter a range of hours and minutes during which the  policy will be in effect or select 24 Hours     7  You can block websites with specific URL addresses   Enter each URL in a separate URL field     8  You can also block websites using specific keywords   Enter each keyword in a separate Keyword field     9  You can filter access to various services accessed over  the Internet  such as FTP or telnet   You can block up to  three applications per policy      From the Applications list  select the application you  want to block  Then click the 55 button to move it to  the Blocked List  To remove an application from the  Blocked List  select it and click the  lt  lt  button     Dual Band Wireless N Gigabit Router    10  If the application you want to block is not listed or you  want to edit a service s settings  enter the application s  name in the Application Name field  Enter its range  in the Port Range fields  Select its protocol from the  Protocol drop down menu  Then click Add     To modify a service  select it from the Application list   Change its name  port range and or protocol setting   Then click Modify     To delete a service  select it from the Application list   Then click Delete     11  Click Save Settings to save the policy s settings  To  cancel the policy s settings  click Cancel Changes     Applications and Gaming  gt  Single Port  Forwarding    The Single Port Forwarding screen allows you to customi
82. ing and Traceroute  allow you to  check the connections of your network devices  including  connection to the Internet  This screen also allows you to  reset the router     LINKSYS by Cisco    Administration Sa          Administration    Diagnostics    Reboot    Reboot Click Reboot to reset the router   Diagnostics    Ping Test  The Ping test checks the status of a connection     IP or URL Address Enter the address of the PC whose  connection you wish to test     Packet Size Enter the packet size you want to use  The  default is 32 bytes     Times to Ping Enter many times you wish to test it     Start to Ping To run the test  click this button  The Ping  Test screen will show if the test was successful  Click Close  to return to the Diagnostics screen     LINKSYS by Cisco    Pirging pehes com  A600 1 72  wit 32 Beek of daba  Rep koa MG 10012472 bitie JI baa TIL  4                   Diagnostics 5 Ping    Dual Band Wireless N Gigabit Router          Traceroute Test    The Traceroute test tests the performance of a  connection     IP or URL Address Enter the address of the PC whose  connection you wish to test     Start to Traceroute To run the test  click this button  The  Traceroute Test screen will show if the test was successful   Click Close to return to the Diagnostics screen     LINKSYS by Cisco    Tracing router to were bin com  b 181 11 20    i   ima ia ila ve ir com  B81 11 28                             Diagnostics 5 Traceroute       Administration 5 Factory Defaults 
83. ion was written so as to conform to  Netscape s SSL     This library is free for commercial and non commercial  use as long as the following conditions are adhered to   The following conditions apply to all code found in this  distribution  be it the RC4  RSA  Ihash  DES  etc   code  not  just the SSL code  The SSL documentation included with  this distribution is covered by the same copyright terms  except that the holder is Tim Hudson  tjh cryptsoft   COM      Copyright remains Eric Young s and as such any Copyright  notices in the code are not to be removed     If this package is used in a product  Eric Young should be  given attribution as the author of the parts of the library  used  This can be in the form of a textual message at  program startup or in documentation  online or textual   provided with the package     Redistribution and use in source and binary forms  with  or without modification  are permitted provided that the  following conditions are met     1  Redistributions of source code must retain the  copyright notice  this list of conditions and the  following disclaimer     52    Appendix E Software Licence Agreement       2  Redistributions in binary form must reproduce the  above copyright notice  this list of conditions and the  following disclaimer in the documentation and or  other materials provided with the distribution     3  All advertising materials mentioning features or  use of this software must display the following  acknowledgement      This p
84. ions  amp     Gaming    D at HOA je      MRC AT xp    MEAR      Bi v rer imo D      Bei e eg   p a D   Bm vin um 1       Bei so ez vim on B    Boh v  ns T NIU       Applications and Gaming    Port Range Forwarding    Dual Band Wireless N Gigabit Router    Port Range Forwarding    To forward a port  enter the information on each line for  the criteria required     Application Name In this field  enter the name you  wish to give the application  Each name can be up to 12  characters     Start End Port Enter the number or range of port s   used by the server or Internet applications  Check  with the Internet application documentation for more  information     Protocol Select the protocol used for this application   either TCP or UDP or Both     To IP Address For each application  enter the IP address  of the PC running the specific application  If you assigned  a static IP address to the PC  then you can click DHCP  Reservation on the Basic Setup screen to look up its static  IP address     Enabled Select Enabled to enable port forwarding for  the applications you have defined     Click Save Settings to apply your changes or click Cancel  Changes to cancel your changes     Applications  amp  Gaming    Port Range  Triggering    The Port Range Triggering screen allows the Router to  watch outgoing data for specific port numbers  The IP  address of the computer that sends the matching data is  remembered by the Router  so that when the requested  data returns through the Router  th
85. ireless routers  access points or gateways away  from exterior walls and windows     e Turn wireless routers  access points or gateways  off when they are not being used  at night  during  holidays      e Use strong passphrases that are at least eight characters  in length  Combine letters and numbers to avoid using  standard words that can be found in the dictionary     ZA WEB  For more information on wireless    security  visit www linksys com security       Chapter 3    Advanced Configuration       Chapter 3   Advanced Configuration    After setting up the Router with the Setup Wizard  located  on the CD ROM   the Router will be ready for use  However   if you d like to change its advanced settings  use the  Router s web based utility  This chapter describes each  web page of the utility and each page s key functions  You  can access the utility via a web browser on a computer  connected to the Router     The web based utility has these main tabs  Setup   Wireless  Security  Access Restrictions  Applications  amp   Gaming  Administration and Status  Additional tabs will  be available after you click one of the main tabs     ta NOTE  When first installing the Router  you  should use the Setup Wizard on the Setup  CD ROM  If you want to configure advanced  settings  use this chapter to learn about the  web based utility        How to access the Web Based Utility    To access the web based utility  launch the web browser on  your computer and enter the Router s default IP add
86. is Auto     N Transmission Rate The rate of data transmission  should be set depending on the speed of your Wireless N  networking  You can select from a range of transmission  speeds or you can select Auto to have the Router  automatically use the fastest possible data rate and enable  the Auto Fallback feature  Auto Fallback will negotiate the  best possible connection speed between the Router and a  wireless client  The default is Auto     CTS Protection Mode The Router will automatically  use CTS  Clear To Send  Protection Mode when your  Wireless N and Wireless G products are experiencing  severe problems and are not able to transmit to the  Router in an environment with heavy 802 1 1b traffic  This  function boosts the Router s ability to catch all Wireless N  and Wireless G transmissions but will severely decrease  performance  The default is Auto     Beacon Interval Enter a value between 1 and 65 535  milliseconds  The Beacon Interval value indicates the  frequency interval of the beacon  A beacon is a packet  broadcast by the Router to synchronise the wireless  network  The default value is 100     DTIM Interval This value  between 1 and 255  indicates  the interval of the Delivery Traffic Indication Message   DTIM   A DTIM field is a countdown field informing  clients of the next window for listening to broadcast  and multicast messages  When the Router has buffered  broadcast or multicast messages for associated clients  it  sends the next DTIM with a DTIM Interval
87. itten offer  valid for at least  three years  to give any third party  for a charge  no more than your cost of physically performing  source distribution  a complete machine readable  copy of the corresponding source code  to be  distributed under the terms of Sections 1 and 2  above on a medium customarily used for software  interchange  or     Dual Band Wireless N Gigabit Router    Software Licence Agreement       c  Accompany it with the information you received  as to the offer to distribute corresponding source  code   This alternative is allowed only for non   commercial distribution and only if you received  the program in object code or executable form  with such an offer  in accord with Subsection b  above      The source code for a work means the preferred form  of the work for making modifications to it  For an  executable work  complete source code means all  the source code for all modules it contains  plus any  associated interface definition files  plus the scripts  used to control compilation and installation of the  executable  However  as a special exception  the source  code distributed need not include anything that is  normally distributed  in either source or binary form   with the major components  compiler  kernel and so  on  of the operating system on which the executable  runs  unless that component itself accompanies the  executable     If distribution of executable or object code is made  by offering access to copy from a designated place   then of
88. ject to the terms and conditions of this  Agreement  Linksys grants the original end user purchaser  of the Linksys product containing the Software   You    a non exclusive licence to use the Software solely as  embedded in or  where authorised in the applicable  documentation  for communication with such product   Thislicence may not be sub licensed andis nottransferable  except to a person or entity to which you transfer  ownership of the complete Linksys product containing  the Software  provided you permanently transfer all rights  under this Agreement and do not retain any full or partial  copies of the Software and the recipient agrees to the  terms of this Agreement      Software  includes and this Agreement will apply to   a  the software of Linksys or its suppliers provided in or  with the applicable Linksys product  excluding technology  from the open source community and  b  any upgrades   updates  bug fixes or modified versions   Upgrades   or  backup copies of the Software supplied to You by Linksys  or an authorised reseller  provided you already hold a  valid licence to the original software and have paid any  applicable fee for the Upgrade     Protection of Information  The Software and  documentation contain trade secrets and or copyrighted  materials of Linksys or its suppliers  You will not copy  or modify the Software or decompile  decrypt  reverse  engineer or disassemble the Software  except to the  extent expressly permitted by law notwithstanding this 
89. led   OpenSSL  nor may  OpenSSL  appear in their names  without prior written permission of the OpenSSL  Project     Dual Band Wireless N Gigabit Router    6  Redistributions of any form whatsoever must retain  the following acknowledgment   This product includes  software developed by the OpenSSL Project for use in  the OpenSSL Toolkit  http   www openssl org       THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT   AS IS  AND ANY EXPRESSED OR IMPLIED WARRANTIES   INCLUDING  BUT NOT LIMITED TO  THE IMPLIED  WARRANTIES OF MERCHANTABILITY AND FITNESS FOR  A PARTICULAR PURPOSE ARE DISCLAIMED  IN NO EVENT  SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE  LIABLE FOR ANY DIRECT  INDIRECT  INCIDENTAL  SPECIAL   EXEMPLARY  OR CONSEQUENTIAL DAMAGES  INCLUDING   BUT NOT LIMITED TO  PROCUREMENT OF SUBSTITUTE  GOODS OR SERVICES  LOSS OF USE  DATA  OR PROFITS   OR BUSINESS INTERRUPTION  HOWEVER CAUSED AND  ON ANY THEORY OF LIABILITY  WHETHER IN CONTRACT   STRICT LIABILITY OR TORT  INCLUDING NEGLIGENCE OR  OTHERWISE  ARISING IN ANY WAY OUT OF THE USE OF  THIS SOFTWARE  EVEN IF ADVISED OF THE POSSIBILITY OF  SUCH DAMAGE     This product includes cryptographic software written by  Eric Young  eay cryptsoft com   This product includes  software written by Tim Hudson  tjhacryptsoft com      Original SSLeay Licence    Copyright   1995 1998 Eric Young  eay cryptsoft com   All rights reserved     This package is an SSL implementation written by Eric  Young  eay cryptsoft com      The implementat
90. lications and Gaming   DMZ                                   1 22  Applications and Gaming  gt QoS                                   1 22  Administration  gt  Management                                     1 24  Administration  gt  Log    dos a ses he GA ban e   bre PO ae 25  Administration  gt  Diagnostics       sasaaa RA E Kee PEER sea EE ETRE PORA es KA 26  Administration  gt  Factory Defaults                                    26  Administration  gt  Firmware Upgrade                                 1 27  Status    NOE  EE 27  Status  gt  Local NETWORK  ab aa woe dr 33e CUR dede ROC EUR aa da 27  Status  gt  Wireless Network                                       1 28   Appendix A  Troubleshooting 29   Appendix B  Specifications 30   Appendix C  Warranty Information 31  Limited Warranty                ee eee ee 31  Exclusions and Limitations sm AER 31  Obtaining Warranty Service    acude aaaea 31  Technical Support 4 64 04 sob 6G 5 59 8 25 READ 32    Dual Band Wireless N Gigabit Router ii    Table of Contents       Appendix D  Regulatory Information 33  i sec unl a ad 33  Safety Notices  1s dee Ro dA Y d EROR RUE Oo ee OE TAMA ANG oe ee KAG DA 33  Industry Canada Statement                                        33  Avis d Industrie Canada  s  KR 44 ido eines KA Eee ES RO ede 33  Wireless Disclaimer us ux aora 3 o8 eda cr oo ee bare ee UR RE a adore 34  Avis de non responsabilit   concernant les appareils sans fil                    34  Declaration of Conformity with Regard 
91. ll be  free of vulnerability to intrusion or attack  The product  may include or be bundled with third party software or  service offerings  This limited warranty shall not apply to  such third party software or service offerings  This limited  warranty does not guarantee any continued availability  of a third party s service for which this product s use or  operation may require     TO THE EXTENT NOT PROHIBITED BY LAW  ALL IMPLIED  WARRANTIES AND CONDITIONS OF MERCHANTABILITY   SATISFACTORY QUALITY OR FITNESS FOR A PARTICULAR  PURPOSE ARE LIMITED TO THE DURATION OF THE  WARRANTY PERIOD  ALL OTHER EXPRESS OR IMPLIED  CONDITIONS  REPRESENTATIONS AND WARRANTIES   INCLUDING  BUT NOT LIMITED TO  ANY IMPLIED  WARRANTY OF NON INFRINGEMENT  ARE DISCLAIMED   Some jurisdictions do not allow limitations on how long  an implied warranty lasts  so the above limitation may not  apply to you  This limited warranty gives you specific legal  rights and you may also have other rights which vary by  jurisdiction     TO THE EXTENT NOT PROHIBITED BY LAW  IN NO EVENT  WILL LINKSYS BE LIABLE FOR ANY LOST DATA  TURNOVER  OR PROFIT OR FOR SPECIAL  INDIRECT  CONSEQUENTIAL   INCIDENTAL OR PUNITIVE DAMAGES  REGARDLESS OF THE  THEORY OF LIABILITY  INCLUDING NEGLIGENCE   ARISING  OUT OF OR RELATED TO THE USE OF OR INABILITY TO  USE THE PRODUCT  INCLUDING ANY SOFTWARE   EVEN  IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF  SUCH DAMAGES  IN NO EVENT WILL LINKSYS  LIABILITY  EXCEED THE AMOUNT PAID BY YOU
92. mber     1  Enter the PIN number in the field on this screen   2  Click Register     3  After the client device has been configured  click  OK  Then refer back to your client device or its  documentation for further instructions     Dual Band Wireless N Gigabit Router    Method  3    Use this method if your client device asks for the Router s  PIN number     1  Enter the PIN number listed on this screen   It is also  listed on the label on the bottom of the Router      2  After the client device has been configured  click  OK  Then refer back to your client device or its  documentation for further instructions     The Wi Fi Protected Setup Status  Network Name  SSID      Security  Encryption and Passphrase are displayed at the  bottom of the screen     ZA NOTE  If you have client devices that do not  support Wi Fi Protected Setup  note the wireless  settings and then manually configure those  client devices        Wireless  gt  Wireless Security    The Wireless Security screen configures the security of  your wireless network  There are six wireless security  mode options supported by the Router  WPA Personal   WPA Enterprise  WPA2 Personal  WPA2 Enterprise  RADIUS  and WEP   WPA stands for Wi Fi Protected Access  which  is a security standard stronger than WEP encryption  WEP  stands for Wired Equivalent Privacy  while RADIUS stands  for Remote Authentication Dial In User Service   These  six are briefly discussed here  For detailed instructions  on configuring wireless secu
93. me to a dynamic Internet IP address  It is useful when  you are hosting your own website  FTP server or other  server behind the Router     Before you can use this feature  you need to sign  up for DDNS service with a DDNS service provider   www dyndns org or www TZO com  If you do not want to  use this feature  keep the default setting  Disabled     DDNS    DDNS Service    If your DDNS service is provided by DynDNS org  then  select DynDNS org from the drop down menu  If your  DDNS service is provided by TZO  then select TZO com   The features available on the DDNS screen will vary   depending on which DDNS service provider you use     Dual Band Wireless N Gigabit Router    DynDNS org    LINKSYS by Cisco       Setup    DDNS    DynDNS    Username Enter the Username for your DDNS account   Password Enter the Password for your DDNS account     Host Name The is the DDNS URL assigned by the DDNS  service     System Select the DynDNS service you use  Dynamic   Static or Custom  The default selection is Dynamic     Mail Exchange  Optional  Enter the address of your mail  exchange server  so emails to your DynDNS address go to  your mail server     Backup MX This feature allows the mail exchange server  to be a backup  To disable this feature  keep the default   Disabled  To enable the feature  select Enabled  If you  are not sure which setting to select  keep the default   Disabled     Wildcard This setting enables or disables wildcards  for your host  For example  if your DDNS add
94. mitted to copy and distribute verbatim  copies of this licence document  but changing it is not  allowed      This is the first released version of the Lesser GPL  It also  counts as the successor of the GNU Library Public Licence   version 2  hence the version number 2 1      Preamble    The licences for most software are designed to take away  your freedom to share and change it  By contrast  the GNU  General Public Licences are intended to guarantee your  freedom to share and change free software   to make  sure the software is free for all its users     This licence  the Lesser General Public Licence  applies to  some specially designated software packages   typically  libraries   of the Free Software Foundation and other  authors who decide to use it  You can use it too  but  we suggest you first think carefully about whether this  licence or the ordinary General Public Licence is the  better strategy to use in any particular case  based on the  explanations below     When we speak of free software  we are referring to  freedom of use  not price  Our General Public Licences  are designed to make sure that you have the freedom  to distribute copies of free software  and charge for this  service if you wish   that you receive source code or can  get it if you want it  that you can change the software and  use pieces of it in new free programs  and that you are  informed that you can do these things     To protect your rights  we need to make restrictions that  forbid distr
95. mke    megjelenik  tilos a t  bbi szelekt  latlan lakoss  gi  hullad  kkal egy  tt kidobni  A c  mke azt jel  li  hogy az adott  term  k kidob  sakor a szokv  nyos h  ztart  si hullad  kelsz  ll  t  si  rendszerekt  l elk  l  n  tett elj  r  st kell alkalmazni  Az On  felel  ss  ge  hogy ezt    s m  s elektromos   s elektronikus  berendez  seit a korm  nyzati vagy a helyi hat  s  gok   ltal  kijel  lt gy  jtoredszereken kereszt  l sz  molja fel  A megfelel    hullad  kfeldolgoz  s seg  t a k  rnyezetre   s az emberi eg  szs  gre  potenci  lisan   rtalmas negat  v hat  sok megel  z  s  ben  Ha  elavult berendez  seinek felsz  mol  s  hoz tov  bbi r  szletes  inform  ci  ra van sz  ks  ge  k  rj  k  l  pjen kapcsolatba a helyi  hat  s  gokkal  a hullad  kfeldolgoz  si szolg  lattal  vagy azzal    zlettel  ahol a term  ket v  s  rolta     Dual Band Wireless N Gigabit Router    Nederlands  Dutch    Milieu informatie voor klanten  in de Europese Unie    De Europese Richtlijn 2002 96 EC schrijft voor dat apparatuur die  is voorzien van dit symbool    op het product of de verpakking   niet mag worden ingezameld met niet gescheiden huishoudelijk  afval  Dit symbool geeft aan dat het product apart moet worden  ingezameld  U bent zelf verantwoordelijk voor de vernietiging  van deze enandere elektrische en elektronische apparatuur via de  daarvoor door de landelijke of plaatselijke overheid aangewezen  inzamelingskanalen  De juiste vernietiging en recycling van  deze apparatuur voorkomt
96. nkimo  sistemas  Tinkamai   alinant ir perdirbant atliekas  bus i  vengta  galimos   alos aplinkai ir   moni   sveikatai  Daugiau informacijos  apie j  s   senos jrangos   alinim   gali pateikti vietin  s vald  ios  institucijos  atliek     alinimo tarnybos arba parduotuv  s  kuriose  isigijote ta gamin      Malti  Maltese    Informazzjoni Ambjentali ghal Klijenti  fI Unjoni Ewropea   Id Direttiva Ewropea 2002 96 KE titlob li t tag  mir li jkun fih  is simbolu X fuq il prodott u jew fuq l ippakkjar ma jistax  jintrema ma  skart muni  ipali li ma   iex isseparat  Is simbolu    jindika li dan il prodott g  andu jintrema separatament minn ma       l iskart domestiku regolari  Hija responsabbilt   tieg  ek li tarmi  dan it tag  mir u kull tag  mir ie  or ta  l elettriku u elettroniku  permezz ta    fa  ilitajiet ta      bir appuntati apposta mill gvern jew  mill awtoritajiet lokali  Ir rimi b mod korrett u r ri  ikla     jg  in  jipprevjeni konsegwenzi negattivi potenzjali g  all ambjent u  g  as sa    a tal bniedem  G  al aktar informazzjoni dettaljata  dwar ir rimi tat tag  mir antik tieg  ek  jekk jog    bok ikkuntattja  lill awtoritajiet lokali tieg  ek  is servizzi g  ar rimi ta  l iskart  jew  il   anut minn fejn xtrajt il prodott     Magyar  Hungarian    K  rnyezetv  delmi inform  ci   az  eur  pai uni  s v  s  rl  k sz  m  ra   A 2002 96 EC sz  m   eur  pai uni  s ir  nyelv megk  v  nja  hogy  azokat a term  keket  amelyeken    s vagy amelyek csomagol  s  n  azal  bbi c  
97. nt    tre choisis de fa  on    ce que la puissance isotrope  rayonn  e   quivalente  p i r e   ne soit pas sup  rieure  au niveau requis pour obtenir une communication  satisfaisante     Avis d Industrie Canada concernant l exposition  aux radiofr  quences    Ce mat  riel est conforme aux limites   tablies par IC  en mati  re d exposition aux radiofr  quences dans un  environnement non contr  l    Ce mat  riel doit   tre install    et utilis      une distance d au moins 20 cm entre l antenne  et le corps de l utilisateur     L   metteur ne doit pas   tre plac   pr  s d une autre antenne  ou d un autre   metteur  ou fonctionner avec une autre  antenne ou un autre   metteur     33    Appendix D Regulatory Information       Wireless Disclaimer    The maximum performance for wireless is derived from  IEEE Standard 802 11 specifications  Actual performance  can vary  including lower wireless network capacity   data throughput rate  range and coverage  Performance  depends on many factors  conditions and variables   including distance from the access point  volume of  network traffic  building materials and construction   operating system used  mix of wireless products used   interference and other adverse conditions     Avis de non responsabilite concernant les  appareils sans fil    Les performances maximales pour les reseaux sans fil  sont tir  es des sp  cifications de la norme IEEE 802 11   Les performances r  elles peuvent varier  notamment  en fonction de la capacit   du r  
98. nt Lease Time is the amount  of time a network user will be allowed connection to the  Router with their current dynamic IP address  Enter the  amount of time  in minutes  that the user will be  leased   this dynamic IP address  After the time is up  the user will  be automatically assigned a new dynamic IP address  The  default is O minutes  which means one day     Static DNS 1 3 The Domain Name System  DNS  is how  the Internet translates domain or website names into  Internet addresses or URLs  Your ISP will provide you with at  least one DNS Server IP Address  If you wish to use another   enter that IP Address in one of these fields  You can enter up  to three DNS Server IP Addresses here  The Router will use  these for quicker access to functioning DNS servers     WINS The Windows Internet Naming Service  WINS   manages each PC s interaction with the Internet  If you  use a WINS server  enter that server s IP Address here   Otherwise  leave this blank     Time Setting    Time Zone Select the time zone in which your network  functions from this drop down menu   You can even  automatically adjust for daylight saving time       GMT 08 00  Pacific Tima  USA  amp  Canada  w      gt   Automatically adjust clock for dk saving changes        Time Setting    Click Save Settings to apply your changes or click Cancel  Changes to cancel your changes     Setup  gt  DDNS    The Router offers a Dynamic Domain Name System  DDNS   feature  DDNS lets you assign a fixed host and domain  na
99. numbers and letters assigned to every  networking device  With MAC address filtering enabled   wireless network access is provided solely for wireless  devices with specific MAC addresses  For example  you can  specify the MAC address of each computer in your home  so that only those computers can access your wireless  network     Dual Band Wireless N Gigabit Router    CA 4  Enable encryption    Encryption protects data transmitted over a wireless  network  Wi Fi Protected Access  WPA WPA2  and Wired  Equivalency Privacy  WEP  offer different levels of security  for wireless communication     A network encrypted with WPA WPA2 is more secure  than a network encrypted with WEP  because WPA WPA2  uses dynamic key encryption  To protect the information  as it passes over the airwaves  you should enable the  highest level of encryption supported by your network  equipment     WEP is an older encryption standard and may be the  only option available on some older devices that do not  support WPA     General Network Security Guidelines    Wireless network security is useless if the underlying  network is not secure     e Password protect all computers on the network and  individually password protect sensitive files     e Change passwords on a regular basis     e Install anti virus software and personal firewall  software     e Disable file sharing  peer to peer   Some applications  may open file sharing without your consent and or  knowledge     Additional Security Tips    e Keep w
100. o mount the Router     Suggested Mounting Hardware       tNote  Mounting hardware illustrations are not  true to scale     NOTE  Linksys is not responsible for damages  incurred by insecure wall mounting hardware     L  A Print this page at 100  size     Follow these instructions     1  Determine where you want to mount the Router   Make sure that the wall you use is smooth  flat  dry and  sturdy  Also make sure the location is within reach of  an electrical socket     2  Drill two holes into the wall  Make sure the holes are  152 mm  6 inches  apart     3  Insert a screw into each hole and leave 3 mm   0 12 inches  of its head exposed     4  Manoeuvre the Router so the wall mount slots line up  with the two screws     5  Place the wall mount slots over the screws and slide  the Router down until the screws fit snugly into the  wall mount slots     152mm      Cut along the dotted line  and place on the wall to drill precise spacing     Wall Mounting Template    Dual Band Wireless N Gigabit Router    Chapter 2    Wireless Security Checklist       Chapter 2   Wireless Security Checklist    Wireless networks are convenient and easy to install  so  homes with high speed Internet access are adopting them  at a rapid pace  Because wireless networking operates by  sending information over radio waves  it can be more  vulnerable to intruders than a traditional wired network   Like signals from your mobile or cordless phones  signals  from your wireless network can also be intercepted
101. ocal authorities   waste disposal service  or the shop where you purchased the  product     Bbarapcku  Bulgarian     UHdopMaunA OTHOCHO  ona3BaHeTO Ha OKOJIHaTa cpega 3a norpe6urenu B  Eeponeuckua CbI03    EBpone  cka AupektuBa 2002 96 EC u3uckBa ypenure  HOCeun  TO34 CUMBON    Bbpxy uasnenuero n nnn OnakoBKaTa My  Ma He  ce U3XBbpna T C HECOPTUPAHU   nTOBM OTMaAbun  CUMBOJIbT  0603HayaBa  ue u3nenuero rps  Ba na ce U3XBBpNA OTMENHO OT  cCMeTocb0 paHeTo Ha O6UKHOBEHUTE GUTOBA oTrnmaabun  Bawa  e OTTOBOPHOCTTa TO3 N APYrUTe enekrpuuecku n enekrpoHHM  ypeau na ce N3XBBpPNAT B npenBapurenHo ONPEAENEHUA OT  AbPKABHUTE nnn OGLLUHCKUA OpraHy CHELUANU3UPAHU NYHKTOBE  3a cbOupaHe  IMpaBunHoTO M3XBbpNAAHE n peuukniupaHe  Le CNOMOrHaT Ma ce MmpenoTBpaTaT eBeHTya lludd BpeaHu 3a  okonHata cpena n 3APABETO Ha HaceneHveto nocneactena  3a  no nonpo6Ha NHDOpMaLIMA OTHOCHO N3XBbpPIIAHETO Ha Baue  cTap  ypenu ce OObpHeTe KbM MECTHUTE BJIACTU  CHYXKOUTE 3a  CMETOCB  NpaHe nnn Mara3VHa  OT KONTO CTe 3aKynunu ypena     Dual Band Wireless N Gigabit Router    Cestina  Czech    Informace o ochran   Zivotniho  prostredi pro zakazniky v zemich Evropsk   unie    Evropsk   sm  rnice 2002 96 ES zakazuje  aby za  izeni oznacen    timto symbolem 4 na produktu anebo na obalu bylo likvidov  no  s netrid  n  m komun  ln  m odpadem  Tento symbol ud  v       e dan   produkt mus   b  t likvidov  n odd  len   od b    n  ho  komun  ln  ho odpadu  Odpov  d  te za likvidaci tohoto produktu  a dal    ch elektrick  c
102. our rights to work written entirely  by you  rather  the intent is to exercise the right to  control the distribution of derivative or collective  works based on the Library     In addition  mere aggregation of another work  not based on the Library with the Library  or with  a work based on the Library  on a volume of a  storage or distribution medium does not bring the  other work under the scope of this Licence     3  You may opt to apply the terms of the ordinary GNU    General Public Licence instead of this Licence to a  given copy of the Library  To do this  you must alter all  the notices that refer to this Licence  so that they refer  to the ordinary GNU General Public Licence  version  2  instead of to this Licence   If a newer version than  version 2 of the ordinary GNU General Public Licence  has appeared  then you can specify that version  instead if you wish   Do not make any other change in  these notices     Once this change is made in a given copy  it is  irreversible for that copy  so the ordinary GNU General  Public Licence applies to all subsequent copies and  derivative works made from that copy     This option is useful when you wish to copy part of the  code of the Library into a program that is not a library     You may copy and distribute the Library  or a portion  or derivative of it  under Section 2  in object code or  executable form under the terms of Sections 1 and  2 above provided that you accompany it with the  complete corresponding machine re
103. pour but de lutter contre l impact n  faste potentiel de ce  type de produits sur l environnement et la sant   publique  Pour  plus d informations sur le mode d   limination de votre ancien    quipement  veuillez prendre contact avec les pouvoirs publics  locaux  le service de traitement des d  chets  ou l endroit o   vous  avez achet   le produit     Italiano  Italian    Informazioni relative all ambiente  per i clienti residenti nell Unione Europea    La direttiva europea 2002 96 EC richiede che le apparecchiature  contrassegnate con questo simbolo X sul prodotto e o  sull imballaggio non siano smaltite insieme ai rifiuti urbani  non differenziati  Il simbolo indica che questo prodotto non  deve essere smaltito insieme ai normali rifiuti domestici  E  responsabilit   del proprietario smaltire sia questi prodotti sia  le altre apparecchiature elettriche ed elettroniche mediante  le specifiche strutture di raccolta indicate dal governo o dagli  enti pubblici locali  Il corretto smaltimento ed il riciclaggio  aiuteranno a prevenire conseguenze potenzialmente negative  per l ambiente e per la salute dell essere umano  Per ricevere  informazioni pi   dettagliate circa lo smaltimento delle vecchie  apparecchiature in Vostro possesso  Vi invitiamo a contattare gli  enti pubblici di competenza  il servizio di smaltimento rifiuti o il  negozio nel quale avete acquistato il prodotto     Latviesu valoda  Latvian    Ekologiska informacija  klientiem Eiropas Savienibas jurisdikcija   Di
104. programming language for websites  If you  deny Java  you run the risk of not having access to Internet    18    Chapter 3    Advanced Configuration       sites created using this programming language  Select  this feature to enable Java filtering  Deselect the feature to  allow Java usage     ActiveX ActiveX is a programming language for websites   If you deny ActiveX  you run the risk of not having access  to Internet sites created using this programming language   Select this feature to enable ActiveX filtering  Deselect the  feature to allow ActiveX usage     Cookies A cookie is data stored on your computer and  used by Internet sites when you interact with them  Select  this feature to filter cookies  Deselect the feature to allow  cookie usage     Click Save Settings to apply your changes or click Cancel  Changes to cancel your changes     Security 5 VPN Passthrough    The VPN Passthrough screen allows you to enable VPN  tunnels using IPSec  PPTP or L2TP protocols to pass through  the Router s firewall     LINKSYS  by Cisco    aw  LR    Security bes         NA e eic inm       Security    VPN Passthrough    VPN Passthrough    IPSec Passthrough Internet Protocol Security  IPSec  is  a suite of protocols used to implement secure exchange  of packets at the IP layer  To allow IPSec tunnels to pass  through the Router  keep the default  Enabled     PPTP Passthrough Point to Point Tunneling Protocol   PPTP  allows the Point to Point Protocol  PPP  to be  tunnelled through an 
105. ration  gt  Log    The Router can keep logs of all traffic for your Internet  connection     LINKSYS by Cisco    Administration nes       Administration  gt  Log    Log    Log To disable the Log function  select Disabled  To  monitor traffic between the network and the Internet   keep the default  Enabled  With logging enabled  you can  choose to view temporary logs     View Log To view the logs  click View Log     LE kesmegleg      manang Loy Sour oe E Address Destination Pali umber  Saga ihe Log Hater eh       Administration 5 Log 5 View Log    Log    e Type Select Incoming Log  Outgoing Log  Security  Log or DHCP Client Log     e  lt Type gt  Log The Incoming Log will display a  temporary log of the source  P addresses and  destination port numbers for the incoming Internet  traffic  The Outgoing Log will display a temporary  log of the local IP addresses  destination URLs IP  addresses and service port numbers for the outgoing  Internet traffic  The Security log will display the login  information for the web based utility  The DHCP  Client Log will display the LAN DHCP server status  information     Click Save the Log to save this information to a file  on your PC s hard drive  Click Refresh to update the  log  Click Clear to clear all the information that is  displayed     Click Save Settings to apply your changes or click Cancel  Changes to cancel your changes     25    Chapter 3    Advanced Configuration       Administration  gt  Diagnostics    The diagnostic tests  P
106. rektiva 2002 96 EK ir prasiba  ka aprikojumu  kam pievienota  z  me E uz pasa izstr  d  juma vai uz t   iesai  ojuma  nedr  kst  izmest ne kirota veida kopa ar komunalajiem atkritumiem   tiem  ko rada vieteji iedzivot  ji un uzn  mumi   Si zime nozim    to  ka Si ierice ir jaizmet atkritumos ta  lai ta nenonaktu kopa ar  parastiem majsaimniecibas atkritumiem  J  su pienakums ir So  un citas elektriskas un elektroniskas ierices izmest atkritumos   izmantojot ipasus atkritumu savaksanas veidus un lidzeklus  ko  nodro  ina valsts un pa  vald  bu iest  des  Ja izme  ana atkritumos  un p  rstr  de tiek veikta pareizi  tad mazin  s iesp  jamais  kaitejums dabai un cilv  ku vesel  bai  Sikakas zi  as par  novecoju  a apr  kojuma izme  anu atkritumos j  s varat sa  emt  viet  j   pa  vald  b    atkritumu sav  k  anas dienest    k   ar   veikal     kur ieg  d  j  ties   o izstr  d  jumu     39    Appendix D    Regulatory Information       Lietuvskai  Lithuanian    Aplinkosaugos informacija   skirta Europos Sajungos vartotojams    Europos direktyva 2002 96 EC numato  kad jrangos  kuri ir     kurios pakuot   yra pa  ym  ta   iuo simboliu  jveskite simboli    negalima   alinti kartu su ner    iuotomis komunalin  mis  atliekomis    is simbolis rodo  kad gaminj reikia   alinti atskirai  nuo bendro buitini   atliek   srauto  J  s privalote u  tikrinti  kad  Si ir kita elektros ar elektronin   jranga b  t     alinama per tam  tikras nacionalin  s ar vietin  s vald  ios nustatytas atliek   ri
107. ress   192 168 1 1  in the Address field  Then  press Enter     A login screen will appear   Non Windows XP users will  see a similar screen   Leave the User name field blank  The  first time you open the Web based utility  use the default  password admin   You can set a new password from the  Administration tab s Management screen   Click OK to  continue        Login Screen    Setup 5 Basic Setup    The first screen that appears is the Basic Setup screen  This  allows you to change the Router s general settings     Dual Band Wireless N Gigabit Router    LINKSYS by Cisco        Ri  Fabre ast Pr Ti e      rosen METRE     m  Han E Zeen i ee  160    Maske a    a m    12 AD 108  Cher Latit r  rurales O tiima ee doy   Date DAE 1       etes         ET LAAL AN     o Eliise ades pisci is bt saming changes       Setup    Basic Setup    Internet Setup    The Internet Setup section configures the Router to your  Internet connection  Most of this information can be  obtained through your ISP     Internet Connection Type    Select the type of Internet connection your ISP provides  from the drop down menu  These are the available types     e Automatic Configuration   DHCP    e Static IP  e PPPoE  e PPTP   e L2TP    e Telstra Cable  Automatic Configuration   DHCP    By default  the Router s Internet Connection Type is set  to Automatic Configuration   DHCP  which should be  kept only if your ISP supports DHCP or you are connecting  through a dynamic IP address   This option usually applies 
108. ress is  myplace dyndns org and you enable wildcards  then  x myplace dyndns org will work as well  x is the wildcard    To disable wildcards  keep the default  Disabled  To enable  wildcards  select Enabled  If you are not sure which setting  to select  keep the default  Disabled     Internet IP Address The Router s Internet IP address is  displayed here  Because it is dynamic  it will change     Status The status of the DDNS service connection is  displayed here     Update To manually trigger an update  click this button     Click Save Settings to apply your changes or click Cancel  Changes to cancel your changes     11    Chapter 3    Advanced Configuration       TZ0 com    LINKSYS by Cisco    Setup    DDNS    TZO    E mail Address  TZO Key and Domain Name Enter the  settings of the account you set up with TZO     Internet IP Address The Router s Internet IP address is  displayed here  Because it is dynamic  it will change     Status The status of the DDNS service connection is  displayed here     Update To manually trigger an update  click this button     Click Save Settings to apply your changes or click Cancel  Changes to cancel your changes     Setup    MAC Address Clone    A MAC address is a 12 digit code assigned to a unique  piece of hardware for identification  Some ISPs will require  you to register a MAC address in order to access the  Internet  If you do not wish to re register the MAC address  with your ISP  you may assign the MAC address you have  currently re
109. rity for the Router  refer to   Chapter 2  Wireless Security      Wireless Security    Security Mode    Select the security method for your wireless network  If  you do not want to use wireless security  keep the default   Disabled     WPA Personal    ta NOTE  If you are using WPA  always remember  that each device in your wireless network MUST   use the same WPA method and shared key or   else the network will not function properly        14    Chapter 3    LINKSYS  by Cisco    Wireless    Passphrase Enter a Passphrase of 8 63 characters     Key Renewal Enter a Key Renewal period  which instructs  the Router how often itshould changethe encryption keys   The default Group Key Renewal period is 3600 seconds     WPA2 Personal    LINKSYS by Cisco    Wireless       Security Mode  gt  WPA2 Personal    Encryption WPA2 supports two encryption methods   TKIP and AES  with dynamic encryption keys  Select the  type of algorithm  AES or TKIP or AES  The default is TKIP  or AES     Passphrase Enter a Passphrase of 8 63 characters     Key Renewal Enter a Key Renewal period  which instructs  the Router how often it should change the encryption keys   The default Group Key Renewal period is 3600 seconds     WPA Enterprise    This option features WPA used in co ordination with a  RADIUS server   This should only be used when a RADIUS  server is connected to the Router      Dual Band Wireless N Gigabit Router          Advanced Configuration    LINKSYS by Cisco    Wireless    Security Mode  g
110. roduct includes cryptographic software written  by Eric Young  eay cryptsoft com      The word  cryptographic  can be left out if the routines  from the library being used are not cryptographic  related     4  Ifyouinclude any Windows specific code  or a derivative  thereof  from the apps directory  application code   you must include an acknowledgement   This product  includes software written by Tim Hudson  tjh   cryptsoft com      THIS SOFTWARE IS PROVIDED BY ERIC YOUNG  AS IS   AND ANY EXPRESS OR IMPLIED WARRANTIES  INCLUDING   BUT NOT LIMITED TO  THE IMPLIED WARRANTIES OF  MERCHANTABILITY AND FITNESS FOR A PARTICULAR  PURPOSE ARE DISCLAIMED  IN NO EVENT SHALL THE  AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY  DIRECT  INDIRECT  INCIDENTAL  SPECIAL  EXEMPLARY  OR CONSEQUENTIAL DAMAGES  INCLUDING  BUT NOT  LIMITED TO  PROCUREMENT OF SUBSTITUTE GOODS OR  SERVICES  LOSS OF USE  DATA OR PROFITS  OR BUSINESS  INTERRUPTION  HOWEVER CAUSED AND ON ANY THEORY  OF LIABILITY  WHETHER IN CONTRACT  STRICT LIABILITY   OR TORT  INCLUDING NEGLIGENCE OR OTHERWISE   ARISING IN ANYWAY OUT OF THE USE OF THIS SOFTWARE   EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE     Thelicence and distribution terms for any publicly available  version or derivative of this code cannot be changed  i e   this code cannot simply be copied and put under another  distribution licence  including the GNU Public Licence      END OF SCHEDULE 4    8122210NC Al  Dual Band Wireless N Gigabit Router 53    
111. roying all copies of the Software  and documentation  Your rights under this Licence will  terminate immediately without notice from Linksys if You  fail to comply with any provision of this Agreement     Limited Warranty  The warranty terms and period  specified in the applicable Linksys Product User Guide  shall also apply to the Software     Disclaimer of Liabilities  IN NO EVENT WILL LINKSYS OR  ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA  TURNOVER  OR PROFIT  OR FOR SPECIAL  INDIRECT  CONSEQUENTIAL   INCIDENTAL OR PUNITIVE DAMAGES  REGARDLESS OF  CAUSE  INCLUDING NEGLIGENCE   ARISING OUT OF    Dual Band Wireless N Gigabit Router    OR RELATED TO THE USE OF OR INABILITY TO USE THE  SOFTWARE  EVEN IF LINKSYS HAS BEEN ADVISED OF  THE POSSIBILITY OF SUCH DAMAGES  IN NO EVENT WILL  LINKSYS  LIABILITY EXCEED THE AMOUNT PAID BY YOU  FOR THE PRODUCT  The foregoing limitations will apply  even if any warranty or remedy under this Agreement fails  of its essential purpose  Some jurisdictions do not allow  the exclusion or limitation of incidental or consequential  damages  so the above limitation or exclusion may not  apply to You     Export  Software  including technical data  may be subject  to U S  export control laws and regulations and or export  or import regulations in other countries  You agree to  comply strictly with all such laws and regulations     U S  Government Users  The Software and documentation  qualify as  commercial items  as defined at 48 C F R  2 101  and 48 C
112. s limited warranty shall apply in addition to any  statutory or other rights which you may have under a  contract of sale     Exclusions and Limitations    This limited warranty does not apply if   a  the product  assembly seal has been removed or damaged   b  the  product has been altered or modified  except by Linksys   c   the product damage was caused by use with non Linksys  products   d  the product has not been installed  operated   repaired or maintained in accordance with instructions  supplied by Linksys   e  the product has been subjected to  abnormal physical or electrical stress  misuse  negligence  or accident   f  the serial number on the Product has been  altered  defaced or removed or  g  the product is supplied  or licensed for beta  evaluation  testing or demonstration  purposes for which Linksys does not charge a purchase  price or licence fee     ALLSOFTWARE PROVIDED BY LINKSYSWITH THE PRODUCT   WHETHER FACTORY LOADED ON THE PRODUCT OR  CONTAINED ON MEDIA ACCOMPANYING THE PRODUCT   IS PROVIDED  AS IS  WITHOUT ANY WARRANTY OF ANY  KIND  Without limiting the foregoing  Linksys does not  warrant that the operation of the product or software will  be uninterrupted or error free  Also  due to the continual  development of new techniques for intruding upon and  attacking networks  Linksys does not warrant that the  product  service  software or any equipment  system or    Dual Band Wireless N Gigabit Router    network on which the product or software is used wi
113. s not restricted and output from such a  program is covered only if its contents constitute a    Dual Band Wireless N Gigabit Router    work based on the Library  independent of the use  of the Library in a tool for writing it   Whether that is  true depends on what the Library does and what the  program that uses the Library does       You may copy and distribute verbatim copies of the    Library s complete source code as you receive it  in  any medium  provided that you conspicuously and  appropriately publish on each copy an appropriate  copyright notice and disclaimer of warranty  keep  intact all the notices that refer to this Licence and to  the absence of any warranty  and distribute a copy of  this Licence along with the Library     You may charge a fee for the physical act of transferring  a copy and you may at your option offer warranty  protection in exchange for a fee       You may modify your copy or copies of the Library or    any portion of it  thus forming a work based on the  Library and copy and distribute such modifications  or work under the terms of Section 1 above  provided  that you also meet all of these conditions     a  The modified work must itself be a software  library     b  You must cause the files modified to carry  prominent notices stating that you changed the  files and the date of any change     C  You must cause the whole of the work to be  licensed at no charge to all third parties under the  terms of this Licence     d  If a facility in 
114. se  port services for common applications on this screen     When users send these types of requests to your network via  the Internet  the Router will forward those requests to the  appropriate servers  computers   Before using forwarding   you should assign static IP addresses to the designated  servers  use the DHCP Reservation feature on the Basic Setup  screen      LINKSYS by Cisco    Applications  amp     Gaming wine Ti LC  cunt i    Ena Pert intesa Per Praten teg Addis  E       EST A9 8    pes E  PAPANG        Lis 188 30  m    rr  es 264 10           ina VB    mam ow m 164 10  CECT    Bn sw Lu 164 10    Bn v  n2 18 16    Beam e nz 160  1 0      I    Bm dee      Bein   ee gp  CUT    aa E A      sem dmm    amjajajajajaan aaoaad      T T  23o 3 2 a ale o o O       Applications and Gaming  gt  Single Port Forwarding    Single Port Forwarding    Common applications are available for the first five  entries  Select the appropriate application  Then enter the  IP address of the server that should receive these requests   Select Enabled to activate this entry     For additional applications  complete the following fields     Application Name Enter the name you wish to give the  application  Each name can be up to 12 characters     20    Chapter 3    Advanced Configuration       External Port Enter the external port number used by  the server or Internet application  Check with the Internet  application documentation for more information     Internal Port Enter the internal por
115. se restrictions translate to certain  responsibilities for you if you distribute copies of the  software or if you modify it     For example  if you distribute copies of such a program   whether gratis or for a fee  you must give the recipients  all the rights that you have  You must make sure that they   too  receive or can get the source code  And you must  show them these terms so they know their rights     We protect your rights with two steps   1  copyright the  software and  2  offer you this licence which gives you  legal permission to copy  distribute and or modify the  software     Also  for each author s protection and ours  we want to  make certain that everyone understands that there is no  warranty for this free software  If the software is modified  by someone else and passed on  we want its recipients  to know that what they have is not the original  so that  any problems introduced by others will not reflect on the  original authors  reputations     Finally  any free program is threatened constantly by  software patents  We wish to avoid the danger that  redistributors of a free program will individually obtain  patent licences  in effect making the program proprietary   To prevent this  we have made it clear that any patent must  be licensed for everyone s free use or not licensed at all     The precise terms and conditions for copying  distribution  and modification follow     Dual Band Wireless N Gigabit Router    TERMS AND CONDITIONS FOR COPYING  DISTRIBUT
116. seau sans fil  du d  bit  de la transmission de donn  es  de la port  e et de la  couverture  Les performances d  pendent de facteurs   conditions et variables multiples  en particulier de la  distance par rapport au point d acc  s  du volume du trafic  r  seau  des mat  riaux utilis  s dans le b  timent et du  type de construction  du syst  me d exploitation et de la  combinaison de produits sans fil utilis  s  des interf  rences  et de toute autre condition d  favorable     Dual Band Wireless N Gigabit Router 34    Appendix D Regulatory Information       Declaration of Conformity with Regard to Nederlands   Pit apparaat voldoet aan de essentiele eisen  EU Directive 1999 5 EC  R amp TTE Directive  Dutch        n andere van toepassing zijnde bepalingen    van de Richtlijn 1999 5 EC            Compliance Information for 2 4 GHz and 5 GHz Wireless  Products Relevant to the EU and Other Countries Following Malti Dan l apparat huwa konformi mal   ti  iet    the EU Directive 1999 5 EC  R amp TTE Directive  Me a Ny a l o  ra rilevanti    ada DIrettiva       ToBa o6opynBaHe OTroBapa Ha cbeujecrBeHurTe  U3UCKBAHUA n  npuioxkxuMa k  May3n Ha  AupekruBa 1999 5 EC     Ez a  k  sz  l  k  teljes  ti az alapveto  Magyar k  vetelm  nyeket   s   m  s  1999 5 EK   Hungarian    ir  nyelvben meghat  rozott vonatkoz    rendelkez  seket     BbbnrapcKn   Bulgarian     Toto za  izeni je v souladu se zakladnimi    pozadavky 2 NU EE No Dette utstyret er i samsvar med de  ustanovenimi smernice grunnle
117. strictive licence from a  patent holder  Therefore  we insist that any patent licence  obtained for a version of the library must be consistent  with the full freedom of use specified in this licence     Most GNU software  including some libraries  is covered  by the ordinary GNU General Public Licence  This licence   the GNU Lesser General Public Licence  applies to certain  designated libraries and is quite different from the  ordinary General Public Licence  We use this licence for  certain libraries in order to permit linking those libraries  into non free programs     When a program is linked with a library  whether  statically or using a shared library  the combination of  the two is legally speaking a combined work  a derivative  of the original library  The ordinary General Public  Licence therefore permits such linking only if the entire  combination fits its criteria of freedom  The Lesser General  Public Licence permits more lax criteria for linking other  code with the library     We call this licence the  Lesser  General Public Licence  because it does Less to protect the user s freedom than  the ordinary General Public Licence  It also provides  other free software developers Less of an advantage over  competing non free programs  These disadvantages are  the reason we use the ordinary General Public Licence  for many libraries  However  the Lesser licence provides  advantages in certain special circumstances     For example  on rare occasions  there may be a sp
118. t  WPA Enterprise    RADIUS Server Enter the IP Address of the RADIUS  server     RADIUS Port Enter the port number of the RADIUS  server  The default value is 1812     Shared Secret Enter the key shared between the Router  and the server     Key Renewal Enter a Key Renewal period  which instructs  the Router how often it should change the encryption  keys  The default Key Renewal period is 3600 seconds     WPA2 Enterprise    This option features WPA2 used in co ordination with a  RADIUS server   This should only be used when a RADIUS  server is connected to the Router      LINKSYS by Cisco    Wireless       Security Mode  gt  WPA2 Enterprise    Encryption WPA2 supports two encryption methods   TKIP and AES  with dynamic encryption keys  Select the  type of algorithm  AES or TKIP or AES  The default is TKIP  or AES     RADIUS Server Enter the IP Address of the RADIUS  server     RADIUS Port Enter the port number of the RADIUS  server  The default value is 1812     Shared Secret Enter the key shared between the Router  and the server     15    Chapter 3    Advanced Configuration       Key Renewal Enter a Key Renewal period  which instructs  the Router how often it should change the encryption  keys  The default Key Renewal period is 3600 seconds     RADIUS    This option features WEP used in co ordination with a  RADIUS server   This should only be used when a RADIUS  server is connected to the Router      LINKSYS by Cisco    Wireless          Security Mode  gt  RADIUS    AN I
119. t number used by  the server or Internet application  Check with the Internet  application documentation for more information     Protocol Select the protocol used for this application   either TCP or UDP or Both     To IP Address For each application  enter the IP address  of the PC that should receive the requests  If you assigned  a static IP address to the PC  then you can click DHCP  Reservation on the Basic Setup screen to look up its static  IP address     Enabled For each application  select Enabled to enable  port forwarding     Click Save Settings to apply your changes or click Cancel  Changes to cancel your changes     Applications and Gaming  gt  Port Range  Forwarding    The Port Range Forwarding screen allows you to set up  public services on your network  such as web servers   ftp servers  email servers or other specialised Internet  applications   Specialised Internet applications are any  applications that use Internet access to perform functions  such as videoconferencing or online gaming  Some Internet  applications may not require any forwarding      When users send these types of requests to your network via  the Internet  the Router will forward those requests to the  appropriate servers  computers   Before using forwarding   you should assign static IP addresses to the designated  servers  use the DHCP Reservation feature on the Basic Setup  screen      If you need to forward all ports to one computer  click the  DMZ tab     LINKSYS by Cisco    Applical
120. the modified Library refers to a  function or a table of data to be supplied by an  application program that uses the facility  other  than as an argument passed when the facility is  invoked  then you must make a good faith effort  to ensure that  in the event an application does  not supply such function or table  the facility still  operates and performs whatever part of its purpose  remains meaningful      For example  a function in a library to compute  square roots has a purpose that is entirely well   defined independent of the application  Therefore   Subsection 2d requires that any application   supplied function or table used by this function  must be optional  if the application does not supply  it  the square root function must still compute  square roots      These requirements apply to the modified work  as a whole  If identifiable sections of that work are  not derived from the Library and can be reasonably  considered independent and separate works in  themselves  then this Licence and its terms  do  not apply to those sections when you distribute    48    Appendix E    them as separate works  But when you distribute  the same sections as part of a whole which is a  work based on the Library  the distribution of the  whole must be on the terms of this Licence  whose  permissions for other licensees extend to the entire  whole and thus to each and every part regardless  of who wrote it     Thus  it is not the intent of this section to claim  rights or contest y
121. the source and  the destination  When the NAT setting is enabled  the  Dynamic Routing feature is automatically disabled  When  the NAT setting is disabled  this feature is available  Select  Enabled to use the Dynamic Routing feature     Static Routing    A static route is a pre determined pathway that network  information must travel to reach a specific host or network   Enter the information described below to set up a new  static route     12    Chapter 3    Advanced Configuration       Route Entries To set up a static route between the Router  and another network  select a number from the drop   down list  Click Delete This Entry to delete a static route     Enter Route Name Enter a name for the Route here   using a maximum of 25 alphanumeric characters     Destination LAN IP The Destination LAN IP is the address  of the remote network or host to which you want to assign  a static route     SubnetMask The Subnet Mask determines which portion  of a Destination LAN IP address is the network portion and  which portion is the host portion     Gateway This is the IP address of the gateway device that  allows for contact between the Router and the remote  network or host     Interface This interface tells you whether the Destination  IP Address is on the LAN  amp  Wireless  Ethernet and wireless  networks  or the WAN  Internet      Click Show Routing Table to view the static routes you  have already set up        Advanced Routing 5 Routing Table    Routing Table    For each ro
122. thin the boundaries of the owner s  property  its use requires a    general authorization  Please  check http   www comunicazioni it it  for more details     Questo prodotto    conforme alla specifiche di Interfaccia  Radio Nazionali e rispetta il Piano Nazionale di ripartizione  delle frequenze in Italia  Se non viene installato all interno  del proprio fondo  l utilizzo di prodotti Wireless LAN a  2 4 GHz richiede una  Autorizzazione Generale     Consultare  http   www comunicazioni it it  per maggiori dettagli     Latvia    The outdoor usage of the 2 4 GHz band requires an  authorization from the Electronic Communications Office   Please check http   www esd lv for more details     24 GHz frekvecu joslas izmanto  anai   rpus telpam  nepieciesama atlauja no Elektronisko sakaru direkcijas   Vair  k inform  cijas  http   www esd lv     Notes     1  Although Norway  Switzerland and Liechtenstein are  not EU member states  the EU Directive 1999 5 EC has  also been implemented in those countries     2  The regulatory limits for maximum output power are  specified in EIRP  The EIRP level of a device can be  calculated by adding the gain of the antenna used   specified in dBi  to the output power available at the  connector  specified in dBm      Dual Band Wireless N Gigabit Router       Product Usage Restrictions    This product is designed for indoor usage only  Outdoor  usage is not recommended  unless otherwise noted     2 4 GHz Restrictions    This product is designed for use
123. to EU Directive 1999 5 EC  R amp TTE Directive     35  Wireless Equipment  Wireless N G A B Products                            36  SI eq ee AA AD we Ge eh AG St eB ge RR 36  National Restrictions Se 3 eC er PA CARES eww 9 93 3 199 99 3 9 98 ed 36  Product Usage Restrictions                                         37  Technical Documents on www linksys com international                     37  User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste  Electric and Electronic Equipment  WEEE                                38   Appendix E  Software Licence Agreement 42  Software in Linksys Products                                        42  Software LICENCES 4404 KAG KAMA a6 EE do D eee nono earth x3  3 42    Dual Band Wireless N Gigabit Router iii    Chapter 1    Product Overview       Chapter 1   Product Overview    Thank you for choosing the Linksys Dual band Wireless N  Gigabit Router  The Router lets you access the Internet via  a wireless connection or through one of its four switched  ports  You can also use the Router to share resources  such  as computers     variety of security features help to protect  your data and your privacy while online  Security features  include WPA2 security  a Stateful Packet Inspection  SPI   firewall and NAT technology  Configuring the Router is    easy using the provided browser based utility     Front Panel              1  2  3  4  Green Blue  These numbered LEDs   corresponding with the numbered ports on the  Ro
124. u are in a remote location  and wish to manage the Router  enter    http    lt Internet_IP_address gt  port or  https    lt Internet_IP_address gt  port   depending on whether you use HTTP or HTTPS   Enter the Router s specific Internet IP address in  place of  lt Internet_IP_address gt  and enter the  Remote Management Port number in place of  the word port     UPnP    Universal Plug and Play  UPnP  allows Windows Me and XP  to automatically configure the Router for various Internet  applications  such as gaming and videoconferencing     UPnP If you want to use UPnP  keep the default setting   Enabled  Otherwise  select Disabled     Allow Users to Configure Keep the default  Enabled   if you want to be able to make manual changes to the  Router while using the UPnP feature  Otherwise  select  Disabled     Allow Users to Disable Internet Access Select Enabled   if you want to be able to prohibit any and all Internet  connections  Otherwise  keep the default setting   Disabled     Backup and Restore    Backup Configurations To back up the Router s  configuration settings  click this button and follow the on   screen instructions     Restore Configurations To restore the Router s  configuration settings  click this button and follow the on   screen instructions   You must have previously backed up  the Router s configuration settings      Click Save Settings to apply your changes or click Cancel  Changes to cancel your changes     Dual Band Wireless N Gigabit Router    Administ
125. up   when there is a connection made through the   Internet port  A flashing LED indicates network  activity over the Internet port       Power  Blue  The Power LED lights up and will  Y stay on while the Router is powered on  When  the Router goes through its self diagnostic  mode during every boot up  this LED will flash   When the diagnostic is complete  the LED will   be solidly lit     Back Panel       Internet This Gigabit port is where you will  connect your cable or DSL Internet connection     1 2 3 4 These Gigabit ports  1  2  3  4  connect  the Router to computers and other Ethernet  network devices on your wired network       Reset There are two ways to reset the Router s  factory defaults  Either press and hold the Reset  Button for approximately five seconds  orrestore  the defaults from Administration  gt  Factory  Defaults in the Router s web based utility     Power The Power port is where you will  H connect the power adapter   Placement Positions    There are two ways to physically install the Router  The  first way is to place the Router horizontally on a surface   The second way is to mount the Router on a wall     Horizontal Placement    The Router has four rubber feet on its bottom panel  Place  the Router on a level surface near an electrical socket        Chapter 1    Product Overview       Wall Mounting Placement    The Router has two wall mount slots on its bottom  panel  The distance between the slots is 152 mm   6 inches      Two screws are needed t
126. ute  the Destination LAN IP address  Subnet  Mask  Gateway and Interface are displayed  Click  Refresh to update the information  Click Close to exit  this screen     Click Save Settings to apply your changes or click Cancel  Changes to cancel your changes     Wireless 5 Basic Wireless Settings    The basic settings for wireless networking are set on this  screen     There are two ways to configure the Router s wireless  network s   manual and Wi Fi Protected Setup     Wi Fi Protected Setup is a feature that makes it easy to set  up your wireless network  If you have client devices  such  as wireless adapters  that support Wi Fi Protected Setup   then you can use Wi Fi Protected Setup     Configuration View To manually configure your wireless  network  select Manual  Proceed to the  Basic Wireless  Settings  section  To use Wi Fi Protected Setup  select    Dual Band Wireless N Gigabit Router    Wi Fi Protected Setup  Proceed to the  Wi Fi Protected  Setup  section     Basic Wireless Settings    LINKSYS by Cisco  Wireless    Bina Wr bw dd besen       Wireless    Basic Wireless Settings  Manual Setup     Wireless Band This is used to select the 2 4 GHz or  5 0 GHz band     Network Mode From this drop down menu  you can  select the wireless standards running on your network  If  you have Wireless N  Wireless G and Wireless B devices in  your network  keep the default setting  Mixed  If you have  only Wireless G and Wireless B devices in your network   select BG Mixed  If you hav
127. uter s back panel  serve two purposes  The  LED is solidly lit when the Router is connected  to a device through that port  It flashes to  indicates network activity  Green indicates  Gigabit speeds  and blue indicates 10 100  speeds     Wi Fi Protected Setup Button If you have  client devices  such as wireless adapters  that  support Wi Fi Protected Setup  then you can  use Wi Fi Protected Setup to automatically  configure wireless security for your wireless  network s      To use Wi Fi Protected Setup  run the Setup  Wizard  or refer to the  Wireless    Basic Wireless  Settings  section of  Chapter 3  Advanced  Configuration      Wi Fi Protected Setup LED  Blue Amber   It lights up blue when wireless security is  enabled  The LED flashes blue for two minutes  during Wi Fi Protected Setup     The LED lights up amber if there is an error  during the Wi Fi Protected Setup process  Make  sure the client device supports Wi Fi Protected  Setup  Wait until the LEDis off  and then try again     The LED flashes amber when a Wi Fi Protected  Setup session is active  and a second session  begins  The Router supports one session at a  time  Wait until the LED is off before starting the  next Wi Fi Protected Setup session     Dual Band Wireless N Gigabit Router    Wireless  Blue  The Wireless LED lights up  when the wireless feature is enabled  If the LED  is flashing  the Router is actively sending or  receiving data over the network           Q Internet  Blue  The Internet LED lights 
128. without  any limitation except for the countries mentioned below     Ce produit peut   tre utilis   dans tous les pays de l UE  et dans  tous les pays ayant transpos  s la directive 1999 5 CE  sans  aucune limitation  except   pour les pays mentionn  s ci   dessous     Questo prodotto e utilizzabile in tutte i paesi EU  ed in tutti  gli altri paesi che seguono le direttive EU 1999 5 EC  senza  nessuna limitazione  eccetto per i paesi menzionati di  seguito     Das Produkt kann in allen EU Staaten ohne Einschr  nkungen  eingesetzt werden  sowie in anderen Staaten die der EU  Direktive 1999 5 CE folgen  mit AuBnahme der folgenden  aufgef  hrten Staaten     In the majority of the EU and other European countries   the 2 4  and 5 GHz bands have been made available for  the use of wireless local area networks  LANs   The table  labelled  Overview of Regulatory Requirements for  Wireless LANs  provides an overview of the regulatory  requirements applicable for the 2 4  and 5 GHz bands     Later in this document you will find an overview of  countries in which additional restrictions or requirements  or both are applicable     The requirements for any country may evolve  Linksys  recommends that you check with the local authorities for  the latest status of their national regulations for both the  2 4  and 5 GHz wireless LANs     Overview of Regulatory Requirements for Wireless LANs    Frequency Max Power Level Indoor Indoor  amp   Band  MHz   EIRP   mW  ONLY Outdoor    2400 2483 5 1
129. ww openssl org source license html     The OpenSSL toolkit stays under a dual licence  i e  both  the conditions of the OpenSSL Licence and the original  SSLeay licence apply to the toolkit  See below for the  actual licence texts  Actually both licences are BSD style  Open Source licences  In case of any licence issues related  to OpenSSL please contact openssl core openssl org     OpenSSL Licence    Copyright    1998 2007 The OpenSSL Project  All rights  reserved     Redistribution and use in source and binary forms  with  or without modification  are permitted provided that the  following conditions are met     1  Redistributions of source code must retain the above  copyright notice  this list of conditions and the  following disclaimer     2  Redistributions in binary form must reproduce the  above copyright notice  this list of conditions and the  following disclaimer in the documentation and or  other materials provided with the distribution     3  All advertising materials mentioning features or  use of this software must display the following  acknowledgment   This product includes software  developed by the OpenSSL Project for use in the  OpenSSL Toolkit   http   www openssl org      4  The names  OpenSSL Toolkit  and  OpenSSL Project   must not be used to endorse or promote products  derived from this software without prior written  permission  For written permission  please contact  openssl coregopenssl org     5  Products derived from this software may not be cal
130. y  receives a licence from the original licensor to copy   distribute  link with or modify the Library subject  to these terms and conditions  You may not impose  any further restrictions on the recipients  exercise  of the rights granted herein  You are not responsible  for enforcing compliance by third parties with this  Licence     50    Appendix E    MP    12     13     If  as a consequence of a court judgment or allegation  of patent infringement or for any other reason  not  limited to patent issues   conditions are imposed on  you  whether by court order  agreement or otherwise   that contradict the conditions of this Licence  they do  not excuse you from the conditions of this Licence  If  you cannot distribute so as to satisfy simultaneously  your obligations under this Licence and any other  pertinent obligations  then as a consequence you may  not distribute the Library at all  For example  if a patent  licence would not permit royalty free redistribution of  the Library by all those who receive copies directly or  indirectly through you  then the only way you could  satisfy both it and this Licence would be to refrain  entirely from distribution of the Library     If any portion of this section is held invalid or  unenforceable under any particular circumstance   the balance of the section is intended to apply and  the section as a whole is intended to apply in other  circumstances     It is not the purpose of this section to induce you to  infringe any patents or
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
MMS Interface  Samsung PS51F8500ST    USER MANUAL - WiFiRanger  A554C User Manual  Impex WM-367 Owner's Manual  Anleitung - Repro Schicker AG  Bedienungsanleitung  ダイレクトサーブ - CLUB T-fal  Cypress NoBL CY7C1352G User's Manual    Copyright © All rights reserved. 
   Failed to retrieve file