background image

11

Wireless-N Router

Linksys E1000

Chapter 2: Advanced Configuration

Wi-Fi Protected Setup

There are three methods available . Use the method that 

applies to the client device you are configuring .

Wireless > Basic Wireless Settings (Wi-Fi Protected Setup)

NOTE:

  Wi-Fi  Protected  Setup  configures  one 

client device at a time . Repeat the instructions 

for  each  client  device  that  supports  Wi-Fi 

Protected Setup .

 •

Wi-Fi  Protected  Setup  Button 

Use  this  method  if 

your client device has a Wi-Fi Protected Setup button .

a .  Click or press the Wi-Fi Protected Setup button on 

the client device .

b .  Click  the  Wi-Fi  Protected  Setup  button  on  the 

Router’s 

Wi-Fi Protected Setup

 screen .

The Wi-Fi Protected Setup LED flashes blue for two 

minutes during the Wi-Fi Protected Setup process 

and lights up blue when the Wi-Fi Protected Setup 

process is successful .
The LED lights up amber if there is an error during 

the Wi-Fi Protected Setup process . Make sure the 

client device supports Wi-Fi Protected Setup . Wait 

until the LED is off, and then try again . 
The  LED  flashes  when  a  Wi-Fi  Protected  Setup 

session is active . The Router supports one session 

at a time . Wait until the LED is continuously lit, or 

off before starting the next Wi-Fi Protected Setup 

session .

c .  After  the  client  device  has  been  configured, 

click  OK  on  the  Router’s 

Wi-Fi  Protected  Setup

 

screen . Then refer back to your client device or its 

documentation for further instructions .

 •

Enter Client Device PIN on Router 

Use this method 

if  your  client  device  has  a Wi-Fi  Protected  Setup  PIN 

(Personal Identification Number) .

a .  Enter the PIN from the client device in the

field on 

the Router’s 

Wi-Fi Protected Setup

 screen .

b .  Click  the  Register  button  on  the  Router’s 

Wi-Fi 

Protected Setup

 screen .

c .  After  the  client  device  has  been  configured, 

click  OK  on  the  Router’s 

Wi-Fi  Protected  Setup

 

screen . Then refer back to your client device or its 

documentation for further instructions .

 •

Enter Router PIN on Client Device 

Use this method 

if your client device asks for the Router’s PIN . 

a .  On  the  client  device,  enter  the  PIN  listed  on  the 

Router’s 

Wi-Fi  Protected  Setup

  screen .  (It  is  also 

listed on the label on the bottom of the Router .)

b .  After  the  client  device  has  been  configured, 

click  OK  on  the  Router’s 

Wi-Fi  Protected  Setup

 

screen . Then refer back to your client device or its 

documentation for further instructions .

The  Network  Name  (SSID),  Security,  and  Passphrase  are 

displayed at the bottom of the screen .

NOTE:

  If  you  have  client  devices  that  do  not 

support Wi-Fi Protected Setup, note the wireless 

settings,  and  then  manually  configure  those 

client devices .

Summary of Contents for Linksys E1000

Page 1: ...Linksys E1000 Wireless N Router User Guide ...

Page 2: ...Filter 15 Wireless Advanced Wireless Settings 16 Security Firewall 17 Security VPN Passthrough 18 Access Restrictions Internet Access 18 Applications and Gaming Single Port Forwarding 19 Applications and Gaming Port Range Forwarding 20 Applications Gaming Port Range Triggering 21 Applications and Gaming DMZ 21 Applications and Gaming QoS 22 Administration Management 24 Administration Log 25 Admini...

Page 3: ... automatically configure wireless security for your wireless network To use Wi Fi Protected Setup refer to Wi Fi Protected Setup on page 11 Wireless Blue The Wireless LED lights up when the wireless feature is enabled It flashes when the Router sends or receives data over the wireless network Internet Blue The Internet LED lights up when there is a connection made through the Internet port It flas...

Page 4: ... to mount the Router Make sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical outlet 2 Drill two holes into the wall Make sure the holes are 152 mm apart 3 Insert a screw into each hole and leave 3 mm of its head exposed 4 Position the Router so the wall mount slots line up with the two screws 5 Place the wall mount slots over the s...

Page 5: ...age 6 A login screen will appear Non Windows 7 users will see a similar screen Leave the User name field blank Then enter the password you set up during the setup software If you did not run the setup software then use the default password admin You can set a new password on the Administration Management screen Refer to Administration Management on page 24 Click OK to continue Login Screen NOTE Yo...

Page 6: ...ax Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time Max Idle Time If your Internet connection has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max...

Page 7: ...as been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max Idle Time field enter the number of minutes you want to elapse before your Internet connection terminates The default is 5 minutes Keep Alive Redial Period If you select thi...

Page 8: ...sk as seen by your network is displayed Device name To access the browser based utility enter the Router s Device name or IP address The default is Ciscoxxxxx xxxxx are the last five digits of the Router s serial number found on the product label on the left side of the Router s bottom panel If you want to change the default enter a new Device name The Device name is also the Router s NetBIOS name...

Page 9: ...IP address After the time is up the user will be automatically assigned a new dynamic IP address or the lease will be renewed The default is 0 minutes which means one day Static DNS 1 3 The Domain Name System DNS is how the Internet translates domain or website names into Internet addresses or Uniform Resource Locators URLs Your ISP will provide you with at least one DNS Server IP address If you w...

Page 10: ...ter s Internet IP address is displayed here Because it is dynamic it will change Status The status of the DDNS service connection is displayed Update To manually trigger an update click Update Click Save Settings to apply your changes or click Cancel Changes to clear your changes TZO com Setup DDNS TZO E mail Address TZO Key and Domain Name Enter the settings of the account you set up with TZO Int...

Page 11: ... this option is available Select Enabled to use the Dynamic Routing option Static Routing A static route is a pre determined pathway that network information must travel to reach a specific host or network Enter the information described below to set up a new static route Route Entries To set up a static route between the Router and another network select a number from the drop down list Click Del...

Page 12: ...less B Only Disabled If you do not have any wireless devices in your network select Disabled NOTE If you are not sure which mode to use keep the default Mixed Network Name SSID The Service Set Identifier SSID is the network name shared by all devices in a wireless network It is case sensitive and must not exceed 32 keyboard characters The default is Ciscoxxxxx xxxxx are the last five digits of the...

Page 13: ...ng the next Wi Fi Protected Setup session c After the client device has been configured click OK on the Router s Wi Fi Protected Setup screen Then refer back to your client device or its documentation for further instructions Enter Client Device PIN on Router Use this method if your client device has a Wi Fi Protected Setup PIN Personal Identification Number a Enter the PIN from the client device ...

Page 14: ...ions because WPA2 or WPA provides encryption while RADIUS provides authentication Security Option Strength WPA2 Enterprise Strongest WPA2 WPA Enterprise Mixed Mode WPA2 Strongest WPA Strong WPA Enterprise Strong RADIUS Basic Security Mode Select the security method for your wireless network WPA2 WPA Mixed Mode NOTE If you select WPA2 WPA Mixed Mode as your Security Mode each device in your wireles...

Page 15: ...e shared key WPA2 WPA Enterprise Mixed Mode RADIUS Server Enter the IP address of the RADIUS server RADIUS Port Enter the port number of the RADIUS server The default is 1812 Shared Secret Enter the key shared between the Router and the server Click Save Settings to apply your changes or click Cancel Changes to clear your changes WPA2 Enterprise This option features WPA2 used in coordination with ...

Page 16: ...bits 26 hex digits The default is 40 64 bits 10 hex digits Passphrase Enter a Passphrase to automatically generate WEP keys Then click Generate Key 1 If you did not enter a Passphrase enter the WEP key manually Click Save Settings to apply your changes or click Cancel Changes to clear your changes RADIUS This option features WEP used in coordination with a RADIUS server This should only be used wh...

Page 17: ...devicesinyourwirelessnetwork Wireless Wireless MAC Filter Wireless MAC Filter Enabled Disabled To filter wireless users by the MAC addresses of their computers or devices select Enabled Otherwise keep the default Disabled Access Restriction Prevent PCs listed below from accessing the wireless network When theWireless Mac Filter is enabled and this option is selected computers listed in the MAC Add...

Page 18: ...he sender and the recipient do NOT use a WEP key for authentication With Shared Key authentication the sender and recipient use aWEP key for authentication Select Shared Key to only use Shared Key authentication Basic Rate The Basic Rate setting is not actually one rate of transmission but a series of rates at which the Router can transmit The Basic Rate is not the actual rate of data transmission...

Page 19: ...ata frame After receiving an RTS the wireless station responds with a CTS frame to acknowledge the right to begin transmission The RTS Threshold value should remain at its default value of 2347 Click Save Settings to apply your changes or click Cancel Changes to clear your changes Security Firewall The Firewall screen is used to configure a firewall that can filter out various types of unwanted tr...

Page 20: ...ult Enabled L2TP Passthrough Layer 2 Tunneling Protocol L2TP is the method used to enable Point to Point sessions via the Internet on the Layer 2 level To allow L2TP tunnels to pass through the Router keep the default Enabled Click Save Settings to apply your changes or click Cancel Changes to clear your changes Access Restrictions Internet Access The Internet Access screen allows you to deny or a...

Page 21: ... Website Blocking by Keyword field 9 You can filter access to various services accessed over the Internet such as FTP or telnet You can block up to three applications per policy From the Applications list select the application you want to block Then click the button to move it to the Blocked List To remove an application from the Blocked List select it and click the button 10 If the application y...

Page 22: ...rt Range Forwarding screen allows you to set up public services on your network such as web servers FTP servers email servers or other specialized Internet applications Specialized Internet applications are any applications that use Internet access to perform functions such as videoconferencing or online gaming Some Internet applications may not require any forwarding When users send these types o...

Page 23: ...MZ The DMZ Demilitarized Zone feature allows one network computer to be exposed to the Internet for use of a special purpose service such as Internet gaming or videoconferencing DMZ hosting forwards all the ports at the same time to one computer The Port Range Forwarding feature is more secure because it only opens the ports you want to have opened while DMZ hosting opens all the ports of one comp...

Page 24: ...ety of applications and devices There are four levels of priority High Medium Normal or Low When you set priority do not set all applications to High because this will defeat the purpose of allocating the available bandwidth Ifyouwanttoselectbelownormalbandwidth select Low Depending on the application a few attempts may be needed to set the appropriate bandwidth priority Enabled Disabled To use th...

Page 25: ... appear in the Summary list Online Games QoS Online Games Game Select the appropriate game If you select Add a New Game follow the instructions in the Add a New Game section Priority Select the appropriate priority High Medium Recommend Normal or Low Click Add to save your changes Your new entry will appear in the Summary list Add a New Game QoS Add a New Game Enter a Name Enter any name to indica...

Page 26: ...outer in a public domain where you are giving wireless access to your guests you can disable wireless access to the Router s browser based utility You will only be able to access the utility via a wired connection if you disable the setting Keep the default Enabled to allow wireless access to the utility or select Disabled to block wireless access to the utility Remote Access Remote Management To ...

Page 27: ...network and the Internet select Enabled With logging enabled you can choose to view temporary logs Click Save Settings to apply your change or click Cancel Changes to clear your change View Log When you wish to view the logs click this option Log View Log Log Type Select Incoming Log Outgoing Log Security Log or DHCP Client Log Type Log The Incoming Log displays a temporary log of the source IP ad...

Page 28: ...The Traceroute screen shows if the test is successful Click Close to return to the Diagnostics screen Click Stop to stop the test Diagnostics Traceroute Administration Factory Defaults The Factory Defaults screen allows you to restore the Router s configuration to its factory default settings NOTE Donotrestorethefactorydefaultsunless you are having difficulties with the Router and have exhausted a...

Page 29: ...the Reset button during the upgrade process Doing so may disable the Router Status Router The Router screen displays information about the Router and its current settings Status Router Router Information Firmware Version The version number of the Router s current firmware is displayed Firmware Verification The unique identifier of the firmware is displayed Current Time The time set on the Router i...

Page 30: ...as a DHCP server DHCP Client Table DHCP Client Table The DHCP Client Table lists computers and other devices that have been assigned IP addresses by the Router The list can be sorted by IP Address MAC Address Interface and Client Name To remove a DHCP client click Delete To update the on screen information click Refresh To exit this screen and return to the Local Network screen click Close Status ...

Page 31: ...o longer need to connect manually The DSL telephone line does not fit into the Router s Internet port The Router does not replace your modem You still need your DSL modem in order to use the Router Connect the telephone line to the DSL modem and then insert the setup CD into your computer Click Set up your Linksys Router and follow the on screen instructions When you double click the web browser y...

Page 32: ...e Password field When you try to log into the browser based utility your password does not work Your wireless security password also serves as the browser based utility s login password To see this password 1 Open Cisco Connect 2 On the main menu click Router settings 3 The Passwordis displayed on the left side of the screen WEB If your questions are not addressed here refer to our E1000 section o...

Page 33: ... Setup Wireless Internet Power Cabling Type CAT 5e RF Pwr EIRP in dBm 17 5 dBm Antenna Gain in dBi 1 5 dBi UPnP able cert Able Security Features WEP WPA WPA2 Security Key Bits Up to 128 Bit Encryption Environmental Dimensions 202 x 34 x 160 mm Unit Weight 280 g Power 12V 0 5A Certifications FCC CE IC 03 Wi Fi Windows 7 Operating Temp 0 to 40 C Storage Temp 20 to 60 C Operating Humidity 10 to 85 No...

Page 34: ...ys are trademarks or registered trademarks of Cisco and or its affiliates in the United States and certain other countries All other trademarks mentioned in this document or website are the property of their respective owners 2010 Cisco All rights reserved ...

Reviews: