background image

20

Wireless-N Router

Linksys E1000

Chapter 2: Advanced Configuration

To IP Address 

Enter the IP address of the computer that 

should  receive  the  requests .  If  you  assigned  a  static  IP 

address to the computer, then you can look up its static IP 

address; refer to “DHCP Reservation” on page 6 .

Enabled 

Select Enabled to enable port forwarding .

You can customize entries for additional applications . For 

each entry, complete the following:

Application Name 

Enter the name you wish to give the 

application . Each name can be up to 12 characters .

External  Port 

Enter  the  external  port  number  used  by 

the  computer  or  Internet  application .  Check  with  the 

Internet application documentation for more information .

Internal Port 

Enter the internal port number used by the 

computer or Internet application . Check with the Internet 

application documentation for more information .

Protocol 

Select the protocol(s) used for this application, 

TCP (Transmission Control Protocol), UDP (User Datagram 

Protocol),or Both .

To IP Address 

Enter the IP address of the computer that 

should  receive  the  requests .  If  you  assigned  a  static  IP 

address to the computer, then you can look up its static IP 

address; refer to “DHCP Reservation” on page 6 .

Enabled 

Select Enabled to enable port forwarding .

Click Save Settings to apply your changes, or click Cancel 

Changes to clear your changes .

Applications and Gaming > Port Range 

Forwarding

The

  Port  Range  Forwarding

  screen  allows  you  to  set  up 

public  services  on  your  network,  such  as  web  servers, 

FTP  servers,  email  servers,  or  other  specialized  Internet 

applications .  (Specialized  Internet  applications  are  any 

applications  that  use  Internet  access  to  perform  functions 

such as videoconferencing or online gaming . Some Internet 

applications may not require any forwarding .)
When users send these types of requests to your network 

via  the  Internet,  the  Router  will  forward  those  requests  to 

the appropriate computers (also called servers) . Before using 

forwarding,  you  should  assign  static  IP  addresses  to  the 

designated computers (use the DHCP Reservation option on 

the 

Basic Setup

 screen; refer to “DHCP Reservation” on page 

6) .
If you need to forward all ports to one computer, click the 

DMZ tab .

Applications and Gaming > Port Range Forwarding

Port Range Forwarding

For each entry, complete the following:

Application Name 

Enter the name you wish to give the 

application . Each name can be up to 12 characters .

Start~End  Port 

Enter  the  number  or  range  of  port(s) 

used by the server or Internet application . Check with the 

Internet application documentation for more information .

Protocol 

Select the protocol(s) used for this application, 

TCPUDP, or Both .

To  IP  Address 

Enter  the  IP  address  of  the  computer 

running the specific application . If you assigned a static IP 

address to the computer, then you can look up its static IP 

address; refer to “DHCP Reservation” on page 6 .

Enabled 

Select Enabled to enable port forwarding .

Click Save Settings to apply your changes, or click Cancel 

Changes to clear your changes .

Summary of Contents for Linksys E1000

Page 1: ...Linksys E1000 Wireless N Router User Guide ...

Page 2: ...Filter 15 Wireless Advanced Wireless Settings 16 Security Firewall 17 Security VPN Passthrough 18 Access Restrictions Internet Access 18 Applications and Gaming Single Port Forwarding 19 Applications and Gaming Port Range Forwarding 20 Applications Gaming Port Range Triggering 21 Applications and Gaming DMZ 21 Applications and Gaming QoS 22 Administration Management 24 Administration Log 25 Admini...

Page 3: ... automatically configure wireless security for your wireless network To use Wi Fi Protected Setup refer to Wi Fi Protected Setup on page 11 Wireless Blue The Wireless LED lights up when the wireless feature is enabled It flashes when the Router sends or receives data over the wireless network Internet Blue The Internet LED lights up when there is a connection made through the Internet port It flas...

Page 4: ... to mount the Router Make sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical outlet 2 Drill two holes into the wall Make sure the holes are 152 mm apart 3 Insert a screw into each hole and leave 3 mm of its head exposed 4 Position the Router so the wall mount slots line up with the two screws 5 Place the wall mount slots over the s...

Page 5: ...age 6 A login screen will appear Non Windows 7 users will see a similar screen Leave the User name field blank Then enter the password you set up during the setup software If you did not run the setup software then use the default password admin You can set a new password on the Administration Management screen Refer to Administration Management on page 24 Click OK to continue Login Screen NOTE Yo...

Page 6: ...ax Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time Max Idle Time If your Internet connection has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max...

Page 7: ...as been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max Idle Time field enter the number of minutes you want to elapse before your Internet connection terminates The default is 5 minutes Keep Alive Redial Period If you select thi...

Page 8: ...sk as seen by your network is displayed Device name To access the browser based utility enter the Router s Device name or IP address The default is Ciscoxxxxx xxxxx are the last five digits of the Router s serial number found on the product label on the left side of the Router s bottom panel If you want to change the default enter a new Device name The Device name is also the Router s NetBIOS name...

Page 9: ...IP address After the time is up the user will be automatically assigned a new dynamic IP address or the lease will be renewed The default is 0 minutes which means one day Static DNS 1 3 The Domain Name System DNS is how the Internet translates domain or website names into Internet addresses or Uniform Resource Locators URLs Your ISP will provide you with at least one DNS Server IP address If you w...

Page 10: ...ter s Internet IP address is displayed here Because it is dynamic it will change Status The status of the DDNS service connection is displayed Update To manually trigger an update click Update Click Save Settings to apply your changes or click Cancel Changes to clear your changes TZO com Setup DDNS TZO E mail Address TZO Key and Domain Name Enter the settings of the account you set up with TZO Int...

Page 11: ... this option is available Select Enabled to use the Dynamic Routing option Static Routing A static route is a pre determined pathway that network information must travel to reach a specific host or network Enter the information described below to set up a new static route Route Entries To set up a static route between the Router and another network select a number from the drop down list Click Del...

Page 12: ...less B Only Disabled If you do not have any wireless devices in your network select Disabled NOTE If you are not sure which mode to use keep the default Mixed Network Name SSID The Service Set Identifier SSID is the network name shared by all devices in a wireless network It is case sensitive and must not exceed 32 keyboard characters The default is Ciscoxxxxx xxxxx are the last five digits of the...

Page 13: ...ng the next Wi Fi Protected Setup session c After the client device has been configured click OK on the Router s Wi Fi Protected Setup screen Then refer back to your client device or its documentation for further instructions Enter Client Device PIN on Router Use this method if your client device has a Wi Fi Protected Setup PIN Personal Identification Number a Enter the PIN from the client device ...

Page 14: ...ions because WPA2 or WPA provides encryption while RADIUS provides authentication Security Option Strength WPA2 Enterprise Strongest WPA2 WPA Enterprise Mixed Mode WPA2 Strongest WPA Strong WPA Enterprise Strong RADIUS Basic Security Mode Select the security method for your wireless network WPA2 WPA Mixed Mode NOTE If you select WPA2 WPA Mixed Mode as your Security Mode each device in your wireles...

Page 15: ...e shared key WPA2 WPA Enterprise Mixed Mode RADIUS Server Enter the IP address of the RADIUS server RADIUS Port Enter the port number of the RADIUS server The default is 1812 Shared Secret Enter the key shared between the Router and the server Click Save Settings to apply your changes or click Cancel Changes to clear your changes WPA2 Enterprise This option features WPA2 used in coordination with ...

Page 16: ...bits 26 hex digits The default is 40 64 bits 10 hex digits Passphrase Enter a Passphrase to automatically generate WEP keys Then click Generate Key 1 If you did not enter a Passphrase enter the WEP key manually Click Save Settings to apply your changes or click Cancel Changes to clear your changes RADIUS This option features WEP used in coordination with a RADIUS server This should only be used wh...

Page 17: ...devicesinyourwirelessnetwork Wireless Wireless MAC Filter Wireless MAC Filter Enabled Disabled To filter wireless users by the MAC addresses of their computers or devices select Enabled Otherwise keep the default Disabled Access Restriction Prevent PCs listed below from accessing the wireless network When theWireless Mac Filter is enabled and this option is selected computers listed in the MAC Add...

Page 18: ...he sender and the recipient do NOT use a WEP key for authentication With Shared Key authentication the sender and recipient use aWEP key for authentication Select Shared Key to only use Shared Key authentication Basic Rate The Basic Rate setting is not actually one rate of transmission but a series of rates at which the Router can transmit The Basic Rate is not the actual rate of data transmission...

Page 19: ...ata frame After receiving an RTS the wireless station responds with a CTS frame to acknowledge the right to begin transmission The RTS Threshold value should remain at its default value of 2347 Click Save Settings to apply your changes or click Cancel Changes to clear your changes Security Firewall The Firewall screen is used to configure a firewall that can filter out various types of unwanted tr...

Page 20: ...ult Enabled L2TP Passthrough Layer 2 Tunneling Protocol L2TP is the method used to enable Point to Point sessions via the Internet on the Layer 2 level To allow L2TP tunnels to pass through the Router keep the default Enabled Click Save Settings to apply your changes or click Cancel Changes to clear your changes Access Restrictions Internet Access The Internet Access screen allows you to deny or a...

Page 21: ... Website Blocking by Keyword field 9 You can filter access to various services accessed over the Internet such as FTP or telnet You can block up to three applications per policy From the Applications list select the application you want to block Then click the button to move it to the Blocked List To remove an application from the Blocked List select it and click the button 10 If the application y...

Page 22: ...rt Range Forwarding screen allows you to set up public services on your network such as web servers FTP servers email servers or other specialized Internet applications Specialized Internet applications are any applications that use Internet access to perform functions such as videoconferencing or online gaming Some Internet applications may not require any forwarding When users send these types o...

Page 23: ...MZ The DMZ Demilitarized Zone feature allows one network computer to be exposed to the Internet for use of a special purpose service such as Internet gaming or videoconferencing DMZ hosting forwards all the ports at the same time to one computer The Port Range Forwarding feature is more secure because it only opens the ports you want to have opened while DMZ hosting opens all the ports of one comp...

Page 24: ...ety of applications and devices There are four levels of priority High Medium Normal or Low When you set priority do not set all applications to High because this will defeat the purpose of allocating the available bandwidth Ifyouwanttoselectbelownormalbandwidth select Low Depending on the application a few attempts may be needed to set the appropriate bandwidth priority Enabled Disabled To use th...

Page 25: ... appear in the Summary list Online Games QoS Online Games Game Select the appropriate game If you select Add a New Game follow the instructions in the Add a New Game section Priority Select the appropriate priority High Medium Recommend Normal or Low Click Add to save your changes Your new entry will appear in the Summary list Add a New Game QoS Add a New Game Enter a Name Enter any name to indica...

Page 26: ...outer in a public domain where you are giving wireless access to your guests you can disable wireless access to the Router s browser based utility You will only be able to access the utility via a wired connection if you disable the setting Keep the default Enabled to allow wireless access to the utility or select Disabled to block wireless access to the utility Remote Access Remote Management To ...

Page 27: ...network and the Internet select Enabled With logging enabled you can choose to view temporary logs Click Save Settings to apply your change or click Cancel Changes to clear your change View Log When you wish to view the logs click this option Log View Log Log Type Select Incoming Log Outgoing Log Security Log or DHCP Client Log Type Log The Incoming Log displays a temporary log of the source IP ad...

Page 28: ...The Traceroute screen shows if the test is successful Click Close to return to the Diagnostics screen Click Stop to stop the test Diagnostics Traceroute Administration Factory Defaults The Factory Defaults screen allows you to restore the Router s configuration to its factory default settings NOTE Donotrestorethefactorydefaultsunless you are having difficulties with the Router and have exhausted a...

Page 29: ...the Reset button during the upgrade process Doing so may disable the Router Status Router The Router screen displays information about the Router and its current settings Status Router Router Information Firmware Version The version number of the Router s current firmware is displayed Firmware Verification The unique identifier of the firmware is displayed Current Time The time set on the Router i...

Page 30: ...as a DHCP server DHCP Client Table DHCP Client Table The DHCP Client Table lists computers and other devices that have been assigned IP addresses by the Router The list can be sorted by IP Address MAC Address Interface and Client Name To remove a DHCP client click Delete To update the on screen information click Refresh To exit this screen and return to the Local Network screen click Close Status ...

Page 31: ...o longer need to connect manually The DSL telephone line does not fit into the Router s Internet port The Router does not replace your modem You still need your DSL modem in order to use the Router Connect the telephone line to the DSL modem and then insert the setup CD into your computer Click Set up your Linksys Router and follow the on screen instructions When you double click the web browser y...

Page 32: ...e Password field When you try to log into the browser based utility your password does not work Your wireless security password also serves as the browser based utility s login password To see this password 1 Open Cisco Connect 2 On the main menu click Router settings 3 The Passwordis displayed on the left side of the screen WEB If your questions are not addressed here refer to our E1000 section o...

Page 33: ... Setup Wireless Internet Power Cabling Type CAT 5e RF Pwr EIRP in dBm 17 5 dBm Antenna Gain in dBi 1 5 dBi UPnP able cert Able Security Features WEP WPA WPA2 Security Key Bits Up to 128 Bit Encryption Environmental Dimensions 202 x 34 x 160 mm Unit Weight 280 g Power 12V 0 5A Certifications FCC CE IC 03 Wi Fi Windows 7 Operating Temp 0 to 40 C Storage Temp 20 to 60 C Operating Humidity 10 to 85 No...

Page 34: ...ys are trademarks or registered trademarks of Cisco and or its affiliates in the United States and certain other countries All other trademarks mentioned in this document or website are the property of their respective owners 2010 Cisco All rights reserved ...

Reviews: