background image

22

Wireless-N Router

Linksys E1000

Chapter 2: Advanced Configuration

DMZ > DHCP Client Table

DHCP Client Table

The  DHCP  Client  Table  lists  computers  and  other 

devices that have been assigned IP addresses by the 

Router . The list can be sorted by Client Name, Interface, 

IP Address, and MAC Address . To select a DHCP client, 

click  Select .  To  update  the  on-screen  information, 

click Refresh . To exit this screen and return to the 

DMZ

 

screen, click Close . 

Click Save Settings to apply your changes, or click Cancel 

Changes to clear your changes .

Applications and Gaming > QoS

Quality of Service (QoS) is a method that assigns priority 

to  specific  types  of  network  traffic,  which  often  are 

demanding,  real-time  applications,  such  as  gaming, 

videoconferencing,  video  streaming,  and  Voice  over 

Internet  Protocol  (VoIP)  telephony .  QoS  helps  to  ensure 

optimal performance for these types of uses .

Applications and Gaming > QoS 

QoS (Quality of Service)

Wireless

WMM  Support 

Wi-Fi  Multimedia  (WMM)  is  a  wireless 

Quality of Service feature that improves quality for audio, 

video,  and  voice  applications  by  prioritizing  wireless 

traffic . To  use  this  feature,  the  wireless  client  devices  in 

your  network  must  support  Wireless  WMM .  To  disable 

this option, select Disabled . Otherwise, keep the default, 

Enabled .

No  Acknowledgement 

If  you  want  to  disable  the 

Router’s  Acknowledgement  option,  so  the  Router  will 

not re-send data if an error occurs, then select Enabled . 

Otherwise, keep the default, Disabled .

Internet Access Priority

In  this  section,  you  can  set  the  bandwidth  priority  for  a 

variety of applications and devices . There are four levels 

of  priority:  High,  Medium,  Normal,  or  Low .  When  you 

set  priority,  do  not  set  all  applications  to  High,  because 

this  will  defeat  the  purpose  of  allocating  the  available 

bandwidth . If you want to select below normal bandwidth, 

select Low . Depending on the application, a few attempts 

may be needed to set the appropriate bandwidth priority .

Enabled/Disabled 

To use the QoS policies you set, select 

Enabled . Otherwise, keep the default, Disabled .

Upstream Bandwidth

Upstream  Bandwidth 

This  option  sets  the  maximum 

outgoing bandwidth that applications can use . To allow 

the Router to set the maximum, keep the default, Auto . 

To specify the maximum, select Manual . Then enter the 

appropriate value and select Kbps or Mbps .

Category

You  can  define  the  Internet  access  priority  level  for  as 

many categories as you want . The 

Summary

 section will 

display all of the priority selections that you enter . Select 

from the following categories: 

 •

Applications 

Allows you to assign a priority level for a 

pre-defined application or one that you add . 

 •

Online Games 

Allows you to assign a priority level for 

a pre-defined game or one that you add .

 •

MAC Address 

This option lets you prioritize network 

traffic  based  on  the  device  that  is  accessing  the 

network .  For  example,  if  you  want  your  gaming 

console to have higher priority accessing the Internet 

than your computer, you can assign their priority levels 

using their respective MAC addresses . 

 •

Voice Device 

Voice devices require a higher priority 

level . You  can  assign  a  higher  priority  level  to  voice 

devices using their respective MAC addresses .

Summary

This  lists  the  QoS  entries  you  have  created  for  your 

applications and devices . Refer to “Summary” on page 24 

for more information .

Summary of Contents for Linksys E1000

Page 1: ...Linksys E1000 Wireless N Router User Guide ...

Page 2: ...Filter 15 Wireless Advanced Wireless Settings 16 Security Firewall 17 Security VPN Passthrough 18 Access Restrictions Internet Access 18 Applications and Gaming Single Port Forwarding 19 Applications and Gaming Port Range Forwarding 20 Applications Gaming Port Range Triggering 21 Applications and Gaming DMZ 21 Applications and Gaming QoS 22 Administration Management 24 Administration Log 25 Admini...

Page 3: ... automatically configure wireless security for your wireless network To use Wi Fi Protected Setup refer to Wi Fi Protected Setup on page 11 Wireless Blue The Wireless LED lights up when the wireless feature is enabled It flashes when the Router sends or receives data over the wireless network Internet Blue The Internet LED lights up when there is a connection made through the Internet port It flas...

Page 4: ... to mount the Router Make sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical outlet 2 Drill two holes into the wall Make sure the holes are 152 mm apart 3 Insert a screw into each hole and leave 3 mm of its head exposed 4 Position the Router so the wall mount slots line up with the two screws 5 Place the wall mount slots over the s...

Page 5: ...age 6 A login screen will appear Non Windows 7 users will see a similar screen Leave the User name field blank Then enter the password you set up during the setup software If you did not run the setup software then use the default password admin You can set a new password on the Administration Management screen Refer to Administration Management on page 24 Click OK to continue Login Screen NOTE Yo...

Page 6: ...ax Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time Max Idle Time If your Internet connection has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max...

Page 7: ...as been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max Idle Time field enter the number of minutes you want to elapse before your Internet connection terminates The default is 5 minutes Keep Alive Redial Period If you select thi...

Page 8: ...sk as seen by your network is displayed Device name To access the browser based utility enter the Router s Device name or IP address The default is Ciscoxxxxx xxxxx are the last five digits of the Router s serial number found on the product label on the left side of the Router s bottom panel If you want to change the default enter a new Device name The Device name is also the Router s NetBIOS name...

Page 9: ...IP address After the time is up the user will be automatically assigned a new dynamic IP address or the lease will be renewed The default is 0 minutes which means one day Static DNS 1 3 The Domain Name System DNS is how the Internet translates domain or website names into Internet addresses or Uniform Resource Locators URLs Your ISP will provide you with at least one DNS Server IP address If you w...

Page 10: ...ter s Internet IP address is displayed here Because it is dynamic it will change Status The status of the DDNS service connection is displayed Update To manually trigger an update click Update Click Save Settings to apply your changes or click Cancel Changes to clear your changes TZO com Setup DDNS TZO E mail Address TZO Key and Domain Name Enter the settings of the account you set up with TZO Int...

Page 11: ... this option is available Select Enabled to use the Dynamic Routing option Static Routing A static route is a pre determined pathway that network information must travel to reach a specific host or network Enter the information described below to set up a new static route Route Entries To set up a static route between the Router and another network select a number from the drop down list Click Del...

Page 12: ...less B Only Disabled If you do not have any wireless devices in your network select Disabled NOTE If you are not sure which mode to use keep the default Mixed Network Name SSID The Service Set Identifier SSID is the network name shared by all devices in a wireless network It is case sensitive and must not exceed 32 keyboard characters The default is Ciscoxxxxx xxxxx are the last five digits of the...

Page 13: ...ng the next Wi Fi Protected Setup session c After the client device has been configured click OK on the Router s Wi Fi Protected Setup screen Then refer back to your client device or its documentation for further instructions Enter Client Device PIN on Router Use this method if your client device has a Wi Fi Protected Setup PIN Personal Identification Number a Enter the PIN from the client device ...

Page 14: ...ions because WPA2 or WPA provides encryption while RADIUS provides authentication Security Option Strength WPA2 Enterprise Strongest WPA2 WPA Enterprise Mixed Mode WPA2 Strongest WPA Strong WPA Enterprise Strong RADIUS Basic Security Mode Select the security method for your wireless network WPA2 WPA Mixed Mode NOTE If you select WPA2 WPA Mixed Mode as your Security Mode each device in your wireles...

Page 15: ...e shared key WPA2 WPA Enterprise Mixed Mode RADIUS Server Enter the IP address of the RADIUS server RADIUS Port Enter the port number of the RADIUS server The default is 1812 Shared Secret Enter the key shared between the Router and the server Click Save Settings to apply your changes or click Cancel Changes to clear your changes WPA2 Enterprise This option features WPA2 used in coordination with ...

Page 16: ...bits 26 hex digits The default is 40 64 bits 10 hex digits Passphrase Enter a Passphrase to automatically generate WEP keys Then click Generate Key 1 If you did not enter a Passphrase enter the WEP key manually Click Save Settings to apply your changes or click Cancel Changes to clear your changes RADIUS This option features WEP used in coordination with a RADIUS server This should only be used wh...

Page 17: ...devicesinyourwirelessnetwork Wireless Wireless MAC Filter Wireless MAC Filter Enabled Disabled To filter wireless users by the MAC addresses of their computers or devices select Enabled Otherwise keep the default Disabled Access Restriction Prevent PCs listed below from accessing the wireless network When theWireless Mac Filter is enabled and this option is selected computers listed in the MAC Add...

Page 18: ...he sender and the recipient do NOT use a WEP key for authentication With Shared Key authentication the sender and recipient use aWEP key for authentication Select Shared Key to only use Shared Key authentication Basic Rate The Basic Rate setting is not actually one rate of transmission but a series of rates at which the Router can transmit The Basic Rate is not the actual rate of data transmission...

Page 19: ...ata frame After receiving an RTS the wireless station responds with a CTS frame to acknowledge the right to begin transmission The RTS Threshold value should remain at its default value of 2347 Click Save Settings to apply your changes or click Cancel Changes to clear your changes Security Firewall The Firewall screen is used to configure a firewall that can filter out various types of unwanted tr...

Page 20: ...ult Enabled L2TP Passthrough Layer 2 Tunneling Protocol L2TP is the method used to enable Point to Point sessions via the Internet on the Layer 2 level To allow L2TP tunnels to pass through the Router keep the default Enabled Click Save Settings to apply your changes or click Cancel Changes to clear your changes Access Restrictions Internet Access The Internet Access screen allows you to deny or a...

Page 21: ... Website Blocking by Keyword field 9 You can filter access to various services accessed over the Internet such as FTP or telnet You can block up to three applications per policy From the Applications list select the application you want to block Then click the button to move it to the Blocked List To remove an application from the Blocked List select it and click the button 10 If the application y...

Page 22: ...rt Range Forwarding screen allows you to set up public services on your network such as web servers FTP servers email servers or other specialized Internet applications Specialized Internet applications are any applications that use Internet access to perform functions such as videoconferencing or online gaming Some Internet applications may not require any forwarding When users send these types o...

Page 23: ...MZ The DMZ Demilitarized Zone feature allows one network computer to be exposed to the Internet for use of a special purpose service such as Internet gaming or videoconferencing DMZ hosting forwards all the ports at the same time to one computer The Port Range Forwarding feature is more secure because it only opens the ports you want to have opened while DMZ hosting opens all the ports of one comp...

Page 24: ...ety of applications and devices There are four levels of priority High Medium Normal or Low When you set priority do not set all applications to High because this will defeat the purpose of allocating the available bandwidth Ifyouwanttoselectbelownormalbandwidth select Low Depending on the application a few attempts may be needed to set the appropriate bandwidth priority Enabled Disabled To use th...

Page 25: ... appear in the Summary list Online Games QoS Online Games Game Select the appropriate game If you select Add a New Game follow the instructions in the Add a New Game section Priority Select the appropriate priority High Medium Recommend Normal or Low Click Add to save your changes Your new entry will appear in the Summary list Add a New Game QoS Add a New Game Enter a Name Enter any name to indica...

Page 26: ...outer in a public domain where you are giving wireless access to your guests you can disable wireless access to the Router s browser based utility You will only be able to access the utility via a wired connection if you disable the setting Keep the default Enabled to allow wireless access to the utility or select Disabled to block wireless access to the utility Remote Access Remote Management To ...

Page 27: ...network and the Internet select Enabled With logging enabled you can choose to view temporary logs Click Save Settings to apply your change or click Cancel Changes to clear your change View Log When you wish to view the logs click this option Log View Log Log Type Select Incoming Log Outgoing Log Security Log or DHCP Client Log Type Log The Incoming Log displays a temporary log of the source IP ad...

Page 28: ...The Traceroute screen shows if the test is successful Click Close to return to the Diagnostics screen Click Stop to stop the test Diagnostics Traceroute Administration Factory Defaults The Factory Defaults screen allows you to restore the Router s configuration to its factory default settings NOTE Donotrestorethefactorydefaultsunless you are having difficulties with the Router and have exhausted a...

Page 29: ...the Reset button during the upgrade process Doing so may disable the Router Status Router The Router screen displays information about the Router and its current settings Status Router Router Information Firmware Version The version number of the Router s current firmware is displayed Firmware Verification The unique identifier of the firmware is displayed Current Time The time set on the Router i...

Page 30: ...as a DHCP server DHCP Client Table DHCP Client Table The DHCP Client Table lists computers and other devices that have been assigned IP addresses by the Router The list can be sorted by IP Address MAC Address Interface and Client Name To remove a DHCP client click Delete To update the on screen information click Refresh To exit this screen and return to the Local Network screen click Close Status ...

Page 31: ...o longer need to connect manually The DSL telephone line does not fit into the Router s Internet port The Router does not replace your modem You still need your DSL modem in order to use the Router Connect the telephone line to the DSL modem and then insert the setup CD into your computer Click Set up your Linksys Router and follow the on screen instructions When you double click the web browser y...

Page 32: ...e Password field When you try to log into the browser based utility your password does not work Your wireless security password also serves as the browser based utility s login password To see this password 1 Open Cisco Connect 2 On the main menu click Router settings 3 The Passwordis displayed on the left side of the screen WEB If your questions are not addressed here refer to our E1000 section o...

Page 33: ... Setup Wireless Internet Power Cabling Type CAT 5e RF Pwr EIRP in dBm 17 5 dBm Antenna Gain in dBi 1 5 dBi UPnP able cert Able Security Features WEP WPA WPA2 Security Key Bits Up to 128 Bit Encryption Environmental Dimensions 202 x 34 x 160 mm Unit Weight 280 g Power 12V 0 5A Certifications FCC CE IC 03 Wi Fi Windows 7 Operating Temp 0 to 40 C Storage Temp 20 to 60 C Operating Humidity 10 to 85 No...

Page 34: ...ys are trademarks or registered trademarks of Cisco and or its affiliates in the United States and certain other countries All other trademarks mentioned in this document or website are the property of their respective owners 2010 Cisco All rights reserved ...

Reviews: