background image

Linksys E1000

Chapter 1: Product Overview

2

Wireless-N Router

Wall-Mounting Placement

The Router has two wall-mount slots on its bottom panel . 
The distance between the slots is 152 mm . 

Two screws are needed to mount the Router .

Suggested Mounting Hardware

2 .5-3 .0 mm

4-5 mm

1-1 .5 mm

NOTE:

  Cisco  is  not  responsible  for  damages 

incurred by unsecured wall-mounting hardware .

Follow these instructions:

1 .  Determine where you want to mount the Router . Make 

sure  that  the  wall  you  use  is  smooth,  flat,  dry,  and 
sturdy . Also make sure the location is within reach of 
an electrical outlet .

2 .  Drill two holes into the wall . Make sure the holes are  

152 mm apart .

3 .  Insert  a  screw  into  each  hole  and  leave  3  mm  

of its head exposed .

4 .  Position  the  Router  so  the  wall-mount  slots  line  up 

with the two screws .

5 .  Place the wall-mount slots over the screws and slide 

the  Router  down  until  the  screws  fit  snugly  into  the 
wall-mount slots .

152 mm

Wall-Mounting Template

Print this page at 100% size . 

Cut along the dotted line, and place on the wall to drill precise spacing .

Summary of Contents for E1000

Page 1: ...Linksys E1000 Wireless N Router User Guide ...

Page 2: ...etup MAC Address Clone 18 Setup Advanced Routing 19 Wireless Basic Wireless Settings 19 Manual Setup 20 Wireless Wireless Security 21 Wireless Wireless MAC Filter 23 Wireless Advanced Wireless Settings 24 Security Firewall 25 Security VPN Passthrough 25 Access Restrictions Internet Access 26 Applications and Gaming Port Range Forwarding 28 Applications Gaming Port Range Triggering 28 Applications ...

Page 3: ...ent 41 FCC Radiation Exposure Statement 41 Safety Notices 41 Industry Canada Statement 41 Avis d Industrie Canada 41 Wireless Disclaimer 42 Avis de non responsabilité concernant les appareils sans fil 42 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 42 Appendix E Software End User License Agreement 43 Cisco Products 43 Sof...

Page 4: ...se the Wi Fi Protected Setup button to automatically configure wireless security for your wireless network To use Wi Fi Protected Setup refer to Wi Fi Protected Setup page 20 Wireless Blue The Wireless LED lights up when the wireless feature is enabled It flashes when the Router sends or receives data over the wireless network Internet Blue The Internet LED lights up when there is a connection mad...

Page 5: ... to mount the Router Make sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical outlet 2 Drill two holes into the wall Make sure the holes are 152 mm apart 3 Insert a screw into each hole and leave 3 mm of its head exposed 4 Position the Router so the wall mount slots line up with the two screws 5 Place the wall mount slots over the s...

Page 6: ...s Install or run program General options Set up your Linksys Router Published by Cisco Consumer Products LLC Set AutoPlay defaults in Control Panel Open folder to view files using Windows Explorer Speed up my system using Windows ReadyBoost Set Up Your Linksys Router If you do not see this access setup on the CD directly To do so perform the following steps for your specific operating system Windo...

Page 7: ...up software is setting up the Router Please Wait 6 The installation is complete Click OK Installation is Complete NOTE If you have any problems during the installation process refer to the Frequently Asked Questions in the setup software or use a computer with an active Internet connection to visit www linksys com support Main Menu When Cisco Connect starts up the main menu appears Main Menu Statu...

Page 8: ... number of devices connected to the Router is displayed Add device To connect another computer or device to the Router click Add device and go to Computers and Other Devices page 6 Main Menu Parental Controls Parental controls restrict Internet access for up to five computers For the computers you select you can block or limit Internet access to specific times You can also block specific websites ...

Page 9: ...nect with the Easy Setup Key page 6 No I don t have an Easy Setup Key create a new one now If you want to create or update an Easy Setup Key select this option Click Next and go to Create or Update the Easy Setup Key page 7 I want to connect manually using my wireless settings If you want to connect manually without an Easy Setup Key select this option Click Next and go to Connect Manually page 7 ...

Page 10: ...r computers to the Router for more information refertoConnectwiththeEasySetupKey page 6 Click Close Easy Setup Key Has Been Updated Connect Manually 1 EntertheNetworkname SSID SecurityKey andSecurity Type settings on your wireless device SSID stands for Service Set Identifier To print this information click Print these settings Connecting a Device 2 After your device connects click Next 3 Enter a ...

Page 11: ...cret question and answer pair If you forget the password you can reset it by correctly answering the secret question Enter your question Answer Enter the answer to your secret question Click OK to save your settings 2 Select the computer whose parental controls you want to set up Then click OK Set Up Parental Controls For 3 The Parental controls main screen appears Parental Controls You have the f...

Page 12: ...a computer follow these instructions 1 Select the computer from the RestrictInternetaccesson list If the computer is not listed click Add to select the computer Parental Controls 2 The Block Internet access option offers the following Always To always block Internet access select this option Specific times To block Internet access during specific days and times select this option and set the sched...

Page 13: ...are sets up the password for the guest network To change the password click Change If you clicked Change the Change guest password screen appears Change Guest Password Enter a new guest password Enter a password of 4 32 characters Click Change to save your setting Total guests allowed By default 5 guests are allowed Internet access through the guest network Select the appropriate number of guests ...

Page 14: ...to the Router will need to be reconnected using the new name or password for more information refer to Computers and Other Devices page 6 If you clicked Change the Changing router name or password screen appears 1 To change the Router name or password click Yes Otherwise click No Changing Router Name or Password 2 Complete the following Router name Enter a name of 1 32 characters Password Enter a ...

Page 15: ...ssword to access the browser based utility Copy password To copy the password to the Clipboard click this option Advanced Settings Click OK to open the web browser and access the browser based utility For more information refer to How to Access the Browser Based Utility page 13 How to Exit Cisco Connect To exit Cisco Connect click Close on the main menu Main Menu How to Access Cisco Connect Window...

Page 16: ...reen Leave the User name field blank Then enter the password you set up during the setup software If you did not run the setup software then use the default password admin You can set a new password on the Administration Management screen Refer to Administration Management page 32 Click OK to continue Login Screen NOTE You can also access the browser based utility through Cisco Connect For more in...

Page 17: ...ax Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time Max Idle Time If your Internet connection has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max...

Page 18: ...has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max Idle Time field enter the number of minutes you want to elapse before your Internet connection terminates The default is 5 minutes Keep Alive Redial Period If you select th...

Page 19: ...our local network Router IP IP Address The Router s IP address as seen by your network is displayed The default Router IP address is 192 168 1 1 Subnet Mask The Router s Subnet Mask as seen by your network is displayed URL Address To access the browser based utility you enter the Router s IP address or URL address The default is http my E1000 If you want to change the default enter a new URL addre...

Page 20: ...matically assigned a new dynamic IP address or the lease will be renewed The default is 0 minutes which means one day Static DNS 1 3 The Domain Name System DNS is how the Internet translates domain or website names into Internet addresses or URLs Your ISP will provide you with at least one DNS Server IP address If you wish to use another enter that IP address in one of these fields You can enter u...

Page 21: ...n is displayed Update To manually trigger an update click Update Click Save Settings to apply your changes or click Cancel Changes to clear your changes TZO com Setup DDNS TZO E mail Address TZO Key and Domain Name Enter the settings of the account you set up with TZO Internet IP Address The Router s Internet IP address is displayed here Because it is dynamic it will change Status The status of th...

Page 22: ...te This Entry to delete a static route Enter Route Name Enter a name for the Route here using a maximum of 25 alphanumeric characters Destination LAN IP The Destination LAN Local Area Network IP is the address of the remote network or host to which you want to assign a static route Subnet Mask The Subnet Mask determines which portion of a Destination LAN IP address is the network portion and which...

Page 23: ...eep the default Auto SSID Broadcast When wireless clients survey the local area for wireless networks to associate with they will detect the SSID broadcast by the Router To broadcast the Router s SSID keep the default Enabled If you do not want to broadcast the Router s SSID then select Disabled Click Save Settings to apply your changes or click Cancel Changes to clear your changes Wi Fi Protected...

Page 24: ... wireless security settings configure the security of your wireless network s The Router supports the following wireless security options WPA WPA2 Mixed Mode default WPA2 Personal WPA Personal WEP and RADIUS WPA stands for Wi Fi Protected Access WEP stands for Wireless Equivalent Privacy RADIUS stands for Remote Authentication Dial In User Service The default option is WPA WPA2 mixed mode which al...

Page 25: ...e WEP keys Then click Generate Key 1 If you did not enter a Passphrase enter the WEP key manually RADIUS This option features WEP used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router NOTE If you are using WEP encryption each device in your wireless network MUST use the same WEP encryption method and encryption key or else your wireless ...

Page 26: ...etwork Select this option to allow wireless access by MAC address This option is disabled by default MAC Address Filter List Wireless Client List Click this option to open the Wireless Client List screen Wireless Client List Wireless Client List This screen shows computers and other devices on the wireless network The list can be sorted by Client Name Interface IP Address MAC Address and Status Se...

Page 27: ...he rate of data transmission should be set depending on the speed of your wireless network Select from a range of transmission speeds or keep the default Auto to have the Router automatically use the fastest possible data rate and enable the Auto Fallback feature Auto Fallback will negotiate the best possible connection speed between the Router and a wireless client N Transmission Rate The N Trans...

Page 28: ...ult Filter IDENT Port 113 The Filter IDENT Identification option keeps port 113 from being scanned by devices outside of your local network This option is enabled by default Disable it to allow port 113 to be scanned Web Filters Proxy Use of WAN proxy servers may compromise the Gateway s security Denying Proxy will disable access to any WAN proxy servers Select this option to enable proxy filterin...

Page 29: ...electing a policy from the drop down menu will display that policy s settings To delete a policy select that policy s number and click DeleteThisPolicy Toviewallthepolicies click Summary Summary The policies are listed with the following information No Policy Name Access Days Time and status Enabled To enable a policy select Enabled To delete a policy click Delete Click Save Settings to save your ...

Page 30: ...o block is not listed or you want to edit a service s settings enter the application s name in the Application Name field Enter its range in the Port Range fields Select its protocol from the Protocol drop down menu Then click Add To modify a service select it from the Applications list Change its Application Name Port Range and or Protocol setting Then click Modify To delete a service select it f...

Page 31: ...resses to the designated computers use the DHCP Reservation option on the BasicSetup screen refer to DHCPReservation page16 If you need to forward all ports to one computer click the DMZ tab Applications and Gaming Port Range Forwarding Port Range Forwarding For each entry complete the following Application Name Enter the name you wish to give the application Each name can be up to 12 characters S...

Page 32: ...you want to specify an IP address or range of IP addresses as the designated source select and complete the IP address range fields Destination If you want to specify the DMZ host by IP address select IP Address and enter the IP address in the field provided If you want to specify the DMZ host by MAC address select MAC Address and enter the MAC address in the field provided To retrieve this inform...

Page 33: ...s accessing the network For example if you want your gaming console to have higher priority accessing the Internet than your computer you can assign their priority levels using their respective MAC addresses Voice Device Voice devices require a higher priority level You can assign a higher priority level to voice devices using their respective MAC addresses Summary This lists the QoS entries you h...

Page 34: ...opriate priority High Medium Recommended Normal or Low Click Add to save your changes Your new entry will appear in the Summary list Voice Device QoS Voice Device Enter a Name Enter a name for your voice device MAC Address Enter the MAC address of your voice device Priority Select the appropriate priority High Recommended Medium Normal or Low Click Add to save your changes Your new entry will appe...

Page 35: ...utside the local network select Enabled You must have the Remote Management option enabled as well Otherwise keep the default Disabled Allowed Remote IP Address If you want to be able to access the Router from any external IP address select Any IP Address If you want to specify an external IP address or range of IP addresses then select the second option and complete the fields provided Remote Man...

Page 36: ... traffic The Security log displays the login information for the browser based utility The DHCP Client Log displays the local DHCP server status information Click Save the Log to save this information to a file on your computer s hard drive Click Refresh to update the log Click Clear to clear all the information that is displayed Administration Diagnostics The diagnostic tests Ping and Traceroute ...

Page 37: ... have exhausted all other troubleshooting measures OncetheRouterisreset youwillhave to re enter all of your configuration settings Administration Factory Defaults Factory Defaults Restore All Settings To reset the Router s settings to the defaults click this button and then follow the on screen instructions Any settings you have saved will be lost when the default settings are restored Administrat...

Page 38: ...n Name The Domain Name of the Router is displayed if it was entered on the Setup Basic Setup screen Internet Connection This section shows the current network information stored in the Router The information varies depending on the Internet connection type selected on the Setup Basic Setup screen For a DHCP connection select Release IP Address or Renew IP Address as appropriate to release or renew...

Page 39: ... to the Local Network screen click Close Status Wireless Network The Wireless Network screen displays information about your wireless network Status Wireless Network Wireless Network MAC Address The MAC address of the Router s local wireless interface is displayed Mode The wireless mode is displayed NetworkName SSID The name of the wireless network which is also called the SSID is displayed Channe...

Page 40: ...the Connections tab 3 Select Never dial a connection 4 Click OK The Router does not have a coaxial port for the cable connection The Router does not replace your modem You still need your cable modem in order to use the Router Connect your cable connection to the cable modem and then insert the setup CD into your computer Click Set up your Linksys Router and follow the on screen instructions The c...

Page 41: ...nternet Power Cabling Type CAT 5e RF Pwr EIRP in dBm 17 5 dBm Antenna Gain in dBi 1 5 dBi UPnP able cert Able Security Features WEP WPA WPA2 Security Key Bits Up to 128 Bit Encryption Environmental Dimensions 7 95 x 1 34 x 6 3 202 x 34 x 160 mm Unit Weight 9 81 oz 280 g Power 12V 0 5A Certifications FCC CE IC 03 Wi Fi Windows 7 Operating Temp 32 to 104 F 0 to 40 C Storage Temp 4 to 140 F 20 to 60 ...

Page 42: ...rice of the software media EXCLUSIONS AND LIMITATIONS This limited warranty does not apply if a the product assembly seal has been removed or damaged b the product has been altered or modified except by Cisco c the product damage was caused by use with non Cisco products d the product has not been installed operated repaired or maintained in accordance with instructions supplied by Cisco e the pro...

Page 43: ...g provisions shall remain in full force and effect OBTAINING WARRANTY SERVICE If you have a question about your product or experience a problem with it please go to www myciscohome com support where you will find a variety of online support tools and information to assist you with your product If the product proves defective during the Warranty Period contact Cisco Technical Support or if you purc...

Page 44: ...A is firmware limited to channels 1 through 11 Safety Notices WARNING Do not use this product near water for example in a wet basement or near a swimming pool WARNING Avoid using this product during an electrical storm There may be a remote risk of electric shock from lightning WARNING This product contains lead known to the State of California to cause cancer and birth defects or other reproducti...

Page 45: ...of this and other electric and electronic equipment via designated collection facilities appointed by the government or local authorities Correct disposal and recycling will help prevent potential negative consequences to the environment and human health For more detailed information about the disposal of your old equipment please contact your local authorities waste disposal service or the shop w...

Page 46: ...tes You agree to all of the terms and conditions of the web sites including the Terms of Use located at the web site you are using as applicable and as amended from time to time Software Licenses The software licenses applicable to software from Cisco are made available at the Cisco public web site at www myciscohome com and www myciscohome com gpl respectively For Your convenience of reference a ...

Page 47: ...p The Technology and Documentation are licensed and not sold to You by Cisco and the relevant third parties set forth in Schedule 2 Cisco its suppliers and its licensors respectively retain all right title and interest including all copyright and intellectual property rights in and to the Technology and Documentation and all copies derivatives and portions thereof All rights not specifically grant...

Page 48: ... product and or Software may become inaccessible There may be circumstances where we apply an Upgrade automatically in order to comply with changes in legislation legal security or regulatory requirements or as a result of requirements to comply with the terms of any agreements Cisco has with any third parties regarding Your Cisco product and or the Software You will always be notified of any Upgr...

Page 49: ...sts and fees including reasonable attorney fees arising from Your use of the Technology as well as from Your failure to comply with any term of this Agreement Technical Support This limited warranty is neither a service nor a support contract Information about Cisco s current technical support offerings and policies including any fees for support services can be found at www myciscohome com suppor...

Page 50: ... your rights with two steps 1 copyright the software and 2 offer you this license which gives you legal permission to copy distribute and or modify the software Also for each author s protection and ours we want to make certain that everyone understands that there is no warranty for this free software If the software is modified by someone else and passed on we want its recipients to know that wha...

Page 51: ... or distribution medium does not bring the other work under the scope of this License 3 You may copy and distribute the Program or a work based on it under Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following a Accompany it with the complete corresponding machine readable source code which must be distributed under the...

Page 52: ... distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License 8 If the distribution and or use of the Program...

Page 53: ...sh that you receive source code or can get it if you want it that you can change the software and use pieces of it in new free programs and that you are informed that you can do these things To protect your rights we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights These restrictions translate to certain responsibilities for you if...

Page 54: ... means either the Library or any derivative work under copyright law that is to say a work containing the Library or a portion of it either verbatim or with modifications and or translated straightforwardly into another language Hereinafter translation is included without limitation in the term modification Source code for a work means the preferred form of the work for making modifications to it ...

Page 55: ... code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code even though third parties are not compelled to copy the source along with the object code 5 A program that contains no derivative of any portion of the Library but is designed to work with the Library by...

Page 56: ...equirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system Such a contradiction means you cannot use both them and the Library together in an executable that you distribute 7 You may place library facilities that are a work based on the Library side by side in a single library together with other library facilities not covered...

Page 57: ...en in the body of this License 13 The Free Software Foundation may publish revised and or new versions of the Lesser General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Library specifies a version number of this License wh...

Page 58: ...ved from this software may not be called OpenSSL nor may OpenSSL appear in their names without prior written permission of the OpenSSL Project 6 Redistributionsofanyformwhatsoevermustretainthe following acknowledgment This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit http www openssl org THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT AS IS AND ANY EXP...

Page 59: ...ude an acknowledgement This product includes software written by Tim Hudson tjh cryptsoft com THIS SOFTWARE IS PROVIDED BY ERIC YOUNG AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL E...

Page 60: ...ed trademarks of Cisco Systems Inc and or its affiliates in the United States and certain other countries All other trademarks mentioned in this document or website are the property of their respective owners The use of the word partner does not imply a partnership relationship between Cisco and any other company 10012110NC JL ...

Reviews: