background image

Linksys E2000

Chapter 2: Cisco Connect

11

Advanced Wireless-N Router

3 .  Wait until your printer connects . On the 

Connecting a 

wireless printer

 screen, click 

Next

 .

4 .  Enter a name that will be used to identify this printer . 

Then click 

Finish

 .

Name Your Printer

Parental Controls

The 

Parental controls

 screen appears .

Parental Controls Password

First-Time Access of Parental Controls

1 .  The first time you access parental controls, you will be 

asked to set up a parental controls password . Complete 

the following:

 

Parental controls password 

This password protects 

access to parental controls . Create a password of 4-32 

characters .

 

Verify password 

Re-enter the password .

 

Secret question 

Create a secret question and answer 

pair .  If  you  forget  the  password,  you  can  reset  it  by 

correctly  answering  the  secret  question .  Enter  your 

question .

 

Answer 

Enter the answer to your secret question .

Click

 OK

 to save your settings .

2 .  Select the computer whose parental controls you want 

to set up . Then click

 OK

 .

Set Up Parental Controls For

3 .  The 

Parental controls 

main screen appears .

Parental Controls

You have the following options:

Restrict  Internet  access  on 

The  list  of  computer(s) 

you  have  selected  for  parental  controls  is  displayed .  To 

add,  remove,  or  rename  computers  on  this  list,  refer  to 

Restrict Internet Access List

page 12

 . To set up parental 

controls on a computer, refer t

Set Up Parental Controls

page 12

 .

Change  parental  controls  password 

Click  this  option 

to change the password that protects access to parental 

controls . Refer to 

Change Parental Controls Password

page 13

 .

Summary of Contents for E2000

Page 1: ...Linksys E2000 Advanced Wireless N Router User Guide ...

Page 2: ...ress Clone 21 Setup Advanced Routing 21 Wireless Basic Wireless Settings 22 Wireless Wireless Security 24 Wireless Wireless MAC Filter 25 Wireless Advanced Wireless Settings 26 Security Firewall 27 Security VPN Passthrough 28 Access Restrictions Internet Access 28 Applications and Gaming Single Port Forwarding 29 Applications and Gaming Port Range Forwarding 30 Applications Gaming Port Range Trigg...

Page 3: ...ion Exposure Statement 42 Safety Notices 42 Industry Canada Statement 42 Restrictions in the 5 GHz Band 42 Avis d Industrie Canada 43 Restrictions dans la bande 5 GHz 43 Wireless Disclaimer 43 Avis de non responsabilité concernant les appareils sans fil 43 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 44 Appendix E Softwar...

Page 4: ...Protected Setup then you can use the Wi Fi Protected Setup button to automatically configure wireless security for your wireless network s To use Wi Fi Protected Setup refer to Wi Fi Protected Setup page 23 Wireless Blue The Wireless LED lights up when the wireless feature is enabled If the LED is flashing the Router is actively sending or receiving data over the network Internet Blue The Internet...

Page 5: ...ting hardware illustrations are not true to scale NOTE Cisco is not responsible for damages incurred by insecure wall mounting hardware Follow these instructions 1 Determine where you want to mount the Router Make sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical outlet 2 Drill two holes into the wall Make sure the holes are 152 m...

Page 6: ...games Install or run program General options Set up your Linksys Router Published by Cisco Consumer Products LLC Set AutoPlay defaults in Control Panel Open folder to view files using Windows Explorer Speed up my system using Windows ReadyBoost Set Up Your Linksys Router If you do not see this access setup on the CD directly To do so perform the following steps for your specific operating system W...

Page 7: ...e setup software is setting up the Router Please Wait 6 The installation is complete Click OK Installation is Complete NOTE If you have any problems during the installation process refer to the Frequently Asked Questions in the setup software or use a computer with an active Internet connection to visit www linksys com support Main Menu When Cisco Connect starts up the main menu appears Main Menu ...

Page 8: ... The number of devices connected to the Router is displayed Add device To connect another computer or device to the Router click Add device and go to Computers and Other Devices page 9 Main Menu Parental Controls Parental controls restrict Internet access for up to five computers For the computers you select you can block or limit Internet access to specific times You can also block specific websi...

Page 9: ... Connect with the Easy Setup Key page 9 No I don t have an Easy Setup Key create a new one now If you want to create or update an Easy Setup Key select this option Click Next and go to Create or Update the Easy Setup Key page 10 I want to connect manually using my wireless settings If you want to connect manually without an Easy Setup Key select this option Click Next and go to Connect Manually pa...

Page 10: ... other computers to the Router for more information refertoConnectwiththeEasySetupKey page 9 Click Close Easy Setup Key Has Been Updated Connect Manually 1 EntertheNetworkname SSID SecurityKey andSecurity Type settings on your wireless device SSID stands for Service Set Identifier To print this information click Print these settings Connecting a Device 2 After your device connects click Next 3 Ent...

Page 11: ...a secret question and answer pair If you forget the password you can reset it by correctly answering the secret question Enter your question Answer Enter the answer to your secret question Click OK to save your settings 2 Select the computer whose parental controls you want to set up Then click OK Set Up Parental Controls For 3 The Parental controls main screen appears Parental Controls You have t...

Page 12: ... for a computer follow these instructions 1 Select the computer from the RestrictInternetaccesson list If the computer is not listed click Add to select the computer Parental Controls 2 The Block Internet access option offers the following Always To always block Internet access select this option Specific times To block Internet access during specific days and times select this option and set the ...

Page 13: ...oftware sets up the password for the guest network To change the password click Change If you clicked Change the Change guest password screen appears Change Guest Password Enter a new guest password Enter a password of 4 32 characters Click Change to save your setting Total guests allowed By default 5 guests are allowed Internet access through the guest network Select the appropriate number of gue...

Page 14: ...cted to the Router will need to be reconnected using the new name or password for more information refer to Computers and Other Devices page 9 If you clicked Change the Changing router name or password screen appears 1 To change the Router name or password click Yes Otherwise click No Changing Router Name or Password 2 Complete the following Router name Enter a name of 1 32 characters Password Ent...

Page 15: ...s password to access the browser based utility Copy password To copy the password to the Clipboard click this option Advanced Settings Click OK to open the web browser and access the browser based utility For more information refer to How to Access the Browser Based Utility page 16 How to Exit Cisco Connect To exit Cisco Connect click Close on the main menu Main Menu How to Access Cisco Connect Wi...

Page 16: ...admin Then enter the password created during the setup software If you did not run the setup software then use the default password admin You can set a new password on the Administration Management screen Refer to Administration Management page 33 Click OK to continue Login Screen NOTE You can also access the browser based utility through Cisco Connect For more information refer to Router Settings...

Page 17: ...r to cut the Internet connection after it has been inactive for a specified period of time Max Idle Time If your Internet connection has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max Idle Time field enter the number of min...

Page 18: ... connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max Idle Time field enter the number of minutes you want to elapse before your Internet connection terminates The default is 5 minutes Keep Alive Redial Period If you select this option the Router will periodically check your Internet connection If you are disconnected then the Router...

Page 19: ...outer s DHCP server option make sure there is no other DHCP server on your network DHCP Server Setting DHCP Server DHCP is enabled by factory default If you already have a DHCP server on your network or you do not want a DHCP server then select Disabled no other DHCP features will be available DHCP Reservation Click DHCP Reservation if you want to assign a fixed local IP address to a MAC address D...

Page 20: ...st and domain name to a dynamic Internet IP address It is useful when you are hosting your own website File Transfer Protocol FTP server or other server behind the Router Before you can use this feature you need to sign up for DDNS service with a DDNS service provider www dyndns org or www TZO com If you do not want to use this option keep the default Disabled DDNS DDNS Service If your DDNS servic...

Page 21: ...tings to apply your changes or click Cancel Changes to clear your changes Setup Advanced Routing This screen is used to set up the Router s advanced functions Operating Mode allows you to select the type s of advanced functions you use Dynamic Routing automatically adjusts how packets travel on your network Static Routing sets up a fixed route to another network destination Setup Advanced Routing ...

Page 22: ...Protected Setup Wi Fi Protected Setup is a feature that makes it easy to set up your wireless network If you have client devices such as wireless adapters that support Wi Fi Protected Setup then you can use Wi Fi Protected Setup Configuration View To manually configure your wireless network select Manual Proceed to the Manual Setup section TouseWi FiProtectedSetup selectWi FiProtected Setup Procee...

Page 23: ... s Wi Fi Protected Setup screen The Wi Fi Protected Setup LED flashes blue for two minutes during the Wi Fi Protected Setup process and lights up blue when the Wi Fi Protected Setup process is successfully completed The LED lights up amber if there is an error during the Wi Fi Protected Setup process Make sure the client device supports Wi Fi Protected Setup Wait until the LED is off and then try ...

Page 24: ...ireless security keep the default Disabled WPA WPA2 Mixed Mode NOTE If you are using WPA WPA2 Mixed Mode each device in your wireless network MUST use the same WPA shared key or else the network will not function properly Wireless Security WPA WPA2 Mixed Mode Passphrase Enter a passphrase of 8 63 characters The default is password WPA2 Personal NOTE If you are using WPA2 or WPA each device in your...

Page 25: ...ecret Enter the key shared between the Router and the server Encryption Select a level of WEP encryption 40 64 bits 10 hex digits or 104 128 bits 26 hex digits The default is 40 64 bits 10 hex digits Passphrase Enter a Passphrase to automatically generate WEP keys Then click Generate Key 1 If you did not enter a Passphrase enter the WEP key manually Click Save Settings to apply your changes or cli...

Page 26: ... Key authentication to be used With Open System authentication the sender and the recipient do NOT use a WEP key for authentication With Shared Key authentication the sender and recipient use aWEP key for authentication Select Shared Key to only use Shared Key authentication Basic Rate The Basic Rate setting is not actually one rate of transmission but a series of rates at which the Router can tra...

Page 27: ... is smaller than the preset Request to Send RTS threshold size the RTS CTS Clear to Send mechanism will not be enabled The Router sends RTS frames to a particular receiving station and negotiates the sending of a data frame After receiving an RTS the wireless station responds with a CTS frame to acknowledge the right to begin transmission The RTS Threshold value should remain at its default value ...

Page 28: ...led PPTP Passthrough Point to Point Tunneling Protocol PPTP allows the Point to Point Protocol PPP to be tunneled through an IP network To allow PPTP tunnels to pass through the Router keep the default Enabled L2TP Passthrough Layer 2 Tunneling Protocol is the method used to enable Point to Point sessions via the Internet on the Layer 2 level To allow L2TP tunnels to pass through the Router keep t...

Page 29: ...the Applications list select the application you want to block Then click the button to move it to the Blocked List To remove an application from the Blocked List select it and click the button 10 If the application you want to block is not listed or you want to edit a service s settings enter the application s name in the Application Name field Enter its range in the Port Range fields Select its ...

Page 30: ... Before using forwarding you should assign static IP addresses to the designated servers use the DHCP Reservation option on the Basic Setup screen refer to DHCP Reservation page 19 If you need to forward all ports to one computer click the DMZ tab Applications and Gaming Port Range Forwarding Port Range Forwarding For each entry complete the following Application Name Enter the name you wish to gi...

Page 31: ... IP addresses as the designated source select and complete the IP address range fields Destination If you want to specify the DMZ host by IP address select IP Address and enter the IP address in the field provided If you want to specify the DMZ host by MAC address select MAC Address and enter the MAC address in the field provided To retrieve this information click DHCP Client Table DMZ DHCP Client...

Page 32: ...nected to a specific Ethernet port For example you can assign a higher priority level to the computer connected to port 1 Voice Device Voice devices require a higher priority level You can assign a higher priority level to voice devices using their respective MAC addresses Summary This lists the QoS entries you have created for your applications and devices Refer to Summary page 33 for more inform...

Page 33: ...e your changes Your new entry will appear in the Summary list Summary This lists the QoS entries you have created for your applications and devices Priority This column displays the bandwidth priority of High Medium Normal or Low Name This column displays the application game device or port name Information This column displays the port range or MAC address entered for your entry If a pre configur...

Page 34: ...ou are in a remote location and wish to manage the Router enter http xxx xxx xxx xxx yyyy or https xxx xxx xxx xxx yyyy depending on whether you use HTTP or HTTPS Enter the Router s specific Internet IP address in place of xxx xxx xxx xxx and enter the Remote Management Port number in place of yyyy UPnP Universal Plug and Play UPnP allows the appropriate Windows operating system to automatically c...

Page 35: ...ons of your network devices including connection to the Internet This screen also allows you to reset the Router Administration Diagnostics Reboot Reboot Click Reboot to reset the Router Diagnostics Ping Test Ping checks the status of a connection IP or URL Address Enter the address of the computer device or website whose connection you wish to test Packet Size Enter the packet size you want to us...

Page 36: ... down all of your custom settings After you upgrade its firmware you will have to re enter all of your configuration settings Firmware Upgrade Before upgrading the firmware download the Router s firmware upgrade file from the website www linksys com support Please select a file to upgrade the firmware Click Browse and select the extracted firmware upgrade file StarttoUpgrade Afteryouhaveselectedth...

Page 37: ... End IP Address For the range of IP addresses that can be used by devices on your local network the ending IP address is displayed DHCP Clients Table Click this option to view a list of computers or other devices that are using the Router as a DHCP server DHCP Clients Table DHCP Client Table The DHCP Client Table lists computers and other devices that have been assigned IP addresses by the Router ...

Page 38: ...lick the Connections tab 3 Select Never dial a connection 4 Click OK The Router does not have a coaxial port for the cable connection The Router does not replace your modem You still need your cable modem in order to use the Router Connect your cable connection to the cable modem and then insert the setup CD into your computer Click Set up your Linksys Router and follow the on screen instructions ...

Page 39: ...g Type CAT 5e Number of Antennas 3 RF Pwr EIRP in dBm 17 dBm Antenna Gain in dBi Main Antenna 1 5 dBi Third Antenna 2 2 dBi UPnP able cert Able Security Features WEP WPA WPA2 Security Key Bits Up to 128 Bit Encryption Environmental Dimensions 7 95 x 6 3 x 1 34 202 x 160 x 34 mm Weight 10 58 oz 0 30 kg Power 12V Certification FCC CE IC 03 Wi Fi Operating Temp 32 to 104ºF 0 to 40ºC Storage Temp 4 to...

Page 40: ...se price of the software media EXCLUSIONS AND LIMITATIONS This limited warranty does not apply if a the product assembly seal has been removed or damaged b the product has been altered or modified except by Cisco c the product damage was caused by use with non Cisco products d the product has not been installed operated repaired or maintained in accordance with instructions supplied by Cisco e the...

Page 41: ...aining provisions shall remain in full force and effect OBTAINING WARRANTY SERVICE If you have a question about your product or experience a problem with it please go to www myciscohome com support where you will find a variety of online support tools and information to assist you with your product If the product proves defective during the Warranty Period contact Cisco Technical Support or if you...

Page 42: ...ith FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 20 cm between the radiator and your body This transmitter must not be co located or operating in conjunction with any other antenna or transmitter Safety Notices WARNING Do not use this product near water for example in a wet basement or near a swimming ...

Page 43: ...r avec une antenne ayant un gain maximal de 4 dBi à 2 4 GHz et de 3 5 dBi à 5 GHz Les antennes ayant un gain plus élevé sont strictement interdites par Industrie Canada L impédance d antenne requise est de 50 ohms Du fait que les radars haute puissance ont la priorité dans les bandes 5 250 5 350 MHz et 5 650 5 850 MHz ils pourraient causer des interférences ou endommager les périphériques réseau s...

Page 44: ...cto en cuestión debe separarse de los residuos domésticos convencionales con vistas a su eliminación Es responsabilidad suya desechar este y cualesquiera otros aparatos eléctricos y electrónicos a través de los puntos de recogida que ponen a su disposición el gobierno y lasautoridadeslocales Aldesecharyreciclarcorrectamenteestos aparatos estará contribuyendo a evitar posibles consecuencias negativ...

Page 45: ...eb sites You agree to all of the terms and conditions of the web sites including the Terms of Use located at the web site you are using as applicable and as amended from time to time Software Licenses The software licenses applicable to software from Cisco are made available at the Cisco public web site at www myciscohome com and www myciscohome com gpl respectively For Your convenience of referen...

Page 46: ...rship The Technology and Documentation are licensed and not sold to You by Cisco and the relevant third parties set forth in Schedule 2 Cisco its suppliers and its licensors respectively retain all right title and interest including all copyright and intellectual property rights in and to the Technology and Documentation and all copies derivatives and portions thereof All rights not specifically g...

Page 47: ...Cisco product and or Software may become inaccessible There may be circumstances where we apply an Upgrade automatically in order to comply with changes in legislation legal security or regulatory requirements or as a result of requirements to comply with the terms of any agreements Cisco has with any third parties regarding Your Cisco product and or the Software You will always be notified of any...

Page 48: ...es costs and fees including reasonable attorney fees arising from Your use of the Technology as well as from Your failure to comply with any term of this Agreement Technical Support This limited warranty is neither a service nor a support contract Information about Cisco s current technical support offerings and policies including any fees for support services can be found at www myciscohome com s...

Page 49: ...tect your rights with two steps 1 copyright the software and 2 offer you this license which gives you legal permission to copy distribute and or modify the software Also for each author s protection and ours we want to make certain that everyone understands that there is no warranty for this free software If the software is modified by someone else and passed on we want its recipients to know that...

Page 50: ...rage or distribution medium does not bring the other work under the scope of this License 3 You may copy and distribute the Program or a work based on it under Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following a Accompany it with the complete corresponding machine readable source code which must be distributed under...

Page 51: ...ware distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License 8 If the distribution and or use of the Pro...

Page 52: ...u wish that you receive source code or can get it if you want it that you can change the software and use pieces of it in new free programs and that you are informed that you can do these things To protect your rights we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights These restrictions translate to certain responsibilities for yo...

Page 53: ...rary means either the Library or any derivative work under copyright law that is to say a work containing the Library or a portion of it either verbatim or with modifications and or translated straightforwardly into another language Hereinafter translation is included without limitation in the term modification Source code for a work means the preferred form of the work for making modifications to...

Page 54: ...bject code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code even though third parties are not compelled to copy the source along with the object code 5 A program that contains no derivative of any portion of the Library but is designed to work with the Libra...

Page 55: ...his requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system Such a contradiction means you cannot use both them and the Library together in an executable that you distribute 7 You may place library facilities that are a work based on the Library side by side in a single library together with other library facilities not co...

Page 56: ...ritten in the body of this License 13 The Free Software Foundation may publish revised and or new versions of the Lesser General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Library specifies a version number of this Licens...

Page 57: ...y OpenSSL appear in their names without prior written permission of the OpenSSL Project 6 Redistributionsofanyformwhatsoevermustretainthe following acknowledgment This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit http www openssl org THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED ...

Page 58: ...ritten by Tim Hudson tjh cryptsoft com THIS SOFTWARE IS PROVIDED BY ERIC YOUNG AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIM...

Page 59: ...ed trademarks of Cisco Systems Inc and or its affiliates in the United States and certain other countries All other trademarks mentioned in this document or website are the property of their respective owners The use of the word partner does not imply a partnership relationship between Cisco and any other company 10012110NC AI ...

Reviews: