background image

USER GUIDE

Wireless-G Broadband Router 

with 2 Phone Ports

Model:

 WRP400

Summary of Contents for Small Business WRP400

Page 1: ...USER GUIDE Wireless G Broadband Router with 2 Phone Ports Model WRP400 ...

Page 2: ...a noteworthy website address or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com international Glossary www linksys co...

Page 3: ... Wireless Advanced Wireless Settings 19 Security Firewall 20 Security VPN Passthrough 20 Access Restrictions Internet Access 20 Applications and Gaming Single Port Forwarding 22 Applications and Gaming Port Range Forward 22 Applications Gaming Port Range Triggering 23 Applications and Gaming DMZ 23 Applications and Gaming QoS 24 Administration Management 26 Administration Log 27 Administration Dia...

Page 4: ... Safety Notices and Information 43 Industry Canada Statement 43 Avis d Industrie Canada 44 Wireless Disclaimer 44 Avis de non responsabilité concernant les appareils sans fil 44 Telepermit Statement 44 Declaration of Conformity with Regard to EU Directive 1999 5 EC R TTE Directive 45 CE Marking 46 National Restrictions 46 Product Usage Restrictions 47 Technical Documents on www linksys com interna...

Page 5: ...n while the Router is powered on When the Router goes through its self diagnostic mode during every boot up the LED will flash When the diagnostic is complete it will be solidly lit green If the LED lights up red make sure the correct power adapter is used If the LED remains red contact your service provider for support Phone 1 2 Green The Phone 1 or 2 LED lights up and stays on when an active lin...

Page 6: ... vertically on a surface The third way is to mount the Router on a wall Horizontal Placement The Router has four rubber feet on its bottom panel Place the Router on a level surface near an electrical outlet Vertical Placement The Router has a stand on the panel opposite to the antenna Rotate the stand 90 degrees and place the Router on a level surface near an electrical outlet Wall Mounting Placem...

Page 7: ...ad exposed Maneuver the Router so two of the wall mount slots 4 line up with the two screws Place the wall mount slots over the screws and slide 5 the Router down until the screws fit snugly into the wall mount slots 60 mm Wall Mounting Template Print this page at 100 size Cut along the dotted line and place on the wall to drill precise spacing ...

Page 8: ...tering Linksys routers give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless network access is provided solely for wireless devices with specific MAC addresses For example you can specify the MAC address of each computer in your home so that ...

Page 9: ...ter NOTE If you place the Router behind a primary router with the IP address of 192 168 15 1 then the Router will automatically assume a new default IP address 192 168 16 1 A login screen appears The first time you open the web based utility use the default user name and password admin You can set a new password from the Administration tab s Management screen Click OK to continue Login Screen Setu...

Page 10: ...Period If you select this option the Router will periodically check your Internet connection If you are disconnected then the Router will automatically re establish your connection To use this option select Keep Alive In the Redial Period field you specify how often you want the Router to check the Internet connection The default Redial Period is 30 seconds PPTP Point to Point Tunneling Protocol P...

Page 11: ...of time Max Idle Time If your Internet connection has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max Idle Time field enter the number of minutes you want to have elapsed before your Internet connection terminates The defaul...

Page 12: ...lient Name Interface IP Address and MAC Address DHCP Reservation Select Clients from DHCP Table Click the Select check box to reserve a client s IP address Then click Add Clients Manually Adding Client To manually assign an IP address enter the client s name in the Enter Client Name field Enter the IP address you want it to have in the Assign IP Address field Enter its MAC address in the To This M...

Page 13: ...ges to cancel your changes Setup DDNS TheRouteroffersaDynamicDomainNameSystem DDNS feature DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address It is useful when you are hosting your own website FTP server or other server behind the Router Before you can use this feature you need to sign up for DDNS service with a DDNS service provider www dyndns org or www TZO com If...

Page 14: ...e Setup MAC Address Clone MAC Address Clone Enabled Disabled To have the MAC address cloned select Enabled MAC Address Enter the MAC address registered with your service provider here Clone Your PC s MAC Click this button to clone the MAC address of the computer you are using Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Setup Advanced Routing This screen...

Page 15: ...stination LAN IP The Destination LAN IP is the address of the remote network or host to which you want to assign a static route Subnet Mask The Subnet Mask determines which portion of a Destination LAN IP address is the network portion and which portion is the host portion Gateway This is the IP address of the gateway device that allows for contact between the Router and the remote network or host...

Page 16: ...i Protected Setup Congratulations NOTE Wi Fi Protected Setup configures one client device at a time Repeat the instructions for each client device that supports Wi Fi Protected Setup Method 1 Use this method if your client device has a Wi Fi Protected Setup button Click or press the 1 Wi Fi Protected Setup button on the client device Click the 2 Wi Fi Protected Setup button on this screen After th...

Page 17: ...o create a second wireless network select Network Enabled for the SSID2 setting Then enter a unique Wireless Network Name NOTE If you are unable to configure the SSID2 settings contact your service provider for more information SSID Broadcast Enabled When wireless clients survey the local area for wireless networks to associate with they detect the SSID broadcast by the Router If you want to broad...

Page 18: ...A2 supports two encryption methods TKIP and AES with dynamic encryption keys Select the type of algorithm AES or TKIP AES The default is TKIP AES WPA Shared Key Enter a WPA Shared Key of 8 63 characters Group Key Renewal Enter a Group Key Renewal period which instructs the Router how often it should change the encryption keys The default is 3600 seconds WPA Enterprise This option features WPA used...

Page 19: ...e Enter a Passphrase to automatically generate WEP keys Then click Generate Key 1 4 If you did not enter a Passphrase enter the WEP key s manually TX Key Select whichTX Transmit Key to use The default is 1 Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Wireless Wireless MAC Filter Wireless access can be filtered by using the MAC addresses of the wireless d...

Page 20: ...ssible data rate and enable the Auto Fallback feature Auto Fallback will negotiate the best possible connection speed between the Router and a wireless client The default is Auto CTS Protection Mode The Router will automatically use CTS Clear To Send Protection Mode when your Wireless Gproductsareexperiencingsevereproblemsand are not able to transmit to the Router in an environment with heavy 802 ...

Page 21: ...Java usage ActiveX ActiveX is a programming language for websites If you deny ActiveX you run the risk of not having access to Internet sites created using this programming language Select this feature to enable ActiveX filtering Deselect the feature to allow ActiveX usage Cookies A cookie is data stored on your computer and used by Internet sites when you interact with them Select this feature to...

Page 22: ...t Access Policy screen click Close Summary Status Policies are disabled by default To enable a policy select the policy number from the drop down menu and select Enabled To create a policy follow steps 1 11 Repeat these steps to create additional policies one at a time Select a number from the 1 Access Policy drop down menu Enter a Policy Name in the field provided 2 To enable this policy select 3...

Page 23: ...en When users send these types of requests to your network via the Internet the Router will forward those requests to the appropriate servers computers Before using forwarding you should assign static IP addresses to the designated servers use the DHCP Reservation feature on the Basic Setup screen Applications and Gaming Single Port Forwarding Single Port Forwarding Common applications are availab...

Page 24: ...have defined Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Applications Gaming Port Range Triggering The Port Range Triggering screen allows the Router to watch outgoing data for specific port numbers The IP address of the computer that sends the matching data is remembered by the Router so that when the requested data returns through the Router the data ...

Page 25: ...ick Refresh To exit this screen and return to the DMZ screen click Close Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Applications and Gaming QoS Quality of Service QoS ensures better service to high priority types of network traffic which may involve demanding real time applications such as videoconferencing Applications and Gaming QoS QoS Quality of Se...

Page 26: ...appropriate priority High Medium Recommend Normal or Low Click Add to save your changes Your new entry will appear in the Summary list Online Games QoS Online Games Game Select the appropriate game If you select Add a New Game follow the Add a New Game instructions Priority Select the appropriate priority High Medium Recommend Normal or Low Click Add to save your changes Your new entry will appear...

Page 27: ...n Management The Administration Management screen allows the network s administrator to manage specific Router functions for access and security Administration Management Management Router Access To ensure the Router s security you will be asked for your password when you access the Router s web based utility The default is admin Router Password Enter a new password for the Router Re enter to conf...

Page 28: ...Configurations After System Reboot If you enable the Allow Users to Configure option then this option will be available Select Enabled if you want to keep UPnP configuration settings after the Router reboots Otherwise keep the default Disabled Allow Users to Disable Internet Access Select Enabled if you want to be able to prohibit any and all Internet connections Otherwise keep the default Disable...

Page 29: ...Changes to cancel your changes Administration Diagnostics The diagnostic tests Ping Traceroute and Detect Active LAN Clients allow you to check the connections of your network devices including connection to the Internet Administration Diagnostics Diagnostics PingTest The Ping test checks the status of a connection IP or URL Address Enter the address of the PC whose connection you wish to test Pac...

Page 30: ...om Router settings you have saved will be lost when the default settings are restored Restore Voice Factory Defaults To reset the voice settings to the default values select Yes Then click Save Settings Any custom Voice settings you have saved will be lost when the default settings are restored NOTE Restoring the voice defaults may require your login the default user name and password are admin If...

Page 31: ...ropriate file click this button and follow the on screen instructions Administration Config Management The Config Management screen allows you to back up or restore the Router s settings using a configuration file Administration Config Management Backup Configuration Backup TosavetheRouter ssettingsinaconfigurationfile click this button and follow the on screen instructions Restore Configuration T...

Page 32: ...d Subnet Mask The Subnet Mask of the Router is displayed DHCP Server DHCP Server The status of the Router s DHCP server function is displayed Start IP Address For the range of IP addresses used by devices on your local network the starting IP address is displayed End IP Address For the range of IP addresses used by devices on your local network the ending IP address is displayed DHCP Clients Table...

Page 33: ...rative screens click Admin Login and enter the user name and password provided by your service provider Contact your service provider for more information The factory default Admin Login name and password are admin NOTE In most cases you do not need to use the administrative screens Contact your service provider for more information Voice Info The Info screen displaysVoice over Internet Protocol V...

Page 34: ...umber of the last caller is displayed Mapped SIP Port The port number of the NAT mapped SIP port is displayed Calls 1 and 2 have the same status information available Call 1 2 State The status of the call is displayed Call 1 2 Tone The type of tone used by the call is displayed Call 1 2 Encoder The codec used for encoding is displayed Call 1 2 Decoder The codec used for decoding is displayed Call ...

Page 35: ...ler numbers that will be forwarded to specific phone numbers Cfwd Sel1 8 Caller Enter the caller number pattern to trigger the Call Forward Selective 1 8 feature Cfwd Sel1 8 Dest Enter the forward number for the Call Forward Selective 1 8 feature Cfwd Last Caller Enter the caller number that is actively forwarded to the Cfwd Last Dest number when the Call Forward Last activation code is used Cfwd ...

Page 36: ...t is 7 Cfwd Ring Splash Len Enter the duration of the ring splash when a call is forwarded The range is 0 to 10 0 seconds The default is 0 Cblk Ring Splash Len Enter the duration of the ring splash when a call is blocked The range is 0 to 10 0 seconds The default is 0 VMWI Ring Splash Len Enter the duration of the ring splash when new messages arrive before the VoiceMail Waiting Indication VMWI si...

Page 37: ...nu is inactive for more than one minute the Router will time out To re enter the menu press Action Command Choices Description Enter IVR Menu Use this command to enter the IVR Menu Ignore Special Information Tones SITs or other tones until you hear Configuration menu Please enter the option followed by the pound key or hang up to exit Check DHCP 100 The IVR announces whether DHCP is enabled or dis...

Page 38: ...en you are on an Internet phone call words are dropped intermittently Follow these instructions until your problem is solved If you are using the Router s wireless function and a cordless phone they may be using the same frequency and may interfere with each other Move the cordless phone farther away from the Router Theremaybeheavynetworkactivity particularlyifyou are running a server or using a f...

Page 39: ...enabled wireless security then make sure the same security method and key are used by both the computer and the Router You need to modify the settings on the Router To access the web based utility follow these instructions Launch the web browser on your computer and enter 1 the Router s default IP address 192 168 15 1 in the Address field Then press Enter NOTE If you place the Router behind a prim...

Page 40: ...1349 QoS Packet Prioritization by Type Router or Bridge Mode of Operation MAC Address Cloning Port Forwarding IP Multicast IGMP v1 v2 v3 IGMP Proxy Voice Features Voice Algorithms G 711 a law and µ law G 726 16 24 32 40 kbps G 729 AB G 723 1 6 3 kbps 5 3 kbps Call Forwarding No Answer Busy Unconditional Support for Two Simultaneous Calls SIP TLS Transport Layer Security Call Transfer Call Waiting ...

Page 41: ... at 2 0 A Max Power Consumption 7 9 watts Average Power Adapter 100 240V 50 60Hz 26 34VA AC Input 1 8 m Cord Indicator Lights LEDs Power Ethernet Wireless Phone 1 Phone 2 Internet WPS Documentation Quick Installation and User Guide are Downloaded from www linksys com Linksys SPA ATA Administration Guide Service Providers Only Linksys Provisioning Guide Service Providers Only Security Features Pass...

Page 42: ...offerings This limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product s use or operation may require TO THE EXTENT NOT PROHIBITED BY LAW ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY SATISFACTORY QUALITY OR FITNESS FOR A PARTICULAR PURPOSE ARE...

Page 43: ...d Canada are responsible for all shipping and handling charges custom duties VAT and other associated taxes and charges Repairs or replacements for your product not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerin...

Page 44: ...or and your body This transmitter must not be co located or operating in conjunction with any other antenna or transmitter IEEE 802 11b or 802 11g operation of this product in the USA is firmware limited to channels 1 through 11 Safety Notices and Information Caution To reduce the risk of fire use only No 26 AWG or larger telecommunication line cord Do not use this product near water for example i...

Page 45: ... fonctionner avec une autre antenne ou un autre émetteur Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802 11 specifications Actual performance can vary including lower wireless network capacity data throughput rate range and coverage Performance depends on many factors conditions and variables including distance from the access point volume of network traf...

Page 46: ...renginys tenkina 1999 5 EB Direktyvos esminius reikalavimus ir kitas šios direktyvos nuostatas Nederlands Dutch Dit apparaat voldoet aan de essentiele eisen en andere van toepassing zijnde bepalingen van de Richtlijn 1999 5 EC Malti Maltese Dan l apparat huwa konformi mal ħtiġiet essenzjali u l provedimenti l oħra rilevanti tad Direttiva 1999 5 EC Magyar Hungarian Ez a készülék teljesíti az alapve...

Page 47: ...sto prodotto è utilizzabile in tutte i paesi EU ed in tutti gli altri paesi che seguono le direttive EU 1999 5 EC senza nessuna limitazione eccetto per i paesii menzionati di seguito DasProduktkanninallenEUStaatenohneEinschränkungen eingesetzt werden sowie in anderen Staaten die der EU Direktive 1999 5 CE folgen mit Außnahme der folgenden aufgeführten Staaten In the majority of the EU and other Eu...

Page 48: ...s for maximum output power are 2 specified in EIRP The EIRP level of a device can be calculated by adding the gain of the antenna used specified in dBi to the output power available at the connector specified in dBm Product Usage Restrictions This product is designed for indoor usage only Outdoor usage is not recommended unless otherwise noted 2 4 GHz Restrictions This product is designed for use ...

Page 49: ...ropská směrnice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místn...

Page 50: ...από το οποίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets d...

Page 51: ...lavult berendezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking ni...

Page 52: ...tuguês Portuguese Informação ambiental para clientes da União Europeia A Directiva Europeia 2002 96 CE exige que o equipamento que exibe este símbolo no produto e ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares É da sua responsabilidade eliminar este e qualquer...

Page 53: ... CISCO SYSTEMS LINKSYS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IFYOU DO NOT AGREETO ALL OFTHESE TERMS THENYOU MAY NOT DOWNLOAD INSTALL OR USE THE SOFTWARE YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFTWARE IS SU...

Page 54: ...eement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer of Liabilities IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA REVENUE OR PROFIT OR FOR SPECIAL INDIRECT CONSEQUENTIAL INCIDENTAL OR PUNITIVE DAMAGES REGARDLESS OF CAUSE INCLUDING NEGLIGENCE ARISING OUT OF OR RELATED TO THE U...

Page 55: ...have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION This License applies to any program or other work 0 which contains a notice placed by the copyright holder saying it may be distributed under the terms of t...

Page 56: ...the terms of Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a...

Page 57: ...ic License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of an...

Page 58: ...LIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS IN...

Page 59: ...S FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDIN...

Reviews: