background image

Chapter 3

Advanced Configuration

21

Wireless-N Home Router

by MAC address, select MAC Address and enter the MAC 

address in the field provided. To retrieve this information, 

click DHCP Client Table.

DMZ > DHCP Client Table

DHCP Client Table

The  DHCP  Client  Table  lists  computers  and  other 

devices that have been assigned IP addresses by the 

Router. The list can be sorted by Client Name, Interface, 

IP  Address,  MAC  Address,  and  Expires  time  (how 

much time is left for the current IP address). To select 

a  DHCP  client,  click  Select. To  update  the  on-screen 

information,  click  Refresh.  To  exit  this  screen  and 

return to the 

DMZ

 screen, click Close

Click Save Settings to apply your changes, or click Cancel 

Changes to clear your changes.

Applications and Gaming > QoS

Quality  of  Service  (QoS)  ensures  better  service  to 

high-priority  types  of  network  traffic,  which  may 

involve  demanding,  real-time  applications,  such  as 

videoconferencing. 

Applications and Gaming > QoS

QoS (Quality of Service)

Wireless

You can configure the support and No Acknowledgement 

settings in this section.

WMM  Support 

If  you  have  other  devices  that  support 

Wi-Fi  Multimedia  (WMM)  on  your  network,  keep  the 

default, Enabled. Otherwise, select Disabled.

No Acknowledgement 

If you want to disable the Router’s 

Acknowledgement feature, so the Router will not re-send 

data  if  an  error  occurs,  then  select  Enabled.  Otherwise, 

keep the default, Disabled.

Internet Access Priority

In  this  section,  you  can  set  the  bandwidth  priority  for  a 

variety of applications and devices. There are four levels 

priority:  High,  Medium,  Normal,  or  Low.  When  you  set 

priority, do not set all applications to High, because this will 

defeat the purpose of allocating the available bandwidth. 

If you want to select below normal bandwidth, select Low. 

Depending  on  the  application,  a  few  attempts  may  be 

needed to set the appropriate bandwidth priority.

Enabled/Disabled 

To use the QoS policies you have set, 

keep the default, Enabled. Otherwise, select Disabled

Category

Select  one  of  the  following  categories:  Applications

Online  Games,  MAC  Address,  Ethernet  Port,  or  Voice 

Device. Proceed to the instructions for your selection.

Summary

This  lists  the  QoS  entries  you  have  created  for  your 

applications and devices. Refer tSummarypage 22 for 

more information.

Applications

Application 

Select  the  appropriate  application.  If  you 

select  Add  a  New  Application,  follow  the  Add  a  New 

Application instructions.

Priority 

Select  the  appropriate  priority:  High,  Medium 

(Recommend)Normal, or Low.
Click Add to save your changes. Your new entry appears in 

the Summary list.
Add a New Application

QoS > Add a New Application

Enter a Name 

Enter any name to indicate the name of 

the entry.

Summary of Contents for WRT120N - Wireless-N Home Router Wireless

Page 1: ...USER GUIDE Wireless N Home Router Model WRT120N ...

Page 2: ...l address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksysbycisco com Linksys International www linksysbycisco com international Glossary www linksysbycisco com glossary Netwo...

Page 3: ... Wireless Advanced Wireless Settings 15 Security Firewall 16 Security VPN Passthrough 17 Access Restrictions Internet Access 17 Applications and Gaming Single Port Forwarding 19 Applications and Gaming Port Range Forwarding 19 Applications Gaming Port Range Triggering 20 Applications and Gaming DMZ 20 Applications and Gaming QoS 21 Administration Management 23 Administration Log 24 Administration ...

Page 4: ...lité concernant les appareils sans fil 34 Declaration of Conformity with Regard to EU Directive 1999 5 EC R TTE Directive 35 Wireless Equipment Wireless N G A B Products 36 CE Marking 36 National Restrictions 36 Product Usage Restrictions 37 Technical Documents on www linksysbycisco com international 37 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and...

Page 5: ...e Wi Fi Protected Setup process Make sure the client device supports Wi Fi Protected Setup WaituntiltheLEDisoff andthentryagain The LED flashes when a Wi Fi Protected Setup session is active The Router supports one session at a time Wait until the LED is solidly lit or off before starting the next Wi Fi Protected Setup session Wireless Blue The Wireless LED lights up when the wireless feature is e...

Page 6: ...ermine where you want to mount the Router Make sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical outlet 2 Drill two holes into the wall Make sure the holes are 152 mm 6 inches apart 3 Insert a screw into each hole and leave 3 mm 0 12 inches of its head exposed 4 Maneuver the Router so the wall mount slots line up with the two scre...

Page 7: ...MAC address filtering Linksys routers give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless network access is provided solely for wireless devices with specific MAC addresses For example you can specify the MAC address of each computer in you...

Page 8: ...outer s default IP address 192 168 1 1 in the Address field Then press Enter A login screen will appear Non Windows XP users will see a similar screen Leave the User name field blank The first time you open the browser based utility use the default password admin You can set a new password from the Administration Management screen Click OK to continue Login Screen Setup Basic Setup The first scree...

Page 9: ...he Router to cut the Internet connection after it has been inactive for a specified period of time Max Idle Time If your Internet connection has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max Idle Time field enter the numbe...

Page 10: ...nection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max Idle Time field enter the number of minutes you want to have elapsed before your Internet connection terminates The default Max Idle Time is 5 minutes Keep Alive Redial Period If you select this option the Router will periodically check your Internet connection If you are disconnected...

Page 11: ... Router s DHCP server option make sure there is no other DHCP server on your network DHCP Server Setting DHCP Server DHCP is enabled by factory default If you already have a DHCP server on your network or you do not want a DHCP server then select Disabled no other DHCP features will be available DHCP Reservation Click this button if you want to assign a fixed local IP address to a MAC address DHCP...

Page 12: ... website FTP server or other server behind the Router Before you can use this feature you need to sign up for DDNS service with a DDNS service provider www dyndns org or www TZO com If you do not want to use this feature keep the default Disabled DDNS DDNS Service If your DDNS service is provided by DynDNS org then select DynDNS org from the drop down menu If your DDNS service is provided by TZO t...

Page 13: ...ck Save Settings to apply your changes or click Cancel Changes to clear your changes Setup Advanced Routing This screen is used to set up the Router s advanced functions Operating Mode allows you to select the type s of advanced functions you use Dynamic Routing automatically adjusts how packets travel on your network Static Routing sets up a fixed route to another network destination Setup Advanc...

Page 14: ...upport Wi Fi Protected Setup then you can use Wi Fi Protected Setup Configuration View To manually configure your wireless network select Manual Proceed to Basic Wireless Settings Manual page 10 To use Wi Fi Protected Setup select Wi Fi Protected Setup Proceed to Wi Fi Protected Setup page 11 BasicWireless Settings Manual Wireless Basic Wireless Settings Manual Setup Network Mode From this drop do...

Page 15: ...isabled Click Save Settings to apply your changes or click Cancel Changes to clear your changes Wi Fi Protected Setup There are three methods available Use the method that applies to the client device you are configuring Wireless Basic Wireless Settings Wi Fi Protected Setup Wi Fi Protected Setup Configured NOTE Wi Fi Protected Setup configures one client device at a time Repeat the instructions f...

Page 16: ... stands for Wired Equivalent Privacy while RADIUS stands for Remote Authentication Dial In User Service These six are briefly discussed here For detailed instructions on configuring wireless security for the Router refer to Chapter 2 Wireless Security Checklist page 3 Wireless Security Security Mode Select the security method for your wireless network If you do not want to use wireless security ke...

Page 17: ...dress of the server RADIUS Port Enter the port number of the server The default is 1812 Shared Secret Enter the key shared between the Router and the server Key Renewal Enter a Key Renewal period which instructs the Router how often it should change the encryption keys The default is 3600 seconds RADIUS This option features WEP used with a RADIUS server This should only be used when a RADIUS serve...

Page 18: ...smit Key 1 is used Click Save Settings to apply your changes or click Cancel Changes to clear your changes Wireless Wireless MAC Filter Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network s radius Wireless Wireless MAC Filter Wireless MAC Filter Enabled Disabled To filter wireless users by MAC Address either permitting or blocking acc...

Page 19: ...d Key authentication the sender and recipient use aWEP key for authentication Select Shared Key to only use Shared Key authentication Basic Rate The Basic Rate setting is not actually one rate of transmission but a series of rates at which the Router can transmit The Basic Rate is not the actual rate of data transmission If you want to specify the Router s rate of data transmission configure the T...

Page 20: ...fter receiving an RTS the wireless station responds with a Clear to Send CTS frame to acknowledge the right to begin transmission The RTS Threshold value should remain at its default value of 2347 Click Save Settings to apply your changes or click Cancel Changes to clear your changes Security Firewall The Firewall screen is used to configure a firewall that can filter out various types of unwanted...

Page 21: ...rotocol PPTP allows the Point to Point Protocol PPP to be tunneled through an IP network To allow PPTP tunnels to pass through the Router keep the default Enabled L2TP Passthrough Layer 2 Tunneling Protocol is the method used to enable Point to Point sessions via the Internet on the Layer 2 level To allow L2TP tunnels to pass through the Router keep the default Enabled Click Save Settings to apply...

Page 22: ...een 6 Decide which days and what times you want this policy to be enforced Select the individual days during which the policy will be in effect or select Everyday Then enter a range of hours and minutes during which the policy will be in effect or select 24 Hours 7 You can block websites with specific URL addresses Enter each URL in a separate Website Blocking by URL Address field 8 You can also b...

Page 23: ...lication documentation for more information Protocol Select the protocol s used for this application TCP UDP or Both To IP Address For each application enter the IP address of the computer that should receive the requests If you assigned a static IP address to the computer then you can look up its IP address click DHCP Reservation on the Basic Setup screen refer to DHCP Reservation page 7 Enabled ...

Page 24: ...documentation for the port number s needed ForwardedRange Foreachapplication enterthestarting and ending port numbers of the forwarded port number range Check with the Internet application documentation for the port number s needed Enabled Select Enabled to enable port triggering for the applications you have defined Click Save Settings to apply your changes or click Cancel Changes to clear your c...

Page 25: ...odisabletheRouter s Acknowledgement feature so the Router will not re send data if an error occurs then select Enabled Otherwise keep the default Disabled Internet Access Priority In this section you can set the bandwidth priority for a variety of applications and devices There are four levels priority High Medium Normal or Low When you set priority donotsetallapplicationstoHigh becausethiswill de...

Page 26: ...ave up to three ranges to define for this bandwidth allocation Port numbers can range from 1 to 65535 Check your application s documentation for details on the service ports used Select the protocol TCP or UDP or select Both Priority Select the appropriate priority High Medium Recommend Normal or Low Click Add to save your changes Your new entry appears in the Summary list MAC Address QoS MAC Addr...

Page 27: ...eless access to your guests you can disable wireless access to the Router s browser based utility You will only be able to access the utility via a wired connection if you disable the setting Keep the default Enabled to allow wireless access to the utility or select Disabled to block wireless access to the utility Remote Management Access Remote Management To permit remote access of the Router fro...

Page 28: ...hanges Administration Log The Router can keep logs of all traffic for your Internet connection Administration Log Log Enabled Disabled To disable the Log function select Disabled To monitor traffic between the network and the Internet keep the default Enabled With logging enabled you can choose to view temporary logs View Log To view the logs click View Log Log View Log Log Type Select Incoming Lo...

Page 29: ...route Administration Factory Defaults Restore the Router to its factory default settings Administration Factory Defaults NOTE Donotrestorethefactorydefaultsunless you are having difficulties with the Router and have exhausted all other troubleshooting measures OncetheRouterisreset youwillhave to re enter all of your configuration settings Factory Defaults Restore All Settings To reset the Router s...

Page 30: ...on the Setup Basic Setup screen Domain Name The Domain Name of the Router is displayed if it was entered on the Setup Basic Setup screen Internet Connection This section shows the current network information stored in the Router The information varies depending on the Internet connection type selected on the Setup Basic Setup screen Select Release IP Address or Renew IP Address as appropriate to r...

Page 31: ...work Status Wireless Wireless Network MAC Address The MAC address of the Router s local wireless interface is displayed Mode The wireless mode used by the network is displayed Network Name SSID The name of the wireless network which is also called the SSID is displayed Channel Width The Channel Width setting selected on the Wireless Basic Wireless Settings screen is displayed Wide Channel The Wide...

Page 32: ...insert the setup CD into your computer Click Setup and follow the on screen instructions When you double click the web browser you are prompted for a username and password If you want to get rid of the prompt follow these instructions Launch the web browser and perform the following steps these steps are specific to Internet Explorer but are similar for other browsers 1 Select Tools Internet Optio...

Page 33: ...Appendix A Troubleshooting 29 Wireless N Home Router ...

Page 34: ...l 1 Mbps 90 dBm typical 11 Mbps 75 dBm typical 54 Mbps 66 dBm typical 270 Mbps Antenna Gain in dBi 2 0 max UPnP able cert Able Wireless Security Wi Fi Protected Access 2 WPA2 WEP Wireless MAC Filtering Security Key Bits Up to 128 Bit Encryption OS Requirements Windows XP Vista or Vista 64 Bit Edition with Latest Updates for Network Magic and Setup Wizard Mac OS X 10 4 or higher for Setup Wizard En...

Page 35: ... or software is used will be free of vulnerability to intrusion or attack The product may include or be bundled with third party software or service offerings This limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product s use or operation may require TO T...

Page 36: ...d under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies including any fees for support services can be found at www linksys com support General This limited warranty is governed by the laws of the jurisdiction i...

Page 37: ...ion If this equipment does causeharmfulinterferencetoradioortelevisionreception which is found by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult a...

Page 38: ...dans un environnement non contrôlé Ce matériel doit être installé et utilisé à une distance d au moins 20 cm entre l antenne et le corps de l utilisateur L émetteur ne doit pas être placé près d une autre antenne ou d un autre émetteur ou fonctionner avec une autre antenne ou un autre émetteur Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802 11 specificati...

Page 39: ...99 5 EB Direktyvos esminius reikalavimus ir kitas šios direktyvos nuostatas Nederlands Dutch Dit apparaat voldoet aan de essentiele eisen en andere van toepassing zijnde bepalingen van de Richtlijn 1999 5 EC Malti Maltese Dan l apparat huwa konformi mal ħtiġiet essenzjali u l provedimenti l oħra rilevanti tad Direttiva 1999 5 EC Magyar Hungarian Ez a készülék teljesíti az alapvető követelményeket ...

Page 40: ...nden aufgeführten Staaten In the majority of the EU and other European countries the 2 4 and 5 GHz bands have been made available for the use of wireless local area networks LANs The table labeled Overview of Regulatory Requirements for Wireless LANs provides an overview of the regulatory requirements applicable for the 2 4 and 5 GHz bands Later in this document you will find an overview of countr...

Page 41: ...ntenna used specified in dBi to the output power available at the connector specified in dBm Product Usage Restrictions This product is designed for indoor usage only Outdoor usage is not recommended unless otherwise noted 2 4 GHz Restrictions This product is designed for use with the standard integral or dedicated external antenna s that is are shipped togetherwiththeequipment However someapplica...

Page 42: ...ice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místními úřady Sp...

Page 43: ...ίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets des ménages...

Page 44: ...dezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking nietmagwordeni...

Page 45: ...iť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenščina Slovene Okoljskeinformacijezastranke v Evropski uniji Evropska direktiva 2002 96 ES prepoveduje odlaganje opreme s te...

Page 46: ...IS SUPPLIED AS PART OF ANOTHER PRODUCT THE UNUSED PRODUCT FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE SUBJECT TO THE RETURN PROCESS AND POLICIES OFTHE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE IN THE EVENT THAT YOU HAVE ELECTED TO OBTAIN A SUBSCRIPTION LICENSE AS INDICATED IN YOUR ORDER YOU ADDITIONALLY AGREE TO BE BOUND BY THE TERMS OF SERVICE SET FORTH IN SCHEDULE 2 IF ...

Page 47: ...co with respect to such sites or third party software products Your correspondence or business dealings with or participation in promotions of advertisers found through the Software and any other terms conditions warranties or representations associated with such dealings are solely between you and such advertiser You agree that Cisco is not responsible or liable for any loss or damage of any sort...

Page 48: ...d the purchase price of the Software media EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SET FORTHABOVEANDTOTHEMAXIMUMEXTENTPERMITTED BY APPLICABLE LAW ALL SOFTWARE PROVIDED BY CISCO IS PROVIDED AS IS WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND Without limiting the foregoing Cisco does not warrant that the operation of the product or software will be uninterrupted or error free Also due to the con...

Page 49: ...cations Cisco may modify or cancel the terms of thisAgreementortheprice content ornatureoftheServices including discontinuing the Services program upon notice to you If Cisco modifies any of these terms you may cancel the Service by providing written notice to Cisco via www networkmagic com support of such cancellation and uninstalling the Software and discontinuing your use of the Service Cisco m...

Page 50: ...that redistributors of a free program will individually obtain patent licenses in effect making the program proprietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION 0 This License ap...

Page 51: ...s of Sections 1 and 2 above on a medium customarily used for software interchange or c Accompany it with the information you received as totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work me...

Page 52: ...h new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the...

Page 53: ...ecipients so that they can relink them with the library after making changes to the library and recompiling it And you must show them these terms so they know their rights We protect your rights with a two step method 1 we copyright the library and 2 we offer you this license which gives you legal permission to copy distribute and or modify the library To protect each distributor we want to make i...

Page 54: ...program using the Library is not restricted and output from such a program is covered only if its contents constitute a work based on the Library independent of the use of the Library in a tool for writing it Whether that is true depends on what the Library does and what the program that uses the Library does 1 You may copy and distribute verbatim copies of the Library s complete source code as yo...

Page 55: ... Library creates an executable that is a derivative of the Library because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivativ...

Page 56: ... copy modify sublicense link with or distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights underthisLicense However partieswhohavereceived copies or rights from you under this License will not have their licenses terminated so long as such partie...

Page 57: ...sion will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY 15 BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LI...

Page 58: ...RUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OFTHE POSSIBILITY OF SUCH DAMAGE This product includes cryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SS...

Page 59: ...OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenseanddistributiontermsforanypubliclyavailable version or derivative of this code can...

Reviews: