background image

Appendix D

Regulatory Information

34

Wireless-N Home Router

Industry Canada Statement

This  Class  B  digital  apparatus  complies  with  Canadian 

ICES-003 and RSS210.
Operation is subject to the following two conditions:
1.  This device may not cause interference and
2.  This  device  must  accept  any  interference,  including 

interference  that  may  cause  undesired  operation  of 

the device.

Industry Canada Radiation Exposure Statement

This equipment complies with IC radiation exposure limits 

set forth for an uncontrolled environment. This equipment 

should be installed and operated with minimum distance 

20 cm between the radiator & your body.
This  transmitter  must  not  be  co-located  or  operating  in 

conjunction with any other antenna or transmitter.

Avis d’Industrie Canada

Cet appareil numérique de la classe B est conforme aux 

normes NMB-003 et RSS210 du Canada.
L’utilisation  de  ce  dispositif  est  autorisée  seulement  aux 

conditions suivantes :
1.  il ne doit pas produire de brouillage et 
2.  il  doit  accepter  tout  brouillage  radioélectrique  reçu, 

même si ce brouillage est susceptible de compromettre 

le fonctionnement du dispositif.

Avis d’Industrie Canada concernant l’exposition 

aux radiofréquences

Ce  matériel  est  conforme  aux  limites  établies  par  IC 

en  matière  d’exposition  aux  radiofréquences  dans  un 

environnement non contrôlé. Ce matériel doit être installé 

et utilisé à une distance d’au moins 20 cm entre l’antenne 

et le corps de l’utilisateur.
L’émetteur ne doit pas être placé près d’une autre antenne 

ou  d’un  autre  émetteur,  ou  fonctionner  avec  une  autre 

antenne ou un autre émetteur.

Wireless Disclaimer

The  maximum  performance  for  wireless  is  derived  from 

IEEE Standard 802.11 specifications. Actual performance 

can  vary,  including  lower  wireless  network  capacity, 

data throughput rate, range and coverage. Performance 

depends  on  many  factors,  conditions  and  variables, 

including  distance  from  the  access  point,  volume  of 

network  traffic,  building  materials  and  construction, 

operating  system  used,  mix  of  wireless  products  used, 

interference and other adverse conditions.

Avis de non-responsabilité concernant les 

appareils sans fil

Les  performances  maximales  pour  les  réseaux  sans  fil 

sont  tirées  des  spécifications  de  la  norme  IEEE  802.11. 

Les  performances  réelles  peuvent  varier,  notamment 

en  fonction  de  la  capacité  du  réseau  sans  fil,  du  débit 

de  la  transmission  de  données,  de  la  portée  et  de  la 

couverture.  Les  performances  dépendent  de  facteurs, 

conditions  et  variables  multiples,  en  particulier  de  la 

distance par rapport au point d’accès, du volume du trafic 

réseau,  des  matériaux  utilisés  dans  le  bâtiment  et  du 

type de construction, du système d’exploitation et de la 

combinaison de produits sans fil utilisés, des interférences 

et de toute autre condition défavorable.

Содержание WRT120N - Wireless-N Home Router Wireless

Страница 1: ...USER GUIDE Wireless N Home Router Model WRT120N ...

Страница 2: ...l address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksysbycisco com Linksys International www linksysbycisco com international Glossary www linksysbycisco com glossary Netwo...

Страница 3: ... Wireless Advanced Wireless Settings 15 Security Firewall 16 Security VPN Passthrough 17 Access Restrictions Internet Access 17 Applications and Gaming Single Port Forwarding 19 Applications and Gaming Port Range Forwarding 19 Applications Gaming Port Range Triggering 20 Applications and Gaming DMZ 20 Applications and Gaming QoS 21 Administration Management 23 Administration Log 24 Administration ...

Страница 4: ...lité concernant les appareils sans fil 34 Declaration of Conformity with Regard to EU Directive 1999 5 EC R TTE Directive 35 Wireless Equipment Wireless N G A B Products 36 CE Marking 36 National Restrictions 36 Product Usage Restrictions 37 Technical Documents on www linksysbycisco com international 37 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and...

Страница 5: ...e Wi Fi Protected Setup process Make sure the client device supports Wi Fi Protected Setup WaituntiltheLEDisoff andthentryagain The LED flashes when a Wi Fi Protected Setup session is active The Router supports one session at a time Wait until the LED is solidly lit or off before starting the next Wi Fi Protected Setup session Wireless Blue The Wireless LED lights up when the wireless feature is e...

Страница 6: ...ermine where you want to mount the Router Make sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical outlet 2 Drill two holes into the wall Make sure the holes are 152 mm 6 inches apart 3 Insert a screw into each hole and leave 3 mm 0 12 inches of its head exposed 4 Maneuver the Router so the wall mount slots line up with the two scre...

Страница 7: ...MAC address filtering Linksys routers give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless network access is provided solely for wireless devices with specific MAC addresses For example you can specify the MAC address of each computer in you...

Страница 8: ...outer s default IP address 192 168 1 1 in the Address field Then press Enter A login screen will appear Non Windows XP users will see a similar screen Leave the User name field blank The first time you open the browser based utility use the default password admin You can set a new password from the Administration Management screen Click OK to continue Login Screen Setup Basic Setup The first scree...

Страница 9: ...he Router to cut the Internet connection after it has been inactive for a specified period of time Max Idle Time If your Internet connection has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max Idle Time field enter the numbe...

Страница 10: ...nection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max Idle Time field enter the number of minutes you want to have elapsed before your Internet connection terminates The default Max Idle Time is 5 minutes Keep Alive Redial Period If you select this option the Router will periodically check your Internet connection If you are disconnected...

Страница 11: ... Router s DHCP server option make sure there is no other DHCP server on your network DHCP Server Setting DHCP Server DHCP is enabled by factory default If you already have a DHCP server on your network or you do not want a DHCP server then select Disabled no other DHCP features will be available DHCP Reservation Click this button if you want to assign a fixed local IP address to a MAC address DHCP...

Страница 12: ... website FTP server or other server behind the Router Before you can use this feature you need to sign up for DDNS service with a DDNS service provider www dyndns org or www TZO com If you do not want to use this feature keep the default Disabled DDNS DDNS Service If your DDNS service is provided by DynDNS org then select DynDNS org from the drop down menu If your DDNS service is provided by TZO t...

Страница 13: ...ck Save Settings to apply your changes or click Cancel Changes to clear your changes Setup Advanced Routing This screen is used to set up the Router s advanced functions Operating Mode allows you to select the type s of advanced functions you use Dynamic Routing automatically adjusts how packets travel on your network Static Routing sets up a fixed route to another network destination Setup Advanc...

Страница 14: ...upport Wi Fi Protected Setup then you can use Wi Fi Protected Setup Configuration View To manually configure your wireless network select Manual Proceed to Basic Wireless Settings Manual page 10 To use Wi Fi Protected Setup select Wi Fi Protected Setup Proceed to Wi Fi Protected Setup page 11 BasicWireless Settings Manual Wireless Basic Wireless Settings Manual Setup Network Mode From this drop do...

Страница 15: ...isabled Click Save Settings to apply your changes or click Cancel Changes to clear your changes Wi Fi Protected Setup There are three methods available Use the method that applies to the client device you are configuring Wireless Basic Wireless Settings Wi Fi Protected Setup Wi Fi Protected Setup Configured NOTE Wi Fi Protected Setup configures one client device at a time Repeat the instructions f...

Страница 16: ... stands for Wired Equivalent Privacy while RADIUS stands for Remote Authentication Dial In User Service These six are briefly discussed here For detailed instructions on configuring wireless security for the Router refer to Chapter 2 Wireless Security Checklist page 3 Wireless Security Security Mode Select the security method for your wireless network If you do not want to use wireless security ke...

Страница 17: ...dress of the server RADIUS Port Enter the port number of the server The default is 1812 Shared Secret Enter the key shared between the Router and the server Key Renewal Enter a Key Renewal period which instructs the Router how often it should change the encryption keys The default is 3600 seconds RADIUS This option features WEP used with a RADIUS server This should only be used when a RADIUS serve...

Страница 18: ...smit Key 1 is used Click Save Settings to apply your changes or click Cancel Changes to clear your changes Wireless Wireless MAC Filter Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network s radius Wireless Wireless MAC Filter Wireless MAC Filter Enabled Disabled To filter wireless users by MAC Address either permitting or blocking acc...

Страница 19: ...d Key authentication the sender and recipient use aWEP key for authentication Select Shared Key to only use Shared Key authentication Basic Rate The Basic Rate setting is not actually one rate of transmission but a series of rates at which the Router can transmit The Basic Rate is not the actual rate of data transmission If you want to specify the Router s rate of data transmission configure the T...

Страница 20: ...fter receiving an RTS the wireless station responds with a Clear to Send CTS frame to acknowledge the right to begin transmission The RTS Threshold value should remain at its default value of 2347 Click Save Settings to apply your changes or click Cancel Changes to clear your changes Security Firewall The Firewall screen is used to configure a firewall that can filter out various types of unwanted...

Страница 21: ...rotocol PPTP allows the Point to Point Protocol PPP to be tunneled through an IP network To allow PPTP tunnels to pass through the Router keep the default Enabled L2TP Passthrough Layer 2 Tunneling Protocol is the method used to enable Point to Point sessions via the Internet on the Layer 2 level To allow L2TP tunnels to pass through the Router keep the default Enabled Click Save Settings to apply...

Страница 22: ...een 6 Decide which days and what times you want this policy to be enforced Select the individual days during which the policy will be in effect or select Everyday Then enter a range of hours and minutes during which the policy will be in effect or select 24 Hours 7 You can block websites with specific URL addresses Enter each URL in a separate Website Blocking by URL Address field 8 You can also b...

Страница 23: ...lication documentation for more information Protocol Select the protocol s used for this application TCP UDP or Both To IP Address For each application enter the IP address of the computer that should receive the requests If you assigned a static IP address to the computer then you can look up its IP address click DHCP Reservation on the Basic Setup screen refer to DHCP Reservation page 7 Enabled ...

Страница 24: ...documentation for the port number s needed ForwardedRange Foreachapplication enterthestarting and ending port numbers of the forwarded port number range Check with the Internet application documentation for the port number s needed Enabled Select Enabled to enable port triggering for the applications you have defined Click Save Settings to apply your changes or click Cancel Changes to clear your c...

Страница 25: ...odisabletheRouter s Acknowledgement feature so the Router will not re send data if an error occurs then select Enabled Otherwise keep the default Disabled Internet Access Priority In this section you can set the bandwidth priority for a variety of applications and devices There are four levels priority High Medium Normal or Low When you set priority donotsetallapplicationstoHigh becausethiswill de...

Страница 26: ...ave up to three ranges to define for this bandwidth allocation Port numbers can range from 1 to 65535 Check your application s documentation for details on the service ports used Select the protocol TCP or UDP or select Both Priority Select the appropriate priority High Medium Recommend Normal or Low Click Add to save your changes Your new entry appears in the Summary list MAC Address QoS MAC Addr...

Страница 27: ...eless access to your guests you can disable wireless access to the Router s browser based utility You will only be able to access the utility via a wired connection if you disable the setting Keep the default Enabled to allow wireless access to the utility or select Disabled to block wireless access to the utility Remote Management Access Remote Management To permit remote access of the Router fro...

Страница 28: ...hanges Administration Log The Router can keep logs of all traffic for your Internet connection Administration Log Log Enabled Disabled To disable the Log function select Disabled To monitor traffic between the network and the Internet keep the default Enabled With logging enabled you can choose to view temporary logs View Log To view the logs click View Log Log View Log Log Type Select Incoming Lo...

Страница 29: ...route Administration Factory Defaults Restore the Router to its factory default settings Administration Factory Defaults NOTE Donotrestorethefactorydefaultsunless you are having difficulties with the Router and have exhausted all other troubleshooting measures OncetheRouterisreset youwillhave to re enter all of your configuration settings Factory Defaults Restore All Settings To reset the Router s...

Страница 30: ...on the Setup Basic Setup screen Domain Name The Domain Name of the Router is displayed if it was entered on the Setup Basic Setup screen Internet Connection This section shows the current network information stored in the Router The information varies depending on the Internet connection type selected on the Setup Basic Setup screen Select Release IP Address or Renew IP Address as appropriate to r...

Страница 31: ...work Status Wireless Wireless Network MAC Address The MAC address of the Router s local wireless interface is displayed Mode The wireless mode used by the network is displayed Network Name SSID The name of the wireless network which is also called the SSID is displayed Channel Width The Channel Width setting selected on the Wireless Basic Wireless Settings screen is displayed Wide Channel The Wide...

Страница 32: ...insert the setup CD into your computer Click Setup and follow the on screen instructions When you double click the web browser you are prompted for a username and password If you want to get rid of the prompt follow these instructions Launch the web browser and perform the following steps these steps are specific to Internet Explorer but are similar for other browsers 1 Select Tools Internet Optio...

Страница 33: ...Appendix A Troubleshooting 29 Wireless N Home Router ...

Страница 34: ...l 1 Mbps 90 dBm typical 11 Mbps 75 dBm typical 54 Mbps 66 dBm typical 270 Mbps Antenna Gain in dBi 2 0 max UPnP able cert Able Wireless Security Wi Fi Protected Access 2 WPA2 WEP Wireless MAC Filtering Security Key Bits Up to 128 Bit Encryption OS Requirements Windows XP Vista or Vista 64 Bit Edition with Latest Updates for Network Magic and Setup Wizard Mac OS X 10 4 or higher for Setup Wizard En...

Страница 35: ... or software is used will be free of vulnerability to intrusion or attack The product may include or be bundled with third party software or service offerings This limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product s use or operation may require TO T...

Страница 36: ...d under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies including any fees for support services can be found at www linksys com support General This limited warranty is governed by the laws of the jurisdiction i...

Страница 37: ...ion If this equipment does causeharmfulinterferencetoradioortelevisionreception which is found by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult a...

Страница 38: ...dans un environnement non contrôlé Ce matériel doit être installé et utilisé à une distance d au moins 20 cm entre l antenne et le corps de l utilisateur L émetteur ne doit pas être placé près d une autre antenne ou d un autre émetteur ou fonctionner avec une autre antenne ou un autre émetteur Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802 11 specificati...

Страница 39: ...99 5 EB Direktyvos esminius reikalavimus ir kitas šios direktyvos nuostatas Nederlands Dutch Dit apparaat voldoet aan de essentiele eisen en andere van toepassing zijnde bepalingen van de Richtlijn 1999 5 EC Malti Maltese Dan l apparat huwa konformi mal ħtiġiet essenzjali u l provedimenti l oħra rilevanti tad Direttiva 1999 5 EC Magyar Hungarian Ez a készülék teljesíti az alapvető követelményeket ...

Страница 40: ...nden aufgeführten Staaten In the majority of the EU and other European countries the 2 4 and 5 GHz bands have been made available for the use of wireless local area networks LANs The table labeled Overview of Regulatory Requirements for Wireless LANs provides an overview of the regulatory requirements applicable for the 2 4 and 5 GHz bands Later in this document you will find an overview of countr...

Страница 41: ...ntenna used specified in dBi to the output power available at the connector specified in dBm Product Usage Restrictions This product is designed for indoor usage only Outdoor usage is not recommended unless otherwise noted 2 4 GHz Restrictions This product is designed for use with the standard integral or dedicated external antenna s that is are shipped togetherwiththeequipment However someapplica...

Страница 42: ...ice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místními úřady Sp...

Страница 43: ...ίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets des ménages...

Страница 44: ...dezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking nietmagwordeni...

Страница 45: ...iť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenščina Slovene Okoljskeinformacijezastranke v Evropski uniji Evropska direktiva 2002 96 ES prepoveduje odlaganje opreme s te...

Страница 46: ...IS SUPPLIED AS PART OF ANOTHER PRODUCT THE UNUSED PRODUCT FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE SUBJECT TO THE RETURN PROCESS AND POLICIES OFTHE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE IN THE EVENT THAT YOU HAVE ELECTED TO OBTAIN A SUBSCRIPTION LICENSE AS INDICATED IN YOUR ORDER YOU ADDITIONALLY AGREE TO BE BOUND BY THE TERMS OF SERVICE SET FORTH IN SCHEDULE 2 IF ...

Страница 47: ...co with respect to such sites or third party software products Your correspondence or business dealings with or participation in promotions of advertisers found through the Software and any other terms conditions warranties or representations associated with such dealings are solely between you and such advertiser You agree that Cisco is not responsible or liable for any loss or damage of any sort...

Страница 48: ...d the purchase price of the Software media EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SET FORTHABOVEANDTOTHEMAXIMUMEXTENTPERMITTED BY APPLICABLE LAW ALL SOFTWARE PROVIDED BY CISCO IS PROVIDED AS IS WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND Without limiting the foregoing Cisco does not warrant that the operation of the product or software will be uninterrupted or error free Also due to the con...

Страница 49: ...cations Cisco may modify or cancel the terms of thisAgreementortheprice content ornatureoftheServices including discontinuing the Services program upon notice to you If Cisco modifies any of these terms you may cancel the Service by providing written notice to Cisco via www networkmagic com support of such cancellation and uninstalling the Software and discontinuing your use of the Service Cisco m...

Страница 50: ...that redistributors of a free program will individually obtain patent licenses in effect making the program proprietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION 0 This License ap...

Страница 51: ...s of Sections 1 and 2 above on a medium customarily used for software interchange or c Accompany it with the information you received as totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work me...

Страница 52: ...h new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the...

Страница 53: ...ecipients so that they can relink them with the library after making changes to the library and recompiling it And you must show them these terms so they know their rights We protect your rights with a two step method 1 we copyright the library and 2 we offer you this license which gives you legal permission to copy distribute and or modify the library To protect each distributor we want to make i...

Страница 54: ...program using the Library is not restricted and output from such a program is covered only if its contents constitute a work based on the Library independent of the use of the Library in a tool for writing it Whether that is true depends on what the Library does and what the program that uses the Library does 1 You may copy and distribute verbatim copies of the Library s complete source code as yo...

Страница 55: ... Library creates an executable that is a derivative of the Library because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivativ...

Страница 56: ... copy modify sublicense link with or distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights underthisLicense However partieswhohavereceived copies or rights from you under this License will not have their licenses terminated so long as such partie...

Страница 57: ...sion will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY 15 BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LI...

Страница 58: ...RUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OFTHE POSSIBILITY OF SUCH DAMAGE This product includes cryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SS...

Страница 59: ...OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenseanddistributiontermsforanypubliclyavailable version or derivative of this code can...

Отзывы: