USER GUIDE Simultaneous Dual-Band Wireless-N Gigabit Router Model: WRT610N
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
Table of Contents Chapter 1: Product Overview 3 Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Chapter 2: Wireless Security Checklist 5 General Network Security Guidelines . . . . . . . . . . . . . . . . . .
Table of Contents Appendix C: Specifications 43 Appendix D: Warranty Information 44 Limited Warranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Appendix E: Regulatory Information 46 FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 FCC Radiation Exposure Statement . . . . . . . . . . . . .
Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Simultaneous Dual-Band Wireless-N Gigabit Router. The Router lets you access the Internet via a wireless connection or through one of its four switched ports. With the built-in storage link, you can easily add gigabytes of storage space onto your network using USB 2.0 hard drives, or plug in a USB flash disk to access your portable data files.
Product Overview Chapter 1 Reset There are two ways to reset the Router’s factory defaults. Either press and hold the Reset Button for approximately five seconds, or restore the defaults from the Administration > Factory Defaults screen in the Router’s browser-based utility (refer to Administration > Factory Defaults, page 32). Suggested Mounting Hardware 2.5-3.0 mm 4-5 mm 1-1.5 mm †† Note: Mounting hardware illustrations are not true to scale. Power Switch Press I the end to power on the Router.
Wireless Security Checklist Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted.
Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration Setup > Basic Setup The first screen that appears is the Basic Setup screen. This allows you to change the Router’s general settings. After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. If you would like to change its advanced settings, use the Router’s browser-based utility. This chapter describes each web page of the utility and each page’s key functions.
Advanced Configuration Chapter 3 Automatic Configuration - DHCP The default Internet Connection Type is set to Automatic Configuration - DHCP. Keep the default only if your ISP supports DHCP or if you connect using a dynamic IP Address. (This option usually applies to cable connections.) Internet Connection Type > Automatic Configuration - DHCP Static IP If you are required to use a permanent IP address to connect to the Internet, select Static IP.
Advanced Configuration Chapter 3 DNS Your ISP will provide you with at least one DNS (Domain Name System) Server IP address. Server IP Address Your ISP will provide you with the Server IP Address. User Name and Password Enter the User Name and Password provided by your ISP. Keep Alive: Redial Period If you select this option, the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re-establish your connection.
Advanced Configuration Chapter 3 Size When Manual is selected in the MTU field, this option is enabled. Leave this value in the 1200 to 1500 range. The default size depends on the Internet Connection Type: •• DHCP, Static IP, or Telstra: 1500 •• PPPoE: 1492 •• PPTP or L2TP: 1460 Network Setup The Network Setup section changes the settings on the network connected to the Router’s Ethernet ports. Wireless Setup is performed through the Wireless tab (refer to Wireless > Basic Wireless Settings, page 12).
Advanced Configuration Chapter 3 the lease will be renewed. The default is 0 minutes, which means one day. DynDNS.org Static DNS (1-3) The Domain Name System (DNS) is how the Internet translates domain or website names into Internet addresses or URLs. Your ISP will provide you with at least one DNS Server IP Address. If you wish to use another, enter that IP Address in one of these fields. You can enter up to three DNS Server IP Addresses here.
Advanced Configuration Chapter 3 Update To manually trigger an update, click Update. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Setup > MAC Address Clone Some ISPs will require you to register a MAC address in order to access the Internet. A MAC address is a 12-digit code assigned to a unique piece of hardware for identification.
Advanced Configuration Chapter 3 Gateway This is the IP address of the gateway device that allows for contact between the Router and the remote network or host. Interface This interface tells you whether the Destination IP Address is on the LAN & Wireless (Ethernet and wireless networks) or the WAN (Internet). Click Show Routing Table to view the static routes you have already set up. Decide which computers and other wireless devices should join which network.
Chapter 3 Advanced Configuration devices, select Wireless‑N Only. If you do not have any Wireless-A and Wireless-N (5GHz) devices in your network, select Disabled. detect the SSID broadcast by the Router. To broadcast the Router’s SSID, keep the default, Enabled. If you do not want to broadcast the Router’s SSID, then select Disabled. Network Mode (2.4 GHz) Select the wireless standards running on your 2.4 GHz network. If you have both Wireless-B, Wireless-G and Wireless-N (2.
Advanced Configuration Chapter 3 3. After the client device has been configured, click OK on the Router’s Wi-Fi Protected Setup screen. Then refer back to your client device or its documentation for further instructions. Method #3 Use this method if your client device asks for the Router’s PIN number. 1. On the client device, enter the PIN number listed on the Router’s Wi-Fi Protected Setup screen. (It is also listed on the label on the bottom of the Router.) 2.
Advanced Configuration Chapter 3 WPA2 Enterprise WPA Enterprise This option features WPA2 used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) This option features WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA2 Enterprise WPA Enterprise Encryption WPA2 supports two encryption methods with dynamic encryption keys, AES or WPA-TKIP/ WPA2‑AES.
Advanced Configuration Chapter 3 RADIUS WEP This option features WEP used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WEP is a basic encryption method, which is not as secure as WPA. IMPORTANT: If you are using WEP encryption, each device in your wireless network MUST use the same WEP encryption method and encryption key, or else your wireless network will not function properly.
Advanced Configuration Chapter 3 Wireless > Wireless MAC Filter Wireless access can be filtered (restricted) by specifying the MAC addresses of the devices in your wireless network. Wireless Client List This screen shows computers and other devices on the wireless network. The list can be sorted by Client Name, Interface, IP Address, MAC Address, and Status. Select Save to MAC Address Filter List for any device you want to add to the MAC Address Filter List. Then click Add.
Chapter 3 with each other. To use this function, select Enabled. AP Isolation is disabled by default. Frame Burst Enabling this option should provide your network with greater performance, depending on the manufacturer of your wireless products. To use the Frame Burst option, keep the default, Enabled. Authentication Type The default is Auto, which allows either Open System or Shared Key authentication to be used.
Advanced Configuration Chapter 3 Security > Firewall The Firewall screen is used to configure a firewall that can filter out various types of unwanted traffic on the Router’s local network. ActiveX ActiveX is a programming language for websites. If you deny ActiveX, you run the risk of not having access to Internet sites created using this programming language. Select this option to enable ActiveX filtering. Deselect the feature to allow ActiveX usage.
Advanced Configuration Chapter 3 Storage > Disk The storage options are available when a USB storage device is connected to the USB port of the Router. The Disk screen describes the disk currently attached to the Router. Use this screen to create shared folders, safely remove a disk, or format a disk (any data on the disk will be deleted during formatting). Shared folders are folders you create to manage access to the folders on the disk.
Advanced Configuration Chapter 3 Current Folder The current folder is displayed. Folder Name The available folders are listed by Folder Name. Enter into Folder To display sub-folders, click this button. For example, if you have a digital media adapter that sends content to your entertainment system, then the digital media adapter can locate the Router using the UPnP AV standard. The folders you specify can then be accessed and played by the digital media adapter. Select Select a folder.
Advanced Configuration Chapter 3 Add a Media Folder Storage > FTP Server Use this screen to add a media folder. The storage options are available when a USB storage device is connected to the USB port of the Router. The FTP Server tab creates an FTP server that can be accessed from the Internet or your local network. Storage> FTP Server Media Folder Media Folder Display Name Create a name for the folder. This will appear in the Database table on the Media Server screen.
Advanced Configuration Chapter 3 Delete To delete an FTP folder, click this option. Access Create or Edit an FTP Folder Specify which user groups have read-and-write or readonly access to the folder. (To create user groups, refer to Create or Edit a Group Account, page 24.) Use this screen to add an FTP folder. Available Groups To allow a group access to the folder, select it, and then click the >> button.
Advanced Configuration Chapter 3 User Management Confirm Password Enter the password again to confirm. By default the Router creates two users, admin and guest. Group Member Select the appropriate user group. The users are listed by User Name and Group. Account Disabled To temporarily disable an account, select this option. Create New User To create a new user, click this button. The User Account screen appears. Proceed to Create or Edit a User Account, page 24.
Advanced Configuration Chapter 3 Access Restrictions > Internet Access The Internet Access screen allows you to deny or allow specific kinds of Internet usage and traffic, such as Internet access, designated services, and websites during specific days and times. 2. Enter a Policy Name in the field provided. 3. To enable this policy, select Enabled. 4. Click Edit List to select which PCs will be affected by the policy. The List of PCs screen appears. You can select a PC by MAC address or IP address.
Chapter 3 Advanced Configuration To modify a service, select it from the Application list. Change its name, port range, and/or protocol setting. Then click Modify. Internal Port Enter the internal port number used by the server or Internet application. Check with the Internet application documentation for more information. To delete a service, select it from the Application list. Then click Delete. Protocol Select the protocol(s) used for this application, TCP, UDP, or Both. 11.
Advanced Configuration Chapter 3 Application Name In this field, enter the name you wish to give the application. Each name can be up to 12 characters. Start~End Port Enter the number or range of port(s) used by the server or Internet applications. Check with the Internet application documentation for more information. Protocol Select the protocol(s) used for this application, TCP, UDP, or Both. To IP Address For each application, enter the IP address of the computer running the specific application.
Advanced Configuration Chapter 3 Applications and Gaming > QoS Category Quality of Service (QoS) ensures better service to high-priority types of network traffic, which may involve demanding, real-time applications, such as videoconferencing. Select one of the following categories: Applications, Online Games, MAC Address, Ethernet Port, or Voice Device. Proceed to the instructions for your selection. Summary This lists the QoS entries you have created for your applications and devices.
Advanced Configuration Chapter 3 Priority Select the appropriate priority: High, Medium (Recommended), Normal, or Low. MAC Address Click Apply to save your changes. Your new entry will appear in the Summary list. Online Games MAC Address The MAC address of the computer you are using is displayed. Online Games Online Games Games Select the appropriate game. If you select Add a New Game, follow the instructions in the Add a New Game section.
Advanced Configuration Chapter 3 Priority Select the appropriate priority: High, Medium (Recommended), Normal, or Low. Administration > Management Click Apply to save your changes. Your new entry will appear in the Summary list. The Management screen allows the network’s administrator to manage specific Router functions for access and security. Voice Device Administration > Management Router Password Voice Device Router Access Enter a Name Enter a name for your voice device.
Advanced Configuration Chapter 3 on the World Wide Web. HTTPS uses SSL (Secure Socket Layer) to encrypt data transmitted for higher security. Select HTTP or HTTPS. HTTP is the default. Remote Upgrade If you want to be able to upgrade the Router from the Internet (outside the local network), select Enabled. (You must have the Remote Management feature enabled as well.) Otherwise, keep the default, Disabled. Administration > Log The Router can keep logs of all traffic for your Internet connection.
Advanced Configuration Chapter 3 Diagnostics Administration > Factory Defaults Ping Test The Factory Defaults screen allows you to restore the Router’s configuration to its factory default settings. Ping checks the status of a connection. IP or URL Address Enter the address of the PC whose connection you wish to test. Packet Size Enter the packet size you want to use. The default is 32 bytes. Number to Ping Enter the number of times you wish to test the connection. The default is 5.
Advanced Configuration Chapter 3 Firmware Upgrade Internet Connection Before upgrading the firmware, download the Router’s firmware upgrade file from the Linksys website, www.linksysbycisco.com. This section shows the current network information stored in the Router. The information varies depending on the Internet connection type selected on the Setup > Basic Setup screen. Please Select a File to Upgrade Click Browse and select the firmware upgrade file.
Advanced Configuration Chapter 3 Status > Wireless Network The Wireless Network screen displays the status information of your 5 GHz and/or 2.4 GHz wireless network(s). Status > Wireless Network 5GHz/2.4GHz Wireless Network MAC Address The MAC address of the Router’s local, wireless interface is displayed. Mode The wireless mode used by the network is displayed. Net work Name (SSID) The name of the wireless network, which is also called the SSID, is displayed.
Troubleshooting Appendix A Appendix A: Troubleshooting Your computer cannot connect to the Internet. When you double-click the web browser, you are prompted for a username and password. If you want to get rid of the prompt, follow these instructions. Launch the web browser and perform the following steps (these steps are specific to Internet Explorer but are similar for other browsers): Follow these instructions until your computer can connect to the Internet: 1. Select Tools > Internet Options.
Appendix A If the Router still does not recognize the USB storage device, then remove the power adapter from the Router’s Power port. Wait five seconds, and then re-connect the power adapter to the Router’s Power port. Troubleshooting WEB: If your questions are not addressed here, refer to the Linksys by Cisco website, www.linksysbycisco.com In Windows Vista, you do not see the USB storage device in the Network screen. Make sure the Router and your computer use the same workgroup name.
How to Install and Access USB Storage Appendix B Appendix B: How to Install and Access USB Storage 3. On the login screen, enter your account user name and password. (For the admin account, admin is both the default user name and password.
How to Install and Access USB Storage Appendix B 3. Enter your account user name and password. (For the admin account, admin is both the default user name and password.) 2. In the Address field, enter \\WRT610N (the server name of the Router). Enter Server Name of Router NOTE: Another option is to use the IP address of the Router. In the Address field, enter the local IP address of the Router: \\xxx.xxx.xxx.xxx The default is 192.168.1.1.
How to Install and Access USB Storage Appendix B Access Mapped Drive NOTE: Another option is to use the IP address 1. On your desktop, double-click the Computer icon. of the Router. In the Address field, enter the local IP address of the Router: \\xxx.xxx.xxx.xxx The default is 192.168.1.1. You can change this IP address on the Setup > Basic Setup screen; refer to Setup > Basic Setup, page 6.
How to Install and Access USB Storage Appendix B 5. From the Drive drop-down menu, select an available drive letter. Advanced Configuration (Advanced Users Only) To manage access to the USB storage device, you can create shared folders, user groups, and user accounts. Access the Browser-Based Utility To access the browser-based utility, launch the web browser on your computer, and enter the Router’s default IP address, 192.168.1.1, in the Address field. Then press Enter. Select Drive Letter 6.
How to Install and Access USB Storage Appendix B 3. To create a shared folder, click Create Share. Create a User Group Account 1. Click the Storage tab. 2. Click the Administration tab. Storage > Administration Shared Folder 3. In the Group Management section, click Create New Group. 4. In the Display Name field, create a display name for the shared folder. 5. In the New Folder field, create a name for the physical location of the shared folder. Then click Create. 6.
How to Install and Access USB Storage Appendix B Create a User Account NOTE: To temporarily disable an account, 1. Click the Storage tab. select Account Disabled. 2. Click the Administration tab. 9. Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Click Close to exit the screen and return to the Administration screen. Storage > Administration 3. In the User Management section, click Create New User. User Account 4.
Specifications Appendix C Appendix C: Specifications Model WRT610N Standards Draft 802.11n, 802.11a, 802.11g, 802.11b, 802.3, 802.3u, 802.3ab Ports Power, Ethernet 1-4, Internet, USB Button Power, Reset, Wi-Fi Protected Setup LEDs Power, USB, Internet, Wireless, Wi-Fi Protected Setup, Ethernet (1-4) Receive Sensitivity 2.
Appendix D Appendix D: Warranty Information Limited Warranty FOR CONSUMERS WHO ARE COVERED BY CONSUMER PROTECTION LAWS OR REGULATIONS IN THEIR COUNTRY OF PURCHASE OR, IF DIFFERENT, THEIR COUNTRY OF RESIDENCE, THE BENEFITS CONFERRED BY THIS WARRANTY ARE IN ADDITION TO ALL RIGHTS AND REMEDIES CONVEYED BY SUCH CONSUMER PROTECTION LAWS AND REGULATIONS. THIS WARRANTY DOES NOT EXCLUDE, LIMIT OR SUSPEND ANY RIGHTS OF CONSUMERS ARISING OUT OF NONCONFORMITY WITH A SALES CONTRACT.
Appendix D Warranty Information OF SUCH DAMAGES. TO THE EXTENT NOT PROHIBITED BY APPLICABLE LAW, IN NO EVENT WILL LINKSYS’ LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT. The foregoing limitations will apply even if any warranty or remedy provided under this limited warranty fails of its essential purpose.
Regulatory Information Appendix E Appendix E: Regulatory Information FCC Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules.
Appendix E Because high power radars are allocated as primary users (meaning they have priority) in 5250-5350 MHz and 5650‑5850 MHz, these radars could cause interference and/or damage to licensed exempt LAN devices. Additional requirements for the band 5600-5650 MHz: Until further notice, devices subject to this Section shall not be capable of transmitting in the band 5600-5650 MHz, so that Environment Canada weather radars operating in this band are protected.
Appendix E User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix E Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix E Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix E Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenščina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Appendix F Appendix F: Software End User License Agreement Cisco Products This product from Cisco Systems, Inc. or its subsidiary licensing the Software instead of Cisco Systems, Inc. (“Cisco”) contains software (including firmware) originating from Cisco and its suppliers and may also contain software from the open source community. Any software originating from Cisco and its suppliers is licensed under the Cisco Software License Agreement contained at Schedule 1 below.
Appendix F License Restrictions.
Appendix F Software can enable any other computer (on the same primary network) to generate reports. When a computer is enabled, that computer shows a notification that it is being monitored. As long as that computer is enabled, each time the Software is started the user of that particular computer will see a notification that it is being monitored by the reports feature. Any computer on the network with the Software installed can enable or disable any other computer from the reports feature.
Appendix F Software End User License Agreement Disclaimer of Liabilities.
Appendix F send you Service related email messages as long as you are a subscriber to the Service. If you wish to opt-out of receiving Service related email messages, you may cancel the Service by providing written notice via www. networkmagic.com/support to Cisco of such cancellation and uninstalling the Software and discontinuing your use of the Service.
Appendix F 1. You may copy and distribute verbatim copies of the Program’s source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program.
Appendix F 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5.
Appendix F 12.
Appendix F Public License permits more lax criteria for linking other code with the library. We call this license the “Lesser” General Public License because it does Less to protect the user’s freedom than the ordinary General Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries.
Appendix F Software End User License Agreement (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.
Appendix F a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable “work that uses the Library”, as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library.
Appendix F 11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
Appendix F Schedule 3-C OPENSSL LICENSE If this Cisco product contains open source software licensed under the OpenSSL license: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/). This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Appendix F Software End User License Agreement 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes cryptographic software written by Eric Young (eay@cryptsoft.