USER GUIDE Wireless-N Broadband Router with Storage Link Model: WRT160NL
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This tick indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation mark indicates that there is a caution or warning and it is something that could damage your property or product.
Table of Contents Chapter 1: Product Overview 1 Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Bottom Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents Appendix C: Specifications 39 Appendix D: Warranty Information 40 Limited Warranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Exclusions and Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Obtaining Warranty Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys by Cisco Wireless-N Broadband Router with Storage Link. The Router lets you access the Internet via a wireless connection or through one of its four switched ports. You can also use the Router to share resources such as computers, printers and files. The Router’s USB port connects to a USB storage device, so you can access your portable files. (A USB hard drive may require an external power supply.
Product Overview Chapter 1 Bottom Panel Wall-Mounting Placement The Router has two wall-mount slots on its bottom panel. The distance between the slots is 152 mm (6 inches). Two screws are needed to mount the Router. 4–5 mm 1–1.5 mm 2.5–3.0 mm Suggested Mounting Hardware ††Note: Mounting hardware illustrations are not Reset The Reset button is located on the right side of the product label. There are two ways to reset the Router to its factory defaults.
Wireless Security Checklist Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your mobile or cordless phones, signals from your wireless network can also be intercepted.
Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you want to change its advanced settings, use the Router’s web-based utility. This chapter describes each web page of the utility and each page's key functions. You can access the utility via a web browser on a computer connected to the Router.
Advanced Configuration Chapter 3 Automatic Configuration - DHCP By default, the Router's Internet Connection Type is set to Automatic Configuration - DHCP, which should be kept only if your ISP supports DHCP or you are connecting through a dynamic IP address. (This option usually applies to cable connections). Internet Connection Type > Automatic Configuration - DHCP Static IP If you are required to use a permanent IP address to connect to the Internet, select Static IP.
Advanced Configuration Chapter 3 PPTP Server IP Address Your ISP will provide you with the IP address of the PPTP server. Username and Password Enter the Username and Password provided by your ISP. Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time).
Advanced Configuration Chapter 3 broadband Internet service has been configured with a host and domain name. In most cases, leaving these fields blank will work. MTU MTU is the Maximum Transmission Unit. It specifies the largest packet size permitted for Internet transmission. Select Manual if you want to manually enter the largest packet size that is transmitted. To have the Router select the best MTU for your Internet connection, keep the default setting of Auto.
Advanced Configuration Chapter 3 amount of time, in minutes, that the user will be "leased" this dynamic IP address. After the time has elapsed, the user will be automatically assigned a new dynamic IP address. The default setting is 0 minutes, which means one day. DynDNS.org Static DNS 1-3 The Domain Name System (DNS) is how the Internet translates domain or website names into Internet addresses or URLs. Your ISP will provide you with at least one DNS Server IP Address.
Advanced Configuration Chapter 3 Clone My PC's MAC Click this button to clone the MAC address of the computer you are using. TZO.com Click Save Settings to apply your changes or click Cancel Changes to cancel your changes. Setup > Advanced Routing This screen is used to set up the Router's advanced functions. Operating Mode allows you to select the type(s) of advanced functions you use. Dynamic Routing automatically adjusts how packets travel on your network.
Advanced Configuration Chapter 3 Route Entries To set up a static route between the Router and another network, select a number from the dropdown list. Click Delete This Entry to delete a static route. Enter Route Name Enter a name for the Route here, using a maximum of 25 alphanumeric characters. select Wi-Fi Protected Setup. Proceed to Wi-Fi Protected Setup, page 11.
Advanced Configuration Chapter 3 Standard Channel If Standard - 20 MHz Channel is the Channel Width setting, then this setting will be available. Select the appropriate channel for your wireless network. If you are not sure which channel to select, keep the default setting of Auto. If Wide - 40MHz Channel is the Channel Width setting, then the Standard Channel will be a secondary channel for Wireless-N (2.4 GHz).
Advanced Configuration Chapter 3 3. After the client device has been configured, click OK. Then refer back to your client device or its documentation for further instructions. Method #3 Use this method if your client device asks for the Router's PIN number. WPA Personal NOTE: If you are using WPA, then each device in your wireless network MUST use the same WPA method and shared key, or else the network will not function properly. 1. Enter the PIN number listed on this screen.
Advanced Configuration Chapter 3 WPA Enterprise RADIUS Server Enter the IP address of the server. This option features WPA used with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router). RADIUS Port Enter the port number of the server. The default value is 1812. Shared Secret Enter the key shared between the Router and the server. Key Renewal Enter a Key Renewal period, which instructs the Router how often it should change the encryption keys.
Advanced Configuration Chapter 3 WEP Wireless > Wireless MAC Filter WEP is a basic encryption method, which is not as secure as WPA. Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network’s radius. IMPORTANT: If you are using WEP encryption, then each device in your wireless network MUST use the same WEP encryption method and key, or else the network will not function properly.
Advanced Configuration Chapter 3 with each other. To use this function, select Enabled. AP Isolation is disabled by default. Wireless Client List Wireless Client List This screen shows computers and other devices on the wireless network. The list can be sorted by Client Name, Interface, IP Address, MAC Address and Status. Select Save to MAC Address Filter List for any device you want to add to the MAC Address Filter List. Then click Add. To update the on-screen information, click Refresh.
Advanced Configuration Chapter 3 Beacon Interval Enter a value between 1 and 65,535 milliseconds. The Beacon Interval value indicates the frequency interval of the beacon. A beacon is a packet broadcast by the Router to synchronise the wireless network. The default value is 100 milliseconds. Firewall DTIM Interval This value, between 1 and 255, indicates the interval of the Delivery Traffic Indication Message (DTIM).
Advanced Configuration Chapter 3 Security > VPN Passthrough The VPN Passthrough screen allows you to enable VPN tunnels using IPSec, PPTP or L2TP protocols to pass through the Router's firewall. Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, keep the default setting of Enabled.
Advanced Configuration Chapter 3 Shared Folders Summary The Shared Folders Summary screen displays the following information: Display Name, Partition, Shared Folder and Groups with Access. Summary To exit the Shared Folders Summary screen and return to the Disk Management screen, click Close. Format Disk Disk To format a disk and create a new partition, select the disk you want to format and then click Format Disk.
Advanced Configuration Chapter 3 Click Save Settings to apply your changes or click Cancel Changes to cancel your changes. Click Close to exit the screen. Scan All To scan all media files, click this button. The database table lists the media folders with the following information: Name, Partition and Folder. Storage > Media Server Scan To scan a folder, click Scan. The storage options are available when a USB storage device is connected to the USB port of the Router.
Advanced Configuration Chapter 3 Storage > Administration User Management The Administration screen allows you to manage the user groups and individual users who can access the shared folders. By default the Router creates two users, admin and guest. The users are listed by Username and Group. Create New User To create a new user, click this button. The User Account screen appears. Proceed to Create or Edit a User Account, page 21.
Advanced Configuration Chapter 3 Create or Edit a User Account User Account User Account Name Create a name for the user. Full Name Enter the actual name of the user. Access Restrictions > Internet Access Description Enter keywords to describe the user. Password Enter the password that the user will use for login Confirm Password Enter the password again to confirm. Group Member Select the appropriate user group. Account disabled To temporarily disable an account, select this option.
Advanced Configuration Chapter 3 Status Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu and select Enabled. To create a policy, follow steps 1-11. Repeat these steps to create additional policies, one at a time. 1. Select a number from the Access Policy drop-down menu. 2. Enter a Policy Name in the field provided. 3. To enable this policy, select Enabled. 4. Click Edit List to select which PCs will be affected by the policy.
Chapter 3 External Port Enter the external port number used by the server or Internet application. Check with the Internet application documentation for more information. Internal Port Enter the internal port number used by the server or Internet application. Check with the Internet application documentation for more information. Protocol Select the protocol(s) used for this application, TCP, UDP or Both.
Advanced Configuration Chapter 3 Triggered Range For each application, enter the starting and ending port numbers of the triggered port number range. Check with the Internet application documentation for the port number(s) needed. address in the field provided. To retrieve this information, click DHCP Client Table. Forwarded Range For each application, enter the starting and ending port numbers of the forwarded port number range.
Advanced Configuration Chapter 3 No Acknowledgement If you want to disable the Router's Acknowledgement feature, so the Router will not re-send data if an error occurs, then select Enabled. Otherwise, keep the default setting of Disabled. Internet Access Priority In this section, you can set the bandwidth priority for a variety of applications and devices. There are four levels of priority: High, Medium, Normal or Low.
Advanced Configuration Chapter 3 Name This column displays the application, device or port name. MAC Address Information This column displays the port range or MAC address entered for your entry. If a pre-configured application or game was selected, there will be no valid entry shown in this section. Remove Click this button to remove an entry. QoS > MAC Address Edit Click this button to make changes. Enter a Name Enter a name for your device. MAC Address Enter the MAC address of your device.
Advanced Configuration Chapter 3 Access via Wireless If you are using the Router in a public domain where you are giving wireless access to your guests, you can disable wireless access to the Router’s web-based utility. You will only be able to access the utility via a wired connection if you disable the setting. Keep the default setting of Enabled, to allow wireless access to the utility or select Disabled to block wireless access to the utility.
Advanced Configuration Chapter 3 Log •• Type Select Incoming Log, Outgoing Log, Security Log or DHCP Client Log. •• Log The Incoming Log displays a temporary log of the source IP addresses and destination port numbers for the incoming Internet traffic. The Outgoing Log displays a temporary log of the local IP addresses, destination URLs/IP addresses and service/ port numbers for the outgoing Internet traffic. The Security log displays the login information for the web-based utility.
Advanced Configuration Chapter 3 Administration > Firmware Upgrade The Firmware Upgrade screen allows you to upgrade the Router's firmware. Do not upgrade the firmware unless you are experiencing problems with the Router or the new firmware has a feature you want to use. Status > Router Administration > Firmware Upgrade NOTE: The Router may lose the settings you have customised. Before you upgrade its firmware, write down all of your custom settings.
Advanced Configuration Chapter 3 Status > Local Network The Local Network screen displays information about the local, wired network. DHCP Client Table The DHCP Client Table lists computers and other devices that have been assigned IP addresses by the Router. The list can be sorted by IP Address, MAC Address, Interface and Client Name. To remove a DHCP client, click Delete. To update the on-screen information, click Refresh. To exit this screen and return to the Local Network screen, click Close.
Troubleshooting Appendix A Appendix A: Troubleshooting Your computer cannot connect to the Internet. Follow these instructions until your computer can connect to the Internet: •• Make sure that the Router is switched on. The Power LED should be green and not flashing. •• If the Power LED is flashing, then switch off the power to all of your network devices, including the modem, Router and computers. Then switch the power back on to each device in the following order: •• 4. Click OK.
Appendix A Troubleshooting system settings. Click the Computer Name tab. The workgroup name is displayed.) If they differ, then change the workgroup name of the Router. Follow these instructions: 1. Access the web-based utility of the Router. (Refer to Chapter 3: Advanced Configuration, page 4.) 2. Click the Storage tab. 3. Click the Administration tab. 4. In the Workgroup field, enter the workgroup name of your computer. 5. Click Save Settings.
How to Install and Access USB Storage Appendix B Appendix B: How to Install and Access USB Storage NOTE: Another option is to use the IP address of the Router. In the Address field, enter the local IP address of the Router: \\xxx.xxx.xxx.xxx Overview This appendix explains how to do the following: •• connect and access a USB storage device •• map a shortcut to a USB storage device •• create a shared folder on a USB storage device (advanced users) The default setting is 192.168.1.1.
How to Install and Access USB Storage Appendix B NOTE: Another option is to use the IP address of the Router. In the Address field, enter the local IP address of the Router: 2. In the Address field, enter the server name of the Router: \\ \\xxx.xxx.xxx.xxx The default setting is 192.168.1.1. You can change this IP address on the Setup > Basic Setup screen; refer to Setup > Basic Setup, page 4. 3. Enter your account username and password.
How to Install and Access USB Storage Appendix B 4. From the Drive drop-down menu, select an available drive letter. Windows XP Map a Drive 1. On your desktop, double-click the My Computer icon. My Computer Icon NOTE: If the My Computer icon is not displayed, then go to Start > All Programs > Accessories > Windows Explorer. 2. In the Address field, enter the server name of the Router: Select Drive Letter \\ 5. Click Finish. Access Mapped Drive 1.
How to Install and Access USB Storage Appendix B 4. Right-click the folder you want to share and click Map Network Drive. (The default shared folder is named Public.) 2. In the Network Drives section, double-click the mapped drive to access it. Double-Click Mapped Drive Map Network Drive 5. From the Drive drop-down menu, select an available drive letter.
How to Install and Access USB Storage Appendix B Create a Shared Folder 1. Click the Storage tab. 2. Click the Disk tab. 6. Select the appropriate folder. To display sub-folders, click Enter into Folder. To return to the previous folder, click Return to Upper Folder. 7. To allow a group access to the shared folder, select it from the Available Groups column and then click the >> button. NOTE: Specify which user groups have readand-write or read-only access to the shared folders. 8.
How to Install and Access USB Storage Appendix B 4. In the Group Name field, create a name for the group. 5. In the Description field, enter keywords to describe the group. 6. From the Access drop-down menu, select the appropriate level of access: read and write or read only. 7. Click Create to apply your changes, or click Cancel to clear your changes. Click Close to exit the screen and return to the Administration screen. Create a User Account 1. Click the Storage tab. 2.
Specifications Appendix C Appendix C: Specifications Operating Temp. 0 to 40°C (32 to 104°F) Storage Temp. -20 to 60°C (-4 to 140°F) Model WRT160NL Storage Humidity Standards 802.3, 802.3u, 802.11b, 802.11g, Draft 802.
Appendix D Appendix D: Warranty Information Limited Warranty Linksys warrants that this Linksys hardware product will be substantially free of defects in materials and workmanship arising under normal use during the Warranty Period, which begins on the date of purchase by the original enduser purchaser and lasts for the period specified below: •• Two (2) years for new product •• Ninety (90) days for refurbished product This limited warranty is non-transferable and extends only to the original end-user pur
Appendix D Warranty Information at your cost and risk. You must include the RMA number and a copy of your dated proof of original purchase when returning your product. Products received without a RMA number and dated proof of original purchase will be rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge.
Regulatory Information Appendix E Appendix E: Regulatory Information FCC Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. Safety Notices WARNING: Do not use this product near water, for example, in a wet basement or near a swimming pool.
Appendix E Regulatory Information Industry Canada Statement Wireless Disclaimer This Class B digital apparatus complies with Canadian ICES-003 and RSS210. The maximum performance for wireless is derived from IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, data throughput rate, range and coverage.
Regulatory Information Appendix E Declaration of Conformity with Regard to EU Directive 1999/5/EC (R&TTE Directive) Nederlands [Dutch]: Dit apparaat voldoet aan de essentiele eisen en andere van toepassing zijnde bepalingen van de Richtlijn 1999/5/EC. Compliance Information for 2.
Regulatory Information Appendix E Wireless Equipment (Wireless-N/G/A/B Products) The following standards were applied during the assessment of the product against the requirements of the Directive 1999/5/EC: •• Radio: EN 300 328 and/or EN 301 893 as applicable •• EMC: EN 301 489-1, EN 301 489-17 •• Safety: EN 60950 and either EN 50385 or EN 50371 Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC) are required for operation in the 5 GHz band.
Regulatory Information Appendix E puissance PIRE de à 100 mW (20 dBm) maximum. Consultez http://www.arcep.fr/ pour de plus amples détails. Applicable Power Levels in France Frequency Band (MHz) Power Level (EIRP), (mW) Indoor Outdoor 2400-2454 100 (20 dBm) X X 2454-2483,5 100 (20 dBm) X 2454-2483,5 10 (10 dBm) X Italy This product meets the National Radio Interface and the requirements specified in the National Frequency Allocation Table for Italy.
Appendix E User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix E Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix E Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix E Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenščina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Appendix F Appendix F: Software End User Licence Agreement Cisco Products This product from Cisco Systems, Inc. or its subsidiary licensing the Software instead of Cisco Systems, Inc. (“Cisco”) contains software (including firmware) originating from Cisco and its suppliers and may also contain software from the open source community. Any software originating from Cisco and its suppliers is licensed under the Cisco Software Licence Agreement contained in Schedule 1 below.
Appendix F of the Software or its related Documentation, or electronically transfer the Software or Documentation from one computer to another or over a network; (ii) alter, merge, modify, adapt, decrypt or translate the Software or related Documentation, or decompile, reverse engineer, disassemble, or otherwise reduce the Software to a humanperceivable form (except to the extent expressly permitted by law notwithstanding this provision); (iii) share, sell, rent, lease, or sublicense the Software or relate
Appendix F In addition, Cisco may collect and store detailed information regarding your network configuration and usage for the purpose of providing you technical networking support. The information is associated with you only when you provide a unique ID number to the support representative while you are receiving help. The unique ID is generated randomly on your computer upon installation and is completely under your control.
Appendix F either the Software or Documentation or both constitutes agreement by the Government that the Software and Documentation are “commercial computer software” and “commercial computer software documentation,” and constitutes acceptance of the rights and restrictions herein. General Terms. This Agreement will be governed by and construed in accordance with the laws of the State of California, without reference to conflict of laws principles.
Appendix F Everyone is permitted to copy and distribute verbatim copies of this licence document, but changing it is not allowed. Preamble The licences for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licence is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.
Appendix F c. If the modified program normally reads commands interactively when run, you must cause it, when it has started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions and telling the user how to view a copy of this Licence.
Appendix F 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this Licence, they do not excuse you from the conditions of this Licence.
Appendix F GNU LESSER GENERAL PUBLIC LICENCE This is an unofficial translation of the GNU Lesser General Public Licence into [language]. It was not published by the Free Software Foundation and does not legally state the distribution terms for software that uses the GNU LGPL— only the original English text of the GNU LGPL does that. However, we hope that this translation will help [language] speakers understand the GNU LGPL better. Version 2.
Appendix F In other cases, permission to use a particular library in nonfree programs enables a greater number of people to use a large body of free software. For example, permission to use the GNU C Library in non-free programs enables many more people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system.
Appendix F Software End User Licence Agreement permissions for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it. Library), rather than a "work that uses the library". The executable is therefore covered by this Licence. Section 6 states terms for distribution of such executables.
Appendix F Software End User Licence Agreement b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user's computer system, rather than copying library functions into the executable and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with. 8.
Appendix F software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this Licence. 12.
Appendix F The OpenSSL toolkit stays under a dual licence, i.e. both the conditions of the OpenSSL Licence and the original SSLeay licence apply to the toolkit. See below for the actual licence texts. Actually both licences are BSD-style Open Source licences. In case of any licence issues related to OpenSSL please contact openssl-core@openssl.org. OpenSSL Licence Copyright © 1998-2007 The OpenSSL Project. All rights reserved.
Appendix F Software End User Licence Agreement BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.