USER GUIDE Dual-Band Wireless-N Gigabit Router Model: WRT320N
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This tick indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
Table of Contents Chapter 1: Product Overview 4 Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Placement Positions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents Appendix D: Regulatory Information 33 FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Safety Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Industry Canada Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys Dual-band Wireless-N Gigabit Router. The Router lets you access the Internet via a wireless connection or through one of its four switched ports. You can also use the Router to share resources, such as computers. A variety of security features help to protect your data and your privacy while online. Security features include WPA2 security, a Stateful Packet Inspection (SPI) firewall and NAT technology.
Product Overview Chapter 1 Wall-Mounting Placement Follow these instructions: The Router has two wall-mount slots on its bottom panel. The distance between the slots is 152 mm (6 inches). 1. Determine where you want to mount the Router. Make sure that the wall you use is smooth, flat, dry and sturdy. Also make sure the location is within reach of an electrical socket. Two screws are needed to mount the Router. 2. Drill two holes into the wall. Make sure the holes are 152 mm (6 inches) apart.
Wireless Security Checklist Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your mobile or cordless phones, signals from your wireless network can also be intercepted.
Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you'd like to change its advanced settings, use the Router's web-based utility. This chapter describes each web page of the utility and each page's key functions. You can access the utility via a web browser on a computer connected to the Router.
Advanced Configuration Chapter 3 Static IP If you are required to use a permanent IP address to connect to the Internet, select Static IP. your Internet connection terminates. The default Max Idle Time is 15 minutes. Keep Alive: Redial Period If you select this option, the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re-establish your connection. To use this option, select Keep Alive.
Advanced Configuration Chapter 3 inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again. To use this option, select Connect on Demand. In the Max Idle Time field, enter the number of minutes you want to elapse before your Internet connection terminates. The default Max Idle Time is 15 minutes. Keep Alive: Redial Period If you select this option, the Router will periodically check your Internet connection.
Advanced Configuration Chapter 3 MTU MTU is the Maximum Transmission Unit. It specifies the largest packet size permitted for Internet transmission. Select Manual if you want to manually enter the largest packet size that is transmitted. To have the Router select the best MTU for your Internet connection, keep the default setting, Auto. DHCP Reservation You will see a list of DHCP clients with the following information: Client Name, Interface, IP Address and MAC Address.
Advanced Configuration Chapter 3 Client Lease Time The Client Lease Time is the amount of time a network user will be allowed connection to the Router with their current dynamic IP address. Enter the amount of time, in minutes, that the user will be "leased" this dynamic IP address. After the time is up, the user will be automatically assigned a new dynamic IP address. The default is 0 minutes, which means one day. DynDNS.
Advanced Configuration Chapter 3 Clone My PC's MAC Click this button to clone the MAC address of the computer you are using. TZO.com Click Save Settings to apply your changes or click Cancel Changes to cancel your changes. Setup > Advanced Routing This screen is used to set up the Router's advanced functions. Operating Mode allows you to select the type(s) of advanced functions you use. Dynamic Routing automatically adjusts how packets travel on your network.
Advanced Configuration Chapter 3 Route Entries To set up a static route between the Router and another network, select a number from the dropdown list. Click Delete This Entry to delete a static route. Enter Route Name Enter a name for the Route here, using a maximum of 25 alphanumeric characters. Wi-Fi Protected Setup. Proceed to the "Wi-Fi Protected Setup" section.
Advanced Configuration Chapter 3 Router's SSID, keep the default setting, Enabled. If you do not want to broadcast the Router's SSID, then select Disabled. Click Save Settings to apply your changes or click Cancel Changes to cancel your changes. Wi-Fi Protected Setup There are three methods available. Use the method that applies to the client device you are configuring. Method #3 Use this method if your client device asks for the Router's PIN number. 1. Enter the PIN number listed on this screen.
Advanced Configuration Chapter 3 Security Mode > WPA Personal Security Mode > WPA Enterprise Passphrase Enter a Passphrase of 8-63 characters. Key Renewal Enter a Key Renewal period, which instructs the Router how often it should change the encryption keys. The default Group Key Renewal period is 3600 seconds. WPA2 Personal RADIUS Server Enter the IP Address of the RADIUS server. RADIUS Port Enter the port number of the RADIUS server. The default value is 1812.
Advanced Configuration Chapter 3 Key Renewal Enter a Key Renewal period, which instructs the Router how often it should change the encryption keys. The default Key Renewal period is 3600 seconds. RADIUS This option features WEP used in co-ordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router). Security Mode > WEP Encryption Select a level of WEP encryption, 40/64 bits (10 hex digits) or 104/128 bits (26 hex digits).
Advanced Configuration Chapter 3 Wireless MAC Filter Enabled/Disabled To filter wireless users by MAC Address, either permitting or blocking access, select Enabled. If you do not wish to filter users by MAC Address, keep the default setting, Disabled. Access Restriction Prevent Select this to block wireless access by MAC Address. This option is selected by default. Permit Select this to allow wireless access by MAC Address. This option is not selected by default.
Advanced Configuration Chapter 3 connection speed between the Router and a wireless client. The default is Auto. N Transmission Rate The rate of data transmission should be set depending on the speed of your Wireless-N networking. You can select from a range of transmission speeds or you can select Auto to have the Router automatically use the fastest possible data rate and enable the Auto-Fallback feature.
Advanced Configuration Chapter 3 sites created using this programming language. Select this feature to enable Java filtering. Deselect the feature to allow Java usage. ActiveX ActiveX is a programming language for websites. If you deny ActiveX, you run the risk of not having access to Internet sites created using this programming language. Select this feature to enable ActiveX filtering. Deselect the feature to allow ActiveX usage.
Advanced Configuration Chapter 3 Status Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu and select Enabled. To create a policy, follow steps 1-11. Repeat these steps to create additional policies, one at a time. 1. Select a number from the Access Policy drop-down menu. 2. Enter a Policy Name in the field provided. 3. To enable this policy, select Enabled. 4. Click Edit List to select which PCs will be affected by the policy.
Chapter 3 External Port Enter the external port number used by the server or Internet application. Check with the Internet application documentation for more information. Internal Port Enter the internal port number used by the server or Internet application. Check with the Internet application documentation for more information. Protocol Select the protocol used for this application, either TCP or UDP or Both.
Advanced Configuration Chapter 3 Triggered Range For each application, enter the starting and ending port numbers of the triggered port number range. Check with the Internet application documentation for the port number(s) needed. address in the field provided. To retrieve this information, click DHCP Client Table. Forwarded Range For each application, enter the starting and ending port numbers of the forwarded port number range.
Advanced Configuration Chapter 3 WMM Support If you have other devices that support WiFi Multimedia (WMM) on your network, keep the default Enabled. Otherwise, select Disabled. No Acknowledgement If you want to disable the Router's Acknowledgement feature, so the Router will not re-send data if an error occurs, then select Enabled. Otherwise, keep the default, Disabled. Internet Access Priority can range from 1 to 65535. Check your application's documentation for details on the service ports used.
Advanced Configuration Chapter 3 Voice Device QoS > Voice Device Enter a Name Enter a name for your voice device. MAC Address Enter the MAC address of your voice device. Priority Select the appropriate priority: (Recommend), Medium, Normal or Low. High Click Add to save your changes. Your new entry will appear in the Summary list. Administration > Management Summary This lists the QoS entries you have created for your applications and devices.
Advanced Configuration Chapter 3 Remote Upgrade If you want to be able to upgrade the Router remotely, from outside the local network, select Enabled. (You must have the Remote Management feature enabled as well). Otherwise, keep the default, Disabled. Administration > Log The Router can keep logs of all traffic for your Internet connection. Allowed Remote IP Address If you want to be able to access the Router from any external IP address, select Any IP Address.
Advanced Configuration Chapter 3 Administration > Diagnostics Traceroute Test The diagnostic tests (Ping and Traceroute) allow you to check the connections of your network devices, including connection to the Internet. This screen also allows you to reset the router. The Traceroute test tests the performance of a connection. IP or URL Address Enter the address of the PC whose connection you wish to test. Start to Traceroute To run the test, click this button.
Advanced Configuration Chapter 3 Administration > Firmware Upgrade The Firmware Upgrade screen allows you to upgrade the Router's firmware. Do not upgrade the firmware unless you are experiencing problems with the Router or the new firmware has a feature you want to use. Status > Router Administration > Firmware Upgrade NOTE: The Router may lose the settings you have customised. Before you upgrade its firmware, write down all of your custom settings.
Advanced Configuration Chapter 3 DHCP Client Table The DHCP Client Table lists computers and other devices that have been assigned IP addresses by the Router. The list can be sorted by Client Name, Interface, IP Address, MAC Address and Expired Time (how much time is left for the current IP address). To remove a DHCP client, click Delete. To retrieve the most up-todate information, click Refresh. To exit this screen and return to the Local Network screen, click Close.
Troubleshooting Appendix A Appendix A: Troubleshooting Your computer cannot connect to the Internet. Follow these instructions until your computer can connect to the Internet: •• Make sure that the Router is powered on. The Power LED should be green and not flashing. •• If the Power LED is flashing, then power-off all of your network devices, including the modem, Router and computers. Then power-on each device in the following order: •• 1. Cable or DSL modem 2. Router 3.
Specifications Appendix B Appendix B: Specifications Model WRT320N Standards Draft 802.11n, 802.11a, 802.11g, 802.11b, 802.3, 802.3u, 802.3ab Ports Power, Internet, and Ethernet Buttons Reset, Wi-Fi Protected Setup LEDs Ethernet (1-4), Wi-Fi Protected Setup, Wireless, Internet, Power Cabling Type CAT 5e Number of Antennas 3 RF Pwr (EIRP) in dBm 17 dBm Antenna Gain in dBi Main Antenna*: 1.5 dBi Third Antenna: 2.
Appendix C Appendix C: Warranty Information Limited Warranty Linksys warrants that this Linksys hardware product will be substantially free of defects in materials and workmanship arising under normal use during the Warranty Period, which begins on the date of purchase by the original enduser purchaser and lasts for the period specified below: •• Two (2) years for new product •• Ninety (90) days for refurbished product This limited warranty is non-transferable and extends only to the original end-user pur
Appendix C Warranty Information and a copy of your dated proof of original purchase when returning your product. Products received without a RMA number and dated proof of original purchase will be rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge.
Appendix D Appendix D: Regulatory Information FCC Statement This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used according to the instructions, may cause harmful interference to radio communications.
Appendix D Regulatory Information Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, data throughput rate, range and coverage.
Regulatory Information Appendix D Declaration of Conformity with Regard to EU Directive 1999/5/EC (R&TTE Directive) Nederlands [Dutch]: Dit apparaat voldoet aan de essentiele eisen en andere van toepassing zijnde bepalingen van de Richtlijn 1999/5/EC. Compliance Information for 2.
Regulatory Information Appendix D Wireless Equipment (Wireless-N/G/A/B Products) The following standards were applied during the assessment of the product against the requirements of the Directive 1999/5/EC: •• Radio: EN 300 328 and/or EN 301 893 as applicable •• EMC: EN 301 489-1, EN 301 489-17 •• Safety: EN 60950 and either EN 50385 or EN 50371 Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC) are required for operation in the 5 GHz band.
Regulatory Information Appendix D France Product Usage Restrictions For 2,4 GHz, the product should not be used outdoors in the band 2454 - 2483,5 MHz. There are no restrictions when used in other parts of the 2,4 GHz band when used indoors. Check http://www.arcep.fr/ for more details. This product is designed for indoor usage only. Outdoor usage is not recommended, unless otherwise noted. Pour la bande 2,4 GHz, l’ équipement ne doit pas être utilisé en extérieur dans la bande 2454 - 2483,5 MHz.
Appendix D User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix D Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix D Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix D Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenčina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Appendix E Appendix E: Software Licence Agreement Software in Linksys Products This product from Cisco-Linksys LLC or from one of its affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or CiscoLinksys K.K. ("Linksys") contains software (including firmware) originating from Linksys and its suppliers and may also contain software from the open source community. Any software originating from Linksys and its suppliers is licensed under the Linksys Software Licence Agreement contained at Schedule 1 below.
Software Licence Agreement Appendix E your Linksys product and/or the Software is being used in accordance with the terms of this Agreement; (iii) to provide improvements to the way Linksys delivers technology to you and to other Linksys customers; (iv) to enable Linksys to comply with the terms of any agreements it has with any third parties regarding your Linksys product and/or Software and/or (v) to enable Linksys to comply with all applicable laws and/or regulations or the requirements of any regulato
Appendix E Everyone is permitted to copy and distribute verbatim copies of this licence document, but changing it is not allowed. Preamble The licences for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licence is intended to guarantee your freedom to share and change free software–to make sure the software is free for all its users.
Appendix E c. If the modified program normally reads commands interactively when run, you must cause it, when it has started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions and telling the user how to view a copy of this Licence.
Software Licence Agreement Appendix E 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this Licence, they do not excuse you from the conditions of this Licence.
Appendix E GNU LESSER GENERAL PUBLIC LICENCE This is an unofficial translation of the GNU General Public Licence into [language]. It was not published by the Free Software Foundation and does not legally state the distribution terms for software that uses the GNU GPL— only the original English text of the GNU GPL does that. However, we hope that this translation will help [language] speakers understand the GNU GPL better. Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc.
Appendix E In other cases, permission to use a particular library in nonfree programs enables a greater number of people to use a large body of free software. For example, permission to use the GNU C Library in non-free programs enables many more people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system.
Appendix E them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this Licence, whose permissions for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it.
Appendix E a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable "work that uses the Library", as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library.
Appendix E 11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this Licence, they do not excuse you from the conditions of this Licence.
Appendix E Schedule 4 If this Linksys product contains open source software licensed under the OpenSSL licence: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/). This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Appendix E Software Licence Agreement 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes cryptographic software written by Eric Young (eay@cryptsoft.