USER GUIDE Simultaneous Dual-N Band Wireless Router Model: WRT610N
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
Table of Contents Chapter 1: Product Overview 3 Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Chapter 2: Wireless Security Checklist 5 General Network Security Guidelines . . . . . . . . . . . . . . . . . .
Table of Contents Appendix C: Specifications 41 Appendix D: Warranty Information 42 Limited Warranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Exclusions and Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Obtaining Warranty Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Dual-Band Wireless-N Gigabit Router with Storage Link. The Router lets you access the Internet via a wireless connection or through one of its four switched ports. With the built-in storage link, you can easily add gigabytes of storage space onto your network using USB 2.0 hard drives, or plug in a USB flash disk to access your portable data files.
Product Overview Chapter 1 Horizontal Placement Follow these instructions: The Router has four rubber feet on its bottom panel. Place the Router on a level surface near an electrical outlet. 1. Determine where you want to mount the Router. Make sure that the wall you use is smooth, flat, dry, and sturdy. Also make sure the location is within reach of an electrical outlet. 2. Drill two holes into the wall. Make sure the holes are 175.56 mm (6.91 inches) apart. 3.
Wireless Security Checklist Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted.
Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration Setup > Basic Setup The first screen that appears is the Basic Setup screen. This allows you to change the Router’s general settings. After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. If you’d like to change its advanced settings, use the Router’s webbased utility. This chapter describes each web page of the utility and each page’s key functions.
Advanced Configuration Chapter 3 Automatic Configuration - DHCP By default, the Router’s Internet Connection Type is set to Automatic Configuration - DHCP, which should be kept only if your ISP supports DHCP or you are connecting through a dynamic IP address. (This option usually applies to cable connections.) Internet Connection Type > Automatic Configuration - DHCP Static IP If you are required to use a permanent IP address to connect to the Internet, select Static IP.
Advanced Configuration Chapter 3 User Name and Password Enter the User Name and Password provided by your ISP. Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time). If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again.
Advanced Configuration Chapter 3 Network Setup The Network Setup section changes the settings on the network connected to the Router’s Ethernet ports. Wireless Setup is performed through the Wireless tab. Router Address This presents both the Router’s IP Address, Subnet Mask, and URL Address as seen by your network. The default Router IP address is 192.168.1.1 and URL address is http://WRT610N.com.
Advanced Configuration Chapter 3 When you finish your changes, click Save Settings to save your changes. Click Cancel Changes to cancel your changes. To view the most up-to-date information, click Refresh. To exit this screen, click Close. Time Setting Select the time zone in which your network functions from this drop-down menu. (You can even automatically adjust for daylight saving time.) Password Enter the Password for your DDNS account. Host Name The is the DDNS URL assigned by the DDNS service.
Advanced Configuration Chapter 3 Setup > MAC Address Clone Setup > Advanced Routing Every computere hardware device, including the network adapter of your computer has a unique code called a MAC address. Some Internet Service Providers (ISPs) require you to register this address with them in order to access the Internet.
Advanced Configuration Chapter 3 Gateway This is the IP address of the gateway device that allows for contact between the Router and the remote network or host. Interface This interface tells you whether the Destination IP Address is on the LAN & Wireless (Ethernet and wireless networks) or the WAN (Internet). Click Show Routing Table to view the Static Routes you have already set up. Routing Table Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes.
Advanced Configuration Chapter 3 Standard Channel (2.4 GHz) Select the channel for Wireless-B, Wireless-G and Wireless-N (2.4GHz) networking. If you selected Wide – 40MHz Channel for the Radio Band setting, then the Standard Channel will be a secondary channel for Wireless-N (2.4GHz). If you are not sure which channel to select, keep the default, Auto.
Advanced Configuration Chapter 3 Wireless > Wireless Security The Wireless Security settings configure the security of your wireless network. There are six wireless security mode options supported by the Router: WPA Personal, WPA Enterprise, WPA2 Personal, WPA2 Enterprise, RADIUS, and WEP. (WPA stands for Wi-Fi Protected Access, which is a security standard stronger than WEP encryption. WEP stands for Wired Equivalent Privacy, while RADIUS stands for Remote Authentication Dial-In User Service.
Advanced Configuration Chapter 3 Encryption WPA2 supports two encryption methods with dynamic encryption keys; AES or WPA-TKIP/WPA2AES. You must select WPA-TKIP or WPA2-AES to connect to the Router. Passphrase Enter a passphrase of 8-63 characters. RADIUS This option features WEP used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.
Advanced Configuration Chapter 3 WEP WEP is a basic encryption method that is not as secure as WPA. Wireless > Wireless MAC Filter Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network’s radius. WEP Encryption Select a level of WEP encryption, 64 bits 10 hex digits or 128 bits 26 hex digits. The default is 64 bits 10 hex digits. Passphrase Enter a Passphrase to automatically generate WEP keys. Then click Generate.
Advanced Configuration Chapter 3 Frame Burst Enabling this option should provide your network with greater performance, depending on the manufacturer of your wireless products. To use the Frame Burst option, select Enabled. The default is Disabled. Wireless Client List MAC XX Enter the MAC addresses of the devices whose wireless access you want to control. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes.
Advanced Configuration Chapter 3 Fragmentation Threshold This value specifies the maximum size for a packet before data is fragmented into multiple packets. If you experience a high packet error rate, you may slightly increase the Fragmentation Threshold. Setting the Fragmentation Threshold too low may result in poor network performance. Only minor reduction of the default value is recommended. In most cases, it should remain at its default value of 2346.
Advanced Configuration Chapter 3 Storage > Disk An external USB hard drive or USB disk must be connected to the USB Port of the Router to use the storage feature. The Disk screen describes the disk currently attached to the Router. Using this screen, you can format a blank disk, safely remove a disk, or erase a disk.
Advanced Configuration Chapter 3 Shared Folder Database Each Display Name you created on the Shared Folder screen will be listed with its partition and shared folder, which you can edit or delete. Select Edit to edit an item or Delete to delete the item. This section lets you select content to add to the database of the Router’s media server. Click Specify Folder to Scan to add a media folder to the Database table. If you click the Edit, the Shared Folder screen appears.
Advanced Configuration Chapter 3 Storage > FTP Server An external USB hard drive or USB disk must be connected to the USB Port of the Router to use the storage feature. The FTP Server tab creates an FTP Server that can be accessed from the Internet or your local network. Storage> FTP Server Setup Server Name The name of the Router’s FTP server is displayed here. It can be changed on the Storage > Administration screen.
Advanced Configuration Chapter 3 If you click Edit, the FTP Folder screen appears. Refer to the “FTP Folder Screen” section above. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. For more information, click Help. Storage > Administration The Administration screen allows you to manage the users and groups of users that can access the shares. User Management The available users are listed in the User Management table.
Advanced Configuration Chapter 3 Group Management Access Restrictions > Internet Access The groups are listed in the Group Management table. There are two default groups, Admin and Guest; these cannot be deleted. Click Create New Group to create a new group. The Access Restrictions > Internet Access screen allows you to deny or allow specific kinds of Internet usage and traffic, such as Internet access, designated services, and websites during specific days and times.
Advanced Configuration Chapter 3 4. Click Edit List of PCs to select which PCs will be affected by the policy. The List of PCs screen appears. You can select a PC by MAC Address or IP Address. You can also enter a range of IP Addresses if you want this policy to affect a group of PCs. After making your changes, click Save Settings to apply your changes or Cancel Changes to cancel your changes. Then click Close. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes.
Advanced Configuration Chapter 3 Applications and Gaming > Port Range Forwarding The Applications & Gaming > Port Range Forwarding screen allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized Internet applications. (Specialized Internet applications are any applications that use Internet access to perform functions such as videoconferencing or online gaming. Some Internet applications may not require any forwarding.
Advanced Configuration Chapter 3 Applications and Gaming > DMZ Applications and Gaming > QoS The DMZ feature allows one network computer to be exposed to the Internet for use of a special-purpose service such as Internet gaming or videoconferencing. DMZ hosting forwards all the ports at the same time to one PC. The Port Forward feature is more secure because it only opens the ports you want to have opened, while DMZ hosting opens all the ports of one computer, exposing the computer to the Internet.
Advanced Configuration Chapter 3 Category Online Games There are four categories available. Select one of the following: Applications, Online Games, MAC Address, Ethernet Port, or Voice Device. Proceed to the instructions for your selection. Applications Applications Select the appropriate application. If you select Add a New Application, follow the instructions in the “Add a New Application “section. Priority Select the appropriate priority: High, Medium, Normal, or Low.
Advanced Configuration Chapter 3 MAC Address Voice Device MAC Address Voice Device Enter a Name Enter a name for your device. Enter a Name Enter a name for your voice device. MAC Address Enter the MAC address of your device. MAC Address. Enter the MAC address of your voice device. Priority Select the appropriate priority: High, Medium, Normal, or Low. Click Add to save your changes. Your new entry will appear in the Summary list.
Advanced Configuration Chapter 3 Administration > Management The Administration > Management screen allows the network’s administrator to manage specific Router functions for access and security. Allowed Remote IP Address Select Any IP Address or manually enter an Internet IP address to allow remote access to the web-based utility from the Internet. Remote Management Port Enter the port number that will provide outside access to the Router’s web-based utility.
Advanced Configuration Chapter 3 When you wish to view the logs, click View Log. Traceroute Test Click Save the Log to save your log, click Refresh to refresh the screen, or click Clear to clear the screen. Traceroute To test the performance of a connection, click Traceroute to open the Traceroute Test screen. Enter the address of the PC whose connection you wish to test and click Traceroute. The Traceroute Test screen will show if the test was successful.
Advanced Configuration Chapter 3 Internet MAC Address This is the Router’s MAC Address, as seen by your ISP. Server Name This is the specific name that will be used for the network storage FTP and Media Server. You entered this name on the Storage > Administration tab. Host Name If required by your ISP, this would have been entered on the Setup tab. Domain Name If required by your ISP, this would have been entered on the Setup tab.
Advanced Configuration Chapter 3 End IP Address For the range of IP addresses used by devices on your local network, the ending IP address is shown here. DHCP Client Table Click DHCP Client Table to view the DHCP Client Table. It lists computers and other devices that have been assigned IP addresses by the Router. SSID Broadcast The status of the SSID Broadcast feature is displayed here. For more information, click Help. For more information, click Help.
Troubleshooting Appendix A Appendix A: Troubleshooting Your computer cannot connect to the Internet. Follow these instructions until your computer can connect to the Internet: •• Make sure that the Router is powered on. The Power LED should be green and not flashing. •• If the Power LED is flashing, then power off all of your network devices, including the modem, Router, and computers. Then power on each device in the following order: •• 1. Cable or DSL modem 2. Router 3.
How to Install and Access USB Storage Appendix B Appendix B: How to Install and Access USB Storage 3. Click Computers or people. Overview This appendix explains how to connect and access an external USB storage device. How to Install the USB Storage 1. Make sure your computer has a wired or wireless connection to the Router. 2. Connect an external USB hard drive or USB flash disk to the USB port of the Router. 3. Proceed to the next section, “How to Access the USB Storage”.
How to Install and Access USB Storage Appendix B 6. In the Name column, double-click Wrt610n. 9. To map the Default shared folder to your computer, right-click Default. Click Map Network Drive. Double-Click WRT610N 7. In the User name and Password fields enter the default User name and password, admin. If you want to change the password, see the Advanced Configuration section later in this Appendix. Click OK. Click Map Network Drive 10.
How to Install and Access USB Storage Appendix B 11. On your desktop, double-click My Computer. The Default shared folder of your USB storage is listed under Network Drives. 3. You will be notified if file sharing is turned off. Click the message. Click the Message Network Drive 4. Click Turn on network discovery and file sharing. To access your USB storage, double-click the Default shared folder. You can use the Default shared folder as another drive on your network.
How to Install and Access USB Storage Appendix B Double-click WRT610N listed in the Computer category (do not double-click WRT610N listed in the Network Infrastructure category). If you do not see the WRT610N listed in the Computer category, then enter the default server name, WRT610N in the Search field, and press the Enter key. See the Advanced Configuration section later in this Appendix for information on how to change the server name. Double-Click Default 8.
How to Install and Access USB Storage Appendix B 10. On your desktop, double-click My Computer. The Default shared folder of your USB storage is listed under Network Location. Password Screen How to Create a Shared Folder 1. Click the Storage tab. 2. Click the Disk tab. 3. To create a shared folder, click Create Share. Network Drive To access your USB storage, double-click the Default shared folder. You can use the Default shared folder as another drive on your network.
How to Install and Access USB Storage Appendix B How to Create a User Group 1. Click the Storage tab. 2. Click the Administration tab. 3. In the Group Management section, click Create New Group. Shared Folder Screen Display Name Enter a display name that will appear in the Shared Folder table of the Disk screen. Partion The name of the Partion to share, that you selected in the Shared Folder will appear here. Storage > Administration 4. The Group Account screen appears.
Appendix B 2. Click the Administration tab. 3. In the Information, Server Name field enter a new Server name. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Click Close to exit the screen. How to Install and Access USB Storage How to Create a User Account 1. Click the Storage tab. 2. Click the Administration tab. 3. In the User Management section, click Create New User. 4. The User Account screen appears. In the User Name field, enter a name for the new user.
Specifications Appendix C Appendix C: Specifications Antenna Gain in dBi 2.4GHz: RIFA 1 & RIFA 2 & RIFA 3 <= 4dBi (Typical) Model WRT610N UPnP Supported Standards Draft 802.11n, 802.11a, 802.11g, 802.11b, 802.3, 802.3u, 802.3ab Security Features WEP, WPA, WPA2 WEP Key Bits Up to 128-Bit Encryption Ports Power, Ethernet, Internet, USB Button Reset, Wi-Fi Protected Setup Environmental LEDs Power, USB, Internet, Wireless, WiFi Protected Setup,Ethernet (1-4) No.
Appendix D Appendix D: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which begins on the date of purchase by the original end-user purchaser and lasts for the period specified below: •• One (1) year for new product •• Ninety (90) days for refurbished product This limited warranty is non-transferable and extends only to the original end-user purchaser.
Appendix D Warranty Information rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
Regulatory Information Appendix E Appendix E: Regulatory Information for point-to-point and non point-to-point operation as appropriate, as stated in section A9.2(3). FCC Statement •• Caution: To reduce the risk of fire, use only No.26 AWG This device complies with Part 15 of the FCC Rules.
Regulatory Information Appendix E Restrictions in the 5 GHz Band The device for the band 5150-5250 MHz is only for indoor usage to reduce potential for harmful interference to co-channel mobile satellite systems. No. Antenna Type For 2.4 GHz Gain (dBi) For 5 GHz Gain (dBi) Antenna Connector 1 PIFA <=4 < = 3.5 NA 2 PIFA <=4 < = 3.5 NA 3 PIFA <=4 < = 3.5 NA en fonction de la capacité du réseau sans fil, du débit de la transmission de données, de la portée et de la couverture.
Appendix E User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix E Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix E Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix E Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenčina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Chapter Number Appendix F: Software License Agreement Software in Linksys Products This product from Cisco-Linksys LLC or from one of its affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or CiscoLinksys K.K. (“Linksys”) contains software (including firmware) originating from Linksys and its suppliers and may also contain software from the open source community. Any software originating from Linksys and its suppliers is licensed under the Linksys Software License Agreement contained at Schedule 1 below.
Software License Agreement Chapter Number used in accordance with the terms of this Agreement; (iii) to provide improvements to the way Linksys delivers technology to you and to other Linksys customers; (iv) to enable Linksys to comply with the terms of any agreements it has with any third parties regarding your Linksys product and/or Software and/or (v) to enable Linksys to comply with all applicable laws and/or regulations, or the requirements of any regulatory authority or government agency.
Chapter Number freedom to share and change free software–to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price.
Chapter Number c. If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License.
Software License Agreement Chapter Number 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
Chapter Number This product includes software written by Tim Hudson (tjh@cryptsoft.com). In addition, if this Linksys product contains open source software licensed under the OpenSSL license then the license terms below in this Schedule 3 will apply to that open source software. The license terms below in this Schedule 3 are from the public web site at http://www.openssl.org/source/license.html. The OpenSSL toolkit stays under a dual license, i.e.
Chapter Number Software License Agreement The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptographic related. 4. If you include any Windows specific code (or a derivative thereof ) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@ cryptsoft.