USER GUIDE Wireless-G Broadband Router with 2 Phone Ports Model: WRP400
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
Table of Contents Chapter 1: Product Overview 4 Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Side Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents Chapter 4: Interactive Voice Response Menu 36 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Menu Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Appendix A: Troubleshooting 37 Appendix B: Specifications 39 Appendix C: Warranty Information 41 Limited Warranty . . .
Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys Wireless-G Broadband Router with 2 Phone Ports. The Router lets you access the Internet via a wireless connection or through one of its four switched ports. You can also use the Router to share resources such as computers, printers and files. The built‑in phone adapter enables Voice-over-IP (VoIP) calls even while you are using the Internet.
Product Overview Chapter 1 Side Panel Vertical Placement The Router has a stand on the panel opposite to the antenna. Rotate the stand 90 degrees, and place the Router on a level surface near an electrical outlet. Reset There are two ways to reset the Router’s factory defaults. Either press and hold the Reset button for approximately ten seconds, or restore the defaults from the Administration > Factory Defaults screen of the Router’s web-based utility.
Product Overview Chapter 1 3. Insert a screw into each hole and leave 3 mm (0.12 inches) of its head exposed. 4. Maneuver the Router so two of the wall-mount slots line up with the two screws. 5. Place the wall-mount slots over the screws and slide the Router down until the screws fit snugly into the wall-mount slots. 60 mm Print this page at 100% size. Cut along the dotted line, and place on the wall to drill precise spacing.
Wireless Security Checklist Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted.
Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you’d like to change its advanced settings, use the Router’s web-based utility. This chapter describes each web page of the utility and each page’s key functions. You can access the utility via a web browser on a computer connected to the Router.
Advanced Configuration Chapter 3 Static IP If you are required to use a permanent IP address to connect to the Internet, select Static IP. this option, select Keep Alive. In the Redial Period field, you specify how often you want the Router to check the Internet connection. The default Redial Period is 30 seconds. PPTP Point-to-Point Tunneling Protocol (PPTP) is a service that applies to connections in Europe only.
Advanced Configuration Chapter 3 L2TP L2TP is a service that applies to connections in Europe and Israel. Internet Connection Type > L2TP Server IP Address This is the IP address of the L2TP Server. Enter the IP address provided by your service provider. User Name and Password Enter the User Name and Password provided by your service provider.
Advanced Configuration Chapter 3 Internet addresses or URLs. Enter the IP address of the DNS server, which is provided by your service provider. If you wish to use a different DNS server, enter its IP address in one of these fields. You can enter up to three DNS server IP addresses here. The Router will use these for quicker access to functioning DNS servers. By default, the Router uses 192.168.15.1 for DNS.
Advanced Configuration Chapter 3 Router with their current dynamic IP address. Enter the amount of time, in minutes, that the user will be “leased” this dynamic IP address. After the time is up, the user will be automatically assigned a new dynamic IP address. The default is 0 minutes, which means one day. Static DNS The Domain Name System (DNS) is how the Internet translates domain or website names into Internet addresses or URLs.
Advanced Configuration Chapter 3 Status The status of the DDNS service connection is displayed here. MAC Address Clone Update To manually trigger an update, click this button. Enabled/Disabled To have the MAC address cloned, select Enabled. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. MAC Address Enter the MAC address registered with your service provider here. TZO.
Advanced Configuration Chapter 3 NAT Enabled/Disabled If this Router is hosting your network’s connection to the Internet, keep the default, Enabled. If another router exists on your network, select Disabled. When the NAT setting is disabled, dynamic routing will be enabled. Dynamic Routing (RIP) Enabled/Disabled This feature enables the Router to automatically adjust to physical changes in the network’s layout and exchange routing tables with the other router(s).
Advanced Configuration Chapter 3 “Wi-Fi Protected Setup” section. To manually configure your wireless network, select Manual. Proceed to the “Wireless Network” section. NOTE: Wi-Fi Protected Setup is available for your primary wireless network (SSID1) only. To configure your second wireless network (SSID2), select Manual. If you are unable to configure the second wireless network, contact your service provider for more information (these settings may be controlled by your service provider).
Chapter 3 1. Enter the PIN number listed on this screen. (It is also listed on the label on the bottom of the Router.) 2. After the client device has been configured, click OK. Then refer back to your client device or its documentation for further instructions. The Wi-Fi Protected Setup Status, Network Name (SSID), Security, Encryption, and Passphrase are displayed at the bottom of the screen.
Advanced Configuration Chapter 3 Wireless Security Select a SSID Select the appropriate SSID. (If you enabled the second wireless network on the Basic Wireless Settings screen, then set up wireless security for each SSID.) WPA Algorithms WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. Select the type of algorithm, AES or TKIP + AES. The default is TKIP + AES. Security Mode WPA Shared Key Enter a WPA Shared Key of 8-63 characters.
Advanced Configuration Chapter 3 Key 1-4 If you did not enter a Passphrase, enter the WEP key(s) manually. TX Key Select which TX (Transmit) Key to use. The default is 1. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Wireless > Wireless MAC Filter Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network’s radius.
Advanced Configuration Chapter 3 MAC Address Filter List Advanced Wireless Wireless Client List Click this to open the Wireless Client List screen. Authentication Type The default is set to Auto, which allows either Open System or Shared Key authentication to be used. With Open System authentication, the sender and the recipient do NOT use a WEP key for authentication. With Shared Key authentication, the sender and recipient use a WEP key for authentication.
Advanced Configuration Chapter 3 Security > Firewall The Firewall screen is used to configure a firewall that can filter out various types of unwanted traffic on the Router’s local network. ActiveX ActiveX is a programming language for websites. If you deny ActiveX, you run the risk of not having access to Internet sites created using this programming language. Select this feature to enable ActiveX filtering. Deselect the feature to allow ActiveX usage.
Advanced Configuration Chapter 3 Summary Status Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu, and select Enabled. To create a policy, follow steps 1-11. Repeat these steps to create additional policies, one at a time. 1. Select a number from the Access Policy drop-down menu. 2. Enter a Policy Name in the field provided. 3. To enable this policy, select Enabled.
Chapter 3 Advanced Configuration 6. Decide which days and what times you want this policy to be enforced. Select the individual days during which the policy will be in effect, or select Everyday. Then enter a range of hours and minutes during which the policy will be in effect, or select 24 Hours. 7. You can block websites with specific URL addresses. Enter each URL in a separate URL field. 8. You can also block websites using specific keywords. Enter each keyword in a separate Keyword field. 9.
Chapter 3 Advanced Configuration that use Internet access to perform functions such as videoconferencing or online gaming. Some Internet applications may not require any forwarding.) Applications & Gaming > Port Range Triggering When users send these types of requests to your network via the Internet, the Router will forward those requests to the appropriate servers (computers).
Advanced Configuration Chapter 3 Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Applications and Gaming > QoS Quality of Service (QoS) ensures better service to high-priority types of network traffic, which may involve demanding, real-time applications, such as videoconferencing.
Advanced Configuration Chapter 3 select Manual, and enter the appropriate number in the field provided. Game Select the appropriate game. If you select Add a New Game, follow the Add a New Game instructions. Category Priority Select the appropriate priority: High, Medium (Recommend), Normal, or Low. There are four categories available. Select one of the following: Application, Online Games, MAC Address, or Ethernet Port. Proceed to the instructions for your selection.
Advanced Configuration Chapter 3 Ethernet Port QoS > Ethernet Port Ethernet Select the appropriate Ethernet port. Priority Select the appropriate priority: High, Medium (Recommend), Normal, or Low. Click Add to save your changes. Your new entry will appear in the Summary list. Summary This lists the QoS entries you have created for your applications and devices. Priority This column displays the bandwidth priority of High, Medium, Normal, or Low.
Advanced Configuration Chapter 3 Remote Access Multimedia Streaming Remote Management To permit remote access of the Router, from outside the local network, select Enabled. Otherwise, keep the default, Disabled. RTSP Support If you are experience issues with videoon-demand applications, select Enabled to improve multimedia transmissions. Using this option, the Router will establish channels with the Real Time Streaming Protocol) RTSP server, which is located at the service provider.
Advanced Configuration Chapter 3 View Log To view the logs, click View Log. Diagnostics Ping Test The Ping test checks the status of a connection. IP or URL Address Enter the address of the PC whose connection you wish to test. Packet Size Enter the packet size you want to use. The default is 32 bytes. Times to Ping Enter many times you wish to test it. Log > View Log Start to Ping To run the test, click this button. The Ping Test screen will show if the test was successful.
Advanced Configuration Chapter 3 Administration > Factory Defaults NOTE: Restoring factory defaults deletes custom settings. Note your custom settings before restoring the factory defaults. Diagnostics > Traceroute Detect Active LAN Client(s) Search Time Select how many seconds you wish to perform this search: 5, 10, or 15. Start to Search To run the search, click this button. The Active LAN Client Table screen will show the search results.
Advanced Configuration Chapter 3 Administration > Username & Password NOTE: The Router may lose the settings you have customized. Before you upgrade its firmware, use the Config Management screen to back up the Router’s settings. Refer to the Administration > Config Management section for more information. Firmware Upgrade Before upgrading the firmware, download the Router’s firmware upgrade file from the Linksys website, www.linksys.com. Then extract the file.
Advanced Configuration Chapter 3 Current Time The time set on the Router is displayed. Internet MAC Address The Router’s MAC address, as seen by your service provider, is displayed. Router Name The name of the Router is displayed. Host Name If required by your service provider, this was entered on the Basic Setup screen. End IP Address For the range of IP addresses used by devices on your local network, the ending IP address is displayed.
Advanced Configuration Chapter 3 Wireless Network 1-2 Status information for each wireless network is displayed. Wireless MAC Address The wireless MAC address of the Router’s local, wireless interface is displayed. Network Name (SSID) The network name, which is also called the SSID, is displayed. Security The wireless security method is displayed. SSID Broadcast The status of the SSID Broadcast feature is displayed. Access to the Voice Screens There are two level of access, user and Admin Login.
Chapter 3 Advanced Configuration Elapsed Time The amount of time elapsed since the last reboot of the Router is displayed. Call 1/2 Encoder The codec used for encoding is displayed. RTP Packets Sent The number of RTP packets sent by the Router is displayed. Call 1/2 Decoder The codec used for decoding is displayed. RTP Bytes Sent The number of RTP bytes sent by the Router is displayed. Call 1/2 FAX The status of the fax pass-through mode is displayed.
Advanced Configuration Chapter 3 Voice > System Call Forward Settings The System screen displays the User Password setting. Enter the call forwarding numbers you want to use. Cfwd All Dest Enter the number for the Call Forward All Service feature (when you want to forward all calls). Cfwd Busy Dest Enter the number for the Call Forward Busy feature (when the line is busy). Cfwd No Ans Dest Enter the number for the Call Forward No Answer feature (when the line is not answered).
Chapter 3 Advanced Configuration Dist Ring Setting Select whether you want to use the Distinctive Ring feature, yes or no. The default is yes. Message Waiting Select whether you want to use the Message Waiting feature, yes or no. The default is no. Distinctive Ring Settings Ring1-8 Caller Enter the caller number pattern to play Distinctive Ring/Call Waiting Tone (1-8). Ring Settings Default Ring Select the default ringing pattern for all callers. The default is 1.
Interactive Voice Response Menu Chapter 4 Chapter 4: Interactive Voice Response Menu Overview This chapter explains how to use the Interactive Voice Response (IVR) Menu to configure the Router’s network settings. Use your telephone’s keypad to enter your commands and select choices, and the Router will use voice responses. Action Command Choices Description **** Use this command to enter the IVR Menu. Ignore Special Information Tones (SITs) or other tones until you hear, “Configuration menu.
Troubleshooting Appendix A Appendix A: Troubleshooting Your computer cannot connect to the Internet. When you are on an Internet phone call, words are dropped intermittently. Follow these instructions until your problem is solved: •• If you are using the Router’s wireless function and a cordless phone, they may be using the same frequency and may interfere with each other. Move the cordless phone farther away from the Router.
Appendix A When you double-click the web browser, you are prompted for a username and password. If you want to get rid of the prompt, follow these instructions. Launch the web browser and perform the following steps (these steps are specific to Internet Explorer but are similar for other browsers): 1. Select Tools > Internet Options. 2. Click the Connections tab. Troubleshooting You cannot configure the settings for the second wireless network because the SSID2 settings are grayed out.
Specifications Appendix B Appendix B: Specifications IP Multicast / IGMP v1, v2, v3/ IGMP Proxy Voice Features Voice Algorithms G.711 (a-law and µ-law) Model WRP400 G.726 (16/24/32/40 kbps) * Note: Many specifications are programmable within a defined range or list of options. Please see the SPA ATA Administration Guide for details. The target configuration profile is uploaded to the WRP400 at the time of provisioning. G.729 AB G.723.1 (6.3 kbps, 5.
Specifications Appendix B Physical Interfaces 4 100Base-T RJ-45 Ethernet Port (IEEE 802.3) 2 RJ-11 FXS Phone Ports - For Analog Circuit Telephone Device USB 2.0 (reserved for future use via firmware upgrade) Buttons Reset, WPS Subscriber Line Interface Circuit (SLIC) Ring Voltage: 40-90 Vpk Ring Frequency: 20 to 25Hz Ring Waveform: Trapezoidal with 1.2 to 1.
Appendix C Appendix C: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which begins on the date of purchase by the original end-user purchaser and lasts for the period specified below: •• One (1) year for new product •• Ninety (90) days for refurbished product This limited warranty is non-transferable and extends only to the original end-user purchaser.
Appendix C Warranty Information of original purchase (if applicable) when returning your product. Products received without a RMA number and dated proof of original purchase (if applicable) will be rejected. Do not include any other items with the product you are returning. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge.
Appendix D Appendix D: Regulatory Information FCC Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules.
Appendix D Avis d’Industrie Canada Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. L’utilisation de ce dispositif est autorisée seulement aux conditions suivantes : 1. il ne doit pas produire de brouillage et 2. il doit accepter tout brouillage radioélectrique reçu, même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif.
Regulatory Information Appendix D Declaration of Conformity with Regard to EU Directive 1999/5/EC (R&TTE Directive) Nederlands [Dutch]: Dit apparaat voldoet aan de essentiele eisen en andere van toepassing zijnde bepalingen van de Richtlijn 1999/5/EC.
Regulatory Information Appendix D The following standards were applied during the assessment of the product against the requirements of the Directive 1999/5/EC: •• Radio: EN 300 328 and/or EN 301 893 as applicable •• EMC: EN 301 489-1, EN 301 489-17 •• Safety: EN 60950 and either EN 50385 or EN 50371 Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC) are required for operation in the 5 GHz band. DFS: The equipment meets the DFS requirements as defined in ETSI EN 301 893.
Regulatory Information Appendix D France Product Usage Restrictions For 2,4 GHz, the product should not be used outdoors in the band 2454 - 2483,5 MHz. There are no restrictions when used in other parts of the 2,4 GHz band when used indoors. Check http://www.arcep.fr/ for more details. This product is designed for indoor usage only. Outdoor usage is not recommended, unless otherwise noted. Pour la bande 2,4 GHz, l’ équipement ne doit pas être utilisé en extérieur dans la bande 2454 - 2483,5 MHz.
Appendix D User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix D Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix D Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix D Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenčina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Appendix E Appendix E: Software License Agreement Software in Linksys Products This product from Cisco-Linksys LLC or from one of its affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or CiscoLinksys K.K. (“Linksys”) contains software (including firmware) originating from Linksys and its suppliers and may also contain software from the open source community. Any software originating from Linksys and its suppliers is licensed under the Linksys Software License Agreement contained at Schedule 1 below.
Software License Agreement Appendix E used in accordance with the terms of this Agreement; (iii) to provide improvements to the way Linksys delivers technology to you and to other Linksys customers; (iv) to enable Linksys to comply with the terms of any agreements it has with any third parties regarding your Linksys product and/or Software and/or (v) to enable Linksys to comply with all applicable laws and/or regulations, or the requirements of any regulatory authority or government agency.
Appendix E freedom to share and change free software–to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price.
Appendix E c. If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License.
Software License Agreement Appendix E 4. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
Appendix E This product includes software written by Tim Hudson (tjh@cryptsoft.com). In addition, if this Linksys product contains open source software licensed under the OpenSSL license then the license terms below in this Schedule 3 will apply to that open source software. The license terms below in this Schedule 3 are from the public web site at http://www.openssl.org/source/license.html. The OpenSSL toolkit stays under a dual license, i.e.
Appendix E Software License Agreement The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptographic related. 1. If you include any Windows specific code (or a derivative thereof ) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@ cryptsoft.