USER GUIDE Simultaneous Dual-Band Wireless-N Router Model: WRT400N
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
Table of Contents Chapter 1: Product Overview 1 Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 2: Wireless Security Checklist 3 General Network Security Guidelines . . . . . . . . . . . . . . . . . .
Table of Contents Appendix D: Regulatory Information 30 FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 FCC Radiation Exposure Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Safety Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys by Cisco Simultaneous Dual-Band Wireless-N Router. The Router lets you access the Internet via a wireless connection or through one of its four switched ports. You can also use the Router to share resources, such as computers. For more wireless bandwidth, the Router can create two simultaneous yet separate Wireless-N networks, one using the 5 GHz band and one using the 2.4 GHz band. For example, use the Wireless-N 2.
Product Overview Chapter 1 Horizontal Placement Follow these instructions: The Router has four rubber feet on its bottom panel. Place the Router on a level surface near an electrical outlet. 1. Determine where you want to mount the Router. Make sure that the wall you use is smooth, flat, dry, and sturdy. Also make sure the location is within reach of an electrical outlet. 2. Drill two holes into the wall. Make sure the holes are 152 mm (6 inches) apart. 3.
Wireless Security Checklist Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted.
Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration Setup > Basic Setup The first screen that appears is the Basic Setup screen. This allows you to change the Router’s general settings. After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. If you’d like to change its advanced settings, use the Router’s webbased utility. This chapter describes each web page of the utility and each page’s key functions.
Advanced Configuration Chapter 3 Automatic Configuration - DHCP By default, the Router’s Internet Connection Type is set to Automatic Configuration - DHCP, which should be kept only if your ISP supports DHCP or you are connecting through a dynamic IP address. (This option usually applies to cable connections.) Internet Connection Type > Automatic Configuration - DHCP Static IP If you are required to use a permanent IP address to connect to the Internet, select Static IP.
Advanced Configuration Chapter 3 Default Gateway Your ISP will provide you with the Gateway Address, which is the ISP server’s IP address. before your Internet connection terminates. The default Max Idle Time is 5 minutes DNS Your ISP will provide you with at least one DNS (Domain Name System) Server IP Address. Keep Alive: Redial Period If you select this option, the Router will periodically check your Internet connection.
Advanced Configuration Chapter 3 •• PPPoE: 1492 •• PPTP or L2TP: 1460 Network Setup The Network Setup section changes the settings on the network connected to the Router’s Ethernet ports. Wireless Setup is performed through the Wireless tab. Router Address This presents both the Router’s IP Address, Subnet Mask, and URL Address as seen by your network. The default Router IP address is 192.168.1.1, and the default URL address is http://wrt400n.com.
Advanced Configuration Chapter 3 When you finish your changes, click Save Settings to save your changes. Click Cancel Changes to cancel your changes. To view the most up-to-date information, click Refresh. To exit this screen, click Close. Time Setting Select the time zone in which your network functions from this drop-down menu. (You can even automatically adjust for daylight saving time.) Time Setting Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes.
Advanced Configuration Chapter 3 Update To manually trigger an update, click Update. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Setup > MAC Address Clone Every computer hardware device, including the network adapter of your computer has a unique code called a MAC address. Some Internet Service Providers (ISPs) require you to register this address with them in order to access the Internet.
Advanced Configuration Chapter 3 join the 2.4 GHz network. Wireless-A devices support only the 5 GHz band, so they should join the 5 GHz network. Routing Table For the 5 GHz network, configure all computers and other wireless devices with the same 5 GHz Network Name (SSID) and wireless security settings. For the 2.4 GHz network, configure all computers and other wireless devices with the same 2.4 GHz Network Name (SSID) and wireless security settings.
Advanced Configuration Chapter 3 Channel Width (5 GHz) For best performance in a network using Wireless-A and Wireless-N (5 GHz) devices, keep the default, Auto (20MHz or 40MHz). For a channel width of 40 MHz, select 40MHz only. For a channel width of 20 MHz, select 20MHz only. Wi-Fi Protected Setup There are three methods available. Use the method that applies to the client device you are configuring. Channel Width (2.
Advanced Configuration Chapter 3 Method #3 Use this method if your client device asks for the Router’s PIN number. 1. Enter the PIN number listed on this screen. (It is also listed on the label on the bottom of the Router.) 2. After the client device has been configured, click the OK button. Then refer back to your client device or its documentation for further instructions. The Wi-Fi Protected Setup Status, Network Name (SSID), Security, and Passphrase are displayed at the bottom of the screen.
Advanced Configuration Chapter 3 Key Renewal Enter a Key Renewal period, which instructs the Router how often it should change the encryption keys. The default Key Renewal period is 3600 seconds. WPA2 Personal You must select WPA-TKIP or WPA2-AES to connect to the Router. RADIUS Server Enter the IP Address of the RADIUS server. RADIUS Port Enter the port number of the RADIUS server. The default value is 1812. Shared Key Enter the key shared between the Router and the server.
Advanced Configuration Chapter 3 Shared Key Enter the key shared between the Router and the server. Encryption Select a level of WEP encryption, 64 bits 10 hex digits or 128 bits 26 hex digits. The default is 64 bits 10 hex digits. Passphrase Enter a Passphrase to automatically generate WEP keys. Then click Generate. Key 1-4 If you did not enter a Passphrase, enter the WEP key(s) manually. Tx Key Select a key from the drop-down menu. WEP WEP is a basic encryption method that is not as secure as WPA.
Advanced Configuration Chapter 3 AP Isolation This isolates all wireless clients and wireless devices on your network from each other. Wireless devices will be able to communicate with the Router but not with each other. To use this function, select Enabled. AP Isolation is disabled by default. Wireless Client List MAC XX Enter the MAC addresses of the devices whose wireless access you want to control. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes.
Advanced Configuration Chapter 3 Threshold. Setting the Fragmentation Threshold too low may result in poor network performance. Only minor reduction of the default value is recommended. In most cases, it should remain at its default value of 2346. RTS Threshold Should you encounter inconsistent data flow, only minor reduction of the default value, 2347, is recommended. If a network packet is smaller than the preset RTS threshold size, the RTS/CTS mechanism will not be enabled.
Advanced Configuration Chapter 3 Access Restrictions > Internet Access The Access Restrictions > Internet Access screen allows you to deny or allow specific kinds of Internet usage and traffic, such as Internet access, designated services, and websites during specific days and times. 4. Click Edit List of PCs to select which computers will be affected by the policy. The List of PCs screen appears. You can select a computer by MAC Address or IP Address.
Chapter 3 Advanced Configuration Applications and Gaming > Single Port Forwarding Applications and Gaming > Port Range Forwarding The Single Port Forwarding screen allows you to customize port services for common applications. The Applications & Gaming > Port Range Forwarding screen allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized Internet applications.
Advanced Configuration Chapter 3 Applications & Gaming > Port Triggering Applications and Gaming > DMZ The Applications & Gaming > Port Triggering screen allows the Router to watch outgoing data for specific port numbers. The IP address of the computer that sends the matching data is remembered by the Router, so that when the requested data returns through the Router, the data is pulled back to the proper computer by way of IP address and port mapping rules.
Advanced Configuration Chapter 3 Applications and Gaming > QoS Category Quality of Service (QoS) ensures better service to high-priority types of network traffic, which may involve demanding, real-time applications, such as videoconferencing. There are four categories available. Select one of the following: Applications, Online Games, MAC Address, Ethernet Port, or Voice Device. Proceed to the instructions for your selection. Applications Applications Select the appropriate application.
Advanced Configuration Chapter 3 Online Games MAC Address Online Games MAC Address Games Enter a Name Enter a name for your device. Games Select the appropriate game. If you select Add a New Game, follow the instructions in the “Add a New Game section”. MAC Address Enter the MAC address of your device. Priority Select the appropriate priority: High, Medium, Normal, or Low. Click Apply to save your changes. Your new entry will appear in the Summary list.
Advanced Configuration Chapter 3 Click Apply to save your changes. Your new entry will appear in the Summary list. Voice Device Administration > Management The Administration > Management screen allows the network’s administrator to manage specific Router functions for access and security. Administration > Management Voice Device Enter a Name Enter a name for your voice device. Router Password MAC Address. Enter the MAC address of your voice device.
Advanced Configuration Chapter 3 Allowed Remote IP Address Select Any IP Address or manually enter an Internet IP address to allow remote access to the web-based utility from the Internet. Remote Management Port Enter the port number that will provide outside access to the Router’s web-based utility. You will need to enter the Router’s password when accessing the Router this way, as usual. UPnP UPnP Keep the default, Enabled, to enable the UPnP feature; otherwise, select Disabled.
Advanced Configuration Chapter 3 Traceroute Test Traceroute To test the performance of a connection, click Start to Traceroute to open the Traceroute Test screen. Enter the address of the computer whose connection you wish to test and click Traceroute. The Traceroute Test screen will show if the test was successful. Click Close to return to the Diagnostics screen. Administration > Firmware Upgrade Before upgrading the firmware, download the Router’s firmware upgrade file from the Linksys website, www.
Advanced Configuration Chapter 3 Internet MAC Address This is the Router’s MAC Address, as seen by your ISP. Server Name This is the specific name that will be used for the network storage FTP and Media Server. You entered this name on the Storage > Administration tab. Host Name If required by your ISP, this would have been entered on the Setup tab. End IP Address For the range of IP addresses used by devices on your local network, the ending IP address is displayed.
Troubleshooting Appendix A Appendix A: Troubleshooting Your computer cannot connect to the Internet. Follow these instructions until your computer can connect to the Internet: •• Make sure that the Router is powered on. The Power LED should be green and not flashing. •• If the Power LED is flashing, then power off all of your network devices, including the modem, Router, and computers. Then power on each device in the following order: •• 1. Cable or DSL modem 2. Router 3.
Specifications Appendix B Appendix B: Specifications Model WRT400N Standards Draft 802.11n, 802.11a, 802.11g, 802.11b, 802.3, 802.3u Ports Power, Ethernet, Internet Button Reset, Wi-Fi Protected Setup LEDs Power, Internet, Wireless, Wi-Fi Protected Setup, Ethernet (1-4) Storage Temp. -20 to 70°C (-4 to 158°F) Operating Humidity 10 to 85%, Noncondensing Storage Humidity 5 to 90% Noncondensing Specifications are subject to change without notice.
Appendix C Appendix C: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which begins on the date of purchase by the original end-user purchaser and lasts for the period specified below: •• One (1) year for new product •• Ninety (90) days for refurbished product This limited warranty is non-transferable and extends only to the original end-user purchaser.
Appendix C Warranty Information rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
Regulatory Information Appendix D Appendix D: Regulatory Information FCC Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules.
Appendix D Avis d’Industrie Canada Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. L’utilisation de ce dispositif est autorisée seulement aux conditions suivantes : 1. il ne doit pas produire de brouillage et 2. il doit accepter tout brouillage radioélectrique reçu, même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif.
Appendix D User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix D Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix D Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix D Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenščina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Appendix E Appendix E: Software End User License Agreement Cisco Products This product from Cisco Systems, Inc. or its subsidiary licensing the Software instead of Cisco Systems, Inc. (“Cisco”) contains software (including firmware) originating from Cisco and its suppliers and may also contain software from the open source community. Any software originating from Cisco and its suppliers is licensed under the Cisco Software License Agreement contained at Schedule 1 below.
Appendix E of the Software or its related Documentation, or electronically transfer the Software or Documentation from one computer to another or over a network; (ii) alter, merge, modify, adapt, decrypt or translate the Software or related Documentation, or decompile, reverse engineer, disassemble, or otherwise reduce the Software to a human-perceivable form (except to the extent expressly permitted by law notwithstanding this provision); (iii) share, sell, rent, lease, or sublicense the Software or relat
Appendix E In addition, Cisco may collect and store detailed information regarding your network configuration and usage for the purpose of providing you technical networking support. The information is associated with you only when you provide a unique ID number to the support representative while you are receiving help. The unique ID is generated randomly on your computer upon installation and is completely under your control.
Appendix E either the Software or Documentation or both constitutes agreement by the Government that the Software and Documentation are “commercial computer software” and “commercial computer software documentation,” and constitutes acceptance of the rights and restrictions herein. General Terms. This Agreement will be governed by and construed in accordance with the laws of the State of California, without reference to conflict of laws principles.
Appendix E freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price.
Appendix E c. If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License.
Appendix E 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
Appendix E GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.
Appendix E freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a “work based on the library” and a “work that uses the library”. The former contains code derived from the library, whereas the latter must be combined with the library in order to run.
Appendix E Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library. In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3.
Appendix E Software End User License Agreement b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user’s computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with. 8.
Appendix E software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 12.
Appendix E The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org. OpenSSL License Copyright © 1998-2007 The OpenSSL Project. All rights reserved.
Appendix E Software End User License Agreement BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.