USER GUIDE BUSINESS SERIES Wireless-G VPN Router with RangeBooster Model: WRV200 v
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. Open Source This product may contain material licensed to you under the GNU General Public License or other open-source software licenses.
Table of Contents Chapter 1: Introduction 1 Chapter 2: Planning Your Wireless Network 2 Network Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Ad-Hoc versus Infrastructure Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Network Layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents VPN > VPN Passthrough . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 VPN > IPSec VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 VPN > VPN Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 QoS . . . . . . . . . . . . . . . . . . . . .
Table of Contents Step 4: Assign New IPSec Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Step 5: Create a Tunnel Through the Web-Based Utility . . . . . . . . . . . . . . . . . . 48 Appendix E: Gateway-to-Gateway VPN Tunnel 49 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Before You Begin . . . . . . . .
Chapter 1 Introduction Chapter 1: Introduction Thank you for choosing the Wireless-G VPN Router with RangeBooster. The WRV200 is a VPN router with a Wireless-G access point for small offices and home offices. The 10/100 Ethernet WAN interface connects directly to your broadband DSL or Cable modem. For the LAN interface, there is a built-in 4-port, full-duplex 10/100 Ethernet switch that can connect up to four devices. The wireless AP supports 802.
Chapter 2 Chapter 2: Planning Your Wireless Network Network Topology A wireless local area network (WLAN) is exactly like a regular local area network (LAN), except that each computer in the WLAN uses a wireless device to connect to the network. Computers in a WLAN share the same frequency channel and SSID, which is an identification name shared by the wireless devices belonging to the same wireless network.
Chapter 3 Chapter 3: Planning Your Virtual Private Network (VPN) Why do I need a VPN? Computer networking provides a flexibility not available when using an archaic, paper-based system. With this flexibility, however, comes an increased risk in security. This is why firewalls were first introduced. Firewalls help to protect data inside of a local network.
Chapter 3 Planning Your Virtual Private Network (VPN) The VPN Router creates a “tunnel” or channel between two endpoints, so that data transmissions between them are secure. A computer with the Linksys VPN client software can be one of the two endpoints (refer to “Appendix B: Using Linksys QuickVPN for Windows 2000, XP, or Vista”).
Chapter 4 Chapter 4: Product Overview Product Overview Back Panel The Router’s ports and Reset button are located on the back panel of the Router. Front Panel The Router’s LEDs are located on the front panel of the Router. Back Panel POWER The Power port is where you will connect the AC power cable. Front Panel RESET The Reset button has two functions. • If pressed for one second, the Reset POWER (Green) The Power LED lights up when the Router is powered on.
Chapter 5 Chapter 5: Configuring the Wireless-G VPN Router Configuring the Wireless-G Router • Advanced Wireless Settings. For advanced users, you can alter data transmission settings on this screen. • WDS. This tab is used for Wireless Distribution System (WDS). Firewall Overview • General. On this screen, you can configure a variety of Linksys recommends using the Setup CD-ROM for firsttime installation of the Router.
Chapter 5 • Diagnostics. Use this screen to check the connection between the Router and a PC. • Factory Default. If you want to restore the Router’s factory defaults, then use this screen. • Firmware Upgrade. Click this tab if you want to upgrade the Router’s firmware. • Reboot. Use this to restart the Router. Status • Router. This screen provides status information about the Router. • Local Network. This provides status information about the local network. • Wireless.
Chapter 5 Configuring the Wireless-G Router available features will differ depending on what kind of connection type you select. The connection types are: • Automatic Configuration - DHCP • Static IP PPPoE • PPPoE User Name and Password/Confirm Password Enter the User Name and Password provided by your ISP. Then, enter the password again to confirm it.
Chapter 5 Configuring the Wireless-G Router User Name and Password Enter the User Name and Password provided by your ISP. seconds of inactivity that must elapse before your Internet connection is terminated automatically. Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time), and then automatically re-establish the connection as soon as you attempt to access the Internet again.
Chapter 5 Configuring the Wireless-G Router assigns an IP address to each PC on your network. Unless you already have one, it is highly recommended that you leave the Router enabled as a DHCP server. Automatically Select your time zone from the Time Zone drop-down menu. If you want to enable the Auto Daylight Savings feature, click Enabled. Local DHCP Server DHCP is already enabled by factory default. If you already have a DHCP server on your network, set the Router’s DHCP option to Disabled.
Chapter 5 DDNS If your DDNS service is provided by DynDNS.org, then select DynDNS.org in the drop-down menu. If your DDNS service is provided by TZO, then select TZO.com. The features available on the DDNS screen will vary, depending on which DDNS service provider you use. DynDNS.org Configuring the Wireless-G Router Status The status of the DDNS service connection is displayed here.
Chapter 5 Setup > Advanced Routing Configuring the Wireless-G Router Delete This Entry If you need to delete a route, select its number from the drop-down menu, and click Delete This Entry. Enter Router Name Enter the name of your Router. Setup > Advanced Routing The Setup > Advanced Routing screen allows you to configure the dynamic and static routing settings. Operation Mode Select Gateway or Router from the drop-down menu.
Chapter 5 Wireless The Wireless tab is used to configure the Router’s wireless network settings. Wireless > Basic Wireless Settings The basic settings for wireless networking are configured on this screen. Configuring the Wireless-G Router It specifically supports priority tagging and queuing. Click the WMM check box to enable WMM. Wireless Channel Select the appropriate channel from the drop-down menu.
Chapter 5 Configuring the Wireless-G Router server’s IP address. Select TKIP or AES from the WPA Algorithms drop-down menu. Enter the RADIUS server’s port number, along with the Shared Secret key, which is the key shared between the Router and the server. Last, enter the Key Renewal period, which instructs the Router how often it should change the encryption keys.
Chapter 5 Renewal period, which instructs the Router how often it should change the encryption keys. When you have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to undo your changes. For help information, click More. WPA2 Personal Mixed WPA2 Personal Mixed gives you either WPA-Personal (TKIP) or PSK2 (AES) encryption. Enter a Shared Secret of 8-63 characters.
Chapter 5 using 64-bit WEP encryption, the key must be exactly 10 hexadecimal characters in length. If you are using 128-bit WEP encryption, the key must be exactly 26 hexadecimal characters in length. Valid hexadecimal characters are “0” to “9” and “A” to “F”. When you have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to undo your changes. For help information, click More. Configuring the Wireless-G Router Changes to undo your changes.
Chapter 5 Wireless > Advanced Wireless Settings Configuring the Wireless-G Router to catch all Wireless-G transmissions but will severely decrease performance. Beacon Interval The default value is 100. Enter a value between 1 and 65,535 milliseconds. The Beacon Interval value indicates the frequency interval of the beacon. A beacon is a packet broadcast by the Router to synchronize the wireless network.
Chapter 5 This tab is used for Wireless Distribution System (WDS). WDS will ONLY work with SSID1. Make sure that the channel and security settings are the same for all WDS enabled devices. WDS allows a wireless signal to be repeated by a repeater. This mode allows a wireless client to connect to the Router through a repeater, such as WAP54GP or WAP54GPE, when operating in the Repeater Mode. This mode allows you to extend the coverage of the Router by using up to three repeaters.
Chapter 5 The Port Forwarding screen sets up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized Internet applications. (Specialized Internet applications are any applications that use Internet access to perform functions such as videoconferencing or online gaming. Some Internet applications may not require any forwarding.) When users send this type of request to your network via the Internet, the Router will forward those requests to the appropriate PC.
Chapter 5 Configuring the Wireless-G Router Firewall > Access Restriction Firewall > URL Filtering The Access Restriction screen allows you to block or allow specific kinds of Internet usage and traffic during specific days and times. URL filtering is used to block access to specific sites on the Internet. Firewall > URL Filtering To create a URL filtering policy: Firewall > Access Restriction Internet Access Policy Access can be managed by a policy.
Chapter 5 Configuring the Wireless-G Router Certificate Management This section allows you to manage the certificate used for securing the communication between the router and QuickVPN clients. Generate Click this button to generate a new certificate to replace the existing certificate on the router. VPN > VPN Client Access User Name Enter a name for the VPN client. Password Enter a password for the VPN client. Re-enter to confirm Enter the password again to confirm it.
Chapter 5 PPTP PassThrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be tunneled through an IP network. PPTP Passthrough is enabled by default. To disable it, select Disabled. L2TP PassThrough Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the Internet on the Layer 2 level. L2TP Passthrough is enabled by default. To disable L2TP Passthrough, select Disabled.
Chapter 5 the VPN will terminate at the Router, instead of the PC; or Any, to allow any computer to access the tunnel. The screen will change depending on the selected option. The options are described below. • Subnet Enter the IP Address and Mask of the remote VPN router in the fields provided. To allow access to the entire IP subnet, enter 0 for the last set of IP Addresses (e.g., 192.168.1.0). • IP Addr. Enter the IP Address of the remote VPN router. The Mask will be displayed.
Chapter 5 DPD will issue DPD packets (ISAKMP format) to query a remote peer, and wait for a reply to recognize that it is still alive. There are 3 auxiliary options: Detection Delay(s), Detection Timeout(s), and DPD Action for DPD. Detection Delay(s) You can indicate the interval between DPD query packets. The default value is 30 seconds. Detection Timeout(s) You can indicate the length of timeout when DPD cannot hear any DPD reply. The default value is 120 seconds.
Chapter 5 Detail Each Tunnel has a Detail button. This button will become available when a Tunnel Status reveals a “C”, “T”, “Any”, and “ NAT-T”. When you press the Detail button, a “VPN Advanced Tunnel Information” screen appears. This feature provides more detailed information for advanced configuration and management. VPN Advanced Tunnel Information will show Advanced Tunnel Information and Remote Security Gateway.
Chapter 5 according to its priority value. If you select High for the specific port, the packets received from this port would be put into High Priority Queue. Flow Control When this feature is enabled, the wired LAN ports will exchange control packets with the connected port before sending packets. If the other end is not able to process more packets, it will send a pause frame and a sending port will hold the packets. Ingress Rate This setting lets the user choose the input data rate for a port.
Chapter 5 SNMP SNMP, Simple Network Management Protocol, is a network protocol that provides network administrators with the ability to monitor the status of the Router and receive notification of any critical events as they occur on the network. To enable SNMP, check the Enabled box. To configure SNMP, complete all fields on this screen. To disable the SNMP agent, remove the checkmark.
Chapter 5 Administration > Diagnostics The Administration > Diagnostics screen allows you to check the connections of your network components. Configuring the Wireless-G Router click Stop. Click Clear Log to clear the screen. Click Close to return to the Administration > Diagnostics screen. For help information, click More.
Chapter 5 Configuring the Wireless-G Router NOTE: The Router will lose all of the settings you have customized. Before you upgrade its firmware, write down all of your custom settings. After you upgrade its firmware, you will have to re-enter all of your configuration settings. Before upgrading the firmware, download the Router’s latest firmware upgrade file from www.linksys.com. Then extract the file to your PC, and perform the steps below.
Chapter 5 Status > Local Network The Status > Local Network screen displays information about the local network. Configuring the Wireless-G Router Click Refresh to update the on-screen information. For help information, click More. Status > Wireless The Status > Wireless screen displays status information about your wireless network. Status > Local Network Local Network Local MAC Address The MAC Address of the Router’s LAN (local area network) interface is displayed here.
Chapter 5 Configuring the Wireless-G Router Bytes Received The number of bytes received is shown here. Bytes Sent The number of bytes sent is shown here. Error Packets Received The number of error packets received is displayed here. Dropped Packets Received The number of dropped packets received is displayed here. Click Refresh to update the on-screen information. For help information, click More.
Appendix A Appendix A: Troubleshooting This appendix provides solutions to problems that may occur during the installation and operation of the Router. Read the descriptions below to help solve your problems. If you can’t find an answer here, check the Linksys website at www.linksys.com. I need to set a static IP address on a PC. The Router, by default, assigns an IP address range of 192.168.1.100 to 192.168.1.149 using the DHCP server on the Router.
Appendix A b. Click the Network and Internet Connections icon and then the Network Connections icon. c. Right-click the Local Area Connection associated with your Ethernet adapter, and click Properties. d. In the This connection uses the following items box, select Internet Protocol (TCP/IP) and click Properties. Make sure that Obtain an IP address automatically and Obtain DNS server address automatically are selected. 2. Open a command prompt: a. Windows 2000 and XP: Click Start and Run.
Appendix A Troubleshooting number used in the VPN IP address), the Router will have difficulties routing information to the right location. If you change the Router’s IP address to 192.168.2.1, that should solve the problem. Change the Router’s IP address through the Setup tab of the Web-based Utility. If you assigned a static IP address to any computer or network device on the network, you need to change its IP address accordingly to 192.168.2.Y (Y being any number from 1 to 254).
Appendix A the Router will send the data to whichever PC or network device you set for DMZ hosting.) Follow these steps to set DMZ hosting: 1. Access the Router’s Web-based Utility by going to http://192.168.1.1 or the IP address of the Router. Go to the Firewall -> Port Forwarding tab. 2. Disable the entries you have entered for forwarding. Troubleshooting For Netscape 4.7 or higher: 1. Start Netscape Navigator, and click Edit, Preferences, Advanced, and Proxies. 2.
Appendix A DSL users, it is strongly recommended to use MTU 1492. If you are having difficulties, perform the following steps: 1. To connect to the Router, go to the web browser, and enter http://192.168.1.1 or the IP address of the Router. Troubleshooting When I enter a URL or IP address, I get a time-out error or am prompted to retry. • Check if other PCs work. If they do, ensure that your workstation’s IP settings are correct (IP Address, Subnet Mask, Default Gateway, and DNS).
Appendix A in one network cannot see the computers in the remote network from Windows Explorer. The WRV200 does not support NetBIOS Broadcast over a Gateway-to-Gateway IPSec VPN tunnel. To access the computers or shared drives on the remote network, users are advised to use the IP address to identify the resource. Troubleshooting Does the Router support ICQ send file? Yes, with the following fix: click ICQ menu => preference => connections tab=>, and check I am behind a firewall or proxy.
Appendix A Troubleshooting setting is disabled in the browser. Check our website at www.linksys.com for more information. If DMZ Hosting is used, does the exposed user share the public IP with the Router? If all else fails in the installation, what can I do? No. Reset the Router by holding down the Reset button for ten seconds. Reset your cable or DSL modem by powering the unit off and then on. Obtain and flash the latest firmware release that is readily available on the Linksys website, www.linksys.
Appendix B Appendix B: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted.
Appendix C Using Linksys QuickVPN for Windows 2000, XP, or Vista Appendix C: Using Linksys QuickVPN for Windows 2000, XP, or Vista Go to the Start menu and then click Run. In the field provided, enter D:\VPN_Client.exe (if “D” is the letter of your CD-ROM drive). 2. The License Agreement screen appears. Click Yes to accept the agreement and the appropriate files are copied to the computer.
Appendix C Using Linksys QuickVPN for Windows 2000, XP, or Vista Using the Linksys QuickVPN Software 1. Double-click the Linksys QuickVPN software icon on your desktop or in the system tray. QuickVPN Desktop Icon QuickVPN Tray Icon— No Connection 2. The QuickVPN Login screen will appear. In the Profile Name field, enter a name for your profile. In the User Name and Password fields, enter the User Name and Password that were assigned to you.
Appendix C Using Linksys QuickVPN for Windows 2000, XP, or Vista Distributing Certificates to QuickVPN Users The following explains how to export a certificate from the WRV200 for distribution to QuickVPN users, as well as how to install the certificate on the QuickVPN users’ PCs. 1. Generate the Certificate as follows: a. Log on to the Web-based Utility. b. Select VPN, then VPN Client Access. c. Click Generate to generate a new certificate. d. Click Export for Client and save the certificate as a .
Appendix D Configuring IPSec with a Windows 2000 or XP Computer Appendix D: Configuring IPSec with a Windows 2000 or XP Computer How to Establish a Secure IPSec Tunnel Step 1: Create an IPSec Policy 1. Click Start, select Run, and type secpol.msc in the Open field. The Local Security Settings screen appears. Introduction This appendix explains how to establish a secure IPSec tunnel using preshared keys to join a private network inside the Router and a Windows 2000 or XP computer.
Appendix D Configuring IPSec with a Windows 2000 or XP Computer 2. Make sure the IP Filter List tab is selected. Click Add. mask 255.255.255.0. (These are the Router’s default settings. If you have changed these settings, enter your new values.) 5. If you want to enter a description for your filter, click the Description tab and enter the description there. 6. Click OK. Then, click OK or Close in the IP Filter List window. Filter List 2: router -> win IP Filter List Tab 7.
Appendix D Configuring IPSec with a Windows 2000 or XP Computer 2. Click the Filter Action tab, and click the filter action Require Security radio button. Then, click Edit. Filters Properties 10. If you want to enter a description for your filter, click the Description tab and enter the description there. 11. Click OK or Close and the New Rule Properties screen appears with the IP Filter List tab selected. The screen will contain listings for Router->win and win->Router.
Appendix D Configuring IPSec with a Windows 2000 or XP Computer Connection Type Tab Preshared Key Tunnel 2: Router->win 6. This new Preshared key will be displayed. Click the Apply button to continue, if it appears on your screen; otherwise, proceed to the next step. 9. In the new policy’s Properties screen, make sure that win -> Router is selected and deselect the Use Add Wizard check box. Then, click Add to create the second IP filter. New Preshared Key Properties Screen 7.
Appendix D Configuring IPSec with a Windows 2000 or XP Computer Filter Action Tab New Preshared Key 12. Click the Authentication Methods tab, and verify that the authentication method Kerberos is selected. Then, click Edit. 15. Click the Tunnel Setting tab. Click the radio button The tunnel endpoint is specified by this IP Address, and enter the Windows 2000/XP computer’s IP Address. Authentication Methods Tab Tunnel Setting Tab 13.
Appendix D Configuring IPSec with a Windows 2000 or XP Computer Step 4: Assign New IPSec Policy In the IP Security Policies on Local Machine window, rightclick the policy named to_Router, and click Assign. A green arrow appears in the folder icon. the Tunnel Name field. This is to allow you to identify multiple tunnels and does not have to match the name used at the other end of the tunnel. Set the NATTraversal option to Disabled. 5.
Appendix E Gateway-to-Gateway VPN Tunnel Appendix E: Gateway-to-Gateway VPN Tunnel Overview This appendix explains how to configure an IPSec VPN tunnel between two VPN Routers by example. Two computers are used to test the liveliness of the tunnel. Configuration of the WRV200 Follow these instructions for the first VPN Router, designated WRV200. The other VPN Router is designated the RV082. 1. Launch the web browser for a networked computer, designated PC 1. 2. Access the web-based utility of the WRV200.
Appendix E Gateway-to-Gateway VPN Tunnel 12. Click Save Settings and proceed to the next section, “Configuration of the RV082.” Configuration of the RV082 Follow similar instructions for the RV082. 1. Launch the web browser for a networked computer, designated PC 2. 2. Access the web-based utility of the RV082. (Refer to the User Guide of the RV082 for details.) 3. Click the IPSec VPN tab. RV082 IPSec Setup Settings 4. Click the Gateway to Gateway tab. 12. Click Save Settings. 5.
Appendix E Gateway-to-Gateway VPN Tunnel Configuration when the Remote Gateway Uses a Dynamic IP Address This example assumes the Remote Gateway is using a dynamic IP address. If the Remote Gateway uses a static IP address, refer to “Configuration when the Remote Gateway Uses a Static IP.” WRV200 IPSec VPN Settings RV082 WRV200 Dynamic IP: B.B.B.B with Domain Name: www.abc.com LAN: 192.168.1.1 WAN: A.A.A.A LAN: 192.168.5.1 8. For the Remote Secure Group Type, select Subnet.
Appendix E For the Local Security Group Type, select Subnet. Enter the RV082’s local network settings in the IP Address and Subnet Mask fields. Gateway-to-Gateway VPN Tunnel IP address, refer to “Configuration when the Remote Gateway Uses a Dynamic IP.” RV082 WRV200 Dynamic IP: B.B.B.B with Domain Name: www.abc.com LAN: 192.168.1.1 Dynamic IP: A.A.A.A with Domain Name: www.xyz.com LAN: 192.168.5.1 RV082 VPN Settings 8. For the Remote Security Gateway Type, select IP address.
Appendix E Gateway-to-Gateway VPN Tunnel 8. For the Remote Secure Group Type, select Subnet. Enter the RV082’s local network settings in the IP Address and Mask fields. 9. For the Remote Secure Gateway Type, select FQDN. Enter the RV082’s domain name in the field provided. 10. In the Key Management section, select the appropriate encryption, authentication, and other key management settings. 11. In the Preshared Key field, enter a string for this key, for example, test1234. RV082 VPN Settings 8.
Appendix F Appendix F: Glossary This glossary contains some basic networking terms you may come across when using this product. Glossary DMZ (Demilitarized Zone) Removes the Router’s firewall protection from one PC, allowing it to be “seen” from the Internet. DNS (Domain Name Server) The IP address of your ISP’s server, which translates the names of websites into IP addresses. Domain A specific name for a network of computers. WEB: For additional terms, please visit the glossary at www.linksys.
Appendix F Glossary IPSec (Internet Protocol Security) A VPN protocol used to implement secure exchange of packets at the IP layer. Router A networking device that connects multiple networks together. ISP (Internet Service Provider) A company that provides access to the Internet. Server Any computer whose function in a network is to provide user access to files, printing, communications, and other services. LAN The computers and networking products that make up your local network.
Appendix F Glossary URL (Uniform Resource Locator) The address of a file located on the Internet. VPN (Virtual Private Network) A security measure to protect data as it leaves one network and goes to another over the Internet. WAN (Wide Area Network) Networks that cover a large geographical area. WEP (Wired Equivalent Privacy) A method of encrypting network data transmitted on a wireless network for greater security.
Appendix G Specifications Appendix G: Specifications Specifications Adjustable Power Yes Model WRV200 Antenna Gain 2 dBi Standards IEEE802.11g, IEEE802.11b, IEEE802.3, IEEE802.3u, 802.1x (Security Authentication), 802.11i-Ready (Security WPA2), 802.11e-Ready (Wireless QoS) Receiver Sensitivity 802.11.g: 54 Mbps @ -69 dBm (typical), 802.11.b: 11 Mbps @ -82 dBM (typical) Ports One Power port (12V 1A), Four 10/100 RJ-45 LAN ports, One 10/100 RJ-45 Internet port Wireless QoS WMM. 802.
Appendix G Specifications Routing Static and RIP v1, v2 Environmental Dimensions WxHxD 6.69" x 1.65" x 7.62” (170 x 42 x 193.5 mm) Unit Weight 0.78 lb (0.355 kg) Power 12V 1A Certification FCC Class B, CE, IC Operating Temp. 32 to 104ºF (0 to 40ºC) Storage Temp.
Appendix H Appendix H: Warranty Information Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which begins on the date of purchase by the original end-user purchaser and lasts for the period specified for this product at www.linksys.com/warranty. The internet URL address and the web pages referred to herein may be updated by Linksys from time to time; the version in effect at the date of purchase shall apply.
Appendix H Warranty Information original purchase when returning your product. Products received without a RMA number and dated proof of original purchase will be rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge.
Appendix I Regulatory Information Appendix I: Regulatory Information Safety Notices • Caution: To reduce the risk of fire, use only No.26 AWG or larger telecommunication line cord. FCC Statement • Do not use this product near water, for example, in a wet basement or near a swimming pool. This device complies with Part 15 of the FCC Rules.
Appendix I Avis d’Industrie Canada Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. L’utilisation de ce dispositif est autorisée seulement aux conditions suivantes : 1. il ne doit pas produire de brouillage et 2. il doit accepter tout brouillage radioélectrique reçu, même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif. Le dispositif a été conçu pour fonctionner avec une antenne ayant un gain maximum de 2 dBi.
Appendix I User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix I Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix I Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix I Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenčina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Appendix J Contact Information Appendix J: Contact Information Linksys Contact Information Website http://www.linksys.com Support Site http://www.linksys.com/support FTP Site ftp.linksys.com Advice Line 800-546-5797 (LINKSYS) Support 800-326-7114 RMA (Return Merchandise http://www.linksys.com/warranty Authorization) NOTE: Details on warranty and RMA issues can be found in the Warranty section of this Guide.