Linksys WRT400N User Manual
Linksys WRT400N User Manual

Linksys WRT400N User Manual

Linksys wrt400n network router user manual
Hide thumbs Also See for WRT400N:
Table of Contents

Advertisement

USER GUIDE
Simultaneous Dual-Band
Wireless-N Router
WRT400N
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WRT400N

  • Page 1 USER GUIDE Simultaneous Dual-Band Wireless-N Router WRT400N Model:...
  • Page 2: About This Guide

    Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco, and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2009 Cisco Systems, Inc. All rights reserved.
  • Page 3: Table Of Contents

    Chapter 1: Product Overview Front Panel..........1 Back Panel .
  • Page 4 Appendix D: Regulatory Information FCC Statement ..........30 FCC Radiation Exposure Statement .
  • Page 5: Chapter 1: Product Overview

    Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys by Cisco Simultaneous Dual-Band Wireless-N Router. The Router lets you access the Internet via a wireless connection or through one of its four switched ports. You can also use the Router to share resources, such as computers.
  • Page 6 Note: Mounting hardware illustrations are not † true to scale. NOTE: Linksys is not responsible for damages incurred by insecure wall-mounting hardware. Print this page at 100% size. Cut along the dotted line, and place on the wall to drill precise spacing.
  • Page 7: Chapter 2: Wireless Security Checklist

    3. Enable MAC address filtering Linksys routers give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device.
  • Page 8: Chapter 3: Advanced Configuration

    How to Access the Web-Based Utility To access the web-based utility, launch the web browser on your computer, and enter the Router’s default IP address, 192.168.1.1 or http://wrt400n.com in the Address field. Then, press Enter. A password request screen will appear. (Non-Windows XP users will see a similar screen.) Leave the User name field...
  • Page 9 Chapter 3 Automatic Configuration - DHCP By default, the Router’s Internet Connection Type is set to Automatic Configuration - DHCP, which should be kept only if your ISP supports DHCP or you are connecting through a dynamic IP address. (This option usually applies to cable connections.) Internet Connection Type >...
  • Page 10 Chapter 3 Default Gateway Your ISP will provide you with the Gateway Address, which is the ISP server’s IP address. Your ISP will provide you with at least one DNS (Domain Name System) Server IP Address. Server IP Address Your ISP will provide you with the Server IP Address.
  • Page 11 This presents both the Router’s IP Address, Subnet Mask, and URL Address as seen by your network. The default Router IP address is 192.168.1.1, and the default URL address is http://wrt400n.com. Router IP Address Network Address Server Settings (DHCP) The settings allow you to configure the Router’s Dynamic Host Configuration Protocol (DHCP) server function.
  • Page 12 Chapter 3 When you finish your changes, click Save Settings to save your changes. Click Cancel Changes to cancel your changes. To view the most up-to-date information, click Refresh. To exit this screen, click Close. Time Setting Select the time zone in which your network functions from this drop-down menu.
  • Page 13: Setup > Mac Address Clone

    Chapter 3 Update To manually trigger an update, click Update. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Setup > MAC Address Clone Every computer hardware device, including the network adapter of your computer has a unique code called a MAC address.
  • Page 14: Wireless > Basic Wireless Settings

    Chapter 3 Routing Table Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Wireless > Basic Wireless Settings The basic settings for wireless networking are set on this screen. Wireless > Basic Wireless Settings Simultaneous Networks For more wireless bandwidth, the Router can create two simultaneous yet separate Wireless-N networks, one using...
  • Page 15 Chapter 3 Channel Width (5 GHz) For best performance in a network using Wireless-A and Wireless-N (5 GHz) devices, keep the default, Auto (20MHz or 40MHz). For a channel width of 40 MHz, select 40MHz only. For a channel width of 20 MHz, select 20MHz only.
  • Page 16: Wireless > Wireless Security

    Chapter 3 Method #3 Use this method if your client device asks for the Router’s PIN number. Enter the PIN number listed on this screen. (It is also listed on the label on the bottom of the Router.) After the client device has been configured, click the OK button.
  • Page 17 Chapter 3 Key Renewal Enter a Key Renewal period, which instructs the Router how often it should change the encryption keys. The default Key Renewal period is 3600 seconds. WPA2 Personal WPA2 Personal Encryption WPA2 supports two encryption methods with dynamic encryption keys;...
  • Page 18: Wireless > Wireless Mac Filter

    Chapter 3 Shared Key Enter the key shared between the Router and the server. Encryption Select level 64 bits 10 hex digits or 128 bits 26 hex digits. The default is 64 bits 10 hex digits. Passphrase Enter a Passphrase to automatically generate WEP keys.
  • Page 19: Wireless > Advanced Wireless Settings

    Chapter 3 Wireless Client List MAC XX Enter the MAC addresses of the devices whose wireless access you want to control. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Wireless > Advanced Wireless Settings This Wireless >...
  • Page 20: Security > Firewall

    Chapter 3 Threshold. Setting the Fragmentation Threshold too low may result in poor network performance. Only minor reduction of the default value is recommended. In most cases, it should remain at its default value of 2346. RTS Threshold Should you encounter inconsistent data flow, only minor reduction of the default value, 2347, is recommended.
  • Page 21: Access Restrictions > Internet Access

    Chapter 3 Access Restrictions > Internet Access The Access Restrictions > Internet Access screen allows you to deny or allow specific kinds of Internet usage and traffic, such as Internet access, designated services, and websites during specific days and times. Access Restrictions >...
  • Page 22: Applications And Gaming > Port Range Forwarding

    Chapter 3 Applications and Gaming > Single Port Forwarding The Single Port Forwarding screen allows you to customize port services for common applications. When users send these types of requests to your network via the Internet, the Router will forward those requests to the appropriate servers (computers).
  • Page 23: Applications & Gaming > Port Triggering

    Chapter 3 Applications & Gaming > Port Triggering The Applications & Gaming > Port Triggering screen allows the Router to watch outgoing data for specific port numbers. The IP address of the computer that sends the matching data is remembered by the Router, so that when the requested data returns through the Router, the data is pulled back to the proper computer by way of IP address and port mapping rules.
  • Page 24: Applications And Gaming > Qos

    Chapter 3 Applications and Gaming > QoS Quality of Service (QoS) ensures better service to high-priority types of network traffic, which may involve demanding, real-time applications, such as videoconferencing. Applications and Gaming > QoS QoS (Quality of Service) Wireless Wireless WMM (Wi-Fi Multimedia) WMM is a wireless Quality of Service feature that improves quality for audio, video, and voice applications by prioritizing wireless...
  • Page 25 Chapter 3 Online Games Online Games Games Games Select the appropriate game. If you select Add a New Game, follow the instructions in the “Add a New Game section”. Priority Select the appropriate priority: High, Medium, Normal, or Low. Click Apply to save your changes. Your new entry will appear in the Summary list.
  • Page 26: Administration > Management

    Chapter 3 Click Apply to save your changes. Your new entry will appear in the Summary list. Voice Device Voice Device Enter a Name Enter a name for your voice device. MAC Address. Enter the MAC address of your voice device.
  • Page 27: Administration > Log

    Chapter 3 Allowed Remote IP Address Select Any IP Address or manually enter an Internet IP address to allow remote access to the web-based utility from the Internet. Remote Management Port Enter the port number that will provide outside access to the Router’s web-based utility.
  • Page 28: Administration > Factory Defaults

    Simultaneous Dual-Band Wireless-N Router Advanced Configuration Administration > Firmware Upgrade Before upgrading the firmware, download the Router’s firmware upgrade file from the Linksys website, www.linksys.com. Then extract the file. Upgrade Firmware Please select a file to upgrade Click Browse and select the extracted firmware upgrade file.
  • Page 29: Status > Local Network

    Chapter 3 Internet MAC Address This is the Router’s MAC Address, as seen by your ISP. Server Name This is the specific name that will be used for the network storage FTP and Media Server. You entered this name on the Storage > Administration tab. Host Name If required by your ISP, this would have been entered on the Setup tab.
  • Page 30: Appendix A: Troubleshooting

    (the default IP address is 192.168.1.1). When prompted, enter the password to the Router (the default is admin). Click the appropriate tab to change the settings. WEB: If your questions are not addressed here, refer to the Linksys website, www.linksys.com...
  • Page 31: Appendix B: Specifications

    Appendix B Appendix B: Specifications Model WRT400N Standards Draft 802.11n, 802.11a, 802.11g, 802.11b, 802.3, 802.3u Ports Power, Ethernet, Internet Button Reset, Wi-Fi Protected Setup LEDs Power, Internet, Wireless, Wi-Fi Protected Setup, Ethernet (1-4) Number of Antennas 4 Total, 2 Internal Antennas per Each 2.4 GHz &...
  • Page 32: Appendix C: Warranty Information

    Your exclusive remedy and Linksys’ entire liability under this limited warranty will be for Linksys, at its option, to (a) repair the product with new or refurbished parts, (b) replace the product with a reasonably available equivalent new or refurbished Linksys product, or (c) refund the purchase price of the product less any rebates.
  • Page 33: Technical Support

    This limited warranty is governed by the laws of the jurisdiction in which the Product was purchased by you. Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623. Simultaneous Dual-Band Wireless-N Router...
  • Page 34: Appendix D: Regulatory Information

    Appendix D Appendix D: Regulatory Information FCC Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
  • Page 35: Avis D'industrie Canada

    Appendix D Avis d’Industrie Canada Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. L’utilisation de ce dispositif est autorisée seulement aux conditions suivantes : il ne doit pas produire de brouillage et il doit accepter tout brouillage radioélectrique reçu, même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif.
  • Page 36: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products. Consumers are required to comply with this notice for all electronic products bearing the following symbol: English - Environmental Information for Customers in...
  • Page 37 Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
  • Page 38 Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių...
  • Page 39 återvinning skyddar mot eventuella negativa konsekvenser för miljön och personhälsa. För mer detaljerad information om kassering av din gamla utrustning kontaktar du dina lokala myndigheter, avfallshanteringen eller butiken där du köpte produkten. WEB: For additional information, please visit www.linksys.com estää...
  • Page 40: Appendix E: Software End User License Agreement

    Appendix E Appendix E: Software End User License Agreement Cisco Products This product from Cisco Systems, Inc. or its subsidiary licensing the Software instead of Cisco Systems, Inc. (“Cisco”) contains software (including firmware) originating from Cisco and its suppliers and may also contain software from the open source community.
  • Page 41 Appendix E of the Software or its related Documentation, or electronically transfer the Software or Documentation from one computer to another or over a network; (ii) alter, merge, modify, adapt, decrypt or translate the Software or related Documentation, or decompile, reverse engineer, disassemble, or otherwise reduce the Software to a human-perceivable form (except to the extent expressly permitted by law notwithstanding this provision);...
  • Page 42 Appendix E In addition, Cisco may collect and store detailed information regarding your network configuration and usage for the purpose of providing you technical networking support. The information is associated with you only when you provide a unique ID number to the support representative while you are receiving help.
  • Page 43 Software and supersedes any conflicting or additional terms contained in any purchase order or elsewhere. Linksys, Cisco and the Cisco Logo and other trademarks contained in the Software and Documentation are trademarks or registered trademarks of Linksys, Cisco, its licensors and third parties, as the case may be.
  • Page 44 Appendix E freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too.
  • Page 45 Appendix E If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions,...
  • Page 46 Appendix E If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
  • Page 47 Appendix E GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
  • Page 48 Appendix E freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a “work based on the library” and a “work that uses the library”.
  • Page 49 Appendix E Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library.
  • Page 50 Appendix E Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user’s computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the...
  • Page 51 Appendix E software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
  • Page 52 Appendix E The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.
  • Page 53 Software End User License Agreement Appendix E BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...

This manual is also suitable for:

Wrt400n-rm - wireless n dual band router

Table of Contents