USER GUIDE Wireless-N Broadband Router with Storage Link Model: WRT160NL
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
Table of Contents Chapter 1: Product Overview 1 Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Bottom Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents Appendix C: Specifications 39 Appendix D: Warranty Information 40 Limited Warranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Appendix E: Regulatory Information 42 FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 FCC Radiation Exposure Statement . . . . . . . . . . . . .
Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys by Cisco Wireless-N Broadband Router with Storage Link. The Router lets you access the Internet via a wireless connection or through one of its four switched ports. You can also use the Router to share resources such as computers, printers and files. The Router’s USB port connects to a USB storage device, so you can access your portable files. (A USB hard drive may require an external power supply.
Product Overview Chapter 1 Bottom Panel Wall-Mounting Placement The Router has two wall-mount slots on its bottom panel. The distance between the slots is 152 mm (6 inches). Two screws are needed to mount the Router. 4-5 mm Reset The Reset button is located on the right side of the product label. There are two ways to reset the Router to its factory defaults.
Wireless Security Checklist Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted.
Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you want to change its advanced settings, use the Router’s web-based utility. This chapter describes each web page of the utility and each page’s key functions. You can access the utility via a web browser on a computer connected to the Router.
Advanced Configuration Chapter 3 Automatic Configuration - DHCP By default, the Router’s Internet Connection Type is set to Automatic Configuration - DHCP, which should be kept only if your ISP supports DHCP or you are connecting through a dynamic IP address. (This option usually applies to cable connections.) Internet Connection Type > Automatic Configuration - DHCP Static IP If you are required to use a permanent IP address to connect to the Internet, select Static IP.
Advanced Configuration Chapter 3 PPTP Server IP Address Your ISP will provide you with the IP address of the PPTP server. Username and Password Enter the Username and Password provided by your ISP. Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time).
Advanced Configuration Chapter 3 broadband Internet service has been configured with a host and domain name. In most cases, leaving these fields blank will work. MTU MTU is the Maximum Transmission Unit. It specifies the largest packet size permitted for Internet transmission. Select Manual if you want to manually enter the largest packet size that is transmitted. To have the Router select the best MTU for your Internet connection, keep the default, Auto.
Advanced Configuration Chapter 3 amount of time, in minutes, that the user will be “leased” this dynamic IP address. After the time has expired, the user will be automatically assigned a new dynamic IP address. The default is 0 minutes, which means one day. DynDNS.org Static DNS 1-3 The Domain Name System (DNS) is how the Internet translates domain or website names into Internet addresses or URLs. Your ISP will provide you with at least one DNS Server IP Address.
Advanced Configuration Chapter 3 Clone My PC’s MAC Click this button to clone the MAC address of the computer you are using. TZO.com Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Setup > Advanced Routing This screen is used to set up the Router’s advanced functions. Operating Mode allows you to select the type(s) of advanced functions you use. Dynamic Routing automatically adjusts how packets travel on your network.
Advanced Configuration Chapter 3 Route Entries To set up a static route between the Router and another network, select a number from the dropdown list. Click Delete This Entry to delete a static route. Enter Route Name Enter a name for the Route here, using a maximum of 25 alphanumeric characters. select Wi-Fi Protected Setup. Proceed to Wi-Fi Protected Setup, page 11.
Advanced Configuration Chapter 3 Standard Channel If Standard - 20 MHz Channel is the Channel Width setting, then this setting will be available. Select the appropriate channel for your wireless network. If you are not sure which channel to select, then keep the default, Auto. If Wide - 40MHz Channel is the Channel Width setting, then the Standard Channel will be a secondary channel for Wireless-N (2.4 GHz).
Advanced Configuration Chapter 3 3. After the client device has been configured, click OK. Then refer back to your client device or its documentation for further instructions. Method #3 Use this method if your client device asks for the Router’s PIN number. WPA Personal NOTE: If you are using WPA, then each device in your wireless network MUST use the same WPA method and shared key, or else the network will not function properly. 1. Enter the PIN number listed on this screen.
Advanced Configuration Chapter 3 WPA Enterprise RADIUS Server Enter the IP address of the server. This option features WPA used with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) RADIUS Port Enter the port number of the server. The default is 1812. Shared Secret Enter the key shared between the Router and the server. Key Renewal Enter a Key Renewal period, which instructs the Router how often it should change the encryption keys.
Advanced Configuration Chapter 3 WEP Wireless > Wireless MAC Filter WEP is a basic encryption method, which is not as secure as WPA. Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network’s radius. IMPORTANT: If you are using WEP encryption, then each device in your wireless network MUST use the same WEP encryption method and key, or else the network will not function properly.
Advanced Configuration Chapter 3 with each other. To use this function, select Enabled. AP Isolation is disabled by default. Wireless Client List Wireless Client List This screen shows computers and other devices on the wireless network. The list can be sorted by Client Name, Interface, IP Address, MAC Address, and Status. Select Save to MAC Address Filter List for any device you want to add to the MAC Address Filter List. Then click Add. To update the on-screen information, click Refresh.
Advanced Configuration Chapter 3 frequency interval of the beacon. A beacon is a packet broadcast by the Router to synchronize the wireless network. The default is 100 milliseconds. DTIM Interval This value, between 1 and 255, indicates the interval of the Delivery Traffic Indication Message (DTIM). A DTIM field is a countdown field informing clients of the next window for listening to broadcast and multicast messages.
Advanced Configuration Chapter 3 Security > VPN Passthrough The VPN Passthrough screen allows you to enable VPN tunnels using IPSec, PPTP, or L2TP protocols to pass through the Router’s firewall. Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. To allow IPSec tunnels to pass through the Router, keep the default, Enabled.
Advanced Configuration Chapter 3 Shared Folders Summary The Shared Folders Summary screen displays the following information: Display Name, Partition, Shared Folder, and Groups with Access. Summary To exit the Shared Folders Summary screen and return to the Disk Management screen, click Close. Format Disk Disk To format a disk and create a new partition, select the disk you want to format, and then click Format Disk.
Advanced Configuration Chapter 3 Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Click Close to exit the screen. Scan All To scan all media files, click this button. The database table lists the media folders with the following information: Name, Partition, and Folder. Storage > Media Server Scan To scan a folder, click Scan. The storage options are available when a USB storage device is connected to the USB port of the Router.
Advanced Configuration Chapter 3 Storage > Administration User Management The Administration screen allows you to manage the user groups and individual users who can access the shared folders. By default the Router creates two users, admin and guest. The users are listed by User Name and Group. Create New User To create a new user, click this button. The User Account screen appears. Proceed to Create or Edit a User Account, page 21.
Advanced Configuration Chapter 3 Create or Edit a User Account User Account User Account Name Create a name for the user. Full Name Enter the actual name of the user. Access Restrictions > Internet Access Description Enter keywords to describe the user. Password Enter the password that the user will use for login Confirm Password Enter the password again to confirm. Group Member Select the appropriate user group. Account disabled To temporarily disable an account, select this option.
Advanced Configuration Chapter 3 Status Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu, and select Enabled. To create a policy, follow steps 1-11. Repeat these steps to create additional policies, one at a time. 1. Select a number from the Access Policy drop-down menu. 2. Enter a Policy Name in the field provided. 3. To enable this policy, select Enabled. 4. Click Edit List to select which PCs will be affected by the policy.
Chapter 3 External Port Enter the external port number used by the server or Internet application. Check with the Internet application documentation for more information. Internal Port Enter the internal port number used by the server or Internet application. Check with the Internet application documentation for more information. Protocol Select the protocol(s) used for this application, TCP, UDP, or Both. To IP Address For each application, enter the IP address of the PC that should receive the requests.
Advanced Configuration Chapter 3 Triggered Range For each application, enter the starting and ending port numbers of the triggered port number range. Check with the Internet application documentation for the port number(s) needed. address in the field provided. To retrieve this information, click DHCP Client Table. Forwarded Range For each application, enter the starting and ending port numbers of the forwarded port number range.
Advanced Configuration Chapter 3 No Acknowledgement If you want to disable the Router’s Acknowledgement feature, so the Router will not re-send data if an error occurs, then select Enabled. Otherwise, keep the default, Disabled. 1250 as your settings. You can have up to three ranges to define for this bandwidth allocation. Port numbers can range from 1 to 65535. Check your application’s documentation for details on the service ports used.
Advanced Configuration Chapter 3 Name This column displays the application, device, or port name. MAC Address Information This column displays the port range or MAC address entered for your entry. If a pre-configured application or game was selected, there will be no valid entry shown in this section. Remove Click this button to remove an entry. QoS > MAC Address Edit Click this button to make changes. Enter a Name Enter a name for your device. MAC Address Enter the MAC address of your device.
Advanced Configuration Chapter 3 Access via Wireless If you are using the Router in a public domain where you are giving wireless access to your guests, you can disable wireless access to the Router’s web-based utility. You will only be able to access the utility via a wired connection if you disable the setting. Keep the default, Enabled, to allow wireless access to the utility, or select Disabled to block wireless access to the utility.
Advanced Configuration Chapter 3 Log •• Type Select Incoming Log, Outgoing Log, Security Log, or DHCP Client Log. •• Log The Incoming Log displays a temporary log of the source IP addresses and destination port numbers for the incoming Internet traffic. The Outgoing Log displays a temporary log of the local IP addresses, destination URLs/IP addresses, and service/ port numbers for the outgoing Internet traffic. The Security log displays the login information for the web-based utility.
Advanced Configuration Chapter 3 Administration > Firmware Upgrade The Firmware Upgrade screen allows you to upgrade the Router’s firmware. Do not upgrade the firmware unless you are experiencing problems with the Router or the new firmware has a feature you want to use. Status > Router Administration > Firmware Upgrade NOTE: The Router may lose the settings you have customized. Before you upgrade its firmware, write down all of your custom settings.
Advanced Configuration Chapter 3 Status > Local Network The Local Network screen displays information about the local, wired network. DHCP Client Table The DHCP Client Table lists computers and other devices that have been assigned IP addresses by the Router. The list can be sorted by IP Address, MAC Address, Interface, and Client Name. To remove a DHCP client, click Delete. To update the on-screen information, click Refresh. To exit this screen and return to the Local Network screen, click Close.
Troubleshooting Appendix A Appendix A: Troubleshooting Your computer cannot connect to the Internet. Follow these instructions until your computer can connect to the Internet: •• Make sure that the Router is powered on. The Power LED should be green and not flashing. •• If the Power LED is flashing, then power off all of your network devices, including the modem, Router, and computers. Then power on each device in the following order: •• 4. Click OK.
Appendix A Troubleshooting system settings. Click the Computer Name tab. The workgroup name is displayed.) If they differ, then change the workgroup name of the Router. Follow these instructions: 1. Access the web-based utility of the Router. (Refer to Chapter 3: Advanced Configuration, page 4.) 2. Click the Storage tab. 3. Click the Administration tab. 4. In the Workgroup field, enter the workgroup name of your computer. 5. Click Save Settings.
How to Install and Access USB Storage Appendix B Appendix B: How to Install and Access USB Storage NOTE: Another option is to use the IP address of the Router. In the Address field, enter the local IP address of the Router: \\xxx.xxx.xxx.xxx Overview This appendix explains how to do the following: •• connect and access a USB storage device •• map a shortcut to a USB storage device •• create a shared folder on a USB storage device (advanced users) The default is 192.168.1.1.
How to Install and Access USB Storage Appendix B NOTE: Another option is to use the IP address of the Router. In the Address field, enter the local IP address of the Router: 2. In the Address field, enter the server name of the Router: \\ \\xxx.xxx.xxx.xxx The default is 192.168.1.1. You can change this IP address on the Setup > Basic Setup screen; refer to Setup > Basic Setup, page 4. 3. Enter your account user name and password.
How to Install and Access USB Storage Appendix B 4. From the Drive drop-down menu, select an available drive letter. Windows XP Map a Drive 1. On your desktop, double-click the My Computer icon. My Computer Icon NOTE: If the My Computer icon is not displayed, then go to Start > All Programs > Accessories > Windows Explorer. Select Drive Letter 2. In the Address field, enter the server name of the Router: \\ 5. Click Finish. Access Mapped Drive 1.
How to Install and Access USB Storage Appendix B 4. Right-click the folder you want to share, and click Map Network Drive. (The default shared folder is named Public.) 2. In the Network Drives section, double-click the mapped drive to access it. Double-Click Mapped Drive Map Network Drive 5. From the Drive drop-down menu, select an available drive letter.
How to Install and Access USB Storage Appendix B Create a Shared Folder 1. Click the Storage tab. 2. Click the Disk tab. 6. Select the appropriate folder. To display sub-folders, click Enter into Folder. To return to the previous folder, click Return to Upper Folder. 7. To allow a group access to the shared folder, select it from the Available Groups column, and then click the >> button. NOTE: Specify which user groups have readand-write or read-only access to the shared folders. 8.
How to Install and Access USB Storage Appendix B 4. In the Group Name field, create a name for the group. 5. In the Description field, enter keywords to describe the group. 6. From the Access drop-down menu, select the appropriate level of access, read and write or read only. 7. Click Create to apply your changes, or click Cancel to clear your changes. Click Close to exit the screen and return to the Administration screen. Create a User Account 1. Click the Storage tab. 2. Click the Administration tab.
Specifications Appendix C Appendix C: Specifications Operating Temp. 0 to 40°C (32 to 104°F) Storage Temp. -20 to 60°C (-4 to 140°F) Model WRT160NL Storage Humidity Standards 802.3, 802.3u, 802.11b, 802.11g, Draft 802.
Appendix D Appendix D: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which begins on the date of purchase by the original end-user purchaser and lasts for the period specified below: •• One (1) year for new product •• Ninety (90) days for refurbished product Your exclusive remedy and Linksys’ entire liability under this limited warranty will be for Linksys, at its option, to (a) re
Appendix D Warranty Information DATED PROOF OF ORIGINAL PURCHASE IS REQUIRED TO PROCESS WARRANTY CLAIMS. If you are requested to return your product, you will be given a Return Materials Authorization (RMA) number. You are responsible for properly packaging and shipping your product to Linksys at your cost and risk. You must include the RMA number and a copy of your dated proof of original purchase when returning your product.
Regulatory Information Appendix E Appendix E: Regulatory Information FCC Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules.
Appendix E Regulatory Information Avis d’Industrie Canada Wireless Disclaimer Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. The maximum performance for wireless is derived from IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, data throughput rate, range and coverage.
Appendix E User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix E Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix E Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix E Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenščina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Appendix F Appendix F: Software End User License Agreement Cisco Products This product from Cisco Systems, Inc. or its subsidiary licensing the Software instead of Cisco Systems, Inc. (“Cisco”) contains software (including firmware) originating from Cisco and its suppliers and may also contain software from the open source community. Any software originating from Cisco and its suppliers is licensed under the Cisco Software License Agreement contained at Schedule 1 below.
Appendix F of the Software or its related Documentation, or electronically transfer the Software or Documentation from one computer to another or over a network; (ii) alter, merge, modify, adapt, decrypt or translate the Software or related Documentation, or decompile, reverse engineer, disassemble, or otherwise reduce the Software to a human-perceivable form (except to the extent expressly permitted by law notwithstanding this provision); (iii) share, sell, rent, lease, or sublicense the Software or relat
Appendix F In addition, Cisco may collect and store detailed information regarding your network configuration and usage for the purpose of providing you technical networking support. The information is associated with you only when you provide a unique ID number to the support representative while you are receiving help. The unique ID is generated randomly on your computer upon installation and is completely under your control.
Appendix F either the Software or Documentation or both constitutes agreement by the Government that the Software and Documentation are “commercial computer software” and “commercial computer software documentation,” and constitutes acceptance of the rights and restrictions herein. General Terms. This Agreement will be governed by and construed in accordance with the laws of the State of California, without reference to conflict of laws principles.
Appendix F freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price.
Appendix F c. If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License.
Appendix F 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
Appendix F GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.
Appendix F freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a “work based on the library” and a “work that uses the library”. The former contains code derived from the library, whereas the latter must be combined with the library in order to run.
Appendix F Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library. In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3.
Appendix F Software End User License Agreement b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user’s computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with. 8.
Appendix F software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 12.
Appendix F The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org. OpenSSL License Copyright © 1998-2007 The OpenSSL Project. All rights reserved.
Appendix F Software End User License Agreement BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.