Wireless N Gigabit Router Wrt310n Firmware Update

Wireless N Gigabit Router Wrt310n Firmware Update

  Also Run into for Linksys WRT310N – Wireless-N Gigabit Router Wireless

  Related Manuals for Linksys WRT310N – Wireless-Due north Gigabit Router Wireless

  Summary of Contents for Linksys WRT310N – Wireless-N Gigabit Router Wireless

  • Page 1
    USER GUIDE Wireless-N Gigabit Router WRT310N Model:…
  • Page 2: About This Guide

    Network world wide web.linksysbycisco.com/security Security Copyright and Trademarks Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.South. and sure other countries. Other brands and product names are trademarks or registered trademarks of their respective holders.

  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Production Overview Front Console……….4 Back Panel .

  • Folio 4
    Tabular array of Contents Appendix A: Troubleshooting Appendix B: Specifications Appendix C: Warranty Information Limited Warranty ……….31 Appendix D: Regulatory Data FCC Statement .
  • Page v: Affiliate 1: Product Overview

    Production Overview is flashing, the Router is actively sending or receiving data over the network. Thank you for choosing the Linksys past Cisco Wireless-N Internet (Blue) The Internet LED lights up Gigabit Router. The Router lets y’all access the Internet via…

  • Page half dozen
    Production Overview Chapter 1 Wall-Mounting Placement Follow these instructions: one. Determine where you want to mount the Router. Make The Router has two wall-mount slots on its bottom sure that the wall you use is smooth, flat, dry, and panel. The altitude between the slots is 152 mm sturdy.
  • Folio 7: Wireless Security Checklist

    Web: For more information on wireless security, visit www.linksysbycisco.com/security Linksys routers give you lot the power to enable Media Access Control (MAC) address filtering. The MAC accost is a unique series of numbers and letters assigned to every networking device. With MAC address filtering enabled, wireless network access is provided solely for wireless devices with specific MAC addresses.

  • Page eight: Advanced Configuration

    Advanced Configuration Chapter three Chapter three: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be set for use. Notwithstanding, if yous’d similar to change its advanced settings, use the Router’s web-based utility. This chapter describes each web page of the utility and each page’s key functions.

  • Page nine
    Advanced Configuration Chapter 3 Static IP before your Cyberspace connection terminates. The default Max Idle Time is xv minutes. If you are required to utilize a permanent IP address to Keep Live: Redial Flow If y’all select this option, connect to the Cyberspace, select Static IP. the Router will periodically check your Internet connectedness.
  • Page 10
    Avant-garde Configuration Chapter 3 inactivity, Connect on Demand enables the Router to Telstra Cable automatically re-found your connectedness as soon as you Telstra Cablevision is a service that applies to connections in endeavor to admission the Cyberspace over again. To employ this option, Commonwealth of australia only.
  • Page 11
    Avant-garde Configuration Chapter three host and domain name. In about cases, leaving these fields DHCP Reservation Click this button if yous want to assign blank will work. a stock-still local IP address to a MAC address. MTU is the Maximum Transmission Unit. Information technology specifies DHCP Reservation the largest packet size permitted for Internet transmission.
  • Page 12: Setup > Ddns

    Avant-garde Configuration Chapter 3 Client Lease Fourth dimension The Customer Charter Time is the amount DynDNS.org of fourth dimension a network user volition be allowed connection to the Router with their electric current dynamic IP address. Enter the amount of time, in minutes, that the user will be “leased” this dynamic IP address.

  • Page 13: Setup > Mac Accost Clone

    Avant-garde Configuration Affiliate three Clone My PC’s MAC TZO.com Click this push button to clone the MAC address of the calculator you are using. Click Save Settings to apply your changes, or click Abolish Changes to cancel your changes. Setup > Avant-garde Routing This screen is used to gear up the Router’s advanced functions.

  • Page 14: Wireless > Basic Wireless Settings

    For each route, the Destination LAN IP address, Subnet wireless network. For added security, you should change Mask, Gateway, and Interface are displayed. Click the default SSID (linksys) to a unique name. Refresh to update the data. Click Close to go out this screen.

  • Folio 15: Wireless > Wireless Security

    Advanced Configuration Chapter iii Wi-Fi Protected Setup ii. After the client device has been configured, click OK. Then refer back to your client device or its In that location are three methods available. Use the method that documentation for further instructions. applies to the client device you are configuring. The Wi-Fi Protected Setup Status, Network Proper name (SSID), Security, Encryption, and Passphrase are displayed at the bottom of the screen.

  • Page 16
    Advanced Configuration Chapter 3 Fundamental Renewal Enter a Key Renewal menses, which instructs WPA2 Enterprise the Router how often information technology should change the encryption keys. This option features WPA2 used in coordination with a The default Group Fundamental Renewal period is 3600 seconds. RADIUS server.
  • Folio 17: Wireless > Wireless Mac Filter

    Avant-garde Configuration Chapter 3 Important: If you are using WEP encryption, always remember that each device in your wireless network MUST use the same WEP encryption method and encryption key, or else your wireless network volition not function properly. RADIUS Server Enter the IP Address of the RADIUS server.

  • Folio 18: Wireless > Advanced Wireless Settings

    Advanced Configuration Chapter 3 Wireless Client List With Shared Fundamental authentication, the sender and recipient utilize a WEP key for authentication. Select Shared Central to This screen shows computers and other devices on only utilize Shared Key authentication. the wireless network. The listing can be sorted by Client Name, Interface, IP Address, MAC Address, and Status.

  • Page 19: Security > Firewall

    Avant-garde Configuration Chapter 3 hear the beacons and awaken to receive the broadcast Deselect the feature to allow anonymous Internet and multicast messages. The default value is 1. requests. Fragmentation Threshold Filter Multicast This value specifies the Multicasting allows multiple maximum size for a packet before data is fragmented transmissions to specific recipients at the same time.

  • Page 20: Access Restrictions > Internet Access

    Advanced Configuration Chapter three Security > VPN Passthrough VPN Passthrough IPSec Passthrough Internet Protocol Security (IPSec) is a suite of protocols used to implement secure substitution of packets at the IP layer. To let IPSec tunnels to pass through the Router, keep the default, Enabled. PPTP Passthrough Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be…

  • Folio 21: Applications And Gaming > Unmarried Port Forwarding

    Advanced Configuration Affiliate three Condition Policies are disabled by default. To enable a policy, 10. If the application you want to block is not listed or you select the policy number from the drop-down menu, and want to edit a service’s settings, enter the application’south select Enabled.

  • Page 22: Applications And Gaming > Port Range Forwarding

    Advanced Configuration Chapter 3 Port Range Forwarding External Port Enter the external port number used past the server or Net application. Check with the Cyberspace To frontward a port, enter the information on each line for awarding documentation for more information. the criteria required.

  • Page 23: Applications And Gaming > Dmz

    Advanced Configuration Chapter iii Triggered Range For each application, enter the starting address in the field provided. To retrieve this information, click DHCP Client Tabular array. and catastrophe port numbers of the triggered port number range. Check with the Internet awarding documentation for the port number(s) needed.

  • Page 24
    Advanced Configuration Affiliate 3 WMM Support If y’all have other devices that support Wi- tin range from 1 to 65535. Check your awarding’s Fi Multimedia (WMM) on your network, continue the default, documentation for details on the service ports used. Enabled.
  • Page 25: Administration > Management

    Avant-garde Configuration Chapter 3 Voice Device QoS > Voice Device Enter a Name Enter a proper noun for your voice device. MAC Address Enter the MAC address of your vox device. Priority Loftier Select appropriate priority: (Recommend), Medium, Normal, or Low. Click Add to save your changes.

  • Page 26: Assistants > Log

    Advanced Configuration Affiliate 3 Administration > Log Remote Upgrade If y’all want to be able to upgrade the Router remotely, from outside the local network, select Enabled. (Y’all must have the Remote Management The Router can keep logs of all traffic for your Internet feature enabled also.) Otherwise, continue the default, connection.

  • Page 27: Administration > Diagnostics

    Advanced Configuration Chapter three Administration > Diagnostics Traceroute Exam The Traceroute examination tests the performance of a The diagnostic tests (Ping and Traceroute) allow you to connectedness. check the connections of your network devices, including connection to the Internet. This screen also allows you to IP or URL Accost Enter the address of the PC whose reset the router.

  • Page 28: Administration > Firmware Upgrade

    This is the Router’southward MAC Address, as seen by your ISP. Earlier upgrading the firmware, download the Router’due south firmware upgrade file from the Linksys website, Host Name If required past your Isp, this was entered on www.linksysbycisco.com. Then extract the file.

  • Page 29: Status > Wireless Network

    Advanced Configuration Chapter iii date data, click Refresh. To exit this screen and render to the Local Network screen, click Close. Condition > Wireless Network The Wireless Network screen displays information nearly your wireless network. Status > Local Network Local Network Local MAC Address The MAC accost of the Router’south local, wired interface is displayed here.

  • Page 30: Appendix A: Troubleshooting

    Spider web: If your questions are not addressed The DSL phone line does not fit into the Router’s here, refer Linksys website, Internet port. www.linksysbycisco.com The Router does not replace your modem. You even so need your DSL modem in order to utilize the Router. Connect the telephone line to the DSL modem, and so insert the setup CD into your computer.

  • Folio 31: Appendix B: Specifications

    Specifications Appendix B Appendix B: Specifications Model WRT310N Standards Draft 802.11n, 802.11g, 802.11b, 802.3, 802.3u, 802.3ab Ports Power, Internet, and Ethernet Buttons Reset, Wi-Fi Protected Setup LEDs Ethernet (ane-iv), Wi-Fi Protected Setup, Wireless, Internet, Power Cabling Type Cat 5e Number of Antennas 3 Max.

  • Page 32: Appendix C: Warranty Information

    Your exclusive remedy and Linksys’ entire liability under OF MERCHANTABILITY, SATISFACTORY QUALITY OR this express warranty will exist for Linksys, at its option, to Fettle FOR A Particular PURPOSE ARE Express TO (a)  repair the product with new or refurbished parts, THE Elapsing OF THE WARRANTY Menses.

  • Page 33
    This limited warranty is governed past the laws of the jurisdiction in which the Product was purchased by yous. Delight direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623. Wireless-N Gigabit Router…
  • Page 34: Appendix D: Regulatory Information

    Regulatory Information Appendix D Appendix D: Safety Notices Regulatory Information WARNING: Do not utilize this product near water, for example, in a moisture basement or well-nigh a swimming pool. FCC Argument This device complies with Part fifteen of the FCC Rules. Alert: Avoid using this production during an Functioning is subject to the following two conditions: (one)

  • Page 35: Industry Canada Statement

    Regulatory Information Appendix D Industry Canada Statement Wireless Disclaimer This Class B digital appliance complies with Canadian The maximum performance for wireless is derived from ICES-003 and RSS210. IEEE Standard 802.11 specifications. Actual functioning can vary, including lower wireless network capacity, Performance is subject to the post-obit two atmospheric condition: data throughput rate, range and coverage.

  • Page 36: User Information For Consumer Products Covered Past Eu Directive 2002/96/Ec On Waste product Electric And Electronic Equipment (Weee)

    úřady. Správná likvidace a recyklace pomáhá předcházet Linksys products. Consumers are required to comply with potenciálním negativním dopadům na životní prostředí a lidské this detect for all electronic products bearing the post-obit zdraví.

  • Page 37
    Regulatory Data Appendix D Eesti (Estonian) – Keskkonnaalane informatsioon Français (French) – Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de fifty’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé…
  • Folio 38
    Regulatory Information Appendix D Lietuvškai (Lithuanian) – Aplinkosaugos informacija, Nederlands (Dutch) – Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė…
  • Page 39
    Regulatory Data Appendix D Português (Portuguese) – Informação ambiental para Slovenščina (Slovene) – Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto eastward/ou na sua embalagem tem simbolom –…
  • Page forty: Appendix Eastward: Software End User License Agreement

    Software End User License Understanding Appendix Eastward Appendix E: Upwardly TO 30 DAYS Later on ORIGINAL Buy, SUBJECT TO THE Return PROCESS AND POLICIES OF THE PARTY FROM Software End User License WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE. IN THE Result THAT YOU HAVE ELECTED TO OBTAIN A Agreement SUBSCRIPTION LICENSE, Equally INDICATED IN YOUR Lodge, You lot ADDITIONALLY AGREE TO BE BOUND Past THE “TERMS…

  • Page 41
    Software Stop User License Understanding Appendix E License Restrictions. Other than as set up forth in this suitability, functionality, or legality of any sites or products Agreement, you may not (i) brand or distribute copies to which links may exist provided or 3rd party services, and of the Software or its related Documentation, or you hereby waive any claim you lot might have confronting Cisco electronically transfer the Software or Documentation…
  • Folio 42
    Software End User License Agreement Appendix E Software tin can enable whatsoever other calculator (on the same part of the installation process or past requesting a change main network) to generate reports. When a computer to your software settings in the mistake procedure. Installing is enabled, that computer shows a notification that it is the software and changing these software settings may beingness monitored.
  • Page 43
    Past Applicable LAW, IN NO Consequence WILL CISCO Exist LIABLE in whatsoever buy order or elsewhere. FOR Any LOST Information, Revenue OR Profit, OR FOR SPECIAL, Linksys, Cisco and the Cisco Logo and other trademarks INDIRECT, CONSEQUENTIAL, INCIDENTAL OR Castigating contained in the Software and Documentation are…
  • Page 44
    Software Stop User License Understanding Appendix E send you Service related email messages equally long equally you lot For case, if you distribute copies of such a programme, are a subscriber to the Service. If you lot wish to opt-out whether gratis or for a fee, you lot must give the recipients of receiving Service related e-mail messages, you may all the rights that you have.
  • Folio 45
    Software Stop User License Agreement Appendix E 1. You may re-create and distribute verbatim copies of the distribution of derivative or collective works based on Plan’s source code equally yous receive it, in any medium, the Program. provided that you conspicuously and appropriately In addition, mere aggregation of some other work non publish on each copy an appropriate copyright observe based on the Program with the Program (or with a…
  • Page 46
    Software Finish User License Agreement Appendix E 4. You may not copy, modify, sublicense, or distribute on consistent application of that system; it is up to the Program except every bit expressly provided under the author/donor to make up one’s mind if he or she is willing to this License.
  • Page 47
    Software End User License Agreement Appendix E 12. IN NO EVENT UNLESS REQUIRED BY Applicative LAW OR When we speak of complimentary software, we are referring to AGREED TO IN WRITING Will Whatever COPYRIGHT HOLDER, freedom of use, non toll. Our General Public Licenses OR ANY OTHER Political party WHO MAY MODIFY AND/OR are designed to brand certain that yous have the liberty REDISTRIBUTE THE Program AS PERMITTED To a higher place,…
  • Page 48
    Software Stop User License Agreement Appendix Eastward Public License permits more lax criteria for linking other either verbatim or with modifications and/or translated code with the library. straightforwardly into another language. (Hereinafter, translation is included without limitation in the term We call this license the “Lesser”…
  • Page 49
    Software Stop User License Agreement Appendix E (For example, a part in a library to compute square If distribution of object lawmaking is fabricated by offering roots has a purpose that is entirely well-defined access to re-create from a designated place, so offering independent of the application.
  • Page 50
    Software Stop User License Agreement Appendix E a) Accompany work with complete 7. Yous may identify library facilities that are a work based corresponding machine-readable source code on the Library side-by-side in a unmarried library together for the Library including whatever changes were with other library facilities not covered by this License, used in the work (which must be distributed and distribute such a combined library, provided that…
  • Page 51
    Software Terminate User License Agreement Appendix Due east 11. If, as a consequence of a court judgment or accusation license version number, you may choose any version of patent infringement or for whatsoever other reason (not ever published by the Free Software Foundation. express to patent problems), conditions are imposed on fourteen.
  • Page 52
    Software End User License Agreement Appendix E Schedule 3-C 6. Redistributions of any grade whatsoever must retain the following acknowledgment: “This product includes OPENSSL LICENSE software developed by the OpenSSL Projection for use in If this Cisco product contains open source software the OpenSSL Toolkit (http://world wide web.openssl.org/)”…
  • Page 53
    Software End User License Agreement Appendix E two. Redistributions in binary form must reproduce the higher up copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes cryptographic software written…

Wireless N Gigabit Router Wrt310n Firmware Update

Read:  Jetstream 4k Ultra Hd Android Tv Box Firmware Upgrade

You May Also Like