Here you can find all about Linksys WRT160N like review and other informations. For example: v2, troubleshooting, setup, default password, problems, firmware, manual.
Linksys WRT160N manual (user guide) is ready to download for free.
On the bottom of page users can write a review. If you own a Linksys WRT160N please write about it to help other people. [ Report abuse or wrong photo | Share your Linksys WRT160N photo ]
Linksys WRT160N, size: 3.6 MB
Linksys WRT160N Ultra RangePlus Wireless N Router
User reviews and opinions
|orphey||4:04am on Monday, November 1st, 2010|
|I thought it would have been better then the wireless G so i gve that set up away and spent a little over 400 dollars on everything i needed for the W...|
|XRumer930||6:00pm on Tuesday, October 19th, 2010|
|have had this particular router for 2.5 years no problems with used it as a router, switch now using it as PPPOE and no glitches or problems. Good product. So far working withough glitches (1 week of use) Easy to set up. Good wireless signal in the whole house.|
|Beata892||4:18am on Saturday, October 2nd, 2010|
|Great signal strength with a super fast network connection! Easy To Setup","Fast","Fast Connection Speed","Reliable connection","Secure Connection|
|WellCams||7:03am on Sunday, September 19th, 2010|
|The setup was easy and seemed to go fine. But within hours of installation, the connection failed and I had to restart the router. Bought this 160N router to replace my old Belkin. Connection is stable, less rebooting than my old Belkin.|
|crsutphin||6:24pm on Thursday, September 16th, 2010|
|I purchased the WRT300 to replace a WRT54G that died (probably because I installed 3rd party firmware that allowed me to boost the XMIT power by a fac... I purchased the WRT300 to replace a WRT54G that died (probably because I installed 3rd party firmware that allowed me to boost the XMIT power by a fac...|
|mapache||4:52pm on Monday, July 12th, 2010|
|I thought it would have been better then the wireless G so i gve that set up away and spent a little over 400 dollars on everything i needed for the W...|
|GAllen||10:57am on Friday, June 25th, 2010|
|This product installed smoothly. It installed its own free controlling software and a trial of Network Magic which I also bought. I seldom do that. call tech support before installing software Easy To Setup,Fast None Works great, easy to set up and install. Easy To Setup,Fast,Fast Connection Speed,Reliable connection,Secure Connection|
|Ikshaar||2:46pm on Sunday, May 16th, 2010|
|Do not buy this router. I am off to find a replacement that has strong user reviews for reliability and good tech support. I expected better of Linksys. I expected a product that would connect and remain connected, without requiring regular hard restarts.|
|felix79||1:25pm on Friday, April 30th, 2010|
|I have not noticed the range issues that others have mentioned - I own a computer business. I beleive the speed is important. This is a very tough house to get signal in. To much brick and concrete including concrete roughing tiles.|
|rayn||8:17am on Monday, April 26th, 2010|
|In the past 17 months I have had two and both have gone bad. I have tried to contact support through Chat---useless... I expected better of Linksys. I expected a product that would connect and remain connected, without requiring regular hard restarts.|
|yebbs||11:20am on Wednesday, March 24th, 2010|
|Ok with open source firmware Out of the box, this router can barely run its own management software. Wireless N - no problems - WRT300N The Linksys WRT300N plugged right in.|
Comments posted on www.ps2netdrivers.net are solely the views and opinions of the people posting them and do not necessarily reflect the views or opinions of us.
Maximize wireless coverage. Network faster than ever before.
The Ultra RangePlus Wireless-N Broadband Router is really three devices in one box. First, theres the Wireless Access Point, which lets you connect to the network without wires. Theres also a built-in 4-port full-duplex 10/100 Switch to connect your wired-Ethernet devices together. Finally, the Router function ties it all together and lets your whole network share a high-speed cable or DSL Internet connection. The Access Point built into the Router uses the very latest wireless networking technology: Wireless-N (draft 802.11n). By overlaying the signals of multiple radios, Wireless-Ns Multiple In, Multiple Out (MIMO) technology multiplies the effective data rate. Unlike ordinary wireless networking technologies that are confused by signal reflections, MIMO actually uses these reflections to increase the range and reduce dead spots in the wireless coverage area. The robust signal travels farther, maintaining wireless connections much farther than standard Wireless-G. With Wireless-N, the farther away you are, the more speed advantage you get. It works great with standard Wireless-G and -B equipment, but when both ends of the wireless link are Wireless-N, the router can increase the throughput even more by using twice as much radio band, yielding speeds far faster than standard Wireless-G. But unlike other speedenhanced technologies, Wireless-N can dynamically enable this double-speed mode for Wireless-N devices, while still connecting to other wireless devices at their respective fastest speeds. In congested areas, the good neighbor mode ensures that the Router checks for other wireless devices in the area before gobbling up the radio band. To help protect your data and privacy, the Router can encode all wireless transmissions with industrial-strength 256-bit encryption. It can serve as your networks DHCP Server, has a powerful SPI firewall to protect your PCs against intruders and most known Internet attacks, and supports VPN pass-through. Configuration is a snap with the web browserbased configuration utility. The incredible speed of Wireless-N makes it ideal for media-centric applications like streaming video, gaming, and Voice over IP telephony, and gives you plenty of headroom to run multiple media-intense data streams through the network at the same time, with no degradation in performance. With the Linksys Wireless-N Broadband Router at the center of your home or office network, you can share a high-speed Internet connection, files, printers, and multi-player games, and run media-intensive applications at incredible speeds, without the hassle of stringing wires!
Internet-sharing Router and 4-port Switch, with a built-in speed and range enhanced Wireless Access Point MIMO technology uses multiple radios to create a robust signal that travels farther and reduces dead spots Much faster than Wireless-G, but also works great with Wireless-G and -B devices Wireless signals protected by wireless encryption, and your network protected from Internet attacks by a powerful SPI firewall
Wireless-N Broadband Router
Features Complies with IEEE draft 802.11n standards Blazing fast wireless speeds for high bandwidth applications such as video streaming or file sharing Expanded wireless coverage far beyond 802.11g products All LAN ports support autocrossover (MDI/MDI-X)no need for crossover cables
Specifications Model Standards Ports Buttons LEDs Cabling Type # of Antennas Detachable (Y/N) RF Pwr (EIRP) in dBm Antenna Gain in dBi UPnP able/cert Security Features Security Key Bits Environmental Dimensions Weight Power Certification Operating Temp. Storage Temp. Operating Humidity Storage Humidity
WRT160N Draft 802.11n, 802.11g, 802.11b, 802.3, 802.3u Power, Internet, Ethernet Reset, Wi-Fi Protected Setup Ethernet (1-4), Wi-Fi Protected Setup, Wireless, Internet, Power CAT 5e 2 No 17 dBm 1.5 dBi Able WEP, WPA, WPA2 128-Bit, 256-Bit 7.95" x 1.34" x 6.30" (202 x 34 x 160 mm) 13.40 oz (0.38 kg) 12V, 1A FCC, CE, IC-to 104F (0 to 40C) -4 to 140F (-20 to 60C) 10 to 85% Noncondensing 5 to 90% Noncondensing
Package Contents Wireless-N Broadband Router Setup CD-ROM with Norton Internet Security User Guide on CD-ROM Ethernet Network Cable Quick Install Power Adapter Minimum Requirements Internet Explorer 6.0 or Firefox 1.0 CD-ROM Drive Windows XP or Vista Wired or Wireless* Network Adapter *For optimum wireless performance, we recommend Linksys Wireless-N adapters (WPC300N, WMP300N, or WUSB300N).
Linksys A Division of Cisco Systems, Inc. 121 Theory Irvine, CA 92617 USA E-mail: firstname.lastname@example.org Web: www.linksys.com Linksys products are available in more than 50 countries, supported by 12 Linksys Regional Offices throughout the world. For a complete list of local Linksys Sales and Technical Support contacts, visit our worldwide website at www.linksys.com
The maximum performance for wireless is derived from IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, data throughput rate, range and coverage. Performance depends on many factors, conditions and variables, including distance from the access point, volume of network traffic, building materials and construction, operating system used, mix of wireless products used, interference and other adverse conditions. Check the product package and contents for specific features supported. Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright 2007 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
Setup > Basic Setup
How to Access the Web-Based Utility
To access the web-based utility, launch the web browser on your computer, and enter the Routers default IP address, 192.168.1.1, in the Address field. Then, press Enter. A login screen will appear. (Non-Windows XP users will see a similar screen.) Leave the User name field blank. The first time you open the Web-based utility, use the default password admin. (You can set a new password from the Administration tabs Management screen.) Click OK to continue.
The Internet Setup section configures the Router to your Internet connection. Most of this information can be obtained through your ISP.
Internet Connection Type
Select the type of Internet connection your ISP provides from the drop-down menu. These are the available types:
Automatic Configuration - DHCP Static IP PPPoE PPTP L2TP Telstra Cable
Automatic Configuration - DHCP
By default, the Routers Internet Connection Type is set to Automatic Configuration - DHCP, which should be kept only if your ISP supports DHCP or you are connecting through a dynamic IP address. (This option usually applies to cable connections.)
The first screen that appears is the Basic Setup screen. This allows you to change the Routers general settings.
Internet Connection Type > Automatic Configuration - DHCP
before your Internet connection terminates. The default Max Idle Time is 15 minutes. Keep Alive: Redial Period If you select this option, the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re-establish your connection. To use this option, select Keep Alive. In the Redial Period field, you specify how often you want the Router to check the Internet connection. The default Redial Period is 30 seconds.
If you are required to use a permanent IP address to connect to the Internet, select Static IP.
Telstra Cable is a service that applies to connections in Australia only.
inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again. To use this option, select Connect on Demand. In the Max Idle Time field, enter the number of minutes you want to have elapsed before your Internet connection terminates. The default Max Idle Time is 15 minutes. Keep Alive: Redial Period If you select this option, the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re-establish your connection. To use this option, select Keep Alive. In the Redial Period field, you specify how often you want the Router to check the Internet connection. The default value is 30 seconds.
Internet Connection Type > Telstra Cable
L2TP is a service that applies to connections in Israel only.
Server IP Address This is the IP address of the Heartbeat Server. Your ISP will provide you with the IP Address you need to specify here. Username and Password Enter the Username and Password provided by your ISP. Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time). If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again. To use this option, select Connect on Demand. In the Max Idle Time field, enter the number of minutes you want to have elapsed before your Internet connection terminates. The default Max Idle Time is 15 minutes. Keep Alive: Redial Period If you select this option, the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re-establish your connection. To use this option, select Keep Alive. In the Redial Period field, you specify how often you want the Router to check the Internet connection. The default Redial Period is 30 seconds.
Internet Connection Type > L2TP
Server IP Address This is the IP address of the L2TP Server. Your ISP will provide you with the IP Address you need to specify here. Username and Password Enter the Username and Password provided by your ISP. Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time). If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again. To use this option, select Connect on Demand. In the Max Idle Time field, enter the number of minutes you want to have elapsed before your Internet connection terminates. The default Max Idle Time is 15 minutes. Keep Alive: Redial Period If you select this option, the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re-establish your connection. To use this option, select Keep Alive. In the Redial Period field, you specify how often you want the Router to check the Internet connection. The default Redial Period is 30 seconds.
Some of these settings may be required by your ISP. Verify with your ISP before making any changes.
Host Name and Domain Name These fields allow you to supply a host and domain name for the Router. Some ISPs, usually cable ISPs, require these names as identification. You may have to check with your ISP to see if your broadband Internet service has been configured with a
You will see a list of DHCP clients with the following information: Client Name, Interface, IP Address, and MAC Address.
host and domain name. In most cases, leaving these fields blank will work. MTU MTU is the Maximum Transmission Unit. It specifies the largest packet size permitted for Internet transmission. Select Manual if you want to manually enter the largest packet size that is transmitted. To have the Router select the best MTU for your Internet connection, keep the default setting, Auto. Size When Manual is selected in the MTU field, this option is enabled. Leave this value in the 1200 to 1500 range. The default size depends on the Internet Connection Type:
DHCP, Static IP, or Telstra: 1500 PPPoE: 1492 PPTP or L2TP: 1460
The Network Setup section changes the settings on the network connected to the Routers Ethernet ports. Wireless setup is performed through the Wireless tab.
This presents both the Routers IP Address and Subnet Mask as seen by your network.
Select Clients from DHCP Table Click the Select
check box to reserve a clients IP address. Then click Add Clients.
Manually Adding Client To manually assign an IP
DHCP Server Setting
The settings allow you to configure the Routers Dynamic Host Configuration Protocol (DHCP) server function. The Router can be used as a DHCP server for your network. A DHCP server automatically assigns an IP address to each computer on your network. If you choose to enable the Routers DHCP server option, make sure there is no other DHCP server on your network.
address, enter the clients name in the Enter Client Name field. Enter the IP address you want it to have in the Assign IP Address field. Enter its MAC address in the To This MAC Address field. Then click Add.
Clients Already Reserved
A list of DHCP clients and their fixed local IP addresses will be displayed at the bottom of the screen. If you want to remove a client from this list, click Remove. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. To view the most up-to-date information, click Refresh. To exit this screen, click Close. Start IP Address Enter a value for the DHCP server to start with when issuing IP addresses. Because the Routers default IP address is 192.168.1.1, the Start IP Address must be 192.168.1.2 or greater, but smaller than 192.168.1.253. The default Starting IP Address is 192.168.1.100. Maximum Number of Users Enter the maximum number of PCs that you want the DHCP server to assign IP addresses to. This number cannot be greater than 253. The default is 50. IP Address Range Displayed here is the range of available IP addresses. Client Lease Time The Client Lease Time is the amount of time a network user will be allowed connection to the Router with their current dynamic IP address. Enter the
DHCP Server DHCP is enabled by factory default. If you already have a DHCP server on your network, or you dont want a DHCP server, then select Disabled (no other DHCP features will be available). DHCP Reservation Click this button if you want to assign a fixed local IP address to a MAC address.
amount of time, in minutes, that the user will be leased this dynamic IP address. After the time is up, the user will be automatically assigned a new dynamic IP address. The default is 0 minutes, which means one day. Static DNS 1-3 The Domain Name System (DNS) is how the Internet translates domain or website names into Internet addresses or URLs. Your ISP will provide you with at least one DNS Server IP Address. If you wish to use another, enter that IP Address in one of these fields. You can enter up to three DNS Server IP Addresses here. The Router will use these for quicker access to functioning DNS servers. WINS The Windows Internet Naming Service (WINS) manages each PCs interaction with the Internet. If you use a WINS server, enter that servers IP Address here. Otherwise, leave this blank.
Time Zone Select the time zone in which your network functions from this drop-down menu. (You can even automatically adjust for daylight saving time.)
Security Mode > WPA2 Enterprise
Encryption WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys. Select the type of algorithm, AES or TKIP or AES. The default is TKIP or AES. RADIUS Server Enter the IP Address of the RADIUS server. RADIUS Port Enter the port number of the RADIUS server. The default value is 1812. Shared Secret Enter the key shared between the Router and the server. Key Renewal Enter a Key Renewal period, which instructs the Router how often it should change the encryption keys. The default Key Renewal period is 3600 seconds.
This option features WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.)
This option features WEP used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.)
Security Mode > WPA Enterprise
RADIUS Server Enter the IP Address of the RADIUS server. RADIUS Port Enter the port number of the RADIUS server. The default value is 1812. Shared Secret Enter the key shared between the Router and the server. Key Renewal Enter a Key Renewal period, which instructs the Router how often it should change the encryption keys. The default Key Renewal period is 3600 seconds.
Wireless-N Broadband Router Security Mode > RADIUS
IMPORTANT: If you are using WEP encryption, always remember that each device in your wireless network MUST use the same WEP encryption method and encryption key, or else your wireless network will not function properly. RADIUS Server Enter the IP Address of the RADIUS server. RADIUS Port Enter the port number of the RADIUS server. The default value is 1812. Shared Secret Enter the key shared between the Router and the server. Encryption Select a level of WEP encryption, 40/64 bits (10 hex digits) or 104/128 bits (26 hex digits). The default is 40/64 bits (10 hex digits). Passphrase Enter a Passphrase to automatically generate WEP keys. Then click Generate. Key 1 If you did not enter a Passphrase, enter the WEP key manually.
WEP is a basic encryption method, which is not as secure as WPA.
Wireless > Wireless MAC Filter
Wireless MAC Filter
Enabled/Disabled To filter wireless users by MAC Address, either permitting or blocking access, select Enabled. If you do not wish to filter users by MAC Address, keep the default setting, Disabled.
This screen shows computers and other devices on the wireless network. The list can be sorted by Client Name, Interface, IP Address, MAC Address, and Status. Select Save to MAC Address Filter List for any device you want to add to the MAC Address Filter List. Then click Add. To retrieve the most up-to-date information, click Refresh. To exit this screen and return to the Wireless MAC Filter screen, click Close. MAC 01-50 Enter the MAC addresses of the devices whose wireless access you want to block or allow. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes.
Wireless > Advanced Wireless Settings
This Advanced Wireless Settings screen is used to set up the Routers advanced wireless functions. These settings should only be adjusted by an expert administrator as incorrect settings can reduce wireless performance.
AP Isolation This isolates all wireless clients and wireless devices on your network from each other. Wireless devices will be able to communicate with the Router but not with each other. To use this function, select Enabled. AP Isolation is disabled by default. Frame Burst Enabling this option should provide your network with greater performance, depending on the manufacturer of your wireless products. To use this option, keep the default, Enabled. Otherwise, select Disabled. Authentication Type The default is set to Auto, which allows either Open System or Shared Key authentication to be used. With Open System authentication, the sender and the recipient do NOT use a WEP key for authentication.
Deselect the feature to allow anonymous Internet requests. Filter Multicast Multicasting allows for multiple transmissions to specific recipients at the same time. If multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate computers. Select this feature to filter multicasting. This feature is not selected by default. Filter Internet NAT Redirection This feature uses port forwarding to block access to local servers from local networked computers. Select this feature to filter Internet NAT redirection. It is not selected by default. Filter IDENT (Port 113) This feature keeps port 113 from being scanned by devices outside of your local network. This feature is selected by default. Deselect this feature to disable it.
hear the beacons and awaken to receive the broadcast and multicast messages. The default value is 1. Fragmentation Threshold This value specifies the maximum size for a packet before data is fragmented into multiple packets. If you experience a high packet error rate, you may slightly increase the Fragmentation Threshold. Setting the Fragmentation Threshold too low may result in poor network performance. Only minor reduction of the default value is recommended. In most cases, it should remain at its default value of 2346. RTS Threshold Should you encounter inconsistent data flow, only minor reduction of the default value, 2347, is recommended. If a network packet is smaller than the preset RTS threshold size, the RTS/CTS mechanism will not be enabled. The Router sends Request to Send (RTS) frames to a particular receiving station and negotiates the sending of a data frame. After receiving an RTS, the wireless station responds with a Clear to Send (CTS) frame to acknowledge the right to begin transmission. The RTS Threshold value should remain at its default value of 2347. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes.
External Port Enter the external port number used by the server or Internet application. Check with the Internet application documentation for more information. Internal Port Enter the internal port number used by the server or Internet application. Check with the Internet application documentation for more information. Protocol Select the protocol used for this application, either TCP or UDP, or Both. To IP Address For each application, enter the IP address of the PC that should receive the requests. If you assigned a static IP address to the PC, then you can click DHCP Reservation on the Basic Setup screen to look up its static IP address. Enabled For each application, select Enabled to enable port forwarding. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes.
Applications and Gaming > Port Range Forwarding
The Port Range Forwarding screen allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized Internet applications. (Specialized Internet applications are any applications that use Internet access to perform functions such as videoconferencing or online gaming. Some Internet applications may not require any forwarding.) When users send these types of requests to your network via the Internet, the Router will forward those requests to the appropriate servers (computers). Before using forwarding, you should assign static IP addresses to the designated servers (use the DHCP Reservation feature on the Basic Setup screen). If you need to forward all ports to one computer, click the DMZ tab.
Applications & Gaming > Port Range Triggering
The Port Range Triggering screen allows the Router to watch outgoing data for specific port numbers. The IP address of the computer that sends the matching data is remembered by the Router, so that when the requested data returns through the Router, the data is pulled back to the proper computer by way of IP address and port mapping rules.
Applications and Gaming > Port Range Triggering
The Administration > Management screen allows the networks administrator to manage specific Router functions for access and security.
Remote Management To permit remote access of the Router, from outside the local network, select Enabled. Otherwise, keep the default, Disabled. Web Utility Access HTTP (HyperText Transport Protocol) is the communications protocol used to connect to servers on the World Wide Web. HTTPS uses SSL (Secured Socket Layer) to encrypt data transmitted for higher security. Select HTTP or HTTPS. HTTP is the default.
Wireless-N Broadband Router 24
Administration > Log
The Router can keep logs of all traffic for your Internet connection.
Remote Upgrade If you want to be able to upgrade the Router remotely, from outside the local network, select Enabled. (You must have the Remote Management feature enabled as well.) Otherwise, keep the default, Disabled. Allowed Remote IP Address If you want to be able to access the Router from any external IP address, select Any IP Address. If you want to specify an external IP address or range of IP addresses, then select the second option and complete the fields provided. Remote Management Port Enter the port number that will be open to outside access. NOTE: When you are in a remote location and wish to manage the Router, enter http://<Internet_IP_address>:port or https://<Internet_IP_address>:port, depending on whether you use HTTP or HTTPS. Enter the Routers specific Internet IP address in place of <Internet_IP_address>, and enter the Remote Management Port number in place of the word port.
Log To disable the Log function, select Disabled. To monitor traffic between the network and the Internet, keep the default, Enabled. With logging enabled, you can choose to view temporary logs. View Log To view the logs, click View Log.
Universal Plug and Play (UPnP) allows Windows Me and XP to automatically configure the Router for various Internet applications, such as gaming and videoconferencing. UPnP If you want to use UPnP, keep the default setting, Enabled. Otherwise, select Disabled. Allow Users to Configure Keep the default, Enabled, if you want to be able to make manual changes to the Router while using the UPnP feature. Otherwise, select Disabled. Allow Users to Disable Internet Access Select Enabled, if you want to be able to prohibit any and all Internet connections. Otherwise, keep the default setting, Disabled.
Administration > Log > View Log
When you double-click the web browser, you are prompted for a username and password. If you want to get rid of the prompt, follow these instructions. Launch the web browser and perform the following steps (these steps are specific to Internet Explorer but are similar for other browsers): 1. Select Tools > Internet Options. 2. Click the Connections tab. 3. Select Never dial a connection. 4. Click OK. The Router does not have a coaxial port for the cable connection. The Router does not replace your modem. You still need your cable modem in order to use the Router. Connect your cable connection to the cable modem, and then insert the setup CD into your computer. Click Setup and follow the onscreen instructions. The computer cannot connect wirelessly to the network. Make sure the wireless network name or SSID is the same on both the computer and the Router. If you have enabled wireless security, then make sure the same security method and key are used by both the computer and the Router. You need to modify the settings on the Router. Open the web browser (for example, Internet Explorer or Firefox), and enter the Routers IP address in the address field (the default IP address is 192.168.1.1). When prompted, enter the password to the Router (the default is admin). Click the appropriate tab to change the settings.
Appendix A: Troubleshooting
Your computer cannot connect to the Internet. Follow these instructions until your computer can connect to the Internet:
Make sure that the Router is powered on. The Power LED should be green and not flashing. If the Power LED is flashing, then power off all of your network devices, including the modem, Router, and computers. Then power on each device in the following order: 1. Cable or DSL modem 2. Router 3. Computer Check the cable connections. The computer should be connected to one of the ports numbered 1-4 on the Router, and the modem must be connected to the Internet port on the Router.
The modem does not have an Ethernet port. The modem is a dial-up modem for traditional dial-up service. To use the Router, you need a cable/DSL modem and high-speed Internet connection. You cannot use the DSL service to connect manually to the Internet. After you have installed the Router, it will automatically connect to your Internet Service Provider (ISP), so you no longer need to connect manually. The DSL telephone line does not fit into the Routers Internet port. The Router does not replace your modem. You still need your DSL modem in order to use the Router. Connect the telephone line to the DSL modem, and then insert the setup CD into your computer. Click Setup and follow the onscreen instructions.
WEB: If your questions are not addressed here,
refer to the Linksys website, www.linksys.com
Obtaining Warranty Service
If you have a question about your product or experience a problem with it, please go to www.linksys.com/support where you will find a variety of online support tools and information to assist you with your product. If the product proves defective during the Warranty Period, contact Linksys Technical Support for instructions on how to obtain warranty service. The telephone number for Linksys Technical Support in your area can be found in the product User Guide and at www.linksys.com. Have your product serial number and proof of purchase on hand when calling. A DATED PROOF OF ORIGINAL PURCHASE IS REQUIRED TO PROCESS WARRANTY CLAIMS. If you are requested to return your product, you will be given a Return Materials Authorization (RMA) number. You are responsible for properly packaging and shipping your product to Linksys at your cost and risk. You must include the RMA number and a copy of your dated proof of original purchase when returning your product. Products received without a RMA number and dated proof of original purchase will be
rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges. Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then-current rates.
This limited warranty is neither a service nor a support contract. Information about Linksys current technical support offerings and policies (including any fees for support services) can be found at: www.linksys.com/support. This limited warranty is governed by the laws of the jurisdiction in which the Product was purchased by you. Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623.
Caution: To reduce the risk of fire, use only No.26 AWG
of the Software or its related Documentation, or electronically transfer the Software or Documentation from one computer to another or over a network; (ii)alter, merge, modify, adapt, decrypt or translate the Software or related Documentation, or decompile, reverse engineer, disassemble, or otherwise reduce the Software to a human-perceivable form (except to the extent expressly permitted by law notwithstanding this provision); (iii) share, sell, rent, lease, or sublicense the Software or related Documentation; (iv)modify the Software or create derivative works based upon the Software; (v) if you make a backup copy of the Software and Documentation, you must reproduce all copyright notices and any other proprietary legends found on the original Software and Documentation; (vi)use the Software for management of a business network with more than 8 computers; (vii)use the Software under any circumstances for competitive evaluation, including developing competing software; (ix)to the extent permitted under applicable law, assign, sublicense or otherwise transfer the Software unless the prospective assignee, sublicensee or transferee expressly agrees to all the terms and conditions under this Agreement. The Software and Documentation contain trade secrets and/or copyrighted materials of Cisco or its suppliers. You will not disclose or make available such trade secrets or copyrighted material in any form to any third party. In the event that you fail to comply with this Agreement, the license granted to you will automatically terminate, at which time you must immediately (i) stop using the Cisco Product in which the Software is embedded, or (ii) uninstall the Software and destroy all copies of the Software and Documentation where the Software is purchased separately. All other rights of both parties and all other provisions of this Agreement will survive this termination. Ownership. The Software and Documentation are licensed and not sold to you by Cisco and the relevant third parties set forth in Schedule 3. Cisco and its licensors retain all right, title and interest, including all copyright and intellectual property rights, in and to, the Software and Documentation and all copies and portions thereof. All rights not specifically granted to you in this Agreement are reserved by Cisco and its licensors. Your use of any software product from an entity other than Cisco that may have been recommended by Cisco is governed by such software products end user license agreement. Links and Advertising. Cisco may provide from within the Software links to websites or third party software products that are beyond our control. Cisco makes no representations as to the quality, suitability, functionality, or legality of any sites or products to which links may be provided, and you hereby waive any claim you might have against Cisco with respect to such sites or third party software products. Your correspondence or
8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 9. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it. 10.Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may not impose any further restrictions on the recipients exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties with this License. 11.If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Library at all. For example, if a patent license would not permit royalty-free redistribution of the Library by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices. Many people have made generous contributions to the wide range of
b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the users computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with. c) Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution. d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place. e) Verify that the user has already received a copy of these materials or that you have already sent this user a copy. For an executable, the required form of the work that uses the Library must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you distribute. 7. You may place library facilities that are a work based on the Library side-by-side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things: a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above. b) Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work.
V2 Firmware LE26C452c4H Siemens S700 Silhouette 2001 Ensoniq DP-2 CS-29Z40MH Ferrari F430 32HF7874 Essentials 3 TX-26LX60P Siemens C110 402 S Monitor Dxai5588-3 RM-V15 CV-3720S G Ryobi P540 37PFL9603D Nokia 6265 URC 1001 Witl 125 Sonar 6 72720-W Pilot PI6500E TX-32LM70F IC-20L Rising SUN L173SA 50PC5DC VGN-FZ18E Scanner SRF-M97 Setup 700SI 200DX Optraimage 232 Server 2011 Mce KIT SP0008 LTH59800 Troubleshooting Magicolor 2350 VDA-1000 LMF-200 Problems Tecra 780 CMT-NEZ3 XJR1300-2005 LE26A456c2C Radio700 Express GR-2 S75388KG68 Utstarcom 6700 Hd 4770 Drive Manual Electronic D-460 Zoom V2 4 BBM 1038 SH-B123L Flash R1245AV Samsung ES63 323 D System DSR-1000 Quicksetup Default Password Continental 1997 DPP-EX50 KD-G722 TC-K808ES Nokia N82 F65011VI RM-V402LIV 50PC1DRA LVC-837 Battlefield 2142 Edition CD1920 EF3000ISE SCH-R800 DI200 Live 2 T713SH-BN DMR-E70V Kodak S730 S8100FD MPK-THJ VL1716 Roland FP-3 Networks 37RA1E SA10003 G-smart S40 45PRO MAC 842 DMR-HS2 22PFL5403D 10 SA-608 8398 PC FP-P40CX IR310CD FV825N
manuel d'instructions, Guide de l'utilisateur | Manual de instrucciones, Instrucciones de uso | Bedienungsanleitung, Bedienungsanleitung | Manual de Instruções, guia do usuário | инструкция | návod na použitie, Užívateľská príručka, návod k použití | bruksanvisningen | instrukcja, podręcznik użytkownika | kullanım kılavuzu, Kullanım | kézikönyv, használati útmutató | manuale di istruzioni, istruzioni d'uso | handleiding, gebruikershandleiding
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101