External, Firewall protection, NAT support, auto-uplink (auto MDI/MDI-X), Stateful Packet Inspection (SPI), VPN passthrough, firmware upgradable, MIMO…
The Dual-Band Wireless-N Gigabit Router is really four devices in one box. First, there's the dual-band Wireless Access Point, which lets you connect to the network without wires. There's also a built-in 4-port full-duplex 10/100/1000 Switch to connect your wired-Ethernet devices together at up to gigabit speeds. The Router function ties it all together and lets your whole network share a high-speed cable or DSL Internet connection. Linksys has also included a Storage Link that lets you ... Read more [ Report abuse or wrong photo | Share your Linksys WRT610N photo ]
Linksys WRT610N, size: 4.0 MB
Linksys WRT610N Quick Installation Guide
Linksys WRT610N Technical Specifications
Linksys WRT610N Simultaneous Dual Band Wireless 802.11n Router w/ Attached Storage (Review ...
User reviews and opinions
|notknowsh||8:45pm on Thursday, November 4th, 2010|
|Linksys WRT610N Ultra RangePlus Simultaneous Dual-N Band Wireless Router seen this smooth, stylish, and most important is a router wifi super fast.|
|bastain||10:44am on Saturday, September 25th, 2010|
|I had overheating and signal interruption pro... When it works, it works. Runs 5Ghz and 2.4Ghz bands simultaneously This is NOT for noobs. You have to know what you are doing to use this router Wanted to upgrade from an old WRT54G to an N-class; found a great deal on this unit at Office Depot. Now I know why URL will randomly redirect (i.e..|
|littochoco||2:52am on Tuesday, August 10th, 2010|
|Not sure about the reviews I have seen for this. I was skeptical at first, but bought one anyway... connecting on 5ghz N is amazing.|
|ridgeway||12:12pm on Saturday, July 24th, 2010|
|Excellent Upgrade I bought this to upgrade from an older Linksys router due to an ever-expanding home network. This router rocks!!|
|catatized||10:22am on Sunday, May 16th, 2010|
|This router is quite like a dream for all its reliability and functionality. Mind you. Was DOA and Linksys would only replace it through RMA with a refurbished unit. I had to return the first refurb because it was scratched and dirty.|
|MCA||10:44pm on Tuesday, April 20th, 2010|
|Great router and provides a low cost NAS option This is a great little router. WRT610N dual band router Overall - very good. Neatly designed - easy to set up - though on the negative side.|
|ThomasOwens||5:18pm on Monday, April 5th, 2010|
|without the network dirve feature working, th... looks cool net work drive feature does not work, maybe only for large drives (>1TB)?|
|BOFH||5:15pm on Monday, April 5th, 2010|
|The Linksys WRT610N at the time of this writing is the current top of the line Linksys (by Cisco) home router.|
|VanDan||8:30am on Wednesday, March 31st, 2010|
|the router can get a little warm/hot admin interface (192.168.1. RATING: 4-5 for Router when cooled RATING: 0 when not cooled. Great Router if you use a cooler as described above.|
Comments posted on www.ps2netdrivers.net are solely the views and opinions of the people posting them and do not necessarily reflect the views or opinions of us.
Internet Connection Type > PPTP
If your ISP supports DHCP or you are connecting through a dynamic IP address, then select Obtain an IP Address Automatically. If you are required to use a permanent IP address to connect to the Internet, then select Specify an IP Address. Then configure the following: Internet IP Address This is the Routers IP address, as seen from the Internet. Your ISP will provide you with the IP Address you need to specify here. Subnet Mask This is the Routers Subnet Mask, as seen by users on the Internet (including your ISP). Your ISP will provide you with the Subnet Mask.
Internet Connection Type > PPPoE
Default Gateway Your ISP will provide you with the Gateway Address, which is the ISP servers IP address. DNS Your ISP will provide you with at least one DNS (Domain Name System) Server IP Address. Server IP Address Your ISP will provide you with the Server IP Address.
User Name and Password Enter the User Name and Password provided by your ISP.
Keep Alive: Redial Period If you select this option, the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re-establish your connection. To use this option, select Keep Alive. In the Redial Period field, you specify how often you want the Router to check the Internet connection. The default Redial Period is 30 seconds.
User Name and Password Enter the User Name and Password provided by your ISP. Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time). If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again. To use this option, select Connect on Demand. In the Max Idle Time field, enter the number of minutes you want to have elapsed before your Internet connection terminates. The default Max Idle Time is 5 minutes. Keep Alive: Redial Period If you select this option, the Router will periodically check your Internet connection. If you are disconnected, then the Router will automatically re-establish your connection. To use this option, select Keep Alive. In the Redial Period field, specify how often you want the Router to check the Internet connection. The default value is 30 seconds.
Telstra Cable is a service that applies to connections in Australia only.
Internet Connection Type > Telstra Cable
L2TP is a service that applies to connections in Israel only.
Server IP Address This is the IP address of the Telstra Cable. Your ISP will provide you with the IP Address you need to specify here. User Name and Password Enter the User Name and Password provided by your ISP.
Some of these settings may be required by your ISP. Verify with your ISP before making any changes.
Internet Connection Type > L2TP
Server IP Address This is the IP address of the L2TP Server. Your ISP will provide you with the IP Address you need to specify here. User Name and Password Enter the User Name and Password provided by your ISP. Connect on Demand: Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time (Max Idle Time). If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again. To use this option, select Connect on Demand. In the Max Idle Time field, enter the number of minutes you want to have elapsed before your Internet connection terminates. The default Max Idle Time is 5 minutes
Host Name/Domain Name These fields allow you to supply a host and domain name for the Router. Some ISPs, usually cable ISPs, require these names as identification. You may have to check with your ISP to see if your broadband Internet service has been configured with a host and domain name. In most cases, leaving these fields blank will work. MTU MTU is the Maximum Transmission Unit. It specifies the largest packet size permitted for Internet transmission. Select Manual if you want to manually enter the largest packet size that is transmitted. To have the Router select the best MTU for your Internet connection, keep the default setting, Auto. Size When Manual is selected in the MTU field, this option is enabled. Leave this value in the 1200 to 1500 range. The default size depends on the Internet Connection Type:
DHCP, Static IP, or Telstra: 1500 PPPoE: 1492 PPTP or L2TP: 1460
Client Lease Time The Client Lease Time is the amount of time a network user will be allowed connection to the Router with their current dynamic IP address. Enter the amount of time, in minutes, that the user will be leased this dynamic IP address. After the time is up, the user will be automatically assigned a new dynamic IP address. The default is 0 minutes, which means one day. Static DNS (1-3) The Domain Name System (DNS) is how the Internet translates domain or website names into Internet addresses or URLs. Your ISP will provide you with at least one DNS Server IP Address. If you wish to use another, enter that IP Address in one of these fields. You can enter up to three DNS Server IP Addresses here. The Router will use these for quicker access to functioning DNS servers. WINS The Windows Internet Naming Service (WINS) manages each PCs interaction with the Internet. If you use a WINS server, enter that servers IP Address here. Otherwise, leave this blank. DHCP Reservation Click DHCP Reservation if you want to assign a fixed local IP address to a MAC address.
NAT If this Router is hosting your networks connection to the Internet, select Enabled. When NAT is disabled, Dynamic Routing (RIP) will be available as an option. Dynamic Routing (RIP) This feature enables the Router to automatically adjust to physical changes in the networks layout and exchange routing tables with the other router(s). The Router determines the network packets route based on the fewest number of hops between the source and the destination. This feature is Disabled by default.
Select Route Entry number To set up a static route between the Router and another network, select a number from the drop-down list. (A static route is a predetermined pathway that network information must travel to reach a specific host or network.) Enter the information described below to set up a new static route. (Click Delete This Entry to delete a static route.) Enter Route Name Enter a name for the Route here, using a maximum of 25 alphanumeric characters. Destination LAN IP The Destination LAN IP is the address of the remote network or host to which you want to assign a static route. Subnet Mask The Subnet Mask determines which portion of a Destination LAN IP address is the network portion, and which portion is the host portion.
Network Mode (5 GHz) From this drop-down menu, you can select the wireless standards running on your network. If you have both Wireless-A and Wireless-N (5GHz) devices in your network, keep the default setting, Mixed. If you have only Wireless-A devices, select Wireless-A Only. If you have only Wireless-N (5GHz) devices, select WirelessN Only. If you do not have any Wireless-A and Wireless-N (5GHz) devices in your network, select Disabled. Network Mode (2.4 GHz) From this drop-down menu, you can select the wireless standards running on your network. If you have both Wireless-B, Wireless-G and Wireless-N (2.4GHz) devices in your network, keep the default setting, Mixed. If you have only Wireless-B devices, select Wireless-B Only. If you have only Wireless-G devices, select Wireless-G Only. If you have only Wireless-N (2.4GHz) devices, select Wireless-N Only. If you do not have any Wireless-B, Wireless-G and Wireless-N (2.4GHz) devices in your network, select Disabled. Wireless Network Name (SSID) The SSID is the network name shared among all points in a wireless network. The SSID must be identical for all devices in the wireless network. It is case-sensitive and must not exceed 32 keyboard characters. Make sure this setting is the same for all points in your wireless network. For added security, you should change the default SSID to a unique name. Radio Band (5 GHz) For best performance in a network using Wireless-A and Wireless-N (5GHz) devices, keep the default, Auto. Radio Band (2.4 GHz) For best performance in a network using Wireless-B, Wireless-G and Wireless-N (2.4GHz) devices, select Auto. The default is Standard - 20MHz Channel. Wide Channel (5 GHz) If you selected Wide - 40MHz Channel for the Radio Band setting, then this setting will be available for your primary Wireless-N (5GHz) channel. If you are not sure which channel to select, keep the default, Auto (DFS). Wide Channel (2.4 GHz) If you selected Wide - 40MHz Channel for the Radio Band setting, then this setting will be available for your primary Wireless-N (2.4GHz) channel. If you are not sure which channel to select, keep the default, Auto. Standard Channel (5 GHz) Select the channel for Wireless-A and Wireless-N (5GHz) networking. If you selected Wide 40MHz Channel for the Radio Band setting, then the Standard Channel will be a secondary channel for Wireless-N (5GHz). If you are not sure which channel to select, keep the default, Auto (DFS).
Applications and Gaming > QoS
Quality of Service (QoS) ensures better service to high-priority types of network traffic, which may involve demanding, real-time applications, such as videoconferencing.
Applications and Gaming > DMZ
The DMZ feature allows one network computer to be exposed to the Internet for use of a special-purpose service such as Internet gaming or videoconferencing. DMZ hosting forwards all the ports at the same time to one PC. The Port Forward feature is more secure because it only opens the ports you want to have opened, while DMZ hosting opens all the ports of one computer, exposing the computer to the Internet.
Any PC whose port is being forwarded should have its DHCP client function disabled and have a new static IP address assigned to it because its IP address may change when using the DHCP function. To allow PCs on the Internet to access a local PC, select Enabled. Then, select Any IP Address or manually enter a specific source IP address of the computer you want to allow access from the Internet. Then, enter your local PCs IP address or MAC address that you want to allow access to. This feature is disabled by default. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes.
QoS (Quality of Service)
Wireless WMM (Wi-Fi Multimedia) WMM is a wireless Quality of Service feature that improves quality for audio, video, and voice applications by prioritizing wireless traffic. To use this feature, your wireless client devices in your network must support Wireless WMM. If you would like to disable this feature, select Disabled. Otherwise, keep the default, Enabled. No Acknowledgement If you want to disable the Routers Acknowledgement feature, so the Router will not re-send data if an error occurs, select Enabled. Otherwise, keep the default, Disabled.
Internet Access Priority
In this section, you can set the bandwidth priority for a variety of applications and devices. There are four levels of priority; High, Medium, Normal, or Low. When you set priority, do not set all applications to High, because this will defeat the purpose of allocating the available bandwidth. If you want to select below normal bandwidth, select Low. Depending on the application, a few attempts may be needed to set the appropriate bandwidth priority. Enabled/Disabled To use the QoS policies you set, select Enabled. Otherwise, select Disabled.
There are four categories available. Select one of the following: Applications, Online Games, MAC Address, Ethernet Port, or Voice Device. Proceed to the instructions for your selection.
Applications Select the appropriate application. If you select Add a New Application, follow the instructions in the Add a New Application section. Priority Select the appropriate priority: High, Medium, Normal, or Low. Click Add to save your changes. Your new entry will appear in the Summary list.
Add a New Application
Games Select the appropriate game. If you select Add a New Game, follow the instructions in the Add a New Game section. Priority Select the appropriate priority: High, Medium, Normal, or Low. Click Add to save your changes. Your new entry will appear in the Summary list.
Add a New Game
Enter a Name Enter any name to indicate the name of the entry. Port Range Enter the port range that the application will be using. For example, if you want to allocate bandwidth for FTP, you can enter 21-21. If you need services for an application that uses from 1000 to 1250, you enter 10001250 as your settings. You can have up to three ranges to define for this bandwidth allocation. Port numbers can range from 1 to 65535. Check your applications documentation for details on the service ports used. Select the protocol TCP or UDP, or select Both. Priority Select the appropriate priority: High, Medium, Normal, or Low. Click Add to save your changes. Your new entry will appear in the Summary list.
Enter a Name Enter a name for this application. Port Range Enter the port range that the application will be using. For example, if you want to allocate bandwidth for FTP, you can enter 21-21. If you need services for an application that uses from 1000 to 1250, you enter 1000-1250 as your settings. You can have up to three ranges to define for this bandwidth allocation. Port numbers can range from 1 to 65535. Check your applications documentation for details on the service ports used. Select the protocol TCP or UDP, or select Both. Priority Select the appropriate priority: High, Medium, Normal, or Low. Click Add to save your changes. Your new entry will appear in the Summary list.
Enter a Name Enter a name for your device. MAC Address Enter the MAC address of your device. Priority Select the appropriate priority: High, Medium, Normal, or Low. Click Add to save your changes. Your new entry will appear in the Summary list.
Enter a Name Enter a name for your voice device. MAC Address. Enter the MAC address of your voice device. Priority Select the appropriate priority: High, Medium, Normal, or Low. Click Add to save your changes. Your new entry will appear in the Summary list.
Administration > Log
The Router can keep logs of all traffic for your Internet connection.
Log To disable the Log function, keep the default setting, Disabled. To monitor traffic between the network and the Internet, select Enabled. Logviewer IP Address If your computer uses Logviewer software you can enter enter the fixed IP address of the PC running the software in the Logviewer IP Address field.s The Router will now send updated logs to that PC.
Remote Management Access
Remote Management To access the Router remotely from the Internet, select Enabled. Access via Select HTTP or HTTPS communications protocols for remote access from the Internet. Remote Upgrade Select Enabled to be able to upgrade the firmware remotely from the Internet.
Traceroute To test the performance of a connection, click Traceroute to open the Traceroute Test screen. Enter the address of the PC whose connection you wish to test and click Traceroute. The Traceroute Test screen will show if the test was successful. Click Close to return to the Diagnostics screen.
When you wish to view the logs, click View Log. Click Save the Log to save your log, click Refresh to refresh the screen, or click Clear to clear the screen. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes.
Administration > Diagnostics
The diagnostic tests (Ping and Traceroute) allow you to check the connections of your Internet network.
Traceroute Test Administration > Diagnostics
Ping The Ping test checks the status of a connection. Enter the address of the PC whose connection you wish to test and how many times you wish to test it. Then, click Start to Ping. The Ping Test screen will show if the test was successful. Click Close to return to the Diagnostics screen.
Administration > Factory Defaults
The Administration > Factory Defaults screen allows you to restore the Routers configuration to its factory default settings.
Restore Factory Defaults To reset the Routers settings to the default values, select Restore Factory Defaults. Any settings you have saved will be lost when the default settings are restored.
Administration > Firmware Upgrade
The Administration > Firmware Upgrade screen allows you to upgrade the Routers firmware. Do not upgrade the firmware unless you are experiencing problems with the Router or the new firmware has a feature you want to use.
10.On your desktop, double-click My Computer. The Default shared folder of your USB storage is listed under Network Location.
How to Create a Shared Folder
1. Click the Storage tab. 2. Click the Disk tab. 3. To create a shared folder, click Create Share.
NOTE: Repeat steps 1-10 to map the USB
storage to each Vista computer on your network,
Advanced Configuration (Advanced Users Only)
To manage access to the USB storage device, you can create shared folders, user groups, and user accounts. Follow the instructions in this section.
To access the web-based utility, launch the web browser on your computer, and enter the Routers default IP address, 192.168.1.1 or http://wrt610n.com, in the Address field. Then, press Enter. A password request screen will appear. (Non-Windows XP users will see a similar screen.) Leave the User name field blank. The first time you open the web-based utility, use the default password admin. (You can set a new password from the Administration tabs Management screen.) Click OK to continue.
How to Create a User Group
1. Click the Storage tab. 2. Click the Administration tab. 3. In the Group Management section, click Create New Group.
Display Name Enter a display name that will appear in the Shared Folder table of the Disk screen. Partion The name of the Partion to share, that you selected in the Shared Folder will appear here. Location The location of the shared folder is displayed. New Folder To create a new folder, enter a name for the folder and click Create. Share entire Partion To share the entire partition, click the check box for Share entire Partion. If you dont want to share the entire partition, you can specify the folder you do want to share. Select a folder name to share. To see a sub-folder, click Enter into Folder. To return to the previous folder, click Return to Upper Folder. To create a new folder, enter a name in the New Folder field, then click Create. Access Select the right Access arrows to allow access to a group or the left arrows to remove access to a group. You can allow Read and Write or Read Only access. To add more groups, go to the Storage > Administration s Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Click Close to exit the screen.
4. The Group Account screen appears. In the Group Name field, enter a name for the new group.
5. In the Description field, enter a description for the new group. 6. From the Access drop-down menu, select read and write or read only access. 7. On the Group Account screen, click Save Settings to save the new changes, or click Cancel Changes to cancel the changes. Click Close to close the screen. 8. On the Administration screen, click Save Settings to apply your changes, or click Cancel Changes to cancel your changes.
How to Change the Server Name
1. Click the Storage tab.
Simultaneous Dual-N Band Wireless Router 39
How to Create a User Account
1. Click the Storage tab. 2. Click the Administration tab. 3. In the User Management section, click Create New User. 4. The User Account screen appears. In the User Name field, enter a name for the new user.
2. Click the Administration tab. 3. In the Information, Server Name field enter a new Server name. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Click Close to exit the screen.
5. In the Full Name field, enter the full name of the new user. 6. In the Description field, enter a description for the new user. 7. In the Password and Confirm Password fields, enter a password. 8. From the Group Member drop-down menu, select the appropriate group. 9. If you want to disable the user account, select Account Disabled. 10.On the User Account screen, click Save Settings to save the new changes, or click Cancel Changes to cancel the changes. Click Close to close the screen. 11.On the Administration screen, click Save Settings to apply your changes, or click Cancel Changes to cancel your changes.
Antenna Gain in dBi 2.4GHz: RIFA 1 & RIFA 2 & RIFA 3 <= 4dBi (Typical) UPnP Security Features WEP Key Bits 5GHz: RIFA 1 & RIFA 2 & RIFA 3 <= 3.5dBi (Typical) Supported WEP, WPA, WPA2 Up to 128-Bit Encryption 8.86" x 1.38" x 7.09" (225 x 35 x 180 mm) 1 lb. 15.94 oz (452g) 12V or 1.5A FCC, IC, CE, Wi-Fi a/b/g/draft-n, 0 to 40C (32 to 104F) -20 to 60C (-4 to 140F) 5 to 90% Noncondensing
Appendix C: Specifications
Model Standards Ports Button LEDs No. of Antennas Modulations Receive Sensitivity WRT610N Draft 802.11n, 802.11a, 802.11g, 802.11b, 802.3, 802.3u, 802.3ab Power, Ethernet, Internet, USB Reset, Wi-Fi Protected Setup Power, USB, Internet, Wireless, Wi- Fi Protected Setup,Ethernet (1-4) 3 Antennas for 2.4 GHz Wireless-N 3 Antennas for 5 GHz Wireless-N 802.11b: CCK, QPSK, BPSK 802.11g: OFDM 802.11a: OFDM Wireless-N: BPSK, QPSK, 16-QAM, 64-QAM 802.11b: 16+/-1.5dBm Typical @ Normal Temp Range 802.11g: 13.5+/-1.5dBmTypical @ Normal Temp Range Wireless-N 20MHz: 13+/-1.5dBm Typical @ Normal Temp Range Wireless-N 40MHz: 13+/-1.5dBm Typical @ Normal Temp Range 5GHz 802.11a: 12.5+/-1.5dBmTypical @ Normal Temp Range Wireless-N 20MHz: 8.5+/-1.5dBm Typical @ Normal Temp Range Wireless-N 40MHz: 11+/-1.5dBmTypical @ Normal Temp Range 2.4GHz 11Mbps: -86dBm @ Typical 54Mbps: -71dBm @ Typical 130Mbps (20MHz): -70dBm@ Typical 270Mbps (40MHz): -66dBm@ Typical 5GHz 54Mbps: -67dBm @ Typical 130Mbps (20MHz): -68dBm@ Typical 270Mbps (40MHz): -62dBm@ Typical
Dimensions Unit Weight Power Certifications Operating Temp. Storage Temp. Storage Humidity
Operating Humidity 10 to 80%, Noncondensing
RF Pwr (EIRP) in dBm 2.4GHz
Specifications are subject to change without notice.
service offerings. This limited warranty shall not apply to such third party software or service offerings. This limited warranty does not guarantee any continued availability of a third partys service for which this products use or operation may require. TO THE EXTENT NOT PROHIBITED BY LAW, ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, SATISFACTORY QUALITY OR FITNESS FOR A PARTICULAR PURPOSE ARE LIMITED TO THE DURATION OF THE WARRANTY PERIOD. ALL OTHER EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING, BUT NOT LIMITED TO, ANY IMPLIED WARRANTY OF NON-INFRINGEMENT, ARE DISCLAIMED. Some jurisdictions do not allow limitations on how long an implied warranty lasts, so the above limitation may not apply to you. This limited warranty gives you specific legal rights, and you may also have other rights which vary by jurisdiction. TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL LINKSYS BE LIABLE FOR ANY LOST DATA, REVENUE OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF THE THEORY OF LIABILITY (INCLUDING NEGLIGENCE), ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILL LINKSYS LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT. The foregoing limitations will apply even if any warranty or remedy provided under this limited warranty fails of its essential purpose. Some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages, so the above limitation or exclusion may not apply to you.
Appendix D: Warranty Information
Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which begins on the date of purchase by the original end-user purchaser and lasts for the period specified below:
If this Linksys product contains open source software licensed under Version 2 of the GNU General Public License then the license terms below in this Schedule 2 will apply to that open source software. The license terms below in this Schedule 2 are from the public web site at http://www.gnu.org/copyleft/gpl.html
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991 Copyright 1989, 1991 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The Program, below, refers to any such program or work, and a work based on the Program means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/ or translated into another language. (Hereinafter, translation is included without limitation in the term modification.) Each licensee is addressed as you. Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. 1. You may copy and distribute verbatim copies of the Programs source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a. You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b. You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.
freedom to share and change free softwareto make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundations software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each authors protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyones free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow.
c. Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. 6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License.
7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and any later version, you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does
11.BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12.IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS END OF SCHEDULE 2
The Dual-Band Wireless-N Gigabit Router is really four devices in one box. First, there's the dual-band Wireless Access Point, which lets you connect to the network without wires. There's also a built-in 4-port full-duplex 10/100/1000 Switch to connect your wired-Ethernet devices together at up to gigabit speeds. The Router function ties it all together and lets your whole network share a high-speed cable or DSL Internet connection. Linksys has also included a Storage Link that lets you easily add gigabytes of storage space onto your network using readily available USB 2.0 hard drives - or plug in a USB flash disk for a convenient way to access your portable data files. The built-in Media Server streams music, video, and photos from the attached storage device to any UPnP compatible media adapter. And you can get to your files from anywhere in the world through the Internet. The Access Point built into the Router uses a dual-band version of the very latest wireless networking technology, Wireless-N (draft 802.11n). By overlaying the signals of multiple radios for each band, Wireless- N's "Multiple In, Multiple Out" (MIMO) technology multiplies the effective data rate. Unlike ordinary wireless networking technologies that are confused by signal reflections, MIMO actually uses these reflections to increase the range and reduce "dead spots" in the wireless coverage area. The robust signals travel farther, maintaining wireless connections much farther than standard Wireless-G Wireless-N works great with standard Wireless-G, -A, and -B equipment, but when both ends of the wireless link are Wireless-N, the router can increase the throughput even more by using twice as much radio band, yielding speeds much faster than standard Wireless-G. But unlike other speed-enhanced technologies, Wireless-N can dynamically enable this double-speed mode for Wireless-N devices, while still connecting to other wireless devices at their respective fastest speeds. In congested areas, the "good neighbor" mode ensures that the Router checks for other wireless devices in the area before gobbling up the radio band. To help protect your data and privacy, the Router can encode all wireless transmissions with industrial-strength 256-bit encryption. It can serve as your network's DHCP Server, has a powerful SPI firewall to protect your PCs against intruders and most known Internet attacks, and supports VPN pass-through. Configuration is a snap with the web browser-based configuration utility. The incredible speed of Wireless-N and gigabit wired networking is ideal for media-centric applications like streaming video, gaming, and Voice over IP telephony, and gives you plenty of headroom to run multiple media-intense data streams through the network at the same time, with no degradation in performance.
|Device Type||Wireless router|
|Connectivity Technology||Wireless, wired|
|Integrated Switch||4-port switch|
|Line Coding Format||CCK, 64 QAM, BPSK, QPSK, 16 QAM, OFDM|
|Data Link Protocol||Ethernet, Fast Ethernet, Gigabit Ethernet, IEEE 802.11b, IEEE 802.11a, IEEE 802.11g, IEEE 802.11n (draft)|
|Network / Transport Protocol||PPTP, L2TP, PPPoE|
|Routing Protocol||RIP, static IP routing|
|Remote Management Protocol||HTTP, HTTPS|
|Status Indicators||Port status, power|
|Features||Firewall protection, NAT support, auto-uplink (auto MDI/MDI-X), Stateful Packet Inspection (SPI), VPN passthrough, firmware upgradable, MIMO technology, Wi-Fi Multimedia (WMM) support, Quality of Service (QoS), Wi-Fi Protected Setup (WPS), DHCP server|
|Compliant Standards||IEEE 802.3, IEEE 802.3u, IEEE 802.3ab, IEEE 802.11b, IEEE 802.11a, IEEE 802.3x, IEEE 802.11g, IEEE 802.11n|
|Expansion / Connectivity|
|Interfaces||1 x network - Ethernet 10Base-T/100Base-TX/1000Base-T - RJ-45 ( WAN ) 4 x network - Ethernet 10Base-T/100Base-TX/1000Base-T - RJ-45 1 x Hi-Speed USB - 4 pin USB Type A|
|Cables Included||1 x network cable|
|Encryption Algorithm||128-bit WEP, 64-bit WEP, WPA, WPA2|
|Certified for Windows Vista||Certified for Windows Vista software and devices have undergone compatibility tests for ease-of-use, better performance and enhanced security.|
|Compliant Standards||CE, IC, FCC|
|Power Device||Power adapter - external|
|Service & Support||1 year warranty|
|Service & Support Details||Limited warranty - 1 year|
|Min Operating Temperature||32 °F|
|Max Operating Temperature||104 °F|
|Humidity Range Operating||10 - 80%|
|Universal Product Identifiers|
|GTIN||00745883585205, 00045883585206, 00745883585267, 04260039347750|
Theater DP-C213 MM6 Mm8 SRP-285II GE87L 1F-4611 F5D4072ED 3KF4830N Voip3211G EWF2004A Citiz Milk Hcb-100E XM-228 Touch Lexmark T640 Terra Problems CDX-715 F 90101 S1110 Firmware VGN-NS20e P Digimax-430 MSC-A09YV Manual Optio W10 Software Nuvi 1245 FBD103 Reference Default Password Scanner 7105T GE89MST Dpac8020 QV-R62 Voicemasterpro Cruzer4 Clock Bizhub 181 Server SC-D364 SCR-187 OW3000 4570C Century 1999 Sd ED DJX-II EL-510R BM 2600 AX-930 SG-DV1660FLC Phone LBP5200 TT1510 P6300 DCR-SR40E Krups FNA2 LE26M51B H10515 MIX-stick DM905 TEW-431BRP Olympus D380 CLP-511-CLP-411 EL-W546 910MP DC-521 990 IS KX-TCD952 V1 Korg X5 Dondolino NP-Q530-js01 DAV-DZ280 Phone Easy LT-D4880HL 740NW R-805X Laserjet 3600 TMR-BT10 Version 6 DCC 600 Husqvarna 128R Firmware Upgrade Speakers DI470 KR532 Setup HR-20E IM-4406 Impressa S50 860IS PT-L6500U Threat KX-TS600FXB Pc2002M Marantz 10B TXL32S20B TH-42PS9 MXD-D40 VCT-870RM Maxima-2002 61 Deko V2 LE26A451 AX-592
manuel d'instructions, Guide de l'utilisateur | Manual de instrucciones, Instrucciones de uso | Bedienungsanleitung, Bedienungsanleitung | Manual de Instruções, guia do usuário | инструкция | návod na použitie, Užívateľská príručka, návod k použití | bruksanvisningen | instrukcja, podręcznik użytkownika | kullanım kılavuzu, Kullanım | kézikönyv, használati útmutató | manuale di istruzioni, istruzioni d'uso | handleiding, gebruikershandleiding
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101