Page 5: Chapter 1: Product Overview Product Overview is flashing, the Router is actively sending or receiving data over the network. The Router lets you access the Internet via Page 6 Router down until the screws fit snugly into the true to scale. NOTE: Linksys is not responsible for damages incurred by insecure wall-mounting hardware. Cut along the dotted line, and place on the wall to drill precise spacing. Page 7: Chapter 2: Wireless Security Checklist 3.
|Published (Last):||28 March 2014|
|PDF File Size:||12.57 Mb|
|ePub File Size:||4.2 Mb|
|Price:||Free* [*Free Regsitration Required]|
Page 2: About This Guide Network www. Other brands and product names are trademarks or registered trademarks of their respective holders. Page 5: Chapter 1: Product Overview Product Overview is flashing, the Router is actively sending or receiving data over the network. The Router lets you access the Internet via Determine where you want to mount the Router. Make The Router has two wall-mount slots on its bottom sure that the wall you use is smooth, flat, dry, and panel.
The distance between the slots is mm sturdy. The MAC address is a unique series of numbers and letters assigned to every networking device. With MAC address filtering enabled, wireless network access is provided solely for wireless devices with specific MAC addresses. The default Max Idle Time is 15 minutes. Page 10 Advanced Configuration Chapter 3 inactivity, Connect on Demand enables the Router to Telstra Cable automatically re-establish your connection as soon as you Telstra Cable is a service that applies to connections in attempt to access the Internet again.
To use this option, Australia only. Page 11 Advanced Configuration Chapter 3 host and domain name. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes.
For added security, you should change Mask, Gateway, and Interface are displayed. Click the default SSID linksys to a unique name. Refresh to update the information. Click Close to exit this screen. After the client device has been configured, click OK. Then refer back to your client device or its There are three methods available.
Use the method that documentation for further instructions. Select Shared Key to This screen shows computers and other devices on only use Shared Key authentication. The default value is 1. Fragmentation Threshold Filter Multicast This value specifies the Multicasting allows multiple maximum size for a packet before data is fragmented transmissions to specific recipients at the same time.
To enable a policy, Check with the Internet To forward a port, enter the information on each line for application documentation for more information. Check with the Internet application documentation for the port number s needed.
Click Add to save your changes.
Wireless-N Gigabit Router
Linksys WRT310N - Wireless-N Gigabit Router Wireless User Manual
Dual-Band Wireless-N Gigabit Router
Cisco WRT320N User Manual